B Ba Guide Win
B Ba Guide Win
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page
751.
This edition applies to version 8, release 1, modification 9 of IBM Spectrum Protect (product numbers 5725-W98, 5725-
W99, and 5725-X15) and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright International Business Machines Corporation 1993, 2019.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
Tables................................................................................................................. xv
iii
Automated client failover configuration and use......................................................................................52
Automated client failover overview..................................................................................................... 52
Configuring the client for automated failover......................................................................................55
Determining the status of replicated client data.................................................................................57
Preventing automated client failover...................................................................................................58
Forcing the client to fail over................................................................................................................59
Configuring the client to back up and archive Tivoli Storage Manager FastBack data............................ 59
Configuring the backup-archive client to protect FastBack client data................................................... 60
Backups in a cluster server environment..................................................................................................62
Protecting data in MSCS clusters (Windows Server clients)............................................................... 62
Configure the web client in a cluster environment..............................................................................63
Frequently asked questions.................................................................................................................70
Configuring online-image backup support................................................................................................72
Configuring Open File Support.................................................................................................................. 72
Configuring NetApp and IBM Spectrum Protect for snapshot difference incremental backups............ 73
Protecting clustered-data ONTAP NetApp file server volumes.......................................................... 75
SnapMirror support for NetApp snapshot-assisted progressive incremental backup (snapdiff)......78
Register your workstation with a server....................................................................................................80
Closed registration............................................................................................................................... 81
Open registration..................................................................................................................................81
Creating an include-exclude list ............................................................................................................... 81
Include-exclude options...................................................................................................................... 82
Determine compression and encryption processing.......................................................................... 90
Preview include-exclude list files........................................................................................................ 91
Include and exclude option processing...............................................................................................92
Processing rules when using UNC names........................................................................................... 93
iv
Displaying online help............................................................................................................................. 118
Ending a session...................................................................................................................................... 118
Online forums.......................................................................................................................................... 119
v
Display backup processing status...........................................................................................................170
Backup (Windows): Additional considerations.......................................................................................173
Open files............................................................................................................................................173
Ambiguous file space names in file specifications............................................................................174
Management classes......................................................................................................................... 174
Deleted file systems...........................................................................................................................175
Removable media backup..................................................................................................................175
Fixed drives........................................................................................................................................ 176
NTFS and ReFS file spaces................................................................................................................ 176
Universal Naming Convention names................................................................................................176
Microsoft Dfs file protection methods............................................................................................... 177
vi
Options and commands to restore NAS file systems from the command line................................ 226
vii
Chapter 10. Client Service Configuration Utility.................................................. 265
Install the backup-archive scheduler service.........................................................................................265
Using the Client Service Configuration Utility (Windows)................................................................. 265
dsmcutil command...............................................................................................................................269
Dsmcutil commands: Required options and examples.................................................................... 269
Dsmcutil valid options........................................................................................................................279
viii
Csv..................................................................................................................................................... 340
Datacenter...................................................................................................................................... 343
Datastore........................................................................................................................................ 343
Dateformat...................................................................................................................................... 344
Dedupcachepath............................................................................................................................. 346
Dedupcachesize............................................................................................................................. 347
Deduplication............................................................................................................................... 347
Deletefiles....................................................................................................................................348
Description....................................................................................................................................349
Detail............................................................................................................................................... 350
Diffsnapshot..................................................................................................................................351
Diffsnapshotname.........................................................................................................................353
Dirmc................................................................................................................................................. 354
Dirsonly.......................................................................................................................................... 354
Disablenqr...................................................................................................................................... 355
Diskbuffsize..................................................................................................................................356
Diskcachelocation.......................................................................................................................356
Domain............................................................................................................................................... 357
Domain.image..................................................................................................................................360
Domain.nas...................................................................................................................................... 361
Domain.vmfull............................................................................................................................... 362
Enable8dot3namesupport............................................................................................................368
Enablearchiveretentionprotection......................................................................................369
Enablededupcache.........................................................................................................................370
Enableinstrumentation..............................................................................................................371
Enablelanfree............................................................................................................................... 373
Encryptiontype............................................................................................................................. 374
Encryptkey...................................................................................................................................... 375
Errorlogmax....................................................................................................................................376
Errorlogname..................................................................................................................................378
Errorlogretention.......................................................................................................................378
Exclude options........................................................................................................................... 380
Fbbranch.......................................................................................................................................... 386
Fbclientname..................................................................................................................................387
Fbpolicyname..................................................................................................................................388
Fbreposlocation........................................................................................................................... 389
Fbserver.......................................................................................................................................... 391
Fbvolumename..................................................................................................................................392
Filelist.......................................................................................................................................... 393
Filename.......................................................................................................................................... 395
Filesonly........................................................................................................................................ 396
Forcefailover............................................................................................................................... 397
Fromdate.......................................................................................................................................... 398
Fromnode.......................................................................................................................................... 398
Fromtime.......................................................................................................................................... 399
Groupname........................................................................................................................................ 400
Host................................................................................................................................................... 400
Httpport.......................................................................................................................................... 401
Hsmreparsetag............................................................................................................................... 401
Ieobjtype........................................................................................................................................ 402
Ifnewer.............................................................................................................................................403
Imagegapsize..................................................................................................................................404
Imagetofile....................................................................................................................................405
Inactive.......................................................................................................................................... 405
Inclexcl.......................................................................................................................................... 406
Include options.................................................................................................................................. 407
Incrbydate...................................................................................................................................... 423
Incremental....................................................................................................................................423
ix
Incrthreshold............................................................................................................................... 424
Instrlogmax....................................................................................................................................425
Instrlogname..................................................................................................................................426
Journalpipe....................................................................................................................................427
Lanfreecommmethod.......................................................................................................................427
Lanfreeshmport............................................................................................................................. 429
Lanfreetcpport............................................................................................................................. 429
Lanfreessl...................................................................................................................................... 430
Lanfreetcpserveraddress......................................................................................................... 431
Language.......................................................................................................................................... 431
Latest............................................................................................................................................... 432
Localbackupset............................................................................................................................. 433
Managedservices........................................................................................................................... 434
Maxcmdretries............................................................................................................................... 435
Mbobjrefreshthresh.................................................................................................................... 436
Mbpctrefreshthresh.................................................................................................................... 437
Memoryefficientbackup..............................................................................................................437
Mode................................................................................................................................................... 439
Monitor.............................................................................................................................................441
Myprimaryserver........................................................................................................................... 442
Myreplicationserver.................................................................................................................. 443
Namedpipename............................................................................................................................... 444
Nasnodename....................................................................................................................................445
Nodename.......................................................................................................................................... 446
Nojournal (Windows)......................................................................................................................... 447
Noprompt.......................................................................................................................................... 447
Nrtablepath....................................................................................................................................448
Numberformat..................................................................................................................................449
Optfile.............................................................................................................................................451
Password.......................................................................................................................................... 451
Passwordaccess............................................................................................................................. 453
Pick................................................................................................................................................... 454
Pitdate.............................................................................................................................................455
Pittime.............................................................................................................................................456
Postschedulecmd/Postnschedulecmd...................................................................................... 456
Postsnapshotcmd........................................................................................................................... 458
Preschedulecmd/Prenschedulecmd...........................................................................................459
Preservelastaccessdate............................................................................................................461
Preservepath..................................................................................................................................462
Presnapshotcmd............................................................................................................................. 464
Queryschedperiod.........................................................................................................................465
Querysummary..................................................................................................................................466
Quiet................................................................................................................................................. 468
Replace.............................................................................................................................................468
Replserverguid............................................................................................................................. 470
Replservername............................................................................................................................. 471
Replsslport....................................................................................................................................472
Repltcpport....................................................................................................................................473
Repltcpserveraddress................................................................................................................ 475
Resetarchiveattribute..............................................................................................................476
Resourceutilization.................................................................................................................. 477
Retryperiod....................................................................................................................................479
Revokeremoteaccess.................................................................................................................... 480
Runasservice..................................................................................................................................481
Schedcmddisabled.........................................................................................................................481
Schedcmdexception.......................................................................................................................482
Schedgroup...................................................................................................................................... 483
Schedlogmax....................................................................................................................................484
x
Schedlogname..................................................................................................................................485
Schedlogretention.......................................................................................................................486
Schedmode........................................................................................................................................ 488
Schedrestretrdisabled..............................................................................................................489
Scrolllines....................................................................................................................................490
Scrollprompt..................................................................................................................................491
Sessioninitiation.......................................................................................................................492
Setwindowtitle............................................................................................................................. 493
Shmport.............................................................................................................................................494
Showmembers....................................................................................................................................494
Skipmissingsyswfiles................................................................................................................ 495
Skipntpermissions.......................................................................................................................496
Skipntsecuritycrc.......................................................................................................................497
Skipsystemexclude.......................................................................................................................498
Snapdiff.......................................................................................................................................... 498
Snapdiffchangelogdir................................................................................................................ 503
Snapdiffhttps............................................................................................................................... 504
Snapshotproviderfs.................................................................................................................... 506
Snapshotproviderimage..............................................................................................................507
Snapshotroot..................................................................................................................................508
Srvoptsetencryptiondisabled.................................................................................................510
Srvprepostscheddisabled......................................................................................................... 511
Srvprepostsnapdisabled............................................................................................................512
Ssl..................................................................................................................................................... 512
Sslacceptcertfromserv..............................................................................................................513
Ssldisablelegacytls.................................................................................................................. 514
Sslfipsmode........................................................................................................................................515
Sslrequired....................................................................................................................................516
Stagingdirectory.........................................................................................................................518
Subdir............................................................................................................................................... 519
Systemstatebackupmethod......................................................................................................... 521
Tagschedule....................................................................................................................................522
Tapeprompt...................................................................................................................................... 525
Tcpadminport..................................................................................................................................526
Tcpbuffsize....................................................................................................................................527
Tcpcadaddress............................................................................................................................... 528
Tcpclientaddress.........................................................................................................................528
Tcpclientport............................................................................................................................... 529
Tcpnodelay...................................................................................................................................... 530
Tcpport.............................................................................................................................................530
Tcpserveraddress.........................................................................................................................531
Tcpwindowsize............................................................................................................................... 532
Timeformat...................................................................................................................................... 533
Toc..................................................................................................................................................... 534
Todate............................................................................................................................................... 535
Totime............................................................................................................................................... 536
Txnbytelimit..................................................................................................................................536
Type................................................................................................................................................... 537
Usedirectory..................................................................................................................................538
Useexistingbase........................................................................................................................... 539
Usereplicationfailover............................................................................................................540
V2archive........................................................................................................................................ 540
Verbose.............................................................................................................................................541
Verifyimage....................................................................................................................................542
Virtualfsname............................................................................................................................... 542
Virtualnodename........................................................................................................................... 543
Vmautostartvm............................................................................................................................... 544
Vmbackdir........................................................................................................................................ 545
xi
Vmbackuplocation.........................................................................................................................545
Vmbackupmailboxhistory............................................................................................................547
Vmbackuptype..................................................................................................................................547
Vmchost.............................................................................................................................................548
Vmcpw................................................................................................................................................. 549
Vmctlmc.............................................................................................................................................550
Vmcuser.............................................................................................................................................551
Vmdatastorethreshold................................................................................................................ 552
Vmdefaultdvportgroup.......................................................................................................................553
Vmdefaultdvswitch............................................................................................................................ 554
Vmdefaultnetwork............................................................................................................................. 555
Vmdiskprovision........................................................................................................................... 556
Vmenabletemplatebackups......................................................................................................... 556
Vmexpireprotect........................................................................................................................... 558
Vmiscsiadapter............................................................................................................................. 559
Vmiscsiserveraddress................................................................................................................ 560
Vmlimitperdatastore.................................................................................................................. 560
Vmlimitperhost............................................................................................................................. 562
Vmmaxbackupsessions.................................................................................................................. 563
Vmmaxparallel............................................................................................................................... 565
Vmmaxrestoresessions................................................................................................................ 566
Vmmaxrestoreparalleldisks..................................................................................................... 567
Vmmaxrestoreparallelvms......................................................................................................... 568
Vmmaxvirtualdisks.............................................................................................................................569
Vmmc................................................................................................................................................... 571
Vmmountage...................................................................................................................................... 571
Vmnocbtcontinue........................................................................................................................... 572
Vmnoprdmdisks............................................................................................................................... 573
Vmnovrdmdisks............................................................................................................................... 574
Vmpreferdagpassive.................................................................................................................... 574
Vmprocessvmwithindependent...................................................................................................575
Vmprocessvmwithprdm.................................................................................................................. 576
Vmrestoretype............................................................................................................................... 577
Vmskipctlcompression................................................................................................................ 580
Vmskipmaxvirtualdisks...................................................................................................................... 580
Vmskipmaxvmdks.............................................................................................................................. 581
Vmstoragetype............................................................................................................................... 581
Vmtagdatamover............................................................................................................................. 582
Vmtagdefaultdatamover..............................................................................................................585
Vmtempdatastore........................................................................................................................... 587
Vmverifyifaction................................................................................................................................. 587
Vmverifyiflatest.................................................................................................................................. 589
Vmvstorcompr..................................................................................................................................590
Vmvstortransport.........................................................................................................................591
Vmtimeout........................................................................................................................................ 592
Vssaltstagingdir.........................................................................................................................593
Vssusesystemprovider................................................................................................................ 594
Webports.......................................................................................................................................... 595
xii
File specification syntax.....................................................................................................................603
Wildcard characters.................................................................................................................................604
Client commands reference.................................................................................................................... 605
Archive.................................................................................................................................................. 605
Open file support................................................................................................................................607
Archive FastBack.............................................................................................................................. 607
Backup FastBack.................................................................................................................................610
Backup Group....................................................................................................................................... 613
Backup Image....................................................................................................................................... 615
Offline and online image backup....................................................................................................... 617
Utilizing image backup to perform file system incremental backup................................................ 617
Backup NAS............................................................................................................................................618
Backup Systemstate.......................................................................................................................... 620
Backup VM..............................................................................................................................................622
Cancel Process...................................................................................................................................629
Cancel Restore...................................................................................................................................629
Delete Access..................................................................................................................................... 630
Delete Archive...................................................................................................................................631
Delete Backup..................................................................................................................................... 632
Delete Filespace.............................................................................................................................. 636
Delete Group....................................................................................................................................... 637
Expire.................................................................................................................................................... 639
Help.........................................................................................................................................................640
Incremental......................................................................................................................................... 641
Open file support................................................................................................................................645
Journal-based backup (Windows).....................................................................................................645
Backing up NTFS or ReFS volume mount points...............................................................................647
Back up Microsoft Dfs root.................................................................................................................648
Incremental-by-Date......................................................................................................................... 648
Associate a local snapshot with a server file space..........................................................................648
Loop.........................................................................................................................................................649
Macro.......................................................................................................................................................649
Monitor Process.................................................................................................................................650
Preview Archive.................................................................................................................................651
Preview Backup...................................................................................................................................652
Query Access....................................................................................................................................... 653
Query Adobjects.................................................................................................................................653
Query Archive..................................................................................................................................... 655
Query Backup....................................................................................................................................... 657
Query NAS file system images...........................................................................................................661
Query Backupset.................................................................................................................................661
Query Backupset without the backupsetname parameter........................................................662
Query Filespace.................................................................................................................................664
Query NAS file spaces........................................................................................................................ 666
Query Group......................................................................................................................................... 666
Query Image......................................................................................................................................... 668
Query Inclexcl...................................................................................................................................670
Query Mgmtclass.................................................................................................................................671
Query Node............................................................................................................................................672
Query Options..................................................................................................................................... 673
Query Restore..................................................................................................................................... 674
Query Schedule...................................................................................................................................675
Query Session..................................................................................................................................... 675
Query Systeminfo.............................................................................................................................. 676
Query Systemstate............................................................................................................................ 678
Query VM................................................................................................................................................ 679
Restart Restore.................................................................................................................................683
Restore.................................................................................................................................................. 684
xiii
Restoring NTFS or ReFS volume mount points................................................................................. 689
Restore Microsoft Dfs junctions.........................................................................................................690
Restore active files.............................................................................................................................690
Universal Naming Convention restores............................................................................................. 690
Restore from file spaces that are not Unicode-enabled................................................................... 691
Restore named streams.....................................................................................................................691
Restore sparse files............................................................................................................................691
Restore Adobjects............................................................................................................................ 691
Restore Backupset............................................................................................................................ 693
Restore backup sets: considerations and restrictions......................................................................696
Restore backup sets in a SAN environment...................................................................................... 697
Restore Backupset without the backupsetname parameter................................................... 697
Restore Group..................................................................................................................................... 699
Restore Image..................................................................................................................................... 701
Restore NAS......................................................................................................................................... 704
Restore Systemstate........................................................................................................................706
Restore VM............................................................................................................................................706
Preview virtual machine restore operations..................................................................................... 716
Retrieve................................................................................................................................................ 718
Retrieve archives from file spaces that are not Unicode-enabled................................................... 722
Retrieve named streams....................................................................................................................722
Retrieve sparse files...........................................................................................................................722
Schedule................................................................................................................................................ 722
Selective..............................................................................................................................................724
Open file support................................................................................................................................726
Associate a local snapshot with a server file space..........................................................................726
Set Access............................................................................................................................................727
Set Event..............................................................................................................................................729
Set Netappsvm ...................................................................................................................................731
Set Password....................................................................................................................................... 732
Set Vmtags............................................................................................................................................737
Data protection tagging overview...................................................................................................... 739
Appendix A. Accessibility...................................................................................749
Notices..............................................................................................................751
Glossary............................................................................................................ 755
Index................................................................................................................ 757
xiv
Tables
4. Stoppable services...................................................................................................................................... 10
15. Required user security rights for IBM Spectrum Protect backup and restore services....................... 102
16. Working with your files using the backup-archive client GUI................................................................117
22. Backup and restore capabilities for VMware virtual machines on Windows platforms....................... 164
xv
24. UNC examples.........................................................................................................................................177
28. Components for the restore command when you restore files to the same computer........................209
29. Components for the restore command when you restore files to a different computer......................209
xvi
49. Diagnostics options.................................................................................................................................301
51. Options that are valid on the initial command line only........................................................................ 308
52. Options that can be set by the IBM Spectrum Protect server............................................................... 309
53. Setting the value of the asnodename option to distribute backups. ....................................................312
60. Effects of server and client SSL settings on success or failure of login attempts................................ 517
xvii
74. Incremental command: Related options............................................................................................... 643
88. Query VM command: Related options for VMware virtual machine queries........................................ 680
95. Restore VM command: Related options used for restoring VMware virtual machines........................ 712
xviii
99. Order of precedence of vSphere inventory objects............................................................................... 747
xix
xx
About this publication
IBM Spectrum Protect is a client/server licensed product that provides storage management services in a
multiplatform computer environment.
The backup-archive client program enables users to back up and archive files from their workstations or
file servers to storage, and restore and retrieve backup versions and archived copies of files to their local
workstations.
In addition to the backup-archive client, IBM Spectrum Protect includes the following components:
• A server program that acts as a backup and archive server for distributed workstations and file servers.
• An administrative client program that you can access from a web browser or from the command line.
The program enables the IBM Spectrum Protect administrator to control and monitor server activities,
define storage management policies for backup, archive, and space management services, and set up
schedules to perform those services at regular intervals.
• An application programming interface (API) that you can use to enhance an existing application with
storage management services. When an application is registered with a server as a client node, the
application can back up, restore, archive, and retrieve objects from storage.
• A web backup-archive client that enables an authorized administrator, help desk person, or other users
to perform backup, restore, archive, and retrieve services by using a web browser on a remote system.
Related concepts
Planning your backups (Windows)
If you are a first-time user, or if you only back up files occasionally, you can use the table in this topic as a
checklist of preliminary steps to consider before performing a backup.
What's new for Version 8.1.9
IBM Spectrum Protect Version 8.1.9 introduces new features and updates.
Installing the IBM Spectrum Protect backup-archive clients
The IBM Spectrum Protect backup-archive client helps you protect information on your workstations.
Publications
The IBM Spectrum Protect product family includes IBM Spectrum Protect Plus, IBM Spectrum Protect for
Virtual Environments, IBM Spectrum Protect for Databases, and several other storage management
products from IBM®.
To view IBM product documentation, see IBM Knowledge Center.
DSMI_DIR A series of uppercase letters indicates return codes and other values.
dsmQuerySessInfo Boldface type indicates a command that you type on a command line, the name
of a function call, the name of a structure, a field within a structure, or a
parameter.
timeformat Boldface italic type indicates a backup-archive client option. The bold type is
used to introduce the option, or used in an example.
dateformat Italic type indicates an option, the value of an option, a new term, a placeholder
for information you provide, or for special emphasis in the text.
maxcmdretries Monospace type indicates fragments of a program or information as it might
appear on a display screen, such a command example.
plus sign (+) A plus sign between two keys indicates that you press both keys at the same
time.
Symbols
Enter these symbols exactly as they appear in the syntax diagram.
• * Asterisk
• { } Braces
• : Colon
• , Comma
• = Equal Sign
• - Hyphen
• () Parentheses
• . Period
• Space
• " quotation mark
• 'single quotation mark
cmd_name <var_name>
Repetition
An arrow returning to the left means that the item can be repeated. A character within the arrow means
that you must separate repeated items with that character.
,
repeat
A footnote (1) by the arrow refers to a limit that tells how many times the item can be repeated.
1
,
repeat
Notes:
1 Specify repeat up to 5 times.
Required choices
When two or more items are in a stack and one of them is on the line, you must specify one item.
In this example, you must choose A, B, or C.
cmd_name A
Optional choices
When an item is below the line, that item is optional. In the first example, you can select A or nothing at
all.
cmd_name
A
When two or more items are in a stack below the line, all of them are optional. In the second example,
you can choose A, B, C, or nothing at all.
cmd_name
A
Repeatable choices
A stack of items followed by an arrow returning to the left indicates that you can select more than one
item, or in some cases, repeat a single item.
In this example, you can select any combination of A, B, or C.
cmd_name A
Defaults
Defaults are above the line. The default is selected unless you override it, or you can select the default
explicitly. To override the default, include an option from the stack below the line.
In this example, A is the default. Select either B or C to override A.
cmd_name ?
xxiv IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
What's new for Version 8.1.9
IBM Spectrum Protect Version 8.1.9 introduces new features and updates.
New and changed information in this product documentation is indicated by a vertical bar (|) to the left of
the change.
The following features and updates are new for this release:
Maintenance updates
Updates for APARs and other minor updates are provided.
For a list of new features and updates in previous V8.1 releases, see Backup-archive client updates.
Related information
About this publication
IBM Spectrum Protect is a client/server licensed product that provides storage management services in a
multiplatform computer environment.
2 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Windows client environment requirements
This section contains client environment information, backup-archive client components, and hardware
and software requirements for the supported Windows platforms.
4 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
admincenter/v6r3/. If you do not already have an Administration Center installed, you must create
and modify FastBack schedules on the IBM Spectrum Protect server. For information about creating
schedules on the server, see the IBM Spectrum Protect server documentation.
The Tivoli Storage Manager FastBack environment must be running. For information about installing and
setting up Tivoli Storage Manager FastBack, see the product information at http://www.ibm.com/support/
knowledgecenter/SS9NU9/.
For information about integrating IBM Spectrum Protect and Tivoli Storage Manager FastBack, see
Integrating and .
You can install the IBM Spectrum Protect client in one of the following ways:
• Install the backup-archive client on a workstation where the FastBack server is installed. In this case,
the prerequisites are: the FastBack server, the FastBack shell, and the FastBack mount.
• Install the backup-archive client on a workstation where the FastBack Disaster Recovery Hub is
installed. In this case, the prerequisites are: the FastBack Disaster Recovery Hub setup, the FastBack
shell, and the FastBack mount.
• Install the backup-archive client on a workstation where neither the FastBack server or the FastBack
Disaster Recovery Hub is installed. In this case, ensure that the FastBack shell and the FastBack mount
are installed.
Related concepts
“Configuring the client to back up and archive Tivoli Storage Manager FastBack data” on page 59
Before you can back up or archive Tivoli Storage Manager FastBack client data, you must complete
configuration tasks.
Installation procedures
The procedure that you follow to install the IBM Spectrum Protect Windows backup-archive client
depends on the type of installation that you want to perform.
Procedures are provided for each of the following installation types:
This table lists the types of installations procedures that can be conducted, including the procedure to
uninstall the Windows backup-archive client.
6 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Installing the Windows client for the first time
Complete this procedure to install the Windows backup-archive client for the first time.
Procedure
1. Download the appropriate package file from one of the following websites.
• Download the client package from Passport Advantage or Fix Central.
• For the latest information, updates, and maintenance fixes, go to the IBM Support Portal.
2. Install the product by using the compressed installation file that you download from Passport
Advantage®.
a) Copy the downloaded compressed installation package to a local disk or to a network-accessible
share. Be sure to extract the installation files to an empty directory.
b) To extract the installation files to the same directory, double-click the compressed installation
package.
c) By default, the uncompressed files are stored in the current disk drive, in the
download_directory\TSMClient directory. If the installation program detects files from
another client installation attempt in this directory, you are prompted about whether to overwrite
the old files. If you receive this prompt, enter A to overwrite the existing files; this selection
ensures that only the files from the current installation are used.
d) Double-click the spinstall.exe file to start the client installation program.
3. Select a language to use for this installation and click OK.
4. If the installation wizard indicates that one or more Microsoft C++ redistributable files must be
installed, click Install. These files are needed to run the Windows client.
5. On the IBM Spectrum Protect client welcome screen, click Next to begin installing the client
software.
6. Accept the default installation directory by clicking Next, or specify a different installation directory.
The default installation directory is C:\Program Files\Tivoli\TSM.
7. Select the installation type: Typical or Custom.
Option Description
Typical A typical installation installs the following components:
• The backup-archive client web files (required to use the web client to connect to IBM
Spectrum Protect server V8.1.1 or earlier or V7.1.7 or earlier V7 levels)
• The backup-archive client GUI files (required to use the Java GUI)
• The client API runtime files (as needed by your client and operating system)
Starting in V8.1.4, the NetApp API runtime files are no longer installed in a typical
installation. If you must install them, use the Custom installation type.
8 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
a) To configure the default file systems for incremental backups, in the Backup Type field, select
Incremental. By default, Back up all local file systems is selected. If you do not want to back up
all local file systems as the default action during incremental backups, clear this option and
individually select the file systems to include. You can override the default selection when you
initiate an incremental backup operation.
b) To configure the default file systems for image backups, in the Backup Type field, select Image.
By default, Back up all local file systems is selected. If you do not want to back up all local file
systems as the default action during image backups, clear this option and individually select the
file systems to include. You can override the default selection when you initiate an image backup
operation.
c) Click Next.
19. On the Confirm and apply your configuration screen, click Apply.
You might be prompted to enter a user ID and password to log on to the IBM Spectrum Protect
server. The user ID defaults to the node name that you specified in step “13” on page 8.
20. You can accept the default user ID or specify a different user ID. Specify the password that you will
use when you log on to the server. Click Login.
What happens next depends on whether the IBM Spectrum Protect server is configured for open or
closed registration.
Option Description
Server is The Register New Node screen prompts you for contact information and it
configured for prompts you again for the password.
open registration
Adding text to the Contact Information field is optional, but suggested; specify
(IBM Spectrum
your name.
Protect server
V8.1.1, V8.1.0, Re-enter your password, twice, in the two Password fields. If the password
V7.1.7 or earlier) that you enter and confirm in these Password fields does not match what you
previously specified in the Login into an IBM Spectrum Protect server screen,
the password that you specify and confirm here becomes the password that is
required to log on to the server.
Click Register to register this node on the server.
Click Finish. The graphical user interface opens and is ready for use. You can
also start any of the other installed client components from the Start menu.
Server uses Click Finish. Provide the information that you specified in the client
closed configuration wizard to your IBM Spectrum Protect server administrator.
registration Provide the administrator with the following information:
• The node name that you specified.
• The user ID and password that you entered.
• Your contact information, such as your name, email address, and phone
number, so the administrator can contact you after your node and user
information is registered on the server.
After the administrator registers your node, you can start any of the installed
client components from the Start menu.
Related concepts
Troubleshooting problems during installation
If you are upgrading from a previous version of the backup-archive client and there are client services
running (for example, Client Acceptor or Scheduler), you might see an error during the installation.
Complete the following steps to upgrade an earlier version of the Windows backup-archive client to
Version 8.1.9:
Procedure
1. Download the appropriate package file from one of the following websites.
• Download the client package from Passport Advantage or Fix Central.
• For the latest information, updates, and maintenance fixes, go to the IBM Support Portal.
2. Install the product by using the compressed installation file that you download from Passport
Advantage.
10 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
a) Copy the downloaded compressed installation package to a local disk or to a network-accessible
share. Be sure to extract the installation files to an empty directory.
b) To extract the installation files to the same directory, double-click the compressed installation
package.
c) By default, the uncompressed files are stored in the current disk drive, in the
download_directory\TSMClient directory. If the installation program detects files from
another client installation attempt in this directory, you are prompted about whether to overwrite
the old files. If you receive this prompt, enter A to overwrite the existing files; this selection
ensures that only the files from the current installation are used.
d) Double-click the spinstall.exe file to start the client installation program.
3. Select a language to use for this installation and click OK.
4. If you are prompted to install one or more Microsoft C++ redistributable files, the prompt indicates
that your node does not have the C++ files that are required by the Windows backup-archive client.
Click Install to install the files and continue with the client installation, or click Cancel to end the
installation process.
5. The backup-archive client installation program starts. On the Welcome screen, click Next to begin
installing the new client software.
6. Accept or change the default installation directory.
7. Select the installation type: Typical or Custom.
Option Description
Typical A typical installation installs the following components:
• The backup-archive client web files (required to use the web client to connect to IBM
Spectrum Protect server V8.1.1 or earlier or V7.1.7 or earlier V7 levels)
• The backup-archive client GUI files (required to use the Java GUI)
• The client API runtime files (as needed by your client and operating system)
Starting in V8.1.4, the NetApp API runtime files are no longer installed in a typical
installation. If you must install them, use the Custom installation type.
Custom A custom installation installs the same files as a typical installation. However, you can
choose to install the following optional components:
• The administrative client command line files. These files are required if you want to run
administrator functions on the IBM Spectrum Protect server.
• The API SDK files. These files are only required if you are developing applications that
work with the backup-archive client.
• The NetApp API runtime files. These files are required for snapshot differential backup
operations.
• The web user interface files. These files are required to perform file-restore operations
by using the web user interface.
Silent installation
The backup-archive client installation program supports silent, unattended installations.
If you plan to install the client on the same system as the IBM Spectrum Protect server V8.1.2 or later
level, ensure that you halt the IBM Spectrum Protect server before you install the client. This action will
prevent the client installation process from forcing the system to reboot. After you install the client, you
can restart the IBM Spectrum Protect server.
Important: The Microsoft Visual C++ 2012 and 2017 redistributable packages and the IBM Java Runtime
Environment (JRE) package are required to use the backup-archive client. The graphical installation
program installs these packages for you. However, if you are installing the client in silent mode by using
MSIEXEC, you must install the Microsoft Visual C++ 2012 and 2017 redistributable packages and the IBM
JRE package separately. The packages can be installed before or after the silent installation of the client
is completed, but they must be installed before you use the backup-archive client.
12 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the following executable files to install the C++ and IBM JRE redistributable packages. In the paths
that are shown, the dir text string represents the drive and directory where you saved the files when you
extracted them from the installation package.
Windows executable files for installing C++ redistributable packages
dir\ISSetupPrerequisites\{3A3AF437-A9CD-472f-9BC9-8EEDD7505A02} (contains MS
2012 x64 C++ Runtime - vcredist_x64.exe)
dir\ISSetupPrerequisites\{915387C3-E260-4985-861D-E7A891A4F74B} (contains MS
2017 x64 C++ Runtime - vc_redist.x64.exe)
Windows executable file for installing the IBM JRE redistributable package
dir\ISSetupPrerequisites\IBM Java(TM) 8 Runtime Environment\spinstall.exe
(contains IBM JRE - spinstall.exe)
To install the backup-archive client in silent mode, complete the actions in the following sections.
For more information about the vcredist_x64.exe command, run the following command:
vcredist_x64.exe /?
For more information about the vc_redist.x64.exe command, run the following command:
vc_redist.x64.exe /?
14 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
/i
Installs the specified source package (replace with /x to uninstall the package).
"Z:\tsm_images\TSMClient\IBM Spectrum Protect Client.msi"
Specifies the complete path to the source package. The Z drive is shown in this example. Specify the
drive letter for the disk drive, in your configuration, that contains the installation image.
RebootYesNo="No" REBOOT="Suppress"
Under certain conditions, a system reboot might be necessary for the installation to complete
successfully. This option causes the installation program to not reboot the system if circumstances
would otherwise cause the reboot to occur. While this option is convenient, use it with caution
because suppressing the reboot might cause the program to behave in an unpredictable manner. The
most common reason that a reboot is required is if the installation was an upgrade to an existing
backup-archive client, and the installation was performed while the client programs were running.
Therefore, shut down all backup-archive client programs and services before you begin the
installation.
ALLUSERS=1
Specifies that the package is for all users. This option is required.
INSTALLDIR="C:\Program Files\Tivoli\TSM"
Specifies the destination path. If you already installed this product or a previous version of this
product on your workstation, use the current installation directory as the destination path for this
package.
ADDLOCAL="BackupArchiveGUI,BackupArchiveWeb,Api64Runtime"
Specifies the features to install. Specify all the components on a single line within quotation marks,
which are separated by commas, with no spaces before or after the commas. The installable client
features are shown in the following table:
TRANSFORMS=1033.mst
Specifies which language transform to use. The following language transforms are available:
Transform Language
1028.mst CHT Traditional Chinese
1029.mst CSY Czech
1031.mst DEU German
1033.mst ENG English
1034.mst ESP Spanish
1036.mst FRA French
1038.mst HUN Hungarian
/qn
Specifies to install the product silently.
/l*v "C:\log.txt"
Specifies verbose logging and the name and location of the log file.
The installation process creates the IBM Spectrum Protect folder in the programs folder of the Windows
Start menu. You can start the backup-archive client by clicking one of the icons in this folder.
Remember: Turn on UAC after the silent installation of the backup-archive client is completed.
Related concepts
Troubleshooting problems during installation
If you are upgrading from a previous version of the backup-archive client and there are client services
running (for example, Client Acceptor or Scheduler), you might see an error during the installation.
Procedure
1. Click Start > Control Panel > Uninstall a program.
2. Select IBM Spectrum Protect Client in the list of installed programs.
3. Select the function that you want to perform: Repair, Change, or Uninstall.
Option Description
Repair Wait for any in-progress backup-archive client tasks to completed before you repair the
Windows client.
This option repairs an existing Windows client installation. If you select Repair, the files
installed by the installation program are examined to determine whether they have
somehow become corrupted. If a file is determined to be corrupted, the repair option
attempts to replace it from the saved installation image. The repair option also repairs
missing program short cuts and icons, missing files, and registry keys.
16 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Option Description
Change Wait for any in-progress backup-archive client tasks to completed before you modify the
Windows client.
This option modifies an existing installation. If you select Change, the next screen that is
displayed shows Modify as the option for changing installed programs. If you already
installed the client and you need to add or remove components, click Change, and select
Modify. Choose the icon next to the feature that you want to install or remove and select
the appropriate action from the drop-down list. For example, if you selected a typical
installation when you installed the client, the administrative client command line
interface files are not installed. If you decide that a node needs this interface, select the
icon next to Administrative Client Command Line Files and click the This feature will
be installed on local hard drive option.
Note: This option achieves the same effect as upgrading the client. The difference is that
you bypass the initial steps and the installation process begins with the last installation
type that you selected. If you want to change the installation type, you can click Back,
and select the new installation type; then complete the information as you are prompted
for it. Use the information that is provided in “Upgrading the Windows client” on page 9
(start at step “7” on page 11) if you have questions about a prompt.
Uninstall Wait for any in-progress backup-archive client tasks to completed before you uninstall
the Windows client.
This option uninstalls the Windows client program. It does not remove any client
services. It also does not remove log files, or other items that were created when you
configured or used the client. Most of these artifacts remain in the installation directory
(Program Files\Tivoli\TSM directory), but they can exist anywhere on the disk,
depending on what you chose for the installation directory and other options. This option
also does not remove files that were copied to the local disk if you extracted the
installation files from a compressed distribution file.
Leaving these artifacts on disk is not a problem if you want to reinstall the client in the
future. However, if you want to more thoroughly remove the client and related files and
settings, see the wiki article How to completely remove the Backup-Archive client from
Microsoft Windows.
The installation program stops any client services that are running before it uninstalls
the software. If you want to stop the services yourself, type the following commands at a
command prompt window:
net stop "tsm journal service"
net stop "tsm client acceptor"
net stop "tsm client scheduler"
net stop "tsm remote client agent"
You can also use the Control Panel to stop these services. Their display names match
the name used on the command line.
Note: The service names shown here are the default names that are set by the
installation program. You can change some of these service names when you configure
the services using one of the configuration wizards on the Utilities > Setup Wizard
menus. If you change the service name, record the name that you specify and use that
name to stop the services.
If you want to remove any of these services without uninstalling the client, perform the
following steps:
a. Click Start > All Programs > IBM Spectrum Protect > Backup-Archive GUI.
4. If you are uninstalling the backup-archive client, you must also uninstall the IBM Spectrum Protect
Java Virtual Machine (JVM):
a) In the Control Panel window, click Uninstall a program.
b) In the Programs and Features window, select IBM Spectrum Protect JVM and click Uninstall.
c) Click Yes when prompted.
Error 1303. The installer has insufficient privileges to access this directory:
(Install Drive):\Program Files\Tivoli\TSM\baclient\plugins. The installation
cannot continue. Log on as an administrator or contact your system administrator.
When this error occurs, you must stop the installation. After stopping the installation process, the
previous version is no longer installed. Stop the client services and retry the installation process.
Software updates
Software updates might periodically be made available by IBM for download.
For the latest information, updates, and maintenance fixes, see the IBM Support Portal for IBM Spectrum
Protect.
18 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 2. Configure the IBM Spectrum Protect client
After installing the backup-archive client, you must configure it before performing any operations.
Tip: After you install the backup-archive client, the IBM License Metric Tool counts the client only if it is
connected to the IBM Spectrum Protect server and is used for data operations. Subsequently, that client
is always included in license calculations. Clients that are not connected to a server and are not used for
data operations are excluded from license calculations.
If you are upgrading the backup-archive client, it is unnecessary to reconfigure the scheduler, web client,
or other configuration settings. If the dsm.opt file used by the previous client installation is available in
the default installation directory or the directory or file pointed to by the DSM_CONFIG and DSM_DIR
environment variables, the client accesses this file for configuration information.
Some configuration tasks are required, while other tasks are optional. The following configuration tasks
are required:
• “Creating and modifying the client options file” on page 21
• “Register your workstation with a server” on page 80
The following configuration tasks are optional:
• “Create a shared directory options file” on page 22
• “Creating multiple client options files” on page 23
• “Environment variables” on page 24
• “Configuring the language for displaying the backup-archive client GUI” on page 25
• “Configuring the web client on Windows systems” on page 26
• “Configuring the scheduler” on page 28
• “Configuring the journal engine service” on page 39
• “Configuring online-image backup support” on page 72
• “Configuring Open File Support” on page 72
• “Creating an include-exclude list ” on page 81
• Configuring parallel backups of VMware virtual machines. See “Parallel backups of virtual machines” on
page 169
verbose
ve
Follow these rules when you add options to your options files:
• You can annotate option settings by adding comments to the options file. Begin each comment with an
asterisk (*) as the first character on the line.
• Do not specify options on a line that contains a comment.
• You can optionally indent options with spaces or tabs, to make it easier to view the options and values
that you specify in the file.
• Enter each option on a separate line and enter all parameters for an option on the same line, as shown
in the following examples:
domain="c: d:"
domain="ALL-LOCAL -c: -systemstate"
• To set an option in this file, enter the option name and one or more blank spaces, followed by the option
value.
• Enter one or more blank spaces between parameters.
• The lengths of file and path names in the client options files cannot exceed the following limits:
– On Windows, a file name cannot exceed 255 bytes. Directory names, including the directory
delimiter, are also limited to 255 bytes. The maximum combined length for a file name and path
name is 5192 bytes. The Unicode representation of a character can occupy several bytes, so the
maximum number of characters that a file name might contain can vary.
File path and file name limits are shown in Table 5 on page 20.
– For archive or retrieve operations, the maximum length that you can specify for a path and file name,
combined, is 1024 bytes.
20 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you update the client options file while a session is active, you must restart the session to pick up the
changes. If you use the client GUI setup wizard to make changes, the changes are effective immediately.
If you are not using the client acceptor to manage the scheduler, you must also restart the scheduler.
Related reference
“Optfile” on page 451
The optfile option specifies the client options file to use when you start a backup-archive client
session.
“Query Options” on page 673
Use the query options command to display all or part of your options and their current settings that
are relevant to the command-line client.
Procedure
1. Select a method to modify the file.
Preferences a. Click Start > All Programs > IBM Spectrum Protect > Backup-Archive GUI.
editor
b. Select Edit > Client Preferences. Select the tabs in the preferences editor to set
client options. Specify the options in the dialog boxes, drop down lists, and other
controls. Online help is provided. Click the question mark (?) icon to display the
help topics for the online help for the tab that you are editing. You can set more
options in the preferences editor than you can set in the setup wizard.
Edit the a. Edit the dsm.opt file by using a plain text editor. Each of the options is
dsm.opt file described in detail in the documentation in “Client options reference” on page
309. This method is the most versatile way to set client options because not all
options can be set in the client options file configuration wizard or in the
preferences editor.
b. To comment out a setting, insert an asterisk (*) as the first character on the line
that you want to comment out. Remove the asterisk to make the commented
option active.
22 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Creating a shared directory options file is an optional root user or authorized user task.
Procedure
• Use one of the following methods to specify or use a different client options file:
• Replace the dsm.opt file with the appropriate options file before you start the backup-archive
client.
For example, issue the following commands to copy the a.opt file to dsm.opt and then start the
backup-archive client GUI:
• Start the backup-archive client from the command line and use the optfile option to specify the
options file that you want to use.
For example:
dsm -optfile=b.opt
• Define the DSM_CONFIG environment variable to specify the options file to use before you start a
backup-archive client session.
For example:
What to do next
If you are running the backup-achive client from the command line, the DSM_DIR and DSM_LOG
environment variables might also need to be configured as follows:
• Define the DSM_DIR environment variable to point to the directory where all other executable files
reside:
• Define the DSM_LOG environment variable to point to the directory where dsmerror.log resides:
Note: The directory path where the client executable files are located must be included in the PATH
environment variable or you must enter a fully qualified path.
• Specify the fully-qualified path name of your client options file (dsm.opt) using the DSM_CONFIG
environment variable:
• Define the DSM_DIR environment variable to point to the directory where the client message file
dsc*.txt is located:
Related reference
“Optfile” on page 451
24 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The optfile option specifies the client options file to use when you start a backup-archive client
session.
Procedure
Use one of the following methods to configure the language for displaying by the backup-archive client
GUI:
• Add the language language option to the client options file (dsm.opt).
For example, to set the display language to US English, add the following statement:
language enu
Procedure
Choose one of the following methods to configure the Windows web client:
Setup method Procedure
Setup wizard a. Start the backup-archive client GUI.
b. Click Utilities > Setup Wizard.
c. Select the Help me configure the Web Client check box.
d. Click NEXT and follow the wizard instructions to configure the
web client options.
Command prompt a. Set the following options in the dsm.opt file: managedservices
webclient schedule and passwordaccess generate.
b. Install the client acceptor service by entering the following
command:
dsmcutil install cad /name:"TSM CAD" /
node:nodename /password:password /autostart:yes
where:
TSM CAD a name for the service. The default name is TSM Client
Acceptor.
nodename is the name of the client node.
password is the IBM Spectrum Protect password.
/autostart:yes indicates that the client acceptor service is
started when the operating system starts.
Start the service by using the Windows net start command.
c. Install the IBM Spectrum Protect remote-client-agent service by
entering the following command:
26 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Setup method Procedure
What to do next
After you configure the web client, you can use the IBM Spectrum Protect Operations Center or a browser
to backup or restore, or archive or retrieve, data on a node.
Related concepts
“Scheduling options” on page 297
This topic discusses the options that you can use to regulate central scheduling. The backup-archive
client uses scheduling options only when the Scheduler is running.
“Web client options” on page 301
Several backup-archive client options are used to configure the IBM Spectrum Protect web client.
Related tasks
“Starting a web client session” on page 111
The web client is a Java Web Start application that can be started and managed independent of web
browser software. After you install and configure the web client on your workstation, you can use the web
client for remote access to remotely back up, restore, archive, or retrieve data on the client node. The
web client facilitates the use of assistive devices for users with disabilities and contains improved
keyboard navigation.
Related reference
“Httpport” on page 401
The httpport option specifies a TCP/IP port address for the web client.
“Passwordaccess” on page 453
The client acceptor service starts and stops the Remains active, even after scheduled backup is
scheduler process as needed for each scheduled complete.
action.
Requires fewer system resources when idle. Requires higher use of system resources when
idle.
Client options and IBM Spectrum Protect server Client options and IBM Spectrum Protect server
override options are refreshed each time the client override options are only processed after dsmc
acceptor services start a scheduled backup. sched is started.
28 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 6. Client acceptor-managed services versus traditional scheduler services (continued)
IBM Spectrum Protect traditional scheduler
Client acceptor-managed services services
Cannot be used with You must restart the scheduler process for
SESSIONINITiation=SERVEROnly backups. updated client options to take effect.
Important: If you run the client scheduler on the
command line, the scheduler does not run as a
background service.
Tip: Restart the traditional scheduler periodically
to free system resources previously used by
system calls.
Configuring the client to use the client acceptor service to manage the scheduler
One of the most effective ways of managing the client scheduler is to use the client acceptor. You must
configure the client to use the client acceptor to manage the scheduler.
Procedure
• Complete the following steps to use the client acceptor to manage the scheduler on the Windows
client:
a) In the backup-archive client GUI, click Utilities > Setup Wizard > Help me configure the Client
Scheduler and click Next.
b) Read the information in the Scheduler Wizard page and click Next.
c) In the Scheduler Task page, select Install a new or additional scheduler and click Next.
d) In the Scheduler Name and Location page, specify a name for the client acceptor service that you
want to manage the scheduler. Then, select Use the client acceptor to manage the scheduler and
click Next.
e) If the client acceptor is already installed for use by the web client, select that name of the client
acceptor from the drop-down list in the Web Service Name page. Otherwise, type the name that
you want to assign to this client acceptor. The default name is TSM Client Acceptor. Click Next.
f) Follow the instructions on the remaining screens to complete the configuration.
Use the following information to help you complete the wizard pages:
30 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the sessioninitiation option to control whether the server or client initiates sessions through a
firewall. The default is that the client initiates sessions. You can use this option with the schedule
command.
Procedure
1. From the backup-archive client GUI main window, click Utilities > Setup Wizard. The Client
Configuration Assistant appears.
2. Select the Help me configure the Client Scheduler and click the OK button. The Scheduler Wizard
panel appears.
3. Select the task that you want to perform. You can install a new client scheduler, update the settings
for a scheduler, or remove a scheduler.
4. Complete each panel and click the right arrow to continue. To go back to a previous panel, click the left
arrow.
What to do next
You can run scheduling services by using the command-line client.
32 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If sessioninitiation option is set to serveronly in your client options file (dsm.opt), the client setup
wizard and scheduler service is unable to initiate authentication with the IBM Spectrum Protect
server. To avoid this problem, when configuring the client scheduler using the setup wizard, ensure
that the Contact the IBM Spectrum Protect Server to validate password check box on the IBM
Spectrum Protect Authentication page is unchecked.
A similar problem can occur if an encryption key is required for backup operations. In this case,
you can run the scheduler from the command line (dsmc schedule), wait until a scheduled backup
starts, and enter the encryption key when prompted. After the password and encryption key are
updated, you must restart the scheduler.
4. When configuring the scheduler on a client workstation for the first time, the scheduler service
might be unable to authenticate to the server when the server contacts the client scheduler to run
a schedule. This can happen when the passwordaccess is set to generate and the IBM Spectrum
Protect server is behind a firewall and the encrypted password cannot be locally stored before the
scheduler is started. To correct this problem, you need to run the scheduler from the command
line (dsmc schedule), wait until a scheduled operation starts, and enter the password for your
node when prompted.
5. The client cannot prompt for the encryption key password in scheduler mode. If you are using IBM
Spectrum Protect data encryption, you must run an initial interactive backup once to set up the
encryption key by opening the TCP/IP connection from the client workstation to the server
workstation. See Method 1 for more information about setting up this communication. After the
encryption key is set, you can use server-initiated sessions to back up the files using encryption.
If you set the sessioninitiation option to client, the client initiates sessions with the server (Method 1)
by communicating on the TCP/IP port defined with the server option tcpport. This is the default.
Server prompted scheduling can be used to prompt the client to connect to the server.
When using the backup-archive client across a firewall in prompted mode, the IBM Spectrum Protect
server needs to contact the client. In order to complete this action, some software might need to be
installed on the IBM Spectrum Protect server to route the request through the firewall. This software
routes the server request through a socks port on the firewall. This method is typically called socksifying a
system. Proxies are not supported, because they only route a few types of communication protocols
(HTTP, FTP, GOPHER). IBM Spectrum Protect communications are not routed by proxies. It is important to
note that the client creates a new connection to the IBM Spectrum Protect server when prompted. This
means that the firewall configuration discussed above must be in place.
Related tasks
“Configuring the scheduler” on page 28
Your IBM Spectrum Protect administrator can schedule the client to perform tasks automatically. For
scheduled events to occur on the client, you must configure the client scheduler to communicate with the
IBM Spectrum Protect server.
Related reference
“Sessioninitiation” on page 492
Use the sessioninitiation option to control whether the server or client initiates sessions through a
firewall. The default is that the client initiates sessions. You can use this option with the schedule
command.
“Tcpadminport” on page 526
Use the tcpadminport option to specify a separate TCP/IP port number on which the server waits for
requests for administrative client sessions, allowing secure administrative sessions within a private
network.
“Tcpport” on page 530
The tcpport option specifies a TCP/IP port address for the IBM Spectrum Protect server. You can obtain
this address from your administrator.
“Webports” on page 595
For fast path details for communication between a V8.1.2 client and a V8.1.2 server, you can use the
SSLACCEPTCERTFROMSERV option to automatically accept a self-signed certificate. See “Configuring by
using the default security settings (fast path)” on page 95 for details.
34 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The dsmcert utility is provided by the backup-archive client and automatically installs it in C:\Program
Files\Tivoli\TSM\baclient.
Before you set up the server certificate on the client, follow these steps:
1. Open a command prompt and change the directory to the backup-archive client directory, for
example: cd "C:\Program Files\Tivoli\TSM\baclient"
2. Append the GSKit binary path and library path to the PATH environment variable, for example:
For more information, see Creating a symbolic link to access the latest GSKit library and IBM Global
Security Kit return codes for details on GSkit libraries.
Next, you must import the server certificate, or the CA root certificate.
If you use a self-signed certificate
Each IBM Spectrum Protect server generates its own certificate. The certificate has a fixed file name
of either cert.arm or cert256.arm. The certificate file is stored on the server workstation in the
server instance directory, for example, C:\Program Files\tivoli\tsm
\server1\cert256.arm. If the certificate file does not exist and you specify the SSLTCPPORT or
SSLTCPADMINPORT server option, the certificate file is created when you restart the server with these
options set. IBM Spectrum Protect V6.3 servers (and newer versions) generate files named
cert256.arm and cert.arm. IBM Spectrum Protect servers older than V6.3 generate only
certificate files named cert.arm. You must choose the certificate that is set as the default on the
server.
Follow these steps to set up the SSL connection to a server:
1. Obtain the certificate from the server administrator.
2. Import the certificate into the client key database by using the following command:
Important:
1. A pseudo random password is used to encrypt the key database. The password is automatically stored
encrypted in the stash file (dsmcert.sth). The stash file is used by the backup-archive client to
retrieve the key database password.
2. More than one server certificate can be added to the client key database file so that the client can
connect to different servers. Also, more than one CA root certificate can be added to the client key
database.
3. If you do not run the preceding commands from the backup-archive client directory, you must copy
dsmcert.kdb and dsmcert.sth into that directory.
4. For performance reasons, use SSL only for sessions where it is needed. A V8.1.2 client communicating
with a V8.1.2 server must use SSL. SSL No (the default value) indicates that encryption is not used
when data is transferred between the client and a server earlier than V8.1.2. When the client connects
36 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
<db2_install_path>/lib32/gskit_db2. On Windows, the default location is C:\Program Files
\ibm\gsk8.
During the installation of other IBM products, such as IBM Spectrum Protect, another copy of the GSKit
libraries might be installed. Depending on the product, these libraries might be either local GSKit libraries
or global GSKit libraries. When Db2 for Linux, UNIX, and Windows and another IBM product that includes
GSKit libraries are both installed on the same system, some interoperability issues might arise. These
interoperability issues might occur because GSKit allows only libraries from a single GSKit source to exist
in any single process. The interoperability issues might lead to unpredictable behavior and runtime errors.
To ensure that a single source of GSKit libraries is used, the symbolic link approach can be used. During
an initial Db2 for Linux, UNIX, and Windows installation, the installer creates a symbolic link
<db2_install_path>/lib64/gskit or <db2_install_path>/lib32/gskit to
<db2_install_path>/lib64/gskit_db2 or <db2_install_path>/lib32/gskit_db2. These
symbolic links are the default locations from where GSKit libraries are loaded. Products that bundle Db2
for Linux, UNIX, and Windows, and change the symbolic link from the default directory to the library
directory of another copy of GSKit must ensure that the newly installed GSKit is at the same or a newer
level. This restriction applies whether the libraries are global or local. During an upgrade or update of Db2
for Linux, UNIX, and Windows, the symbolic link is preserved. If the newly installed copy has a symbolic
link to the default location, the symbolic link that is associated with the older installation copy is
preserved. If the newly installed copy does not have a symbolic link to the default location, the symbolic
link that is associated with the newer installation copy is preserved.
Some limitations exist since the symbolic link <db2_install_path>/lib64/gskit or
<db2_install_path>/lib32/gskit is in the path of the Db2 for Linux, UNIX, and Windows
installation copy. For example, if two or more instances are created for any Db2 copy, the symbolic link
changes affect all the instances.
You can also modify a Domino Server GSKit in a similar manner. A Domino server does not have a GSKit
folder, but it has folders C and N, and a library libgsk8iccs_64.so. You can first create soft links for
these folders, and files to point to the corresponding folders on the GSKit package, where the IBM
Spectrum Protect backup-archive client V8.1.2 is installed, as follows:
• ln -s /usr/local/ibm/gsk8_64/lib64/C /opt/ibm/lotus/notes/90010/zlinux
• ln -s /usr/local/ibm/gsk8_64/lib64/N /opt/ibm/lotus/notes/90010/zlinux
• ln -s /usr/local/ibm/gsk8_64/lib64/libgsk8iccs_64.so /opt/ibm/lotus/notes/
90010/zlinux
Next, change the DPD node's password to domdsmc CHANGEADSMPwd tvt1054_domnote2
tvt1054_domnote2 tvt1054_domnote2. Finally, run domdsmc query adsm.
When other applications deliver a GSKit version that is newer than the version delivered with IBM
Spectrum Protect API, then it is better to either perform the upgrade of the Client or to perform the
following procedure.
Procedure
1. Create a symbolic link on Windows, if you have administrator privileges. Rename the Db2 GSKit copy
of the lib64 directory that is located in the default location, C:\Program Files\ibm\gsk8. Start a
DOS shell, navigate to the Db2 GSKit location, and rename the directory as follows:
2. Create a symbolic link in the location of the Db2 GSKit copy and point to the location of the TSM GSKit
copy by running the following commands in the DOS shell. Navigate to the location of the Db2 GSkit
copy and then create the symbolic link as follows:
3. Restart Db2 for changes to take effect. On startup, Db2 loads GSKit from the new location, which
points to the IBM Spectrum Protect copy of GSKit. In the Db2 command prompt, enter these
commands as follows:
db2stop
db2start
38 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Configure your system for journal-based backup
You must install and configure the journal daemon (Linux) or journal engine service (Windows) before you
can perform journal-based backups.
Procedure
1. From the main window, open the Utilities menu and select Setup Wizard.
2. Select the Help me configure the Journal Engine check box.
3. Select the task you want to perform. You can install a new journal engine, update a previously installed
journal engine, or remove a previously installed journal engine from your system.
4. Complete each panel in the wizard and click the Next button to continue. To return to a previous
panel, click the Back button. To display help information for a panel, click the Help button.
Results
Journal service configuration settings are stored in the journal configuration file tsmjbbd.ini. This file
can be installed and configured with the GUI setup wizard or be manually edited.
Follow these steps to set up multiple journal services:
1. Create and set up a separate journal configuration file (tsmjbbd.ini) for each journal service to be
installed. Each configuration file must specify a different JournalPipe value, and must also specify
different drives to journal, so that the two services do not interfere with each other. Multiple journal
services journaling the same drive causes problems. The different services attempts to write to the
same journal database unless this is specifically overridden by specifying different journal directories
in the different configuration files.
2. Install the multiple journal services using the dsmcutil.exe tool. Use distinct names for each
service, and specify the /JBBCONFIGFILE option to identify the tsmjbbd.ini to be used for that
particular journal instance. For example:
Note: In Uniform Naming Convention (UNC) format, the jbbconfigfile path must contain a drive
letter. In the following UNC format example, the path contains the drive letter D$: \\computer7\D$
\journalconfig\tsmjbbd1.ini
40 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
the backup client option of the same name. The default pipe name is \\.\pipe\jnlSessionMgr1.
For example, in dsm.opt:
JournalPipe \\.\pipe\jnlSessionMgr1
JournalPipe=\\.\pipe\jnlSessionMgr1
Note: The same pipe name must be specified by the client using the JournalPipe option.
NlsRepos
Specifies the National Language Support repository the journal service uses for generating messages.
Since the journal service is non-interactive, this only applies to messages written to the journal error
log. The default value is dscameng.txt. For example:
NlsRepos=dscenu.txt
ErrorLog
Specifies the log file where detailed error messages generated by the journal service are written. Note
that less detailed error and informational messages are written to the Windows application event log
as well. The default value is jbberror.log. For example:
ErrorLog=jbberror.log
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$: \\computer7\D$\temp
\jbberror.log.
JournalDir
Specifies the directory where journal database files are stored and written. The default directory is the
journal service installation directory. You can specify different journal locations for each file system
being journaled. This is useful when running in a clustered environment because the location of the
journal must be accessible by each workstation in the cluster running the journal service. Typically the
journal for local resources being journaled resides in the same location and the journal for shared
cluster resources (which can move from workstation to workstation) is located on the shared resource
to ensure that it is accessible to both workstations.
By default, this setting applies to all journaled file systems but can be overridden by an override
stanza for each journal file system. If the default value is a fully qualified path (for example
c:\tsmjournal), all journal database files are written to the specified directory. If the default value
does not specify a drive letter, (for example \tsmjournal) the journal database files for each journal file
system are written to the specified directory on each journal file system.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$: \\computer7\D$\temp\tsmjournal.
The following is an example configuration stanza:
[JournalSettings]
;
; Store all resources in one location unless overridden
; by an override stanza
;
JournalDir=c:\tsmjournal
;
;
[JournaledFileSystemSettings.D:\]
;
; Journal for d: only is in location specified below
;
JournalDir=d:\tsmjournal
Note: Changes to this setting do not take effect until the journaled file systems are brought online.
dsm.opt: tsmjbbd.ini
[JournalExcludeList]
%SystemRoot%\System32\Config\*
C:\Program Files\Tivoli\TSM\baclient\adsm.sys\*
%TEMP%\*
%TMP%\*
c:\excludedir\*
c:\dir1\excludefile
*.:\*.tmp
Note: The c:\excludedir\* statement matches the entire tree including subdirectories and files.
JournaledFileSystemSettings stanza
Settings under this stanza apply to each specified journaled file system unless they are overridden for
individual file systems in an override stanza.
The following is the syntax for the JournaledFileSystemSettings stanza:
Syntax for JournaledFileSystemSettings stanza:
[JournaledFileSystemSettings]
Syntax for stanza settings:
JournaledFileSystemSetting=value
You can specify the following JournaledFileSystemSettings values:
DirNotifyBufferSize
Specifies the size of the buffer to record change notifications for a particular journal file system. You
might need to increase this value for journaled file systems that generate a very large volume of
change activity. The buffer size is limited by memory. The default value is 16 KB.
JournaledFileSystems
Specifies a space delimited list of file systems to journal. Full file system specifications and Windows
junctions are supported. There is no default value. You must specify at least one journaled file system
42 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
for the journal service to run. Journaled file systems can be added or removed online without having
to restart the service. For example:
JournaledFileSystems=c: d:
JournalDbSize
Specifies the maximum size the journal database can grow. The journal database size is expressed in
bytes. A value of zero (0) indicates that the database size is limited only by the capacity of the file
system containing the journal database. The default is 0 (unlimited). For example:
JournalDBSize=0x10000000
NotifyBufferSize
Specifies the size of the memory buffer receiving file system change notifications for a particular
journal file system. You might need to increase this value for journaled file systems that generate a
very large volume of change activity. The buffer size is limited by memory. The default value is 32 KB.
For example:
NotifyBufferSize=0x00008000
NotifyFilter
Specifies what file system change actions generate notifications to the journal service. NotifyFilter
applies to file changes and directory modifications. Directory name changes, such as deletions and
creations, are always tracked regardless of the filter value. Multiple actions can be monitored by
combining (adding) values together. The default value is 0x11F (File and Dir Name, Attrib, Size, Last
Write, and security Changes). You can also use the IBM Spectrum Protect Journal Engine Wizard to
specify that any or all of these actions are monitored. Supported values are:
The asterisk (*) indicates that notification might be deferred until disk write cache is flushed. Name
changes are object creations, deletions, or renames.
Example:
NotifyFilter=0x107
PreserveDbOnExit setting
This setting allows a journal to remain valid when a journaled file system goes offline and comes back
online. This is useful for preserving the journal during system reboots, cluster failovers, and resource
movement.
File systems go offline when the journal service stops or when the file system is removed from the
configuration file. File systems come back online when the journal service is started or when the file
system is added to the configuration file.
This setting allows a journal-based backup to continue processing when the service is restarted (or
the file system comes back online) without performing a full incremental backup.
[JournaledFileSystemSettings.D:\]
;
; Do not delete the journal when D:\ goes offline
;
PreserveDbOnExit=1
deferFSMonStart setting
This setting defers an attempt to begin monitoring a file system in the following cases:
• When the specified journaled file system is not valid or available
• The journal directory for the specified journaled file system cannot be accessed or created
Resources are checked at the interval you specify using the deferRetryInterval setting.
The deferFSMonStart setting is most commonly used in a cluster environment where shared resources
might move to different workstations in the cluster.
A value of 1 indicates that the setting is on. A value of 0 indicates that the setting is off. The default
value is off (set to 0) .
deferRetryInterval setting
This setting specifies the value in seconds that a deferred file systems with the deferRetryInterval
setting enabled are checked for availability and brought online. The default value is 1 second.
logFSErrors setting
This setting specifies whether errors encountered while accessing a journaled file system or journal
directory are logged in the jbberror.logand the event log.
Use the logFSErrors setting with the deferFSMonStart setting to prevent excessive File System
unavailable messages from being logged when bringing a journaled file system online is deferred. The
first error which causes the file system to be deferred is logged. Subsequent errors are not logged. A
value of 1 indicates that the setting is on. A value of 0 indicates that the setting is off.
An example to defer journaling until the file system journal directories are valid is:
[JournalSettings]
;
; Place journal files in directory on each journaled file system
;
journalDir=\tsmjournal
[JournaledFileSystemSettings]
;
;journal c:, d:, and f:
44 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
;
JournaledFileSystems=c: d: d:\mountpoint f:
;
; Override stanza to defer starting journaling for f:\
; until it is a valid file system
[JournalFileSystemSettings.f:\]
;
; Keep database valid if file system goes offline
;
PreserveDBOnExit=1
;
; Defer journaling until file system and journal directory
; are valid
;
deferFSMonStart=1
;
; Attempt to start journaling every 120 seconds when deferred
;
deferRetryInterval=120
;
;Do not log excessive resource unavailable messages
;
logFsErrors=0
Related concepts
“Overriding stanzas” on page 45
Any setting in the JournaledFileSystemSettings stanza, except for the buffer sizes, can be overridden for
a particular journaled file system by creating an override stanza.
Overriding stanzas
Any setting in the JournaledFileSystemSettings stanza, except for the buffer sizes, can be overridden for
a particular journaled file system by creating an override stanza.
The following is the syntax for the JournaledFileSystemSettings stanza:
Syntax for JournaledFileSystemSettings stanza:
[JournaledFileSystemSettings.fs]
Syntax for stanza settings:
JournaledFileSystemSetting=override value
Example:
[JournalFileSystemSettings.C:\]
NotifyBuffer=0x0020000
NotifyFilter=0x107
Overview
Two types of data deduplication are available: client-side data deduplication and server-side data
deduplication.
Client-side data deduplication is a data deduplication technique that is used on the backup-archive client
to remove redundant data during backup and archive processing before the data is transferred to the IBM
Spectrum Protect server. Using client-side data deduplication can reduce the amount of data that is sent
over a local area network.
Server-side data deduplication is a data deduplication technique that is done by the server. The IBM
Spectrum Protect administrator can specify the data deduplication location (client or server) to use with
the DEDUP parameter on the REGISTER NODE or UPDATE NODE server command.
Benefits
Client-side data deduplication provides several advantages:
• It can reduce the amount of data that is sent over the local area network (LAN).
• The processing power that is required to identify duplicate data is offloaded from the server to client
nodes. Server-side data deduplication is always enabled for deduplication-enabled storage pools.
However, files that are in the deduplication-enabled storage pools and that were deduplicated by the
client, do not require additional processing.
• The processing power that is required to remove duplicate data on the server is eliminated, allowing
space savings on the server to occur immediately.
Client-side data deduplication has a possible disadvantage. The server does not have whole copies of
client files until you back up the primary storage pools that contain client extents to a non-deduplicated
copy storage pool. (Extents are parts of a file that are created during the data-deduplication process.)
During storage pool backup to a non-deduplicated storage pool, client extents are reassembled into
contiguous files.
By default, primary sequential-access storage pools that are set up for data deduplication must be
backed up to non-deduplicated copy storage pools before they can be reclaimed and before duplicate
data can be removed. The default ensures that the server has copies of whole files at all times, in either a
primary storage pool or a copy storage pool.
46 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Important: For further data reduction, you can enable client-side data deduplication and compression
together. Each extent is compressed before it is sent to the server. Compression saves space, but it
increases the processing time on the client workstation.
In a data deduplication-enabled storage pool (file pool) only one instance of a data extent is retained.
Other instances of the same data extent are replaced with a pointer to the retained instance.
When client-side data deduplication is enabled, and the server has run out of storage in the destination
pool, but there is a next pool defined, the server will stop the transaction. The backup-archive client
retries the transaction without client-side data deduplication. To recover, the IBM Spectrum Protect
administrator must add more scratch volumes to the original file pool, or retry the operation with
deduplication disabled.
For client-side data deduplication, the IBM Spectrum Protect server must be Version 6.2 or higher.
Prerequisites
When configuring client-side data deduplication, the following requirements must be met:
• The client and server must be at version 6.2.0 or later. The latest maintenance version should always be
used.
• When a client backs up or archives a file, the data is written to the primary storage pool that is specified
by the copy group of the management class that is bound to the data. To deduplicate the client data, the
primary storage pool must be a sequential-access disk (FILE) storage pool or container storage pool
that is enabled for data deduplication.
• The value of the DEDUPLICATION option on the client must be set to YES. You can set the
DEDUPLICATION option in the client options file, in the preference editor of the backup-archive client
GUI, or in the client option set on the IBM Spectrum Protect server. Use the DEFINE CLIENTOPT
command to set the DEDUPLICATION option in a client option set. To prevent the client from overriding
the value in the client option set, specify FORCE=YES.
• Client-side data deduplication must be enabled on the server. To enable client-side data deduplication,
use the DEDUPLICATION parameter on the REGISTER NODE or UPDATE NODE server command. Set
the value of the parameter to CLIENTORSERVER.
• Ensure files on the client are not excluded from client-side data deduplication processing. By default, all
files are included. You can optionally exclude specific files from client-side data deduplication with the
exclude.dedup client option.
• Files on the client must not be encrypted. Encrypted files and files from encrypted file systems cannot
be deduplicated.
• Files must be larger than 2 KB and transactions must be below the value that is specified by the
CLIENTDEDUPTXNLIMIT option. Files that are 2 KB or smaller are not deduplicated.
The server can limit the maximum transaction size for data deduplication by setting the
CLIENTDEDUPTXNLIMIT option on the server. For more information about this option, see the IBM
Spectrum Protect server documentation.
The following operations take precedence over client-side data deduplication:
• LAN-free data movement
• Simultaneous-write operations
• Data encryption
Important: Do not schedule or enable any of those operations during client-side data deduplication. If
any of those operations occur during client-side data deduplication, client-side data deduplication is
turned off, and a message is written to the error log.
The setting on the server ultimately determines whether client-side data deduplication is enabled. See
Table 7 on page 48.
Encrypted files
The IBM Spectrum Protect server and the backup-archive client cannot deduplicate encrypted files. If an
encrypted file is encountered during data deduplication processing, the file is not deduplicated, and a
message is logged.
Tip: You do not have to process encrypted files separately from files that are eligible for client-side data
deduplication. Both types of files can be processed in the same operation. However, they are sent to the
server in different transactions.
As a security precaution, you can take one or more of the following steps:
• Enable storage-device encryption together with client-side data deduplication.
• Use client-side data deduplication only for nodes that are secure.
• If you are uncertain about network security, enable Secure Sockets Layer (SSL).
• If you do not want certain objects (for example, image objects) to be processed by client-side data
deduplication, you can exclude them on the client. If an object is excluded from client-side data
deduplication and it is sent to a storage pool that is set up for data deduplication, the object is
deduplicated on server.
• Use the SET DEDUPVERIFICATIONLEVEL command to detect possible security attacks on the server
during client-side data deduplication. Using this command, you can specify a percentage of client
extents for the server to verify. If the server detects a possible security attack, a message is displayed.
Related tasks
“Configuring the client for data deduplication” on page 49
Configure the client so that you can use data deduplication to back up or archive your files.
Related reference
“Deduplication” on page 347
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
“Dedupcachepath” on page 346
Use the dedupcachepath option to specify the location where the client-side data deduplication cache
database is created.
“Dedupcachesize” on page 347
Use the dedupcachesize option to determine the maximum size of the data deduplication cache file.
When the cache file reaches its maximum size, the contents of the cache are deleted and new entries are
added.
“Enablededupcache” on page 370
Use the enablededupcache option to specify whether you want to use a cache during client-side data
deduplication. Using a local cache can reduce network traffic between the IBM Spectrum Protect server
and the client.
“Ieobjtype” on page 402
48 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the ieobjtype option to specify an object type for a client-side data deduplication operation within
include-exclude statements.
Procedure
Use one of the following methods to enable data deduplication on the client:
Option Description
Edit the client options • Add the deduplication yes option to the dsm.opt file.
file
Preferences editor a. From the IBM Spectrum Protect window, click Edit > Client Preferences.
b. Click Deduplication.
c. Select the Enable Deduplication check box.
d. Click OK to save your selections and close the Preferences Editor.
Results
After you have configured the client for data deduplication, start a backup or archive operation. When the
operation completes, the backup or archive report shows the amount of data that was deduplicated in
this operation, and how many files were processed by client-side data deduplication.
If you do not have enough disk space for the backup or archive operation, you can enable client-side data
deduplication without local data deduplication cache on the client by using these steps:
1. Add the deduplication yes option to the client options file.
• Add the deduplication yes option to the dsm.opt file. You can also set this option in the GUI.
2. Turn off the local data deduplication cache by completing one of the following steps:
• Add the ENABLEDEDUPCACHE NO option to the dsm.opt file.
You can also set this option in the backup-archive client preferences editor by clearing the Enable
Deduplication Cache check box.
Protect> q sess
IBM Spectrum Protect Server Connection Information
The following example uses the query management class command to show the type of data that was
processed for data deduplication:
Related concepts
“Client-side data deduplication” on page 45
Data deduplication is a method of reducing storage needs by eliminating redundant data.
Related reference
CLIENTDEDUPTXNLIMIT option
REGISTER NODE command
UPDATE NODE (Update node attributes)
50 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
“Deduplication” on page 347
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
“Enablededupcache” on page 370
Use the enablededupcache option to specify whether you want to use a cache during client-side data
deduplication. Using a local cache can reduce network traffic between the IBM Spectrum Protect server
and the client.
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
Procedure
If you do not want certain files to be processed by client-side data deduplication, you can exclude files
from data deduplication processing using the GUI:
1. Click Edit > Client Preferences.
2. Click the Include-Exclude tab.
3. Click Add to open the Define Include-Exclude Options window.
4. Select a category for processing.
• To exclude a file from data deduplication during archive processing, select Archive in the Category
list.
• To exclude a file from data deduplication during backup processing, select Backup in the Category
list.
5. Select Exclude.Dedup in the Type list.
6. Select an item from the Object Type list.
• For archive processing, only the File object type is available.
• For backup processing, select one of the following object types:
– File
– Image
– System state
– ASR
7. Specify a file or pattern in the File or Pattern field. You can use wildcard characters. If you do not want
to type a file or pattern, click Browse to open a selection window and select a file. For mounted file
spaces, you can choose the directory mount point from the selection window.
For ASR and system state, this field is filled out automatically. When you specify the image object type,
the drive letter must be followed by :\*\* . For example, to exclude drive E:, enter the following pattern:
E:\*\*
8. Click OK to close the Define Include-Exclude Options window. The exclude options that you defined
are in an exclude statement at the bottom of the Statements list box in the Include-Exclude
Preferences tab.
9. Click OK to save your selections and close the Preferences Editor.
52 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
In this failover mode, you can restore or retrieve any replicated client data. When the primary server is
online again, the client automatically fails back to the primary server the next time the client is started.
For example, the following sample text is the connection information about the secondary server that is
sent to the client and saved to the client options file (dsm.opt):
MYREPLICATIONServer TARGET
MYPRIMARYServer SERVER1
*** end of automatically updated options
If both nodes are configured for replication with the replstate=enabled option in the node
definition, when Node_A is replicated, Node_B and the proxy relationship are replicated as well.
54 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Failover capabilities of IBM Spectrum Protect components
IBM Spectrum Protect components and products rely on the backup-archive client or API to back up data
to the primary IBM Spectrum Protect server. When the primary server becomes unavailable, some of
these products and components can fail over to the secondary server, while others are not capable of
failover.
To learn more about the failover capabilities of IBM Spectrum Protect components and products, see
technote 1649484.
Related tasks
Determining the status of replicated client data
You can verify whether the most recent backup of the client was replicated to the secondary server before
you restore or retrieve client data from the secondary server.
Procedure
To manually configure the client for automated failover, complete the following steps:
1. Ensure that the client is enabled for automated client failover by verifying that the
usereplicationfailover option is either not in the client options file or is set to yes. By default,
the client is enabled for automated client failover so the usereplicationfailover is not required
in the client options file.
2. Obtain the connection information about the secondary server from the IBM Spectrum Protect server
administrator and add the information to the beginning of the client options file. Group the statements
into a stanza under the replservername statement.
REPLSERVERNAME TARGET
REPLTCPSERVERADDRESS 192.0.2.9
REPLTCPPORT 1501
REPLSSLPORT 1502
REPLSERVERGUID 60.4a.c3.e1.85.ba.11.e2.af.ce.00.0c.29.2f.07.d3
MYREPLICATIONServer TARGET
MYPRIMARYSERVERNAME SERVER1
Example
After you configured the client for automated client failover, and the client attempts to log on to the
server, the following sample command output is displayed:
What to do next
You can restore or retrieve any replicated data in failover mode.
Related concepts
Automated client failover overview
When there is an outage on the IBM Spectrum Protect server, the backup-archive client can automatically
fail over to a secondary server for data recovery.
Related tasks
Restoring or retrieving data during a failover
When the client fails over to the secondary server, you can restore or retrieve replicated data from the
secondary server.
Related reference
Forcefailover
The forcefailover option enables the client to immediately fail over to the secondary server.
Myprimaryserver
The myprimaryserver option specifies the primary server name that the client uses to log on to the
secondary server in failover mode.
Myreplicationserver
The myreplicationserver option specifies which secondary server stanza that the client uses during a
failover.
Nrtablepath
56 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The nrtablepath option specifies the location of the node replication table on the client. The backup-
archive client uses this table to store information about each backup or archive operation to the IBM
Spectrum Protect server.
Replserverguid
The replserverguid option specifies the globally unique identifier (GUID) that is used when the client
connects to the secondary server during failover. The GUID is used to validate the secondary server to
ensure that it is the expected server.
Replservername
The replservername option specifies the name of the secondary server that the client connects to
during a failover.
Replsslport
The replsslport option specifies the TCP/IP port on the secondary server that is SSL-enabled. The
replsslport option is used when the client connects to the secondary server during a failover. This
option is deprecated if you are connecting to an IBM Spectrum Protect server V8.1.2 and later levels, and
V7.1.8 and later V7 levels.
Repltcpport
The repltcpport option specifies the TCP/IP port on the secondary server to be used when the client
connects to the secondary server during a failover.
Repltcpserveraddress
The repltcpserveraddress option specifies the TCP/IP address of the secondary server to be used
when the client connects to the secondary server during a failover.
Usereplicationfailover
The usereplicationfailover option specifies whether automated client failover occurs on a client
node.
Procedure
dsmc query filespace -detail
The following sample output shows that the time stamps on the server and the client match, therefore the
replication status is current:
# Last Incr Date Type fsID Unicode Replication File Space Name
--- -------------- ------- ---- ------- ----------- ---------------
1 00/00/0000 00:00:00 HFS 9 Yes Current /
The following sample output shows that time stamps on the server and the client do not match, therefore
the replication status is not current:
What to do next
If you attempt to restore the data in failover mode and the replication status is not current, a message is
displayed that indicates that the data you are about to restore is old. You can decide whether to proceed
with the restore or wait until the primary server is online.
Related tasks
Restoring or retrieving data during a failover
When the client fails over to the secondary server, you can restore or retrieve replicated data from the
secondary server.
Related reference
Nrtablepath
The nrtablepath option specifies the location of the node replication table on the client. The backup-
archive client uses this table to store information about each backup or archive operation to the IBM
Spectrum Protect server.
Procedure
To prevent the client node from failing over to the secondary server, add the following statement to the
client options file:
usereplicationfailover no
This setting overrides the configuration that is provided by the IBM Spectrum Protect server administrator
on the primary server.
Results
The client node does not automatically fail over to the secondary server the next time it tries to connect to
the offline primary server.
Related tasks
Determining the status of replicated client data
You can verify whether the most recent backup of the client was replicated to the secondary server before
you restore or retrieve client data from the secondary server.
Related reference
Usereplicationfailover
58 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The usereplicationfailover option specifies whether automated client failover occurs on a client
node.
Procedure
To force the client to immediately fail over to the secondary server, complete the following steps:
1. Add the forcefailover yes option in the client options file (dsm.opt).
2. Connect to the secondary server by restarting the backup-archive client GUI or by starting a command
session with the dsmc command.
3. Optional: Instead of updating the options file, you can establish a connection with the secondary
server by specifying the -forcefailover=yes option with a command. For example:
What to do next
You can verify that you are connected to the secondary server with one of the following methods:
• Check the Secondary Server Information field in the Connection Information window in the backup-
archive client GUI.
• Check the command output when you start a command session. The status of the secondary server is
displayed in the output.
Related reference
“Forcefailover” on page 397
The forcefailover option enables the client to immediately fail over to the secondary server.
60 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Complete a one-time post-installation setup for these purposes:
– To specify the FastBack user name and password to be used by the wizard, to query and mount
volumes from the FastBack repository
– To run IBM Spectrum Protect scheduler scripts
• Set up the FastBack credentials file. The user ID that you specify must have Tivoli Storage Manager
FastBack administrative authority.
1. Configure the user ID and password. Run the following command on the workstation where the
backup-archive client and FastBack server or Disaster Recovery Hub are installed:
cd <TSM_FastBack_install_location>\FastBack\shell
mkdir <machine_system_drive>:\FastbackTSMScripts
62 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Install the backup-archive client on each node in the cluster. All backup-archive clients must be the
same version of the software and all clients must be installed in the same directory on each node.
• Register the nodes that you are going to run the cluster configuration wizard on. On the IBM Spectrum
Protect server, use the administrative command-line client and register the node by using the
register node command.
• Make sure that the cluster groups that will be configured are owned by the system that will run the
cluster wizard. This ensures that the backup-archive client files (options file, error log, schedule log) can
be created/updated on the cluster drives.
Procedure
1. Run dsm.exe to start the Java GUI.
2. In the GUI, click Utilities > Setup Wizard > Help me protect my cluster.
3. Choose Configure a new or additional cluster group, the first time you run the wizard on a node. On
subsequent wizard sessions, you can choose to update a previously configured cluster group or to
remove a saved configuration.
4. Select the name of the cluster group that you want to protect.
5. Select the disks in the cluster group that you want to protect. You cannot use the wizard to back up
the quorum drive.
6. Specify the disk location where you want the wizard to store the client options file (dsm.opt) that the
wizard creates. The client options file must be on one of the drives in the cluster group that you
selected in step “4” on page 63.
If a client options file exists at this location, you are prompted to overwrite it, or choose a new
directory.
7. Specify a name for the IBM Spectrum Protect Scheduler that will be used to perform the backups.
Select Use the Client Acceptor to manage the scheduler if you want the client acceptor to manage
the scheduler.
8. Specify the node name for the cluster node and the password that is used to log on to the IBM
Spectrum Protect Server. By default, the option to have the password validated by the server is
selected. Clear this option if you do not want the password validated.
9. Specify the account that the scheduler and client acceptor daemon services log on as when the
services are started. Specify whether you want to start the service manually, or when the node is
booted.
10. Specify the names and location of the client schedule log file and error log file. By default, event
logging is enabled. Clear this option if you do not want to log events.
To ensure that any node can perform backups if any other node fails, the wizard copies the registry
data to all nodes in the cluster.
Procedure
• To configure the dsm.opt file for each cluster group, specify the following options:
nodename
Specify a unique name. For example: mscs-cluster-group-a
domain
Specify the drive letters for the drives that are managed by the group. For example: q: r:
See “Frequently asked questions” on page 70 for information on how to add a cluster drive to an
existing IBM Spectrum Protect cluster scheduler service resource for backup.
clusternode
Specify the Yes value. If you set the clusternode option to Yes, the client does the following
actions:
1. Checks for a cluster environment (MSCS or VCS).
2. Uses the cluster name instead node name for file space naming and encryption. This action
allows the use of one password file for all nodes in the cluster.
3. Builds a list of shared volumes and works only with shared volumes. Backing up local volumes
is not permitted if the clusternode option set to yes.
Important: For the VCS, cluster database processing is skipped because VCS does not have a
cluster database. VCS stores all cluster configuration information in an ASCII configuration file that
is called main.cf, which is in the path pointed by %VCS_HOME%conf/config on each node in the
cluster. If this file is corrupted, the cluster configuration is also corrupted. Be careful when you
handle this file. The VCS_HOME environment variable points to the directory where VCS is installed
on the node.
64 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
passwordaccess
Specify the generate value.
managedservices
(Optional). Specifies whether the IBM Spectrum Protect Client Acceptor service manages the
scheduler, the web client, or both. The examples in this appendix assume that the client acceptor
manages both the web client and the scheduler for each cluster group. To specify that the client
acceptor manages both the web client and the scheduler, enter the following option in the
dsm.opt file for each cluster group:
httpport
Specify a unique TCP/IP port number that the web client uses to communicate with the client
acceptor service that is associated with the cluster group.
errorlogname
Specify a unique error log name.
Note: This file is not the same error log file that the client uses for other operations. Ideally, this
file is stored on a cluster resource, but at minimum it should be stored in a location other than the
client directory.
schedlogname
Specify a unique schedule log name. It is a best practice to specify a different log file name for
each cluster group.
Note: This file is not the same schedule log file that the client uses for other operations. Ideally,
this file is stored on a cluster resource, but at minimum it should be stored in a location other than
the client directory.
Related reference
“Clusternode” on page 331
The clusternode option specifies how the backup-archive client manages cluster drives.
“Domain” on page 357
The domain option specifies what you want to include for incremental backup.
“Errorlogname” on page 378
This option specifies the fully qualified path and file name of the file that contains the error messages.
“Managedservices” on page 434
The managedservices option specifies whether the IBM Spectrum Protect client acceptor service
manages the scheduler, the web client, or both.
“Nodename” on page 446
Use the nodename option in your client options file to identify your workstation to the server. You can use
different node names to identify multiple operating systems on your workstation.
“Passwordaccess” on page 453
The passwordaccess option specifies whether you want to generate your password automatically or set
as a user prompt.
“Schedlogname” on page 485
The schedlogname option specifies the path and file name where you want to store schedule log
information.
MSCS
You must use the Microsoft Cluster Administrator utility to add an IP address resource to each cluster
group managed by IBM Spectrum Protect.
Procedure
1. Select the group-a folder under the MSCS-Cluster\Groups folder and select File > New >
Resource from the dropdown menu.
2. In the New Resource dialog, enter a unique name in the Name field. For example: IP address for
GROUP-A. Enter a description in the Description field. Change resource type to IP address in the
Resource Type field. Enter the group name in the Group field. Press Enter.
3. In the Possible Owner dialog, ensure that all cluster nodes appear as possible owners. Press Enter.
4. In the Dependencies dialog add all physical disk resources as Resource Dependencies. Press Enter.
5. In the TCP/IP Address dialog, enter appropriate values for address, subnetmask, and network. Press
Enter.
6. Select the new resource from the Microsoft Cluster Administrator utility, and from the dropdown menu
click File and then Bring Online.
Results
You must use the Microsoft Cluster Administrator utility to add a network name to each cluster group
managed by IBM Spectrum Protect.
66 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Follow these steps to add a network name:
1. Select the group-a folder under the MSCS-Cluster\Groups folder and select File > New >
Resource from the dropdown menu.
2. In the New Resource dialog, enter a unique name in the Name field. For example: Network Name
for GROUP-A. Enter a description in the Description field. Change resource type to Network Name
in the Resource Type field. Enter the group name in the Group field. Press Enter.
3. In the Possible Owner dialog, ensure that all cluster nodes appear as possible owners. Press Enter.
4. In the Dependencies dialog add the IP address resource and all physical disk resources as Resource
Dependencies. Press Enter.
5. In the Network Name Parameters dialog, enter a network name for GROUP-A. Press Enter.
6. Select the new resource from the Microsoft Cluster Administrator utility, and from the dropdown menu
click File and then Bring Online.
The IP address and network name to backup the disks in the cluster group are now resources in the same
group.
Repeat this procedure for each cluster group managed by IBM Spectrum Protect.
VCS
You must use the VCS Configuration Editor to add a network name and IP address resource for each
group that is managed by the client.
Procedure
1. Open the VCS Configuration Editor. You are prompted with the Build a new configuration or modify
existing configuration window which provides the following options: New Config - If you select this
option you are prompted for the path for the types.cf file, and Open Existing Config - If you select this
option, the configuration window opens. Click on RESOURCE GROUP you want to modify.
2. Click on the Edit button and select Add resource. The Add Resource window opens.
3. Enter the name you want to give the resource in Resource Name field.
4. Select the Resource Type as IP. The attributes of the IP resource type are displayed.
5. Click the Edit button to modify the resource attributes.
a) Select the MACAddress attribute and enter the MAC address of adapter you want the IP to be
assigned to.
b) Select the SubNetMask attribute and enter the subnetmask.
c) Select the Address attribute and enter the IP address you want to make High-Availability.
6. When you are finished, close the window. The Configuration window prompts you whether to save the
configuration; click Yes.
Procedure
1. Select the group-a folder under the MSCS-Cluster\Groups folder and select File > New >
Resource from the dropdown menu.
Results
The client acceptor service is now a resource in the same group. If the group is moved (failed) to the other
nodes in the cluster, the service should correctly fail over between the cluster nodes and notify both
cluster nodes of automatic password changes.
Note:
1. If you manually change the password, you must stop the remote agent and the client acceptor
services, regenerate the password, and restart the client acceptor service (do not restart the remote
agent). You can generate the password by running this command:
2. See “Frequently asked questions” on page 70 for information on what to do if a generic service
resource for the cluster group fails because the client acceptor service has been removed.
Procedure
1. Open the VCS Configuration Editor. You are prompted with the Build a new configuration or modify
existing configuration window which provides the following options: New Config - If you select this
option you are prompted for the path for the types.cf file, and Open Existing Config- If you select this
option, the configuration window opens. Click on RESOURCE GROUP you want to modify.
2. Click on the Edit button and select Add resource. The Add Resource window opens.
3. Enter the name you want to give the resource in Resource Name field.
4. Select the Resource Type as GenericService. The attributes of the GenericService resource type
are displayed.
5. Click the Edit button to modify the resource attributes.
6. Select the ServiceName attribute and enter the name of scheduler service that you want to make
High-Availability.
7. When you are finished, close the window. The Configuration window prompts you whether to save the
configuration; click Yes.
68 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Results
Use the VCS Configuration Editor to configure the registry replication resource, as follows:
1. Open the VCS Configuration Editor. You are prompted with the Build a new configuration or modify
existing configuration window which provides the following options: New Config - If you select this
option you are prompted for the path for the types.cf file, and Open Existing Config - If you select this
option, the configuration window opens. Click on RESOURCE GROUP you want to modify.
2. Click on the Edit button and select Add resource. The Add Resource window opens.
3. Enter the name you want to give the resource in Resource Name field.
4. Select the Resource Type as RegRep. The attributes of the RegRep resource type are displayed.
5. Click the Edit button to modify the resource attributes.
6. Select the MountResName attribute and enter the shared disk on which you want to store the registry
keys.
7. When you are finished, close the window. The Configuration window prompts you whether to save the
configuration; click Yes.
The client acceptor service is now a resource in the same group. If the group is moved (failed) to the other
nodes in the cluster, the service should correctly fail over between the cluster nodes and notify both
cluster nodes of automatic password changes.
Note:
1. If you manually change the password, you must stop the remote agent and the client acceptor
services, regenerate the password, and restart the client acceptor service (do not restart the remote
agent). You can generate the password by running this command: dsmc query session -
optfile="q:\tsm\dsm.opt"
2. See “Frequently asked questions” on page 70 for information on what to do if a generic service
resource for the cluster group fails because the client acceptor service has been removed.
Procedure
1. Start the Client Acceptor Service for each resource group on each node.
2. To start the web client, point your browser at the IP address and httpport specified for the Resource
Group. For example, if you used an IP address of 9.110.158.205 and specified an httpport value of
1583, open the web address: http://9.110.158.205:1583.
Results
Alternatively, you can point your browser at the network name and httpport. For example, if you used a
network name of cluster1groupa and specified an http port value of 1583, open the web address:
http://cluster1groupa:1583.
Note that the web client connects to whichever workstation currently owns the resource group. The web
client displays all of the local file spaces on that workstation, but to ensure that the files are backed up
with the correct node name you should only back up the files for the resource group.
When failing back to the original node after a failover scenario, ensure that the remote agent service on
the original workstation is stopped. The remote agent can be stopped manually, or it stops automatically
after 20 to 25 minutes of inactivity. Because the remote agent is configured for manual startup, it will not
start automatically if the workstation on which it was running is rebooted.
Procedure
1. Right-click on the desktop and select New > Shortcut.
2. In the window that appears, find the path to the dsm.exe executable (located by default in directory
C:\program files\tivoli\tsm\baclient\). If you type the path in, instead of using the Browse
button, the path should be enclosed in double quotation marks. For example: "C:\Program Files
\tivoli\tsm\baclient\dsm.exe"
3. After you enter the path and executable in the text field, add the following information after the closing
double quotation marks (add a space between the double quotation marks and the following): -
optfile="x:\path\to\cluster\dsm.opt". This identifies the proper IBM Spectrum Protect
cluster options file you want to use. This example assumes that the cluster options file is located in the
folder "x:\path\to\cluster\" and has the file name dsm.opt.
4. The complete line in the text field now should look similar to the following: "C:\Program Files
\tivoli\tsm\baclient\dsm.exe" -optfile="x:\path\to\cluster\ dsm.opt".
5. Click Next and give this shortcut a meaningful name, such as Backup-Archive GUI: Cluster
Group X.
6. Click Finish. A desktop icon should now be available. The properties of this icon shows the following
correct Target, as noted in step 4: "C:\Program Files\tivoli\tsm\baclient\dsm.exe" -
optfile="x:\path\to\cluster\ dsm.opt".
Results
Q: How do you verify that a scheduler service setup in a cluster environment works?
A: Setting up a scheduler service for a Microsoft clustered resource group can be time consuming, and
can be lengthened by mistakes and errors in the syntax of the commands used to set them up.
Carefully entering the commands and recording important information about the cluster setup can
minimize setup time. To successfully set up a scheduler service for Microsoft cluster environments:
1. Carefully read the information in this appendix for correct syntax on setting up a scheduler service
for a cluster group.
2. Ensure that the proper dsm.opt file(s) are used for the cluster. In a typical normal workstation,
only one dsm.opt file is used. In a clustered environment, additional dsm.opt files are required.
Each cluster group that is backed up must have its own dsm.opt file. A cluster group is any group
listed under the GROUPS folder of the cluster tree within the Microsoft Cluster Administrator utility
or VCS Configuration Editor.
3. Understand what the following dsmcutil.exe options mean, and when to use them. (1) /
clustername:clustername - Specifies the name of the Microsoft cluster, where clustername is
the name at the top level of the tree within the Microsoft Cluster Administrator utility or VCS
Configuration Editor. Use this option with dsmcutil.exe, only when installing a scheduler service
for a cluster group. Do not specify a clustername of more than 64 characters. If you specify more
than 256 characters and you are using Veritas Storage Foundation with High Availability or a
Microsoft Cluster Server configuration, you might not be able to install or start the IBM Spectrum
Protect scheduler service, and (2) /clusternode:yes - Specifies that you want to enable
support for cluster resources. Use this option in the dsm.opt file for each cluster group, and with
dsmcutil.exe when installing a scheduler service for a cluster group.
70 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
4. Common mistakes are made in typing the syntax of the dsmcutil.exe command. An easy way to
prevent such syntax problems is to create a temporary text file which is accessible to the cluster
group (for instance, place it on a cluster drive belonging to that cluster group), and type the syntax
into this file. When needed, cut and paste this syntax from the file to the DOS prompt and press the
Enter key. It guarantees the consistency of the command syntax regardless of which computer
you enter it on.
5. If the scheduler service is failing to restart after a failover of the cluster group occurs (using the
MOVE GROUP option in Cluster Administrator, for example), there might be potential password
synchronization problems between the two cluster workstations. To verify that the passwords are
the same, browse to this registry key on each workstation and compare the encrypted password
value: HKEY_LOCAL_MACHINE\SOFTWARE\IBM\ADSM\CurrentVersion\Nodes\nodename
\servername.
If the encrypted keys for this node do not match between the two cluster workstations, there is a
password mismatch on one or both of the two workstations. To correct this problem, use the
dsmc.exe program to update the password manually on both workstations.
For example, assume that the Y: drive is part of the cluster group that is experiencing problems
being backed up with a scheduler service. The Y:\tsm directory contains the dsm.opt file for this
cluster group in the Y:\tsm directory. To update the password manually, enter the following
command on both workstations: dsmc -optfile=Y:\tsm\dsm.opt -clusternode=yes, and
enter the following command to receive the prompt for the node name and password: dsmc q se
-optfile=Y:\tsm\dsm.opt -clusternode=yes.
Verify that the passwords are synchronized, and restart the scheduler service to verify if the
password remains consistent. If password mismatching continues, it might be due to a syntax
error in the original dsmcutil.exe command that was used to install the scheduler service. In
this case, uninstall the scheduler service (using the dsmcutil remove /name:schedule_name
command) and reinstall the scheduler service again (using the shared text file syntax as shown
previously).
Q: How do you add a cluster drive to an existing cluster scheduler service resource for backup?
A: To add an additional cluster drive resource to an existing backup-archive client cluster scheduler
service, the following components must be modified or updated to properly reflect this change:
1. The cluster drive resource, and any related resource shares, must exist and reside within the
designated cluster group as defined in the Microsoft Cluster Administrator utility or VCS
Configuration Editor. The designated cluster group must already contain the cluster scheduler
service resource for which this new drive is added.
2. The dsm.opt file used by the designated cluster scheduler service resource must be modified to
include the additional cluster drive resource on the domain option statement. For example, if you
want to add the R:\ drive, and the domain statement currently identifies cluster drives Q: and S:,
update the domain statement in your dsm.opt file as follows: domain Q: S: R:.
3. You must modify the cluster scheduler service resource properties to include this file in the list of
dependent resources needed to bring this resource online. This ensures that the cluster drive
resource being added is included in the new backups, and for backups which run after a failover
occurs.
After the changes above are made, bring the cluster scheduler service resource offline, and back
online. The schedule should now process this additional resource for backups.
Q: The client acceptor service has been removed and now the generic service resource for the cluster
group is failing. How can this be corrected?
A: The client acceptor can be used to control the scheduler, the web client, or both for a cluster
environment. If the client acceptor is removed without updating the generic cluster resource, the
resource fails. To correct this:
1. Verify which scheduler service was controlled by the client acceptor.
Procedure
1. Select Utilities > Setup Wizard from the backup-archive client GUI main window. The Client
Configuration Wizard panel appears.
2. Select Help me configure Online Image Support and click Next. The Online Image Support Wizard
panel appears.
3. Click Volume Shadowcopy Services (VSS) and then click Next. To disable online image support, click
None (Disable online image support).
4. Click Finish button to complete the setup.
5. Complete each panel in the wizard and click the Next to continue. To return to a previous panel, click
the Back. To display help information for a panel, click the help icon.
Results
To set preferences for open file support, use the Include-Exclude tab on the IBM Spectrum Protect
Preferences editor. You can set these options for all volumes or for individual volumes using the
include.fs option: snapshotproviderfs, presnapshotcmd, postsnapshotcmd.
Related concepts
“Client options reference” on page 309
The following sections contain detailed information about each of the IBM Spectrum Protect processing
options.
“Image backup” on page 152
From your local workstation, you can back up a logical volume as a single object (image backup) on your
system.
72 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
To configure OFS, perform the following steps:
Procedure
1. Start the Windows client Java GUI (run dsm.exe).
2. Select Utilities > Setup Wizard.
3. Select Help me configure Online Image Support and click Next.
4. Click Next again.
5. Select the VSS snapshot provider to enable Open File Support or select None to perform normal (non-
snapshot) backups of the files on your volume; then click Next.
6. Click Apply and then click Finish.
Results
To set preferences for open file support, use the Include-Exclude tab on the Preferences editor. You can
set these options for all volumes or for individual volumes using the include.fs option:
snapshotproviderfs, presnapshotcmd, postsnapshotcmd
Related concepts
“Client options reference” on page 309
The following sections contain detailed information about each of the IBM Spectrum Protect processing
options.
Procedure
1. Establish a console session on the NetApp filer and define a new user on the file server by using the
following steps:
a) Add the user ID to a group that permits users to log in to the file server with http and running API
commands.
b) From the file server, enter the following command to list the user ID to verify the settings and verify
that the output is similar:
Name: snapdiff_user
Info:
Rid: 131077
Groups: snapdiff_group
Full Name:
For clustered-data ONTAP NetApp filers, the only capability that is required is ontapapi with the
admin role.
c) If the security.passwd.firstlogin.enable option for the user ID on the NetApp server is
set to on, ensure that all groups have the login-telnet and cli–passwd* capabilities.
74 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The createnewbase option creates a base snapshot and uses it as a source to run a full incremental
backup.
Procedure
Complete the following steps on the remote machine where the backup-archive client is installed:
1. Configure the backup-archive client with the cluster management filer credentials. Use the dsmc set
password command to store the credentials of the management filer that is associated with the
storage virtual machine.
For example, enter the following command:
Where:
Where:
storage_virtual_machine_hostname
The host name or IP address of the storage virtual machine that is used to mount volumes to back
up.
management_filer_hostname
The host name or IP address of the cluster management filer.
storage_virtual_machine_name
The name of the storage virtual machine.
Note: The host name or IP address of the storage virtual machine that is used to mount volumes must
be consistent with what is specified in the dsmc set commands. For example, if the volumes are
mounted with a storage virtual machine IP address, the IP address (not the host name) must be used
in the dsmc set commands. Otherwise, client authentication with the cluster management filer fails.
You need only to specify the dsmc set netappsvm command once for each storage virtual machine.
If the storage virtual machine is moved to a different cluster management filer, you must use the
command to update the associated cluster management filer host name.
3. Map the volumes to drive letters.
For example, enter the following command for each storage virtual machine:
Where:
y:
The drive to map the volume to.
storage_virtual_machine_hostname
The host name or IP address of the storage virtual machine.
domain_name\CIFS_share_name
The CIFS share that is defined on the filer on the volume being backed up.
4. Start a full progressive incremental backup of a flex or infinite volume.
By default, HTTP access to the NetApp file server is not enabled. If you did not configure your file
server to allow access by using HTTP, use the backup-archive client snapdiffhttps option to enable
access to the cluster management server with the HTTPS protocol.
For example, on Windows clients, enter the following command:
Tip: You need only to run the full progressive incremental backup once. After this backup is
successfully completed, run differential backups in future backup operations.
5. Start a snapshot differential backup of the flex or infinite volume.
76 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For example, on Windows clients, enter the following command:
Example
A backup-archive client user wants to complete a snapshot differential incremental backup of the
volumes on a c-mode file server. The user is using a Windows backup-archive client to complete the
backup and the volumes are mounted as CIFS shares. The c-mode filer configuration is as follows:
ONTAP 8.31 management filer
Hostname: netapp1mgmt.example.com
User: netapp1mgmt_user
Password: pass4netapp1mgmt
CIFS Domain Controller: WINDC
Domain User: domainuser
Hostname: netapp1-v1.example.com
Storage virtual machine name: netapp1-client1
CIFS share: demovol
Volume name: demovol
Hostname: netapp1-v4.example.com
Storage virtual machine name: netapp1-infiniteVolume1
CIFS Share: InfiniteVol
4. Run a full progressive incremental backup of the flex volume and infinite volume:
You need only to run the full progressive incremental backup once. After this backup is successfully
completed, run differential backups in future backup operations.
5. Run a snapshot differential backup of the flex volume and infinite volume:
78 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• When the base snapshot that was registered by a previous differential snapshot no longer exists, and an
existing snapshot that is older than the missing base snapshot does not exist.
If this option is not specified, a new snapshot is created on the volume that is being backed up. Because
destination filer volumes are read-only volumes, useexistingbase must be specified when creating
snapshot differential backups of destination filer volumes. If useexistingbase is not specified,
snapshot differential backups of a destination filer volume fail because the new snapshot cannot be
created on the read-only volume.
When backing up destination filer volumes, use both the useexistingbase option and the
diffsnapshot=latest option to ensure that the most recent base and most recent differential
snapshots are used during the volume backup.
You use the basesnapshotname option to specify which snapshot, on the destination filer volume, to
use as the base snapshot. If you do not specify this option, the most recent snapshot on the destination
filer volume is used as the base snapshot. You can use wildcards to specify the name of the base
snapshot.
You use the diffsnapshotname option to specify which differential snapshot, on the destination filer
volume, to use during a snapshot differential backup. This option is only specified if you also specify
diffsnapshot=latest. You can use wildcards to specify the name of the differential snapshot.
The diffsnapshot=latest option specifies that you want to use the latest snapshot that is found on
the file server as the source snapshot.
Additional information about each of these options is provided in the Client options reference topics.
You can use a question mark (?) to match a single character. In this example, -
basesnapshotname=nightly.? uses the latest base snapshot that is named "nightly.", followed by
a single character (for example: nightly.0, nightly.1, and so on).
Example 2. Back up a destination filer volume by using snapshots created manually (not created by
the NetApp snapshot scheduler)
This example also uses the question mark (?) wildcard to illustrate the syntax if the base and
differential snapshot names have different numbers as part of the name.
-useexistingbase selects the most recent base snapshot. Adding an asterisk (*) wildcard to -
basesnapshotname selects the most recent base snapshot that follows the script-naming
convention. The -diffsnapshot=latest option suppresses the creating of a new differential
snapshot and -diffsnapshotname= selects the most recent existing differential snapshot that
follows the script-naming convention. (The asterisks wildcards match any string).
Example 5: Perform a snapshot differential backup by using an existing differential snapshot that
exists on the source filer
To use an existing differential snapshot that exists on the source filer, use the -
diffsnapshot=latest to prevent the creation of a new differential snapshot. Also use the -
diffsnapshotname option to specify which existing differential snapshot to use. The snapshot you
specify is compared to the base snapshot, which was registered in the IBM Spectrum Protect server
database when the last backup was created. For example:
where the node name and the administrative user ID must be the same. For example:
80 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Closed registration
With closed registration, the IBM Spectrum Protect administrator must register your workstation as a
client node with the server. If your enterprise uses closed registration, you must provide some
information to your IBM Spectrum Protect administrator.
Open registration
With open registration, a system administrator can register your workstation as a client node with the IBM
Spectrum Protect Version 8.1.1, V8.1.0, V7.1.7 or earlier server.
Procedure
You can use the following methods to create an include-exclude list or specify an include-exclude file:
• You can add include-exclude statements in the backup-archive client GUI or web client directory tree.
The online help provides detailed instructions.
a) Open the Edit menu and select Client Preferences. In the Preferences dialog, select the Include/
Exclude tab. You can specify an INCLEXCL file using the Preferences editor. However, you cannot
create the INCLEXCL file using the Preferences editor.
b) Create the include-exclude list manually, following the steps listed.
• You can create an include-exclude list manually by performing the following steps:
a) Determine your include and exclude requirements.
b) Locate the client options file
c) Important: Group your include-exclude options together in your client options file.
d) Enter your include and exclude statements. The client evaluates all exclude.dir statements
first (regardless of their position within the include-exclude list), and removes the excluded
directories and files from the list of objects available for processing. All other include-exclude
statements are processed from the bottom of the list up. Therefore, it is important to enter all your
include-exclude statements in the proper order. For example, in the following include-exclude list
the includefile.txt file is not backed up:
include c:\test\includefile.txt
exclude c:\test\...\*
However, in the following include-exclude list the includefile.txt file is backed up:
exclude c:\test\...\*
include c:\test\includefile.txt
Include-exclude options
This topic provides brief descriptions of the include and exclude options that you can specify in your
client options file, a minimum include-exclude list that excludes system files, a list of supported wildcard
82 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
characters, and examples of how you might use wildcard characters with include and exclude
patterns.
exclude.dir c:\MyPrograms\Traverse
exclude.dir c:\MyPrograms\Traverse\*
Exclude all directories whose names begin with temp, and are located within
directory x:\documents and settings and its subdirectories, where x: is
any drive.
Exclude all directories whose names begin with temp, regardless of the drive or
directory in which they reside:
exclude.dir temp*
exclude.dir c:\MyPrograms\Traverse\
exclude x:\*
exclude.dir x:\*
domain -x:
84 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Include-exclude statements for networked file systems
Include-exclude statements that involve networked file systems (remote drives) must be written in the
UNC format.
In the following example Z: is a mapped drive to a remote file system on vista.example.com.
The old format would be to exclude \dir\dir2 on the remote file system, as in this example:
EXCLUDE.DIR "Z:\dir1\dir2"
EXCLUDE.DIR "\\vista.example.com\d$\dir1\dir2"
The include-exclude statements written in the old format will not be recognized by the client.
Table 9. Options for controlling processing using include and exclude statements
Option Description Page
Back up processing
These options are equivalent. Use these options to exclude a file “Exclude
exclude
or group of files from backup services and space management options”
exclude.backup
services (if the HSM client is installed). The exclude.backup on page
exclude.file
option only excludes files from normal backup, but not from 380
exclude.file.backup
HSM.
Use these options to include files or assign management “Include
include
classes for backup processing. options”
include.backup
on page
include.file
407
include.fs Use this option to set options on a file space-by-file space basis. “Include
options”
on page
407
Archive processing
The implicitly generated statements can be seen in the lines of output of the query inclexcl
command with the source "operating system".
Use the sample include-exclude list in the dsm.smp file as a starting point for your include-exclude list.
This is the minimum include-exclude list that you should have. The dsm.smp file is located in the config
86 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
folder in the installation directory. If you accepted the defaults, the path to this file is C:\Program
Files\Tivoli\TSM\config\dsm.smp
There are exclude statements generated from a list defined by the Windows operating system in the
Windows Registry. Those implicitly generated statements can be seen in the lines of output of the query
inclexcl command with the source "operating system".
\\remote\books
You would like to exclude from backups all files at the root of this share point that have an extension
of .txt. You could use either of the following commands:
exclude g:\*.txt
exclude \\remote\books\*.txt
You cannot specify UNC names for removable drives such as DVD, ZIP, or diskette. For example, the
following command is not valid:
exclude \\ocean\a$\winnt\system32\...\*
[ ]
To specify files and directories in include and exclude statements, you must use the escape character "\"
to specify the wildcards. However, the escape character can only be used inside the character classes
"[]".
The following examples illustrate how to specify files and directories that contain wildcard characters
using the escape character and character classes in include-exclude statements.
To exclude the single directory C:\[dir2] from backup processing, enter the following in the dsm.opt
file:
exclude.dir "C:\[\[]dir2[\]]"
To exclude the single file C:\file[.txt from backup processing, enter the following in the dsm.opt file:
exclude.dir "C:\file[\[].txt"
Tip: If you use the Preferences Editor to include or exclude a single file or directory that contains wildcard
characters, you must manually edit the include or exclude statement to escape the wildcard characters.
The Preferences Editor does not automatically escape the wildcard characters. Follow the previous
examples to edit the include or exclude statements in the dsm.opt file or the include-exclude file.
c:\*
The following pattern specifies all files and all directories on the C drive:
c:\...\*
[ The open character-class character begins the enumeration of a character class. For
example:
– The character-class range includes characters from the first character to the last
character specified. For example:
This format should not be used to specify remote drives in an exclude statement.
88 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 10. Wildcard and other special characters (continued)
Character Function
\ The literal escape character. When used within a character class, it treats the next
character literally. When used outside of a character class, it is not treated in this way.
For example, if you want to include the ']' in a character class, enter [...\]...]. The escape
character removes the usual meaning of ']' as the close character-class character.
] The close character-class character ends the enumeration of a character class.
: The drive separator character separates a file specification. The character before the
colon identifies a drive letter. The characters after the colon identify file specification or
pattern. For example:
d:\direct\file.nam
Note: Because a drive specification can consist of only one letter, you should not use more than one
wildcard or a combination of a wildcards with a letter to designate a drive specification. The following
patterns are not allowed, and if specified in the client options file (dsm.opt), stops the client program
immediately after it starts:
?*:\test.txt
*?:\...\pagefile.sys
H*:\test.*
*H:\test.txt
myvolume*:\
myvolume?*:\
If you are using UNC names, Table 11 on page 89 shows how to correctly specify shared drives.
Related concepts
“Wildcard characters” on page 604
Use wildcard characters when you want to specify multiple files with similar names in one command.
Without wildcard characters, you must repeat the command for each file.
Table 12. Using wildcard characters with include and exclude patterns
Task Pattern
Exclude all files during backup with an extension of bak,
exclude ?:\*.bak
except those found on the d: drive in the dev directory. include d:\dev\*.bak
Related concepts
“Examples using wildcards with include and exclude patterns” on page 89
The backup-archive client accepts the exclude.dir option, which can be used to exclude directory
entries. However, the include and exclude.dir options cannot be used together.
Related reference
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
90 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 13. Options for controlling compression and encryption processing (continued)
Option Description Page
Encryption processing
exclude.encrypt Excludes files from encryption processing. “Exclude
options”
on page
380
include.encrypt Includes files for encryption processing. “Include
options”
The data that you include is stored in encrypted form, and
on page
encryption does not affect the amount of data sent or
407
received.
Important: The include.encrypt option is the only way
to enable encryption on the backup-archive client. If no
include.encrypt statements are used encryption will not
occur.
Restriction: Client encryption with the include.encrypt
option is no longer supported for LAN-free backup and
archive operations to the IBM Spectrum Protect server
V8.1.1 and later levels, or V7.1.8 and later V7 levels. LAN-
free restore and retrieve operations of encrypted backup
versions and archive copies continue to be supported. If you
need to encrypt data by using the include.encrypt
option, in which data is encrypted before it is sent to the
server, use LAN-based backup or archive operations.
exclude ?:\*.obj
include c:\foo\...\*.obj
exclude c:\foo\junk\*.obj
The file being processed is: c:\foo\dev\test.obj. Processing follows these steps:
1. Rule 3 (the last statement defined) is checked first because of bottom-up processing. The pattern
c:\foo\junk\*.obj does not match the file name that is being processed.
2. Processing moves to Rule 2 and checks. This time, pattern c:\foo\...\*.obj matches the file
name that is being processed. Processing stops, the option is checked, and it is included.
3. File c:\foo\dev\test.obj is backed up.
92 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Example 2
Assume that you defined the following statements for the include and exclude options:
exclude ?:\*.obj
include c:\foo\...\*.obj
exclude c:\foo\junk\*.obj
The file being processed is: c:\widg\copyit.bat. Processing follows these steps:
1. Rule 3 is checked and finds no match.
2. Rule 2 is checked and finds no match.
3. Rule 1 is checked and finds no match.
4. Because a match is not found, file c:\widg\copyit.bat is implicitly included and backed up.
Example 3
Assume that you defined the following statements for the include and exclude options:
exclude ?:\...\*.obj
include c:\foo\...\*.obj
exclude c:\foo\junk\*.obj
The current file being processed is: c:\lib\objs\printf.obj. Processing follows these steps:
1. Rule 3 is checked and finds no match.
2. Rule 2 is checked and finds no match.
3. Rule 1 is checked and a match is found.
4. Processing stops, the option is checked, and it is excluded.
5. File c:\lib\objs\printf.obj is not backed up.
Related concepts
“Exclude file spaces and directories” on page 83
Use exclude.dir statements to exclude all files and subdirectories in the specified directory from
processing.
“Processing options” on page 283
You can use defaults for processing client options or you can tailor the processing options to meet your
specific needs. Read about an overview of processing options and explore the options reference that
provides detailed information about each option.
Related reference
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
“Query Inclexcl” on page 670
The query inclexcl command displays a list of include-exclude statements in the order in which they
are processed during backup and archive operations. The list displays the type of option, the scope of the
option (archive, all, and so on), and the name of the source file.
\\remote\c$\include\file.out r:\include\file.out
\\remote\c$\...\file.out r:\...\file.out
\\remote\share4\exclude\* s:\exclude\*
\\remote\share2\...\?.out t:\...\?.out
\\remote[a-z]\share\file.txt
matches \\remotea\share\file.txt
\\remote\share[a-z]\file.txt
matches \\remote\sharex\file.txt
\\remote\share\file[a-z].txt
matches \\remote\share\fileg.txt
94 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 3. Getting started
Before you can use the IBM Spectrum Protect backup-archive client, you must learn how to start a GUI or
command-line session, and how to start the client scheduler automatically. You can also learn about
other commonly used tasks.
Before you use the backup-archive client, complete the following tasks:
• “Starting a Java GUI session” on page 106
• “Starting a command-line session” on page 107
• “Starting a web client session” on page 111
• “Start the client scheduler automatically” on page 115
• “Changing your password” on page 115
You can also complete the following tasks:
• “Sorting file lists using the backup-archive client GUI” on page 117
• “Displaying online help” on page 118
• “Ending a session” on page 118
96 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
– No changes are required to the security options for the client.
– The client uses existing authentication and session security protocol to servers at versions earlier
than V8.1.2 , and automatically upgrade to use TLS authentication when initially connecting to a
server at V8.1.2 or later. Session security is managed per server.
• New client installation, server is at V8.1.2 or later:
– Configure the client according to a new installation.
– Default values for the security options automatically configure the client for TLS-encrypted session
authentication.
– Set the SSL parameter to the Yes value if encryption of all data transfers between the client and the
server is required.
• New client installation, server is at a version earlier than V8.1.2 :
– Configure the client according to a new client installation.
– Accept the default values for client session-security parameters if SSL encryption of all data transfers
is not required.
- Non-SSL authentication protocol is used until the server is upgraded to V8.1.2 or later.
– Set the SSL parameter to the Yes value if encryption of all data transfers between the client and the
server is required, and proceed with the manual configuration for SSL.
- See “Configuring IBM Spectrum Protect client/server communication with Secure Sockets Layer”
on page 34 for configuration instructions.
- SSL communication is automatically enhanced to use the TLS level that is required by the server
after the server is updated to V8.1.2 or later.
Related reference
Sslrequired
The sslrequired option specifies the conditions when SSL is or is not required when the client logs on
to the IBM Spectrum Protect server or storage agents. To actually enable SSL so client-to-server and
client-to-storage-agent communications are secure, you must set the client ssl option to yes. When
communicating with the IBM Spectrum Protect server V8.1.2 and later levels, and V7.1.8 and later V7
levels, this option no longer applies since SSL is always used.
Sslacceptcertfromserv
Use the sslacceptcertfromserv option to control whether the backup-archive client or the API
application accept and trust the IBM Spectrum Protect server's Secure Sockets Layer (SSL) public
certificate the first time they connect. This option applies only the first time that the backup-archive client
or the API application connects to the IBM Spectrum Protect server. When the SSL public certificate is
accepted, future changes to the certificate are not automatically accepted, and must be manually
imported to the backup-archive client. You can use this option to connect only to an IBM Spectrum
Protect server V8.1.2 and later levels, and V7.1.8 and later V7 levels.
Ssl
Use the ssl option to enable Secure Sockets Layer (SSL) to provide secure client and server
communications. When the backup-archive client communicates with an IBM Spectrum Protect server
V8.1.1 and earlier V8 levels, and V7.1.7 and earlier levels, it determines whether SSL is enabled. When
the backup-archive client communicates with an IBM Spectrum Protect server V8.1.2 and later levels,
and V7.1.8 and later V7 levels, SSL is always used and this option controls whether object data is
encrypted or not. For performance reasons, it might be desirable to not encrypt the object data.
Sslfipsmode
The sslfipsmode option specifies whether the client uses SSL Federal Information Processing
Standards (FIPS) mode for Secure Sockets Layer (SSL) communications with the server. The default is no.
Ssldisablelegacytls
Use the ssldisablelegacytls option to disallow the use of SSL protocols that are lower than TLS 1.2.
Lanfreessl
Uses cases for configuring the client without automatic certificate distribution
If automatic certificate distribution is not possible or wanted, use the dsmcert utility to import the
certificate. Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA. The CA
can be from a company such as VeriSign or Thawte, or an internal CA that is maintained within your
company.
• First, the server is upgraded to V8.1.2. Then, the client is upgraded. The existing client is not using SSL
communications:
– Set the SSLACCEPTCERTFROMSERV option with the value No.
– Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
• First, the server is upgraded to V8.1.2 or later. Then, the client is upgraded. The existing client is using
SSL communications:
– No changes are required to the security options for the client. If the client already has a server
certificate for SSL communication, the SSLACCEPTCERTFROMSERV option does not apply.
– SSL communication with existing server public certificate continues to be used.
– SSL communication is automatically enhanced to use the TLS level that is required by the server.
• First, the client is upgraded to V8.1.2 or later. Then, the server is upgraded later. The existing client is
not using SSL communications:
– Set the SSLACCEPTCERTFROMSERV option with the value No.
– Existing authentication protocol continues to be used to servers at levels earlier than V8.1.2.
– Before the client connects to a V8.1.2 or later server:
- Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
• First, the client is upgraded to V8.1.2 or later. Then, the server is upgraded later. The existing client is
using SSL communications
– No changes are required to the security options for the client. If the client already has a server
certificate for SSL communication, the SSLACCEPTCERTFROMSERV option does not apply.
98 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
– SSL communication with existing server public certificate continues to be used with servers at levels
earlier than V8.1.2.
– SSL communication is automatically enhanced to use the TLS level that is required by the server after
the server is updated to V8.1.2 or later.
• First, the client is upgraded to V8.1.2 or later. Then, the client connects to multiple servers. The servers
are upgraded at different times:
– Set the SSLACCEPTCERTFROMSERV option with the value No.
– Existing authentication protocol continues to be used to servers at levels earlier than V8.1.2.
– Before the client connects to a V8.1.2 or later server, or when SSL communication is required at any
server level:
- Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
– The client uses existing authentication and session security protocol to servers at versions earlier
than V8.1.2, and automatically upgrade to use TLS authentication when initially connecting to a
server at V8.1.2 or later. Session security is managed per server.
• New client installation, server is at V8.1.2 or later:
– Configure the client according to a new installation.
– Set the SSLACCEPTCERTFROMSERV option with the value No.
– Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
– Set the SSL parameter to the Yes value if encryption of all data transfers between the client and the
server is required.
• New client installation, server is at a version earlier than V8.1.2, SSL-encrypted sessions are required:
– Configure the client according to a new installation.
– Set the SSL parameter to the Yes value.
– Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
• New client installation, server is at a version earlier than V8.1.2, SSL-encrypted sessions are not
required:
– Configure the client according to a new installation.
– Set the SSLACCEPTCERTFROMSERV option with the value No.
- Non-SSL authentication protocol is used until the server is upgraded to V8.1.2 or later.
– Before the client connects to a V8.1.2 or later server:
- Obtain the necessary certificate from the IBM Spectrum Protect server or from a CA and use the
dsmcert utility to import the certificate. See “Configuring IBM Spectrum Protect client/server
communication with Secure Sockets Layer” on page 34 for configuration instructions.
Related reference
Sslrequired
The sslrequired option specifies the conditions when SSL is or is not required when the client logs on
to the IBM Spectrum Protect server or storage agents. To actually enable SSL so client-to-server and
client-to-storage-agent communications are secure, you must set the client ssl option to yes. When
communicating with the IBM Spectrum Protect server V8.1.2 and later levels, and V7.1.8 and later V7
levels, this option no longer applies since SSL is always used.
Sslacceptcertfromserv
100 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Password locations on Windows clients
On Windows clients, the passwords in the SOFTWARE\IBM\ADSM\CurrentVersion\BackupClient
\Nodes registry key and the SOFTWARE\IBM\ADSM\CurrentVersion\Nodes registry key are migrated
to the new password store.
The password entries in these registry keys are deleted after the migration.
The migrated server and encryption passwords are stored in the password stores in separate
subdirectories of the C:\ProgramData\Tivoli\TSM\baclient directory (a hidden directory).
Separating the server passwords this way allows an administrator to grant a non-administrative user
access to individual passwords without giving that user access to all the other passwords. The following
directories are examples of password file locations:
• C:\ProgramData\Tivoli\TSM\BAClient\NodeName\ServerName
• C:\ProgramData\Tivoli\TSM\BAClient\(VCB)\ServerName
• C:\ProgramData\Tivoli\TSM\BAClient\(DOMAIN)\ServerName
• C:\ProgramData\Tivoli\TSM\BAClient\(FILER)\ServerName
Access to the password stash files (TSM.sth) is restricted to the creator of the keystore, Administrators,
and System. A utility (dsmcutil addace) is available to allow Windows users to easily modify password
file access control lists. For more information, see “ADDACE” on page 276 and “DELETEACE” on page
277.
NODES\NodeName\ServerName
To store an encrypted password file when you set up a cluster environment, use the
clustersharedfolder option to specify the directory location in which to store the encrypted
password file. For more information, see “Clustersharedfolder” on page 330.
In a cluster configuration, the options file is stored on a cluster disk so that it can be accessed by the
takeover node. The password files must also be stored on a cluster disk so that after a failure, the
generated backup-archive client password is available to the takeover node.
For example, if the dsm.opt file is in the c:\ClusterStorage\Volume1\SPData directory, the node
name is Cluster-B, and the server name is Bigdata, the location for password files is:
C:\ClusterStorage\Volume1\SPdata\Nodes\Cluster-B\Bigdata
Windows Clients Member of Backup Operators • Back up and restore all file and
group directory objects
• Back up system state, except
for ASR Writer
Note: Backup Operator group
members cannot restore system
state.
Windows Clients Member of Users or other group • Back up and restore all file and
directory objects
102 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
By default, IBM Spectrum Protect client services run under the local system account. However, the local
system account does not have access to network mapped drives and does not have the same permissions
and logon properties as a user that is logged in to the system. If you experience discrepancies between a
user initiated backup and a scheduled backup using the local system account, consider changing the
services to run under the user account.
Tip: In addition to the appropriate user security rights, the IBM Spectrum Protect backup-archive client
requires that the user has read permission to the root of any drive that needs to be backed up or restored.
If you are using the system account to logon for the IBM Spectrum Protect scheduler service, ensure that
you grant the system account (SYSTEM) read access to the root of the drive. It is not sufficient to grant
Everyone read access to the root of the drive.
Domain resources, such as network drives, can only be accessed by services configured to run under a
domain authorized account using dsmcutil or the Service Control Panel Application.
Beginning with IBM Spectrum Protect Version 8.1.2, stricter access control is enforced for the IBM
Spectrum Protect password storage on Windows operating systems. By default, only the Administrator,
SYSTEM, or LocalSystem account has access to the password store and SSL certificates.
You can use the dsmcutil addace command to modify the access control list to allow additional users,
such as non-administrative users, or processes such as the IBM Spectrum Protect Data Protection client
processes to access the password store and SSL certificates.
You can use the dsmcutil deleteace command to modify the access control list to remove access to
the password store and client certificates for users, such as non-administrative users or processes such
as the IBM Spectrum Protect Data Protection client processes.
For more information, see “ADDACE” on page 276 and “DELETEACE” on page 277.
104 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Client owner
Authority over the registered IBM Spectrum Protect client node. You can access the client through the
web client or backup-archive client. You own the data and have a right to physically gain access to the
data remotely. You can back up and restore files on the same or different system, and you can delete
file spaces or archive data.
Client access
To use the web client to back up and restore files on a remote client system, you must have an
administrative user ID with client access authority over the node name for the remote client system. If
you do not want IBM Spectrum Protect administrators with client access authority over your node
name to be able to back up and restore files on your system, specify the revokeremoteaccess
option in your client options file.
Client access authority only allows IBM Spectrum Protect administrators to back up and restore files
on remote systems. They do not have physical access to the data. That is, they cannot restore the
data belonging to the remote system to their own systems. To restore data belonging to a remote
system to your own system, you must possess at least client owner authority.
To determine what authority you have, you can use either of the following methods:
• From the main IBM Spectrum Protect GUI window, select File → Connection Information.
• Use the IBM Spectrum Protect server QUERY ADMIN command from the administrative command-line
client.
Related reference
Revokeremoteaccess
The revokeremoteaccess option restricts an administrator with client access privilege from accessing
a client workstation that is running the web client.
QUERY ADMIN command
Procedure
Complete the following steps to enable the client to access data on network shares.
1. Create a desktop shortcut for the Windows command prompt.
The default location of the command prompt executable file is C:\Windows\System32\cmd.exe.
Procedure
Complete the procedure that is appropriate for your operating system to start the Java GUI.
Operating Procedure
System
Windows To start the backup-archive client GUI on a Windows system, use one of the following
methods:
• Click Start > Programs > IBM Spectrum Protect > Backup-Archive GUI.
• Click Start > Run and enter the full path to the backup client dsm.exe file.
• On the command line, change directory to the backup-archive client installation
directory and enter dsm.
On Windows operating systems that have the User Account Control feature enabled, you
might be prompted to allow the dsm.exe program to run. To allow the program to
continue and start the backup-archive client GUI, provide administrative credentials.
The backup-archive client locates and uses the options that are specified in the client options file
(dsm.opt).
Related concepts
“Configure the IBM Spectrum Protect client” on page 19
After installing the backup-archive client, you must configure it before performing any operations.
Related tasks
Configuring the language for displaying the backup-archive client GUI
You can select the language to use for displaying the backup-archive client GUI.
“Configuring the language for displaying the backup-archive client GUI” on page 25
106 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can select the language to use for displaying the backup-archive client GUI.
Setup wizard
When the client GUI starts, it checks to see whether a client options file exists.
If the client options file does not exist (which usually happens after you have installed the client for the
first time on your system), the setup wizard automatically starts and guides you through the configuration
process.
You can launch the setup wizard at any time to modify your client options file.
The client options file is dsm.opt.
dsmc incremental
Some commands require one or more arguments. For example, to archive a file:
Depending upon the current setting of your passwordaccess option, the client might prompt you for
your password before the command is processed in a batch mode session.
When you enter your password, the password is not displayed on your screen.
Related reference
“Passwordaccess” on page 453
The passwordaccess option specifies whether you want to generate your password automatically or set
as a user prompt.
Protect>
When you log on with an administrator ID, you can complete standard user tasks.. If you are not logged
on before you begin a task from a command-prompt window, you are prompted to do so..
When you are in interactive mode, do not precede commands with dsmc. For example, instead of typing
dsmc archive to archive a file, type only archive.
For example, to archive a file, enter the command with the file specification:
archive c:\myfiles\file1.dat
Depending upon the current setting of the passwordaccess option, the client might prompt you for your
password before you are allowed to enter a command in an interactive session.
When you enter your password, the password is not displayed on your screen.
108 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Displaying Euro characters in a command-line prompt
This topic explains how to display the Euro character in the Windows command-line prompt (console
window).
Procedure
1. Contact your Microsoft Representative for the 858 code page (the file name is c_858.nls). Copy the
file into your Windows system32 directory (for example, C:\WINNT\system32).
2. Edit the Windows Registry key, using this command: HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\Nls\CodePage\850, and set it to value c_858.nls. Any
changes that you make to the Windows Registry editor cannot be undone. Errors made in editing
the Windows Registry can cause your system to malfunction, and you might not even be able to restart
your system. Be very careful when editing the Windows Registry. If you are unfamiliar with using the
Windows Registry editor, then ask someone else who is familiar with the Windows Registry editor to
help you.
3. In your Regional Settings, select a Western European country (Germany, France, Italy, etc.) as your
locale setting.
4. Exit and reboot the system.
Results
Ensure that the console window font that you use supports the Euro symbol (such as Lucida Console).
When access is granted, you would retrieve the file by entering the following command:
Note: Access to the files of another user can also be granted and gained using the GUI.
If you have more than one backup server in your organization, you can easily switch between them using
a command-line option. To override the server specified in dsm.opt, you could use a command such as
this:
Related reference
“Fromnode” on page 398
The fromnode option permits one node to perform commands for another node. A user on another node
must use the set access command to permit you to query, restore, or retrieve files for the other node.
“Set Access” on page 727
• If the input string has a double quotation mark, enclose the string within single quotation marks, as in
this example:
• If the input string has spaces and quotation marks, enclose the string in quotation marks. The outer
quotation marks must not be the same as the quotation marks within the string.
Restriction: An input string that has single and double quotation marks is not a valid input string.
The following rules apply to these types of data:
• Fully qualified names
• The description that you specify in the archive command
• Any value for an option value where the character string can include spaces or quotation marks
Important: You cannot use escape characters in input strings. Escape characters are treated the same as
any other characters. Here are some examples where escape characters are not recognized:
• If the character string is in an option file
• If the character string is in a list file
• If the character string is entered in interactive mode
110 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For more information, see:
– “Back up NAS file systems using Network Data Management Protocol” on page 157
– “Restore NAS file systems” on page 223
Tip: If you already upgraded the backup-archive client to V8.1.2 or later, you can uninstall it and reinstall
the V8.1.0 client to continue to use the web client. The IBM Spectrum Protect server administrator needs
to set the SESSIONSECURITY parameter on the node back to TRANSITIONAL. For more information, see
UPDATE NODE (Update node attributes).
Procedure
1. Specify the URL of the client workstation that you installed the web client on, in your web browser.
Also, specify the HTTP port number that is defined on the client workstation for the web client.
The default port number is 1581.
The following example shows the syntax of a web client URL:
http://myhost.mycompany.com:1581
If you enter a different URL or click Back during an operation, the web client is disconnected and the
current operation ends.
Note: Backup and restore activities that are running with a NAS server continue after the web client
disconnects.
2. Follow the instructions in the IBM Spectrum Protect web client launch page to start the web client.
Each time that you start the web client, a Java Web Start application (.jnlp file) is downloaded to
your browser. Open the dsm.jnlp file to start the web client.
You can close the web browser after the web client starts.
Tip: The web client runs in the language of the web browser's workstation because it uses the JRE that
is installed locally on the workstation. For example, if your web browser's workstation is running in the
English locale and the remote client node is in Japanese, the web client launch page is displayed in
Japanese while the web client is in English.
Related concepts
“Web client configuration overview” on page 25
User privileges
If you plan to use the web client, ensure that you are assigned an administrative user ID with system
privilege, policy privilege, client access authority, or client owner authority.
When a new node is registered with the server, the node must be given an administrative user ID of the
same node name with client owner authority.
The IBM Spectrum Protect server administrator must specify the userid parameter with the REGISTER
NODE server command:
where the node name and the administrative user ID must be the same. For example:
Tip: You can use the revokeremoteaccess option to prevent IBM Spectrum Protect administrators with
client access privilege from performing client operations on your workstation through the web client.
However, IBM Spectrum Protect administrators with client owner privilege, system privilege, or policy
privilege can still perform client operations on your workstation through the web client.
Related concepts
“IBM Spectrum Protect client authentication” on page 104
When using the graphical user interface or command line interface of the IBM Spectrum Protect client,
you can log on using a node name and password or administrative user ID and password.
Related reference
“Revokeremoteaccess” on page 480
The revokeremoteaccess option restricts an administrator with client access privilege from accessing
a client workstation that is running the web client.
Procedure
1. In the installation directory, locate the client options file, dsm.opt or dsm.sys. For more
information, see “Client options file overview” on page 19.
2. Add the HTTPPORT option to the client options file. For example, specify the following value:
httpport 1581
3. If you are changing the HTTPPORT value in the client options file, ensure that the port number for
your service is also updated. You can check the port number by using the following command:
112 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
dsmcutil query CAD /name:your service name
You can update the port number by using the following command:
6. Start the client acceptor by taking the appropriate actions for your operating system:
• Use the dsmcutil command to create a dsmcad and dsmagent service from a command line.
For more information, see the INSTall CAD and INSTall REMOTEAgent commands in
“Dsmcutil commands: Required options and examples” on page 269. Issue the following
command:
where client acceptor daemon service name is the name of the client acceptor daemon (CAD)
service.
7. Enter the following IBM Spectrum Protect server commands to register an administrator to access
the client data, and perform the file-restore operations on behalf of the node:
where admin ID is the administrator's ID, password is the administrator's password, and node is the
node where file-restore operations are performed.
8. If you registered a new node, and do not have backup data stored on the IBM Spectrum Protect
server for that node, perform a backup. This backup provides you with test data that can be used for
file-restore operations with the web user interface. To back up the data, take one of the following
actions:
• From the command line, run either the dsmc incremental or dsmc selective command. For
more information, see:
– “Incremental” on page 641
– “Selective” on page 724
• In the IBM Spectrum Protect backup-archive client GUI select Backup.
9. To start the File Restore user interface, in a supported web browser, enter the following URL:
https://hostname:9081/bagui/
where hostname specifies the address of the virtual machine that hosts the File Restore user
interface.
10. In the login window, enter the administrator ID and password (as specified in step 7), and click Sign
In.
Procedure
From the web user interface, select Download System Logs.
Results
Depending on the size of the log files and trace file, it can take several minutes for the system logs to be
downloaded.
The problem-determination information is collected into a compressed file. The file can be saved to a
selected location, or saved to the default location as specified in the browser configuration.
The compressed file name has the following format:
TIV-logs-TSM_CAD-<NODE NAME>-YYYY-MM-DD_hh-mm-ss.zip
The compressed file contains the following problem-determination information:
• ba/dsminfo.txt. This file contains IBM Spectrum Protect backup-archive client information from the
command query systeminfo, and includes the following information dsmerror.log,
dsmwebcl.log, and dsmsched.log.
• ba/trace.txt. If tracing is enabled, this file contains IBM Spectrum Protect backup-archive client
trace file information.
• ba/dsminstr.log. This file contains IBM Spectrum Protect backup-archive client instrumentation
information.
• The liberty_logs folder contains all logs and trace files that are related to the Liberty Server and the
file-restore API, including fr_api.log and messages.log.
• frGUI/FRLog.config. This file contains file-restore API logging and tracing configuration
information.
• The tsmVmGUI folder contains the file-restore information files, and including api-
jlog.properties, frConfig.props, traceConfig.properties, TsmApiLog.config, and
tsmserver.props.
• server.xml. This file contains configuration information that is related to the Liberty Server.
Procedure
1. Go to the directory where the frConfig.props file is located.
For example, open a command prompt and enter the following command:
cd C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\tsmVmGUI
114 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
2. Open the frConfig.props file with a text editor in administrator mode and specify the option as
needed.
To determine which options to specify, see “File restore options” on page 115.
3. Save your changes and close the frConfig.props file.
Results
Modified options are applied to the IBM Spectrum Protect web user interface.
Procedure
1. From the main window, open the Utilities menu and select Change password.
Results
To change your password from the command-line client, enter this command:
For UNIX, Linux, and Windows clients:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are case-sensitive and are subject to more restrictions that can be imposed by LDAP
policies.
If your IBM Spectrum Protect server is at version 6.3.3 or later, and if you do not use an LDAP
directory server to authenticate passwords
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are stored in the IBM Spectrum Protect server database and are not case-sensitive.
If your IBM Spectrum Protect server is earlier than version 6.3.3
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9
_ - & + .
Passwords are stored in the IBM Spectrum Protect server database and are not case-sensitive.
Remember:
On the command line, enclose all parameters that contain one or more special characters in quotation
marks. Without quotation marks, the special characters can be interpreted as shell escape characters, file
redirection characters, or other characters that have significance to the operating system.
On Windows systems:
Enclose the command parameters in quotation marks (").
Command line example:
dsmc set password "t67@#$%^&" "pass2><w0rd"
Quotation marks are not required when you type a password with special characters in an options file.
Related concepts
“Start the client scheduler automatically” on page 115
116 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can start the client scheduler automatically when you start your workstation.
Related reference
“Password” on page 451
The password option specifies a password for IBM Spectrum Protect.
“Set Password” on page 732
The set password command changes the IBM Spectrum Protect password for your workstation, or sets
the credentials that are used to access another server.
Table 16. Working with your files using the backup-archive client GUI
Task Procedure
Displaying files To display files in a directory, click the folder icon next to the directory
name. The files appear in the File List box on the right.
Sorting the file list • Click the appropriate column heading in the File List box.
Display active and inactive • Click the Display Active/Inactive Files option from the View menu.
backup versions
• Click the Display both active and inactive files tool on the tool bar.
Display only active backup Click the Display active files only option from the View menu.
versions
Selecting files to restore or • Click the selection box next to the directory or file name that you
retrieve. want to restore or retrieve.
• Highlight the files that you want to restore or retrieve and click the
Select Items tool on the tool bar.
• Highlight the files that you want to restore or retrieve and click the
Select Items option from the Edit menu.
Deselecting files • Click the checked selection box next to the directory or file name.
• Highlight the files that you want to deselect and click the Deselect
Items tool on the tool bar.
• Highlight the files that you want to deselect and click the Deselect
Items option from the Edit menu.
Displaying file information • Highlight the file name, and click the View File Details button on the
tool bar.
• Highlight the file name, and select File Details from the View menu.
Note:
1. Unless otherwise noted, the tasks and procedures in the above table apply to all client GUIs.
2. Using the client GUIs, you can sort a list of files by various attributes, such as name, directory, size, or
modification date. Sorting files by the last backup date can be useful in determining what date and
time to use for the point-in-time function.
3. An active file is the most recent backup version of a file that existed on your workstation when you ran
your last backup. All other backup versions of that file are inactive. Only active backup versions of files
Ending a session
You can end a client session from the backup-archive client GUI or from the dsmc command line.
118 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The loop command starts an interactive command line session that is maintained until you enter quit.
Online forums
To participate in user discussions of IBM Spectrum Protect products, you can subscribe to the ADSM-L list
server.
The list server will send you a response asking you to confirm the subscription request. Once you confirm
your subscription request, the list server will send you further instructions. You will then be able to post
messages to the list server by sending e-mail to:
If at a later time you want to unsubscribe from ADSM-L, you can send a note to the following e-mail
address:
SIGNOFF ADSM-L
You can also read and search the ADSM-L archives, join discussion forums, and access other resources at
the following URL:
http://www.adsm.org
☐ Decide whether you want to back up or archive files. See “When to back up and when to
archive files” on page 130 for more information.
☐ See “Pre-backup considerations (Windows)” on page 130 for important migration
information, and how you might increase performance before backing up files and directories.
☐ Create an include-exclude list to specify files and directories you want to exclude from
backup services. See “Control processing with an include-exclude list” on page 134 for more
information.
☐ Decide what type of backup you want according to your needs. See the following sections for
more information:
• “Incremental, selective, or incremental-by-date backups (Windows)” on page 136
• “Backing up files from one or more file spaces for a group backup (Windows)” on page 143
• “Backing up Windows system state” on page 148
• “Backing up Automated System Recovery files” on page 149
• “Image backup” on page 152
• “Back up NAS file systems using Network Data Management Protocol” on page 157
• “Parallel backups of virtual machines” on page 169
Related concepts
Installing the IBM Spectrum Protect backup-archive clients
The IBM Spectrum Protect backup-archive client helps you protect information on your workstations.
122 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
A management class is a collection of backup and archive copy groups that establishes and contains
specific storage management requirements for backing up and archiving data.
Related tasks
“Backing up Windows system state” on page 148
The backup-archive client uses VSS to back up all system state components as a single object, to provide
a consistent point-in-time snapshot of the system state. System state consists of all bootable system
state and system services components.
Related reference
“Absolute” on page 310
Use the absolute option with the incremental command to force a backup of all files and directories
that match the file specification or domain, even if the objects were not changed since the last
incremental backup.
Do not use OFS for backing up locked Windows system files, such as the Windows system state. The
client has advanced features for backing up data that is contained within these files. The backup of the
system data that is contained in these files requires extra processing and must be backed up in a group to
allow for a successful restore. These files are excluded from IBM Spectrum Protect file level backup.
For database applications that use certain files for transactional consistency (for example, a recovery log
file), it might not be possible to back up and restore these files without database coordination. In these
situations, do not back up these database files with the normal file level backup. You can exclude these
files from backup processing by using an exclude or exclude.dir statement. A number of data
protection clients (IBM Spectrum Protect for Databases, IBM Spectrum Protect for Mail, and so on) are
available to provide this database coordination and backup along with other advanced database backup
features. For a current list of data protection clients go to this website: http://www.ibm.com/systems/
storage/spectrum/protect/.
For private applications or other database products where a Data Protection client is not available, you
can use the preschedulecmd option to signal the database or application to do one of the following
actions:
• Take the steps necessary to move these files to a consistent and unopen state.
• Bring down the database before the file level backup is started.
124 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You configure Open File Support (OFS) after you install the Window client.
Procedure
1. Click Backup on the GUI main window. The Backup window appears.
2. Expand the directory tree by clicking the plus sign +. To display files in a folder, click the Folder icon.
To search or filter files, click the Search icon from the toolbar.
3. Click the selection box for the objects that you want to back up.
4. Select the type of backup from the pull-down menu:
a) To run an incremental backup, select Incremental (complete).
b) To run an incremental backup by date, select Incremental (date only).
c) To run a selective backup, select Always backup.
d) To run an incremental backup without using the journal database, select Incremental (without
journal). If you installed the journal engine service and it is running, then by default the
Incremental command automatically performs a journal-based backup on selected file systems
that are being monitored by the journal engine service. This option performs a traditional full
incremental backup, instead of the default journal-based backup.
5. Click Backup. The Backup Task List window displays the backup processing status. When processing
completes, the Backup Report window displays processing details.
Results
The following are some items to consider when you use the GUI to back up your data.
• IBM Spectrum Protect uses management classes to determine how to manage your backups on the
server. Every time you back up a file, the file is assigned a management class. The management class
that is used is either a default that is selected for you, or one that you assign to the file using an
include option in the include-exclude options list. Select Utilities → View Policy Information from
the backup-archive client GUI to view the backup policies that are defined by the IBM Spectrum Protect
server for your client node. Select Edit → Client Preferences from the backup-archive client GUI and
select the Include-Exclude tab in the Preferences editor to display your include-exclude list.
• To modify specific backup options, click the Options button. Any options that you change are effective
during the current session only.
• To perform subsequent incremental backups, from the IBM Spectrum Protect main window, open the
Actions menu and select Backup Domain.
Related concepts
“Storage management policies” on page 255
Storage management policies are rules your administrator defines in order to manage your backups and
archives on the server.
Related tasks
“Restoring data by using the backup-archive client GUI” on page 183
Using the backup-archive client command line interface, you can specify drives to include in addition to
your default domain. For example, if your default domain contains drives c: and d:, and you want to back
up those drives as well as the diskette in drive a:, enter:
You can also select Actions > Backup Domain from the backup-archive client GUI to perform these
backup functions.
Related reference
“Domain” on page 357
The domain option specifies what you want to include for incremental backup.
126 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 18. Command line backup examples (continued)
Task Command Considerations
Back up the g: and h: dsmc incremental -domain="g: h:" See “Domain” on page 357 for more
drives in addition to the c:, information about the domain
d:, and e: drives defined in option.
your client domain.
Back up all local volumes dsmc incremental -domain="all- You cannot use the (-) operator in
defined in your client local -c: -systemobject" front of the domain keyword all-
domain except for the c: local. See “Domain” on page 357 for
drive and systemobject more information. For Windows
domain. clients you can also exclude the
systemstate domain from backup
processing in this way.
Back up all local volumes dsmc incremental -domain="all- You cannot use the (-) operator in
defined in your client local -c: -systemstate" front of the domain keyword all-
domain except for the c: local. See “Domain” on page 357 for
drive and systemstate more information.
domain.
Back up only the g: and h: dsmc incremental g: h: None
drives.
Back up all files in the dsmc incremental c:\Accounting\* See “Subdir” on page 519 for more
c:\Accounting directory -sub=yes information about the subdir
and all its subdirectories. option.
Assuming that you initiated See “Snapshotroot” on page 508 for
dsmc incremental c: -snapshot=
a snapshot of the C: drive \\florence\c$\snapshots\ more information.
and mounted the snapshot snapshot.0
as the logical volume \
\florence\ c$
\snapshots
\snapshot.0, run an
incremental backup of all
files and directories under
the local snapshot and
manage them on the IBM
Spectrum Protect server
under the file space name
C:.
Incremental-by-date backup
Perform an incremental-by- dsmc incremental -incrbydate Use the incrbydate option with
date backup of your default the incremental command to
client domain. back up new and changed files with
a modification date later than the
last incremental backup stored at
the server. See “Incrbydate” on
page 423 for more information
about the incrbydate option.
Selective backups
Related concepts
“Backup (Windows): Additional considerations” on page 173
This section discusses additional information to consider when backing up data.
“Using commands” on page 597
128 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The backup-archive client provides a command-line interface (CLI) that you can use as an alternative to
the graphical user interface (GUI). This topic describes how to start or end a client command session and
how to enter commands.
Procedure
To delete backup copies using the backup-archive client GUI or web client:
1. Select Utilities > Delete Backup Data from the menu. The Backup Delete window appears.
2. Expand the Directory tree by clicking the plus sign (+) or folder icon next to the object you want to
expand.
3. Click the selection boxes next to objects that you want to delete.
4. Select an item from the drop-down list near the top of the Backup Delete window to specify the type
of backup delete to perform. You can delete active backup versions, inactive backup versions, or all
objects that you have selected in the tree.
5. Click Delete to begin deleting the selected items.
Results
Note:
• If you specify Delete Active Objects or Delete Inactive Objects, only the files are considered for
removal.
• If you specify Delete Active Objects or Delete Inactive Objects and select a directory that contains no
files for removal, the following message is displayed during the delete backup operation:
The last parent inactive directory is removed based on retention policy settings on the server.
• A directory is deleted only if you select Delete All Objects.
• To delete file spaces, click Utilities > Delete Filespaces from the main window.
• To delete backup copies using the command-line client, use the delete backup command.
Related reference
“Delete Backup” on page 632
130 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restriction: Client encryption with the include.encrypt option is no longer supported for LAN-free
backup and archive operations to the IBM Spectrum Protect server V8.1.1 and later levels, or V7.1.8 and
later V7 levels. LAN-free restore and retrieve operations of encrypted backup versions and archive copies
continue to be supported. If you need to encrypt data by using the include.encrypt option, in which
data is encrypted before it is sent to the server, use LAN-based backup or archive operations.
LAN-free prerequisites
To enable LAN-free support, you must install and configure the IBM Spectrum Protect for SAN storage
agent on the client workstation.
IBM Spectrum Protect for SAN is a separate product.
For more information about installing and configuring the storage agent, see the documentation for IBM
Spectrum Protect for SAN.
132 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The memoryefficientbackup option specifies the memory-conserving algorithm to use for processing
full file space backups.
134 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Encryption is not compatible with VMware virtual machine backups that use the incremental forever
backup modes (MODE=IFIncremental and MODE=IFFull). If the client is configured for encryption, you
cannot use incremental forever backup.
To encrypt file data, you must select an encryption key password, which the client uses to generate the
encryption key for encrypting and decrypting the file data. You can specify whether to save the encryption
key password in the password store by using the encryptkey option.
IBM Spectrum Protect client encryption allows you to enter a value of up to 63 characters in length. This
encryption password needs to be confirmed when encrypting the file for backup, and also needs to be
entered when performing restores of encrypted files.
While restoring an encrypted file, you are prompted for the key password to decrypt the file in the
following cases:
• If the encryptkey option is set to Prompt.
• If the key supplied by the user does not match.
• If the encryptkey option is set to Save and the locally saved key password does not match the
encrypted file.
Restriction: Client encryption with the include.encrypt option is no longer supported for LAN-free
backup and archive operations to the IBM Spectrum Protect server V8.1.1 and later levels, or V7.1.8 and
later V7 levels. LAN-free restore and retrieve operations of encrypted backup versions and archive copies
continue to be supported. If you need to encrypt data by using the include.encrypt option, in which
data is encrypted before it is sent to the server, use LAN-based backup or archive operations.
Related concepts
“Backup (Windows): Additional considerations” on page 173
This section discusses additional information to consider when backing up data.
Related reference
“Encryptiontype” on page 374
Use the encryptiontype option to specify the algorithm for data encryption.
“Encryptkey” on page 375
The backup-archive client supports the option to encrypt files that are being backed up or archived to the
IBM Spectrum Protect server. This option is enabled with the include.encrypt option.
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
136 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
During an incremental backup, the client queries the server or the journal database to determine the
exact state of your files since the last incremental backup. The client uses this information for the
following tasks:
• Back up new files.
• Back up files whose contents changed since the last backup.
Files are backed up when any of the following attributes change:
– File size
– Date or time of last modification
– Extended Attributes
– Access Control List
– Sparse, reparse point or encrypted file attributes.
– NTFS or ReFS file security descriptors:Owner Security Identifier (SID), Group SID, Discretionary
Access Control List (ACL), and System ACL.
– Directory attributes
If only the following attributes change, the attributes are updated on the IBM Spectrum Protect server,
but the file is not backed up:
– Read-only or read/write
– Hidden or not hidden
– Compressed or not compressed
The archive attribute is not examined by IBM Spectrum Protect in determining changed files.
• Back up directories.
A directory is backed up in any of the following circumstances:
– The directory was not previously backed up.
– The directory permissions changed since the last backup.
– The directory Access Control List changed since the last backup.
– The directory Extended Attributes changed since the last backup.
Directories are counted in the number of objects that are backed up. To exclude directories and their
contents from backup, use the exclude.dir option.
• Expire backup versions of files on the server that do not have corresponding files on the workstation.
The result is that files that no longer exist on your workstation do not have active backup versions on
the server. However, inactive versions are retained according to rules defined by the IBM Spectrum
Protect administrator.
• Rebind backup versions if management class assignments change. Only objects that have active backup
versions are bound again. Objects for which only inactive backup versions exist are not bound again.
During a partial incremental backup operation, objects are rebound or expired as follows:
If the file specification matches all files in a path:
Rebinding and expiration occurs for all eligible backup versions that match the file specification.
This is the case for an incremental command like dsmc incr c:\mydir\* -subdir=yes.
If the file specification does not match all files in a path:
Rebinding and expiration occurs for all eligible backup versions that match the file specification.
However, eligible backup versions are not expired or rebound if they were in a directory that no
longer exists on the client file system.
Consider an incremental command like dsmc incr c:\mydir\*.txt -subdir=yes. Assume
that some files in c:\mydir\ do not have the txt file type. Rebinding and expiration occurs only
for files that match the *.txt specification and whose directories still exist on the client file
system.
Journal-based backup
Journal-based backup is an alternate method of backup that uses a change journal maintained by the
IBM Spectrum Protect journal service process.
Journal-based backup is supported for all Windows clients.
To support journal-based backup, you must configure the journal engine service using the dsmcutil
command or the client GUI setup wizard.
A backup for a particular file system will be journal-based when the IBM Spectrum Protect journal service
has been installed and configured to journal the particular file system, and a valid journal has been
established for the file system.
The primary difference between traditional incremental backup and journal-based backup is the method
used for backup and expiration candidates.
Traditional incremental backup obtains the list of backup and expiration candidates by building
comprehensive lists of local objects, and lists of active server objects for the file system being backed up.
The local lists are obtained by scanning the entire local file system. The server list is obtained by querying
the entire server inventory for all active objects.
The two lists are compared, and candidates are selected according to the following criteria:
• An object is selected as a backup candidate if it exists in the local list. but doesn't exist in the server list.
The object is also a backup candidate if it exists in both lists, but differs according to incremental
criteria (for example, attribute changes, date and size changes).
• An object is selected as an expiration candidate if it exists in the server list, but doesn't exist in the local
list.
Journal-based backup obtains the candidates list of objects to backup and expire by querying the journal
service for the contents of the change journal of the file system being backed up.
Change journal entries are cleared (marked as free) after they have been processed by the backup client
and committed on the IBM Spectrum Protect server.
Journal-based backup is activated by configuring the journal service to monitor specified file systems for
change activity.
Journal-based backup is enabled by successfully completing a full incremental backup.
The journal engine service does not record changes in specific system files, such as the registry, in the
journal. Therefore, a journal-based backup will not back up this file. See the journal service configuration
file, tsmjbbd.ini, in the client installation directory for excluded system files.
You can use journal-based backup when backing up file systems with small or moderate amounts of
change activity between backup cycles. If you have many file changes between backup cycles, you will
have very large change journals. Many changes to the journal-based backup file might pose memory and
performance problems that can negate the benefits of journal-based backup. For example, creating,
138 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
deleting, renaming, or moving very large directory trees can also negate the benefit of using journal-based
backup instead of normal incremental backup.
Journal-based backup is not intended to be a complete replacement for traditional incremental backup.
You should supplement journal-based backup with a full progressive incremental backup on a regular
basis. For example, perform journal-based backups on a daily basis, and full incremental backups on a
weekly basis.
Journal-based backup has the following limitations:
• Individual server attributes are not available during a journal-based backup. Certain policy settings such
as copy frequency and copy mode might not be enforced.
• Other operating-system specific behaviors might prevent objects from being processed properly. Other
software that changes the default behavior of the file system might prevent file system changes from
being detected.
• If the file system is very active when a journal-based backup is in progress, it is possible that a small
number of deleted files will not be expired.
• If you restore files to a file system that has an active journal, some of the restored files might get
backed up again when the next journal-based backup occurs, even if the files have not changed since
they were restored.
Note:
1. Multiple journal-based backup sessions are possible.
2. When using antivirus software, there are limitations to journal-based backup.
3. A journal-based backup might not fall back to the traditional incremental backup if the policy domain
of your node is changed on the server. This depends on when the policy set within the domain was last
updated and the date of the last incremental backup. In this case, you must force a full traditional
incremental backup to rebind the files to the new domain. Use the nojournal option with the
incremental command to specify that you want to perform a traditional full incremental backup,
instead of the default journal-based backup.
Related tasks
“Configuring the journal engine service” on page 39
Journal-based backup can be used for all Windows clients. If you install the journal engine service and it
is running, then by default the incremental command automatically performs a journal-based backup
on selected file systems that are being monitored by the journal engine service.
140 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
NetApp snapshot difference
For NAS and N-Series file servers that are running ONTAP 7.3.0, or later, you can use the snapdiff
option to invoke the snapshot difference backup from NetApp when running a full-volume
incremental backup. Using this option reduces memory usage and is faster.
Consider the following restrictions when running a full-volume incremental backup using the
snapdiff option, to ensure that data is backed up when it should be.
• A file is excluded due to an exclude rule in the include-exclude file. The client runs a backup of the
current snapshot with that exclude rule in effect. This happens when you have not made changes to
the file, but you have removed the rule that excluded the file. NetApp will not detect this include-
exclude change because it only detects file changes between two snapshots.
• If you added an include statement to the option file, that include option does not take effect unless
NetApp detects that the file has changed. The client does not inspect every file on the volume
during backup.
• If you used the dsmc delete backup command to explicitly delete a file from the IBM Spectrum
Protect inventory, NetApp cannot detect that a file was manually deleted from IBM Spectrum
Protect storage. Therefore, the file remains unprotected in IBM Spectrum Protect storage until it is
changed on the volume and the change is detected by NetApp, which signals the client to back it up
again.
• Policy changes such as changing the policy from mode=modified to mode=absolute are not
detected.
• The entire file space is deleted from the IBM Spectrum Protect inventory. This action causes the
snapdiff option to create a new snapshot to use as the source, and a full incremental backup to
be run.
• Snapshot differential backup operations are not supported in the IBM Spectrum Protect for Virtual
Environments environment. You cannot run snapshot differential backup operations of a file system
that resides on a NetApp filer on a host where the Data Protection for VMware or Data Protection for
Microsoft Hyper-V data mover is also installed.
The NetApp software determines what is a changed object, not IBM Spectrum Protect.
To avoid backing up all snapshots under the snapshot directory, do one of the following actions:
• Run NDMP backups
• Run backups using the snapshotroot option
• Run incremental backups using the snapdiff option
Tip: If you run an incremental backup using the snapdiff option and you schedule periodic
incremental backups, use the createnewbase=yes option with the snapdiff option to create a
base snapshot and use it as a source to run an incremental backup.
• Exclude the snapshot directory from backups.
On Windows systems, the snapshot directory is in ~snapshot.
142 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Procedure
To start a snapshot differential backup operation over an HTTPS connection, specify the incremental
command with the snapdiff and snapdiffhttps options at the command-line interface.
For example, on a Windows system with a network share \\netapp1.example.com\vol1, where
netapp1.example.com is a filer, issue the following command:
Related concepts
“Snapshot differential backup with an HTTPS connection” on page 141
You can use a secure HTTPS connection for the backup-archive client to communicate with a NetApp filer
during a snapshot differential backup.
Related reference
“Snapdiffhttps” on page 504
Specify the snapdiffhttps option to use a secure HTTPS connection for communicating with a NetApp
filer during a snapshot differential backup.
Selective backup
Use a selective backup when you want to back up specific files or directories regardless of whether a
current copy of those files exists on the server.
Incremental backups are generally part of an automated system to back up entire file systems. In
contrast, selective backups allow you to manually select a set of files to back up regardless of whether
they have changed since your last incremental backup.
Unlike incremental backups, a selective backup provides the following:
• Does not cause the server to update the date and time of the last incremental.
• Backs up directory and file entries even if their size, modification timestamp, or permissions have not
changed.
• Does not expire deleted files.
• Does not rebind backup versions to a new management class if you change the management class.
Related tasks
“Backing up data using the backup-archive client GUI” on page 125
You can use the backup-archive client GUI to back up specific files, a group of files with similar names, or
entire directories.
Related reference
“Selective” on page 724
The selective command backs up files that you specify. If you damage or mislay these files, you can
replace them with backup versions from the server.
Backing up files from one or more file spaces for a group backup (Windows)
Use the backup group command to create and back up a group from a list of files from one or more file
space origins to a virtual file space on the IBM Spectrum Protect server.
Procedure
Enter the backup group command to start a group backup.
For example, to perform a full backup of all the files in the c:\dir1\filelist1 file to the virtual file
space \virtfs, containing the group leader c:\group1 file, enter the following command:
Related concepts
“Restore data from a backup set” on page 192
Your IBM Spectrum Protect administrator can generate a backup set, which is a collection of your files
that reside on the server, onto portable media created on a device using a format that is compatible with
the client device.
Related reference
“Backup Group” on page 613
Use the backup group command to create and back up a group containing a list of files from one or
more file space origins to a virtual file space on the IBM Spectrum Protect server.
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
“Mode” on page 439
Use the mode option to specify the backup mode to use when performing specific backup operations.
144 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• If you use the same asnodename value to back up files from different machines, you need to keep track
which files or volumes are backed up from each system so that you can restore them to the correct
location.
• All agent nodes in a multiple node environment should be of the same platform type.
• Do not use target nodes as traditional nodes, especially if you encrypt your files before backing them up
to the server.
Procedure
To enable this option, follow these steps:
1. Install the backup-archive client on all nodes in a shared data environment.
2. Register each node with the IBM Spectrum Protect server, if it does not exist. Register the common
target node name to be shared by each of the agent nodes used in your shared data environment.
3. Register each of the nodes in the shared data environment with the IBM Spectrum Protect server. This
is the agent node name that is used for authentication purposes. Data will not be stored using the node
name when the asnodename option is used.
4. Grant proxy authority to all nodes in the shared environment to access the target node name on the
IBM Spectrum Protect server, using the GRANT PROXYNODE command (IBM Spectrum Protect
administrator).
5. Use the QUERY PROXYNODE administrative client command to display the client nodes of the
authorized user, granted by the GRANT PROXYNODE command.
Related reference
“Asnodename” on page 312
Use the asnodename option to allow an agent node to back up, archive, restore, retrieve, and query data
on behalf of a target node.
Procedure
1. Verify that the client node has proxy authority to a target node (or authorized to act as the target node)
by using the QUERY PROXYNODE administrative client command.
2. Select Edit > Client Preferences to open the preferences window.
3. Select the General tab and fill in the As Node Name field with the name of the target node.
4. Click Apply and then OK to close the preferences window.
Setting up encryption
This topic lists the steps that you must follow to set up encryption with the encryptkey option.
Procedure
1. Specify encryptkey=save in the options file.
2. Back up at least one file with asnode=ProxyNodeName to create a local encryption key on each agent
node in the multiple node environment.
Results
Follow these steps to set up encryption with the encryptkey=prompt option:
1. Specify encryptkey=prompt in the options file.
2. Ensure that users of the agent nodes in the multiple node environment are using the same encryption
key.
Important:
• If you change the encryption key, you must repeat the previous steps.
• Use the same encryption key for all files backed up in the shared node environment.
3. Ensure that each agent node must have its schedule associated with a node:
The following examples show the administrative client-server commands using the scheduler on multiple
nodes.
• The administrator registers all the nodes to be used, by issuing the following commands:
– register node NODE-A
– register node NODE-B
146 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
– register node NODE-C
• The administrator grants proxy authority to each agent node, by issuing the following commands:
– grant proxynode target=NODE-Z agent=NODE-A
– grant proxynode target=NODE-Z agent=NODE-B
– grant proxynode target=NODE-Z agent=NODE-C
• The administrator defines the schedules, by issuing the following commands:
– define schedule standard proxy1 description="NODE-A proxy schedule"
action=incremental options="-asnode=NODE-Z" objects=C: startdate=05/21/2005
starttime=01:00
– define schedule standard proxy2 description="NODE-B proxy schedule"
action=incremental options="-asnode=NODE-Z" objects=D: startdate=05/21/2005
starttime=01:00
– define schedule standard proxy3 description="NODE-C proxy schedule"
action=incremental options="-asnode=NODE-Z" objects=E: startdate=05/21/2005
starttime=01:00
Note: Place the asnodename option in the schedule definition only. Do not place it in the client options
file, on the command line, or in any other location.
Start the schedules by either configuring a scheduler service, or by using the following client command:
dsmc sched
You can also use the client acceptor, with managedservices set to schedule in the systems options file.
Important:
• Each schedule can be started from a different workstation or LPAR.
• After running the schedules, any proxied client can query and restore all the backed up data.
• A proxy operation uses the settings for the target node (such as maxnummp and deduplication) and
schedules that are defined on the IBM Spectrum Protect server. The IBM Spectrum Protect server node
settings and schedules for the agent node are ignored.
Related reference
Asnodename
Use the asnodename option to allow an agent node to back up, archive, restore, retrieve, and query data
on behalf of a target node.
Session settings and schedules for a proxy operation
A proxy operation occurs when an agent node uses the asnodename target_node_name option to
complete operations on behalf of the specified target node.
DEFINE SCHEDULE command
148 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
require availability of the operating system installation media. By backing up the dllcache directory, you
can avoid the need for installation media during system restores.
If you do not want the dllcache directory included in the backup of your boot partition, and you
understand the limitations of not backing up the dllcache directory, then you can use an exclude.dir
statement to suppress backup of those files. For example:
exclude.dir c:\windows\system32\dllcache
Procedure
To back up ASR files on Windows operating systems, use the backup systemstate command.
Results
The client generates the ASR files in the \adsm.sys\ASR staging directory on the system drive of your
local workstation and stores these files in the ASR file space on the IBM Spectrum Protect server.
Related concepts
“Preparation for Automated System Recovery” on page 150
Procedure
1. Find a copy of the client options file.
You can find the file in several places:
• There is an options file in the installation directory of an installed IBM Spectrum Protect client. The
default installation location is C:\Program Files\Tivoli\TSM\baclient\dsm.opt. If you
have the options file for the computer that you want to restore, this options file requires the fewest
modifications.
• There is a sample options file in the client installation package. The path in the package is
TSM_BA_Client\program files\Tivoli\TSM\config\dsm.smp. Rename the file to
dsm.opt.
2. Edit dsm.opt.
a) Enter a writable location for the error log.
The backup-archive client creates several log files. Use the option errorlogname to specify the
log file location. For example, in the dsm.opt file, specify errorlogname x:\dsmerror.log.
Note: This example uses x: because in WinPE mode, the default system drive is x:.
b) Enter the client node name with the nodename option.
c) Optional: If you plan to restore the system state from files that are stored on the IBM Spectrum
Protect server, enter the server connection information.
Enter appropriate values for the commmethod and tcpserveraddress options.
d) Optional: If you know the password for the node, enter the password with the password option.
3. Copy the dsm.opt file to media that the target computer can read during Automated System
Recovery.
4. Optional: Copy IBM Spectrum Protect client registry information to media that the target computer can
read during Automated System Recovery. Use the regedit.exe utility to export IBM Spectrum
Protect client registry entries from the HKLM\SOFTWARE\IBM key.
150 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For example, from a command prompt window, run this command:
Copy the tsmregistry.out file to media that the target computer can read during ASR.
During ASR, you can import the registry entries from the tsmregistry.out file. The backup-archive
client can use the registry entries in the WinPE environment to access backup copies on the IBM
Spectrum Protect server.
Note: Saving registry entries is optional because there are other ways to get access to the password-
protected IBM Spectrum Protect server. You can access the server with the following methods:
• If you know the node password, you can type the password when prompted during recovery.
• Request the IBM Spectrum Protect administrator to change the node password and provide you with
the new password at the time of recovery.
• Provide the password information in the dsm.opt file.
If the files you want to restore are included in a backup set on tape or on a CD or DVD, then you do not
need to access the IBM Spectrum Protect server.
Results
You created an options file that contains client configuration information that is unique for each
computer. This information complements the generic bootable WinPE CD.
Related tasks
“Creating a bootable WinPE CD” on page 189
Before you can recover a Windows computer by using Automated System Recovery (ASR), you must
create a bootable Windows Preinstallation Environment (WinPE) CD or DVD.
Backing up the boot drive and system drive for Automated System Recovery
Before you can recover your Windows computer by using Automated System Recovery (ASR), you must
have a complete backup of the boot drive and system drive.
Procedure
1. Perform a full incremental backup of your system and boot drives.
Assuming that your system and boot files are on the c: drive, enter the following command:
dsmc incremental c:
2. Back up the system state. To back up the system state, enter the following command:
To verify that you backed up the system state, enter the following command:
Image backup
From your local workstation, you can back up a logical volume as a single object (image backup) on your
system.
The traditional static image backup prevents write access to the volume by other system applications
during the operation.
These volumes can be formatted NTFS or ReFS, or unformatted RAW volumes. If a volume is NTFS-
formatted, only those blocks that are used by the file system or smaller than the imagegapsize
parameter are backed up.
Normally you cannot restore an image backup of the system drive over itself since an exclusive lock of the
system drive is not possible. However, in a Windows pre-installation environment (WinPE), an image
restore of the system drive is possible. For information about restoring data in a WinPE environment, see
technote 7005028.
You cannot restore an image backup to the volume on which the client is running. Consider installing the
backup-archive client on the system drive.
Image backup does not guarantee consistency of system objects, such as the Active Directory. System
objects can be spread out across multiple volumes, and should be backed up by using the backup
systemstate command.
An image backup provides the following benefits:
• Backs up file systems that contain a large number of files faster than a full file system incremental
backup.
• Improves the speed with which the client restores file systems that contain many small files.
• Conserves resources on the server during backups since only one entry is required for the image.
• Provides a point-in-time picture of your logical volume, which might be useful if your enterprise must
recall that information.
• Restores a corrupted file system or raw logical volume. Data is restored to the same state it was when
the last logical volume backup was performed.
The traditional offline image backup prevents write access to the volume by other system applications
during the operation. When you backup an image by using snapshotproviderimage=none, always run
the fsck utility after you restore the data.
To restore an image backup of a volume, the backup-archive client must be able to obtain an exclusive
lock on the volume that is being restored.
If online image support is configured, the client performs an online image backup, during which the
volume is available to other system applications. The snapshot provider, as specified by the
snapshotproviderimage option, maintains a consistent image of a volume during online image
backup.
You can use the snapshotproviderimage option with the backup image command or the
include.image option to specify whether to perform an offline or online image backup.
Related tasks
“Configuring online-image backup support” on page 72
If the online image feature is configured, the backup-archive client performs a snapshot-based image
backup, during which the real volume is available to other system applications.
Related reference
“Snapshotproviderimage” on page 507
152 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the snapshotproviderimage option to enable snapshot-based image backup, and to specify a
snapshot provider.
Procedure
1. Perform a full incremental backup of the file system. This establishes a baseline for future incremental
backups.
2. Perform an image backup of the same file system to make image restores possible.
3. Perform incremental backups of the file system periodically to ensure that the server records additions
and deletions accurately.
4. Perform an image backup periodically to ensure faster restore.
5. Restore your data by performing an incremental restore. Ensure that you select the Image plus
incremental directories and files and Delete inactive files from local options in the Restore Options
window before beginning the restore. During the restore, the client does the following:
Results
• Restores the most recent image on the server.
• Deletes all of the files restored in the previous step which are inactive on the server. These are files
which existed at the time of the image backup, but were subsequently deleted and recorded by a later
incremental backup.
• Restores new and changed files from the incremental backups.
Note: If an incremental backup is performed several times after backing up an image, make sure that the
backup copy group of the IBM Spectrum Protect server has enough versions for existing and deleted files
on the server so that the subsequent restore image with incremental and deletefiles options can
delete files correctly.
Related tasks
“Backing up data using the backup-archive client GUI” on page 125
You can use the backup-archive client GUI to back up specific files, a group of files with similar names, or
entire directories.
“Performing an image backup using the GUI” on page 156
If the image backup feature is configured, you can create an image backup where the real volume is
available to other system applications.
“Restoring an image using the GUI” on page 191
154 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can use the GUI to restore an image of your file system or raw logical volume.
Procedure
1. Perform an image backup of the file system.
2. Perform an incremental-by-date image backup of the file system. This sends only those files that were
added or changed since the last image backup to the server.
3. Periodically, perform full image backups.
4. Restore your volume by performing an incremental restore. Ensure that you select the Image plus
incremental directories and files option in the Restore Options window before beginning the restore.
This first restores the most recent image and then restores all of the incremental backups performed
since that date.
Results
Note: You should perform full image backups periodically in the following cases:
• When a file system changes substantially (more than 40%), as indicated in step 4 of method 1 and step
3 of method 2. On restore, this would provide a file system image close to what existed at the time of
the last incremental-by-date image backup and it also improves restore time.
• As appropriate for your environment.
This improves restore time because fewer changes are applied from incremental backups.
The following restrictions apply when using method 2:
• The file system can have no previous full incremental backups.
• Incremental-by-date image backup does not inactivate files on the server; therefore, when you restore
an image with the incremental option, files deleted after the original image backup is present after
the restore.
• If this is the first image backup for the file system, a full image backup is performed.
• If file systems are running at or near capacity, an out-of-space condition could result during the restore.
Related tasks
“Performing an image backup using the GUI” on page 156
If the image backup feature is configured, you can create an image backup where the real volume is
available to other system applications.
“Restoring an image using the GUI” on page 191
You can use the GUI to restore an image of your file system or raw logical volume.
Procedure
1. Click on the Backup button in the IBM Spectrum Protect main window. The Backup window appears.
2. Expand the directory tree and select the objects you want to back up. To back up a raw logical volume,
locate and expand the RAW directory tree object.
3. Click Backup. The Backup Task List window displays the backup processing status. The Backup
Report window displays a detailed status report.
Results
• To perform an offline image backup, select Image Backup from the drop-down list.
• To perform an online image backup, select Snapshot Image Backup from the drop-down list.
• To perform an incremental-by-date image backup, select Incremental image (date only) from the
drop-down list.
The following are some items to consider when you perform an online image backup:
• To modify specific backup options, click the Options button. The options you select are effective only
during the current session.
• Because image backup allows you to back up only used blocks in a file system, the stored image size on
the IBM Spectrum Protect server could be smaller than the volume size. For online image backups, the
stored image can be larger than the file system based on the size of the cache files. To determine the
156 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
actual stored image size, select View > File Details. The actual stored image size is noted in the Stored
Size field.
• To modify specific backup options, click the Options button. The options you select are effective only
during the current session.
• Because image backup allows you to back up only used blocks in a file system, the stored image size on
the IBM Spectrum Protect server could be smaller than the volume size. For online image backups, the
stored image can be larger than the file system based on the size of the cache files. To determine the
actual stored image size, select View > File Details. The actual stored image size is noted in the Stored
Size field.
Related reference
“Snapshotproviderimage” on page 507
Use the snapshotproviderimage option to enable snapshot-based image backup, and to specify a
snapshot provider.
158 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the snapshotroot option with the incremental, selective, or archive commands with an
independent software vendor application that provides a snapshot of a logical volume, to associate the
data on the local snapshot with the real file space data that is stored on the IBM Spectrum Protect server.
Backing up NAS file systems with the backup-archive client GUI using NDMP protocol
For both the backup-archive client GUI and the client command line interface, you must specify
passwordaccess=generate and set authentication=on must be specified at the server.
You are always prompted for a user ID and password. To display NAS nodes and perform NAS functions,
you must enter an authorized administrative user ID and password. The authorized administrative user ID
should have at least client owner authority over both the NAS node and the client workstation node they
are using either from command line or from the backup-archive client GUI. The IBM Spectrum Protect
server must be configured to grant authority to the client node for NAS backup and restore operations.
You can use the toc option with the include.fs.nas option in the client options file to specify whether
the client saves Table of Contents (TOC) information for each file system backup. If you save TOC
information, you can use the Windows backup-archive client GUI to examine the entire file system tree
and select files and directories to restore. Creation of a TOC requires that you define the
TOCDESTINATION attribute in the backup copy group for the management class to which this backup
image is bound. Note that TOC creation requires additional processing, network resources, storage pool
space, and possibly a mount point during the backup operation.
The backup-archive client GUI must be connected to the IBM Spectrum Protect Version 8.1.2 or later
server, or V7.1.8 or later V7 server.
To back up NAS file systems using the backup-archive client GUI:
1. Click Backup from the main window. The Backup window is displayed.
2. Expand the directory tree if necessary.
Note:
a. The root node called Nodes is not selectable. This node only appears if a NAS plug-in is present on
the client workstation.
b. NAS nodes display on the same level as the client workstation node. Only nodes for which the
administrator has authority appear.
c. You can expand NAS nodes to reveal file spaces, but no further expansion is available (no file
names).
3. Click the selection boxes next to the nodes or file systems you want to back up.
4. Click the type of backup you want to perform in the backup type pull-down menu. The NAS backup
type list is active only when you first select NAS backup objects. Full backup backs up the entire file
system. Differential backs up the changes since the most recent full backup.
5. Click Backup. The NAS Backup Task List window displays the backup processing status and progress
bar. The number next to the progress bar indicates the number of bytes backed up so far. After the
backup completes, the NAS Backup Report window displays processing details, including the actual
size of the backup, including the total bytes backed up.
Note: If it is necessary to close the backup-archive client GUI session, current NAS operations
continue after disconnect. You can use the Dismiss button on the NAS Backup Task List window to
quit monitoring processing without ending the current operation.
6. (Optional) To monitor processing of an operation from the GUI main window, open the Actions menu
and select IBM Spectrum Protect Activities. During a backup, the status bar indicates processing
status. A percentage estimate is not displayed for differential backups.
Consider the following items when you back up NAS file systems using the backup-archive client GUI:
• Workstation and remote (NAS) backups are mutually exclusive in a Backup window. After selecting an
item for backup, the next item you select must be of the same type (either NAS or non NAS).
160 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 21. NAS options and commands (continued)
Option or command Definition Page
query node Use the query node command to display all the “Query Node” on page
nodes for which a particular administrative user ID 672
has authority to perform operations. The
administrative user ID should have at least client
owner authority over both the NAS node and the
client workstation node they are using.
backup nas Use the backup nas command to create an image “Backup NAS” on page
backup of one or more file systems that belong to a 618
Network Attached Storage (NAS) file server.
toc Use the toc option with the backup nas “Toc” on page 534
command or the include.fs.nas option to
specify whether Table of Contents (TOC)
information is saved for each file system backup.
monitor process Use the monitor process command to display “Monitor Process” on
current backup and restore processes for all NAS page 650
nodes for which an administrative user has
authority. The administrative user can then select
one process to monitor.
cancel process Use the cancel process command to display “Cancel Process” on
current backup and restore processes for all NAS page 629
nodes for which an administrative user has
authority. From the display, the administrative user
can select one process to cancel.
query backup Use the query backup command with the class “Query Backup” on page
option to display information about file system 657
images backed up for a NAS file server.
query filespace Use the query filespace command with the “Query Filespace” on
class option to display a list of file spaces page 664
belonging to a NAS node.
delete filespace Use the delete filespace command with the “Delete Filespace” on
class option to display a list of file spaces page 636
belonging to a NAS node so that you can choose
one to delete.
Methods for backing up and recovering data on NAS file servers accessed by CIFS
protocol
The backup-archive client can process network-attached storage (NAS) file-server data that is accessed
by using the Common Internet File System (CIFS) protocol.
You can use the following methods to back up and recover data on NAS devices:
• Use the backup-archive client to back up and restore data, by using CIFS to access files from the
backup-archive client. Data can be stored on the IBM Spectrum Protect server with file-level
granularity, by using the progressive-incremental backup method. The data is stored in the IBM
Spectrum Protect storage hierarchy and can be migrated, reclaimed, and backed up to a copy storage
pool.
This method increases processor usage when the client accesses individual files. The method requires
that the data to flow through the client. This method also requires that the data flows through the IBM
Spectrum Protect server unless a LAN-free configuration is used.
• Use the snapdiff option to mitigate the performance problems of CIFS backup. This option stores
data with file-level granularity by using progressive incremental backup for CIFS.
• Use a backup-archive client that is running on the NAS device, if you can use external programs with the
NAS operating system.
This method decreases processor usage of CIFS. Data can be stored on the IBM Spectrum Protect
server with file-level granularity by using progressive-incremental backup. The data is stored in the IBM
Spectrum Protect storage hierarchy and can be migrated, reclaimed, and backed up to a copy storage
pool. This method requires that data flow through the backup-archive client. This method also requires
that the data flows over a network and through the IBM Spectrum Protect server unless a LAN-free
configuration is used.
• Use NDMP with the backup-archive client. File systems are backed up as full images (all files) or
differential images (all files that changed since the last full backup). Backed up images are stored on a
tape device that is accessed by the NAS file server. This method provides high performance because
there is no data flow through a backup-archive client or IBM Spectrum Protect server. Data that is
backed up to the server by using NDMP cannot be migrated, reclaimed, or backed up to a copy storage
pool.
The following limitations exist for NAS file server data when it is accessed by using CIFS:
• File and directory security information might be inaccessible when the Windows account that is
performing the backup is not a member of the Domain Administrators group of the domain the NAS file
server is a trusted member of. It is also possible that these security access failures might prevent the
entire file or directory from being backed up.
• Performance degradation occurs because data is being accessed remotely.
• The mapped drives appear to the client as NTFS file systems, but they might not have full NTFS
functionality. For example, the encryption attribute of a file is set, but when the client backs up the file,
the backup fails because the volume-level encryption setting indicates that encryption cannot be used
for the volume. ReFS file systems also appear to the client as NTFS file systems.
Tip: Use NDMP with the backup-archive client on a NAS file server to back up and restore volumes
instead of backing up and restoring the volumes by using remote mapped drives.
Related reference
“Snapdiff” on page 498
162 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Table 22 on page 164 lists the backup and restore operations for VMware virtual machines that the
backup-archive client can implement on Windows platforms.
Restriction: You can complete VMware backup and restore operations with the backup-archive client
only on 64-bit Windows operating systems.
Full VM incremental- Requires the IBM Spectrum Protect for Virtual Environments licensed product.
forever backup:
A full VM backup is required before you can create incremental backups. If you
schedule incremental-forever backups, this backup type is selected automatically
for the first backup if a full backup was not already created. Data from incremental
backups is combined with data from the full backup to create a synthetic full
backup image. Subsequent full VM incremental-forever backups read all used
blocks and copy those blocks to the IBM Spectrum Protect server. Each full VM
incremental-forever backup reads and copies all of the used blocks, whether the
blocks are changed or not since the previous backup. You can still schedule a full
VM backup, although a full backup is no longer necessary. For example, you might
run a full VM backup to create a backup to a different node name with different
retention settings.
You cannot use this backup mode to back up a VMware virtual machine if the
client is configured to encrypt the backup data.
Incremental-forever- Requires the IBM Spectrum Protect for Virtual Environments licensed product.
incremental VM backup:
Requires you to create a full VM backup one time only. The full VM backup copies
all of the used disk blocks owned by a virtual machine to the IBM Spectrum
Protect server. After the initial full backup is complete, all subsequent backups of
the virtual machine are incremental-forever-incremental backups. Each
incremental-forever-incremental backup copies only the blocks that are changed
since the previous backup, irrespective of the type of the previous backup. The
server uses a grouping technology that associates the changed blocks from the
most recent backup with data already stored on the server from previous backups.
A new full backup is then effectively created each time changed blocks are copied
to the server by an incremental-forever-incremental backup.
The incremental-forever-incremental backup mode provides the following
benefits:
• Improves the efficiency of backing up virtual machines.
• Simplifies data restore operations.
• Optimizes data restore operations.
During a restore operation, you can specify options for point-in-time and point-in-
date to recover data. The data is restored from the original full backup and all of
the changed blocks that are associated with the data.
You cannot use this backup mode to back up a VMware virtual machine if the
client is configured to encrypt the backup data.
Item recovery for files and Requires the IBM Spectrum Protect for Virtual Environments licensed product.
folders from a full backup
Provides the capability to recover files and folders from a full backup of a virtual
of the virtual machine:
machine. Item recovery is available only with the IBM Spectrum Protect recovery
agent.
Full restore of the virtual Restores all of the file systems, virtual disks, and the virtual machine
machine: configuration.
164 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 22. Backup and restore capabilities for VMware virtual machines on Windows platforms (continued)
Capability Comment
File-level restore of the The restore approach depends on the type of backup of the virtual machine:
virtual machine:
• If you have a license for IBM Spectrum Protect for Virtual Environments, you can
restore files and directories from a full VM image backup.
• Backup-archive client users can restore files and directories that are created
file-level backups of a virtual machine. You use the restore command to
restore individual files from a file-level backup of a virtual machine, not the
restore vm command. File-level backups were created with the version 7.1 or
earlier backup-archive clients.
Related concepts
“Parallel backups of virtual machines” on page 169
With parallel backup processing, you can use a single data mover node to back up multiple virtual
machines (VMs) at the same time to optimize your backup performance.
Related tasks
“Preparing the environment for full backups of VMware virtual machines” on page 165
Complete the following steps to prepare the VMware environment for backing up full VMware virtual
machines. The vStorage backup server can run either a Windows or Linux client.
“Creating full backups for VMware virtual machines” on page 167
A full backup of a VMware virtual machine is a backup of an entire virtual machine, including the virtual
disks and the virtual machine configuration file. This type of backup is similar to an image backup. To
create the full backup, you configure the backup-archive client on the vStorage backup server. The
vStorage backup server must run a Windows client or a Linux client.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Procedure
1. To configure the storage environment for backing up, complete the following steps:
a) Configure your storage environment so that the vStorage backup server can access the storage
volumes that are in your ESX server farm.
b) If you are using network-attached storage (NAS) or direct-attach storage, ensure that the vStorage
backup server is accessing the volumes with a network-based transport.
c) Optional: For data access, make the following settings:
• Create storage area network (SAN) zones that your vStorage backup server can use to access the
storage logical units (LUNs) that host your VMware datastores.
• Configure your disk subsystem host mappings so that all ESX servers and the backup proxy can
access the same disk volumes.
2. To configure the vStorage backup server, complete the following steps:
a) When the backup-archive client runs on a vStorage backup server, this client configuration is called
the IBM Spectrum Protect data mover node. A Windows system that is a data mover must have the
64-bit Windows client installed on it. A data mover node typically uses the SAN to back up and
diskpart
automount disable
automount scrub
san policy OnlineAll
exit
For a description of the vStorage transport settings and how you can override the defaults, see the
following topic:
“Vmvstortransport” on page 591
b) Install the backup-archive client on the vStorage backup server. At the custom setup page of the
installation wizard, select VMware vStorage API runtime files.
Important: If you are moving the backup data by using backups that are not in a LAN, the SAN
must have separate connections for tape and disk.
3. To modify IBM Spectrum Protect, complete the following steps:
a) Access the administrative command line on the backup-archive client.
b) From the backup-archive client on the vStorage backup server, run the following command to
register the node:
Where my_server_name is the full computer name of the vStorage backup server and my_password
is the password to access the server.
Tip: On Windows systems, you can get the server full computer name by right-clicking on My
Computer. Click the Computer Name tab and look at the name listed next to Full computer name.
c) From the backup-archive client on the vStorage backup server, run the following command to
register the node:
Where my_vm_name is the full name of the virtual machine that you are backing up.
166 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
4. If you back up a virtual machine where volumes are mounted to directories rather than drive letters,
files might not be stored in the correct location. An error might be caused because the mount point
does not correspond to the actual mount points of backed up files. An error is caused because the
mount points for a virtual machine that is running Windows do not have a drive letter assignment.
When you use the VMware vStorage APIs for Data Protection, a filespace name is created that
includes a number assignment. The filespace names that are created for the mount point do not
correspond to the actual mount points of the backed up file.
To back up or restore files to their original location, use the following steps:
a. To restore files to their original location, map the drive or assign a drive letter to the mount point
from the virtual machine.
b. If you restore a file that the vStorage API renamed, select a different restore location.
c. When using mount points without drive letter assignments, use an include or exclude statement for
that volume. See the following example of an exclude statement:
exclude \\machine\3$\dir1\...\*.doc
Related tasks
“Creating full backups for VMware virtual machines” on page 167
A full backup of a VMware virtual machine is a backup of an entire virtual machine, including the virtual
disks and the virtual machine configuration file. This type of backup is similar to an image backup. To
create the full backup, you configure the backup-archive client on the vStorage backup server. The
vStorage backup server must run a Windows client or a Linux client.
Related reference
“Backup VM” on page 622
“Query VM” on page 679
Use the query VM command to list and verify the successful backups of virtual machines (VMs).
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Vmchost” on page 548
Use the vmchost option with the backup VM, restore VM, or query VM commands to specify the host
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
“Vmcpw” on page 549
Use the vmcpw option with the backup VM, restore VM, or query VM commands to specify the
password for the VMware VirtualCenter or the ESX user ID that is specified with the vmcuser option.
“Vmcuser” on page 551
Use the vmcuser option with the backup VM, restore VM, or query VM commands to specify the user
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
“Vmvstortransport” on page 591
The vmvstortransport option specifies the preferred transports order (hierarchy) to use when backing
up or restoring VMware virtual machines. If you do not include a given transport using this option, that
transport is excluded and is not used to transfer data.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
4. To verify that you can restore the files for the virtual machine, complete the following steps:
a) At the command-line interface of the vStorage backup server, run the following command:
c:\Program Files\Tivoli\TSM\baclient\dsmerror.log
Related concepts
“Parallel backups of virtual machines” on page 169
With parallel backup processing, you can use a single data mover node to back up multiple virtual
machines (VMs) at the same time to optimize your backup performance.
Related tasks
“Preparing the environment for full backups of VMware virtual machines” on page 165
Complete the following steps to prepare the VMware environment for backing up full VMware virtual
machines. The vStorage backup server can run either a Windows or Linux client.
Related reference
“Backup VM” on page 622
168 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Query VM” on page 679
Use the query VM command to list and verify the successful backups of virtual machines (VMs).
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Mode” on page 439
Use the mode option to specify the backup mode to use when performing specific backup operations.
“Vmchost” on page 548
Use the vmchost option with the backup VM, restore VM, or query VM commands to specify the host
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
“Vmcpw” on page 549
Use the vmcpw option with the backup VM, restore VM, or query VM commands to specify the
password for the VMware VirtualCenter or the ESX user ID that is specified with the vmcuser option.
“Vmcuser” on page 551
Use the vmcuser option with the backup VM, restore VM, or query VM commands to specify the user
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
“Vmmc” on page 571
Use the vmmc option to store virtual machine backups by using a management class other than the
default management class. For VMware VM backups, the vmmc option is valid only if the
vmbackuptype=fullvm option is set.
“Vmvstortransport” on page 591
The vmvstortransport option specifies the preferred transports order (hierarchy) to use when backing
up or restoring VMware virtual machines. If you do not include a given transport using this option, that
transport is excluded and is not used to transfer data.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
For information about parallel backup operations, see Backing up multiple virtual machines in parallel.
The following output is displayed when the root directory (and share definition) is backed up:
Related concepts
“Restore Net Appliance CIFS shares” on page 198
Restoring the share definition requires restoring the root directory of the share file space, which under
most circumstances can be done as follows: dsmc rest \\NetAppFiler\CifsShareName\ -
dirsonly.
Related reference
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
170 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The web client and backup-archive client GUI provide a Task List window that displays information about
files during processing. When a task completes, a Backup Report window displays processing details.
Click the Help button in the Backup Report window for context help.
On the backup-archive command line, the name of each file is displayed after it is sent to the server. The
progress indicator shows overall progress.
Table 23 on page 171 lists some informational messages and meanings.
Total number of bytes Specifies the sum of the sizes of the files that are processed for the
processed: operation.
Data transfer time: The sum of the times that each backup, archive, restore, or retrieve
session takes to send data across the network. This number does not
include the time for the client to read the data from disk before the
data is sent, nor the time to wait for server transactions to complete.
This number can be greater than the elapsed processing time if the
operation uses multiple concurrent sessions to move data, such as
multi-session backup and restore operations.
This number includes the time that it takes to send data more than
once due to retries, such as when a file changes during a backup
operation.
Network data transfer rate: The average rate at which the network transfers data between the
client and the server. This statistic is calculated by dividing the total
number of bytes transferred by the time to transfer the data over the
network. This statistic does not include the time for the client to read
the data from disk before the data is sent, nor the time to wait for
server transactions to complete.
Aggregate data transfer rate: The total number of bytes transferred during a backup, archive,
restore, or retrieve operation, divided by the total elapsed time of the
operation.
Objects compressed by: Specifies the percentage of data sent over the network divided by the
original size of the file on disk. For example, if the net data-bytes are
10K and the file is 100K, then Objects compressed by: == (1 -
(10240/102400)) x 100 == 90%.
Total number of objects grew: The total number of files that grew larger as a result of compression.
Deduplication reduction: Specifies the size of the duplicate extents that were found, divided by
the initial file or data size. For example, if the initial object size is 100
MB, after deduplication it is 25 MB. The reduction would be: (1 -
25/100) * 100 = 75%.
Total data reduction ratio: Adds incremental and compression effects. For example, if the bytes
inspected are 100 MB and the bytes sent are 10 MB, the reduction
would be: (1 - 10/100) * 100 = 90%
Elapsed processing time: The active processing time to complete a command. This is
calculated by subtracting the starting time of a command process
from the ending time of the completed command process.
172 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 23. Client command line informational messages (continued)
Informational message Meaning
Total number of bytes The total number of bytes transferred during the backup, archive,
transferred: restore, or retrieve operation. This value includes data that is sent
more than once due to retries, such as when a file changes during a
backup operation.
LanFree bytes transferred: The total number of data bytes transferred during a lan-free
operation. If the enablelanfree option is set to no, this line will not
appear.
Total number of bytes A sum of sizes of files selected for the operation.
inspected:
Total number of retries: The total number of retries during a backup operation. Depending on
the settings for the serialization attribute and the changingretries
option, a file that is opened by another process might not be backed
up on the first backup try. The backup-archive client might try to back
up a file several times during a backup operation. This message
indicates the total retries for all files that are included in the backup
operation.
Open files
Some files on your system might be in use when you try to back them up. These are called open files
because they are locked by an application for its exclusive use.
It is not very common for files to be opened in locked mode. An application can open a file in this way to
avoid other applications or users from reading or accessing the file, but it can prevent backup programs
from reading the file for backup.
You might not always want to use the open file feature to back up open or locked files. Sometimes an
application opens a file or group of files in this locked mode to prevent the access of these files in an
inconsistent state.
To avoid the increase of processor usage when you create a volume snapshot for each backup, and on
platforms where the open file feature is not available or is not in use, consider the following points:
• If the file is unimportant or can be easily rebuilt (a temporary file for example), you might not care if the
file is backed up, and might choose to exclude it.
• If the file is important:
– Ensure the file is closed before backing it up. If backups are run according to a schedule, use the
preschedulecmd option to enter a command that closes the file. For example, if the open file is a
database, issue a command to close the database. You can use the postschedulecmd option to
restart the application that uses the file after the backup completes. If you are not using a schedule
for the backup, close the application that uses the file before you start the backup.
– The client can back up the file even if it is open and changes during the backup. This is only useful if
the file is usable even if it changes during backup. To back up these files, assign a management class
with dynamic or shared dynamic serialization.
Note: If open file support is not configured: While the client attempts to back up open files, this is not
always possible. Some files are open exclusively for the application that opened them. If the client
encounters such a file, it cannot read it for backup purposes. If you are aware of such file types in your
environment, you should exclude them from backup to avoid seeing error messages in the log file.
Notice that the name of the first file space, \\storman\home, matches the beginning of the name of the
second file space, \\storman\home\amr. When you use the backup-archive command-line client
interface to restore or query a file from either of these file spaces, by default the client matches the
longest file space name in the file specification, \\storman\home\amr. To work with files in the file
space with the shorter name, \\storman\home, use braces around the file space name portion of the file
specification.
This means that the following query command finds project2.doc but does not find project1.doc:
This is because the longer of the two file space names is \\storman\home\amr and that file space
contains the backup for project2.doc.
To find project1.doc, enclose the file space name in braces. The following command finds
project1.doc but does not find project2.doc:
Similarly, the following command restores project1.doc but does not restore project2.doc:
Management classes
IBM Spectrum Protect uses management classes to determine how to manage your backups on the
server.
Every time you back up a file, the file is assigned a management class. The management class used is
either a default selected for you, or one that you assign to the file using an include option in the include-
exclude options list. The selected management class must contain a backup copy group for the file to be
backed up.
Select Utilities → View Policy Information from the backup-archive client or web client GUI to view the
backup policies defined by the IBM Spectrum Protect server for your client node.
Related concepts
“Storage management policies” on page 255
174 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Storage management policies are rules your administrator defines in order to manage your backups and
archives on the server.
Related tasks
“Setting the client scheduler process to run as a background task and start automatically at startup” on
page 242
You can configure the IBM Spectrum Protect client scheduler to run as a background system task that
starts automatically when your system is started.
domain a: \\local\c$
176 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Using a UNC name permits you to back up specific shared directories to a separate file space. This is
useful if, for example, you or an administrator want to back up a small portion of data that you would
otherwise be unable to access. Drives are not backed up to a separate file space.
Every local drive is accessible using a UNC name except for drives containing removable media (such as
tapes, cartridges or diskettes). Access these drives by using a predefined administrative share name
consisting of the workstation name and the local drive letter, followed by $. For example, to specify a UNC
name on the c: drive for workstation ocean, enter:
\\ocean\c$
\\ocean\wave
When accessing files, you do not need to enter the letter of the drive except for drives containing
removable media.
See the following table for examples showing selective backup of files using UNC names. In these
examples, assume that:
• The workstation running dsmc is major.
• Share names betarc and testdir from workstation alpha1 are mapped to drives r and t,
respectively.
You can also specify UNC names for files in your include-exclude and domain lists.
Related tasks
“Creating an include-exclude list ” on page 81
If you do not create an include-exclude list, the backup-archive client considers all files for backup
services and uses the default management class for backup and archive services.
Related reference
“Domain” on page 357
The domain option specifies what you want to include for incremental backup.
Results
Note:
1. See the product README file for current limitations of this feature.
Files contained on a Dfs server component are accessed using a standard UNC name, for example:
\\servername\dfsroot\
where servername is the name of the host computer and dfsroot is the name of the Dfs root.
If you set the dfsbackupmntpnt option to yes (the default), an incremental backup of a Dfs root does
not traverse the Dfs junctions. Only the junction metadata is backed up. This is the setting you should use
so that the client can be used to restore Dfs links.
You can use the dfsbackupmntpnt option to specify whether the client sees a Dfs mount point as a
Microsoft Dfs junction or as a directory.
Important: Restore the Dfs junction metadata first. This recreates the links. Then restore each junction
and the data at each junction separately. If you do not restore the junction metadata first, the client
creates a directory under the Dfs root using the same name as the junction point and restores the data in
that directory.
The following example relates to method 1 above and illustrates how to use the client to back up and
restore a Microsoft Dfs environment. Assume the existence of a domain Dfs environment hosted by the
workstation wkst1:
Dfs root
\\wkst1\abc64test
Dfs link1
\\wkst1\abc64test\tools
Dfs link2
\\wkst1\abc64test\trees
Backup procedure:
1. Set the dfsbackupmntpnt option to yes in your client options file (dsm.opt).
2. Enter the following command to back up link junction information:
178 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Note: DFS Replication uses staging folders to act as caches for new and changed files to be replicated
from sending members to receiving members. If you do not want to backup these files, you can exclude
them from your backup using the exclude.dir option.
exclude.dir x:\...\Dfsrprivate
Restore procedure:
1. Manually recreate shares at target workstations only if they no longer exist.
2. Manually recreate the Dfs root using the exact name as it existed at the time of back up.
3. Enter the following command to recover data from the tools link. This step is not necessary if the data
still exists at the link target:
4. Enter the following command to recover data from the trees link. This step is not necessary if the data
still exists at the link target:
5. Use the Distributed File System management console snap-in to reestablish replication for each link, if
necessary.
The following limitations exist for restoring Microsoft Dfs data:
• The client does not restore root of Dfs. To recreate the Dfs tree, manually create the Dfs root first, then
start restore to recreate the links.
• The client can back up the Dfs tree (both domain based Dfs and stand alone Dfs) hosted on local
workstation only. You cannot back up Dfs if the Dfs host server is not your local workstation.
• The client cannot recreate shared folders on restore. For example, if you delete the junction and the
shared folder the junction points to, restoring the Dfs root recreates the Dfs junction, but restoring a
junction creates a local folder instead of creating the original backed up shared network folder.
• If a Dfs link is created with replica and the replica share is on a different server, the client does not
display the replica data.
• If a Dfs root is added or modified, the client will not back it up. You must specify the Dfs root in the
domain option in the client options file (dsm.opt) regardless of whether DOMAIN ALL-LOCAL is
specified.
\\ocean\c$
\\ocean\wave
When accessing files, you do not need to enter the letter of the drive except for drives with removable
media.
182 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the inactive option to display both active and inactive objects.
Procedure
1. Click Restore on the main GUI window. The Restore window appears.
2. Expand the directory tree by clicking the plus (+) sign or the folder icon next to an object in the tree.
Select the object that you want to restore. To search or filter files, click the Search icon from the
toolbar.
3. Click the selection box for the objects that you want to restore.
4. To modify specific restore options, click the Options button. Any options that you change are effective
during the current session only.
5. Click Restore. The Restore Destination window appears. Enter the appropriate information.
6. Click Restore. The Restore Task List window displays the processing status.
Related tasks
“Backing up data using the backup-archive client GUI” on page 125
You can use the backup-archive client GUI to back up specific files, a group of files with similar names, or
entire directories.
Restore a file that was originally dsmc restore {workathome} If you are restoring a file to a disk
backed up from the diskette labeled \doc\h2.doc a:\doc\h2.doc with a different label than the disk
"workathome" in the a: drive, and from which the file was backed up,
restore it to a diskette in the a: you must use the file space name
drive labeled "extra". (label) of the backup disk instead of
the drive letter.
184 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 25. Command-line restore examples (continued)
Task Command Considerations
Restore files specified in the dsmc restore - See “Filelist” on page 393 for more
c:\filelist.txt file to the filelist=c:\filelist.txt information about restoring a list of
d:\dir directory. d:\dir\ files.
Restore all members of the virtfs dsmc restore group {virtfs} See “Restore Group” on page 699
\group1 group backup stored on \group1 for more information.
the IBM Spectrum Protect server.
Related concepts
“Using commands” on page 597
The backup-archive client provides a command-line interface (CLI) that you can use as an alternative to
the graphical user interface (GUI). This topic describes how to start or end a client command session and
how to enter commands.
Related reference
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
However, if you enter multiple commands for the root directories in your c: file space, you can restore
the files faster. For example, enter these commands:
Or, if you need to restore files for multiple drives, enter these commands:
You can also use the quiet option with the restore command to save processing time. However, you
will not receive informational messages for individual files.
Note: If you already have the appropriate values set for the subdir, replace, tapeprompt, and quiet
options in your client options file, it is not necessary to include these options in the commands.
When you enter multiple commands to restore your files, you must specify a unique part of the file space
in each restore command. Do not use any overlapping file specifications in the commands.
To display a list of the root directories in a file space, use the query backup command. For example:
As a general rule, you can enter two to four restore commands at one time. The maximum number you
can run at one time without degrading performance depends on factors such as network utilization and
how much memory you have. For example, if \users and \data1 are on the same tape, the restore for
c:\mydocs\2004\*
c:\mydocs\2004\sales.*
186 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restartable restore process
If the restore process stops because of a power outage or network failure, the server records the point at
which this occurred.
This record is known to the client as a restartable restore. It is possible to have more than one restartable
restore session. Use the query restore command or choose restartable restores from the Actions
menu to find out if your client has any restartable restore sessions in the server database.
You must complete a restartable restore before attempting further backups of the file system. If you
attempt to repeat the restore that was interrupted or try to back up the destination file space, the attempt
fails because you did not complete the original restore. You can restart the restore at the point of
interruption by entering the restart restore command, or you can delete the restartable restore
using the cancel restore command. If you restart the interrupted restore, it restarts with the first
transaction, which might consist of one or more files, not completely restored when the interruption
occurred. Because of this, you might receive some replace prompts for files from the interrupted
transaction which were already restored.
From the IBM Spectrum Protect GUI Restartable restores dialog box you can select the interrupted
restore and delete it, or you can choose to restart the restore. If you restart the interrupted restore, it
restarts with the first transaction, which might consist of one or more files, not completely restored when
the interruption occurred. Because of this, you might receive some replace prompts for files from the
interrupted transaction which were already restored.
To perform restartable restores using the GUI, follow these steps:
1. Select Actions –> Restartable restores from the main panel.
2. Select the restartable restore session you want to complete.
3. Click the Restart button at the bottom of the panel.
Related reference
“Resourceutilization” on page 477
Use the resourceutilization option in your option file to regulate the level of resources the IBM
Spectrum Protect server and client can use during processing.
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
ANS5189E Online SystemState restore has been deprecated. Please use offline
WinPE method for performing system state restore.
Related concepts
“Recovering a computer when the Windows OS is not working ” on page 188
Procedure
To restore ASR files on Windows operating systems, use the restore systemstate command.
Related concepts
“Recovering a computer when the Windows OS is not working ” on page 188
If the computer has a catastrophic hardware or software failure, you can recover a Windows operating
system with Automated System Recovery (ASR).
Procedure
1. Restore the system drive. For example: dsmc restore c:\* -sub=yes -rep=all.
2. Restore system state. For example: dsmc restore systemstate.
188 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If your computer is working, you can restore the operating system from backed up files.
Procedure
For instructions that describe how to create a bootable WinPE CD or DVD, see the following IBM Spectrum
Protect Wiki articles:
• Best Practices for Recovering Windows Server 2012 and Windows 8
• Best Practices for Recovering Windows Server 2012 R2 and Windows 8.1
Procedure
For instructions that describe how to restore a Windows system by using ASR, see the following IBM
Spectrum Protect Wiki articles:
• Best Practices for Recovering Windows Server 2012 and Windows 8
• Best Practices for Recovering Windows Server 2012 R2 and Windows 8.1
What to do next
You can now restore other volumes.
Related tasks
“Creating a bootable WinPE CD” on page 189
Before you can recover a Windows computer by using Automated System Recovery (ASR), you must
create a bootable Windows Preinstallation Environment (WinPE) CD or DVD.
“Creating a client options file for Automated System Recovery” on page 150
Before you can recover a Windows computer by using Automated System Recovery (ASR), you must
create an options file. The options file is unique for each computer.
Related reference
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
“Restore Systemstate” on page 706
The restore systemstate command is deprecated for online system state restore operations.
Restoring an image
There are some items to consider before you begin restoring images on your system.
Before you restore an image (offline or online), you must have administrative authority on the system.
Here is a list of items to consider before you restore an image:
• Restoring the image of a volume restores the data to the same state that it was in when you performed
your last image backup. Be absolutely sure that you need to restore an image, because it replaces your
entire current file system or raw volume with the image on the server.
• The image restore operation overwrites the volume label on the destination volume with the one that
existed on the source volume.
• Ensure that the volume to which you are restoring the image is at least as large as the image that is
being restored.
• The file system or volume you are restoring to does not have to be the same type as the original. The
volume does not even have to be formatted. The image restore process creates the appropriately
formatted file system for you.
• Ensure that the target volume of the restore is not in use. The client locks the volume before starting the
restore. The client unlocks the volume after the restore completes. If the volume is in use when the
client attempts to lock the file system, the restore fails.
• You cannot restore an image to where the IBM Spectrum Protect client program is installed.
• If you created an image of the system drive, you cannot restore the image to the same location because
the client cannot have an exclusive lock of the system drive. Also, because of different system
component configurations, the system image might not be consistent across components (such as
Active Directory). Some of these components can be configured to use different volumes where parts
are installed on the system drive and others to non-system volumes.
• If you have run progressive incremental backups and image backups of your file system, you can
perform an incremental image restore of the file system. The process restores individual files after the
complete image is restored. The individual files restored are those backed up after the original image.
Optionally, if files were deleted after the original backup, the incremental restore can delete those files
from the base image.
Deletion of files is performed correctly if the backup copy group of the IBM Spectrum Protect server has
enough versions for existing and deleted files. Incremental backups and restores can be performed only
on mounted file systems, not on raw logical volumes.
• If for some reason a restored image is corrupted, you should run chkdsk to check for and repair any bad
sectors (unless the restored volume is RAW).
You can use the verifyimage option with the restore image command to specify that you want to
enable detection of bad sectors on the destination target volume. If bad sectors are detected on the
target volume, the client issues a warning message on the console and in the error log.
If bad sectors present on the target volume, you can use the imagetofile option with the restore
image command to specify that you want to restore the source image to a file. Later, you can use a data
copy utility of your choice to transfer the image from the file to a disk volume.
Related reference
“Imagetofile” on page 405
Use the imagetofile option with the restore image command to specify that you want to restore the
source image to a file.
“Verifyimage” on page 542
190 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the verifyimage option with the restore image command to specify that you want to enable
detection of bad sectors on the destination target volume.
Procedure
1. Click Restore from the main window. The Restore window appears.
2. Expand the directory tree.
3. Locate the object in the tree named Image and expand it. Click the selection box next to the image you
want to restore. You can obtain detailed information about the object by highlighting the object and
selecting View → File Details... from the main window or click the View File details button.
4. (Optional) To perform an incremental image restore, click the Options button to open the Restore
Options window and select the Image plus incremental directories and files option. If you want to
delete inactive files from your local file system, select the Delete inactive files from local check box.
Click the OK button.
5. Click Restore. The Restore Destination window appears. The image can be restored to the volume with
the drive letter or mount point from which it was originally backed up. Alternatively, a different volume
can be chosen for the restore location.
6. Click the Restore button to begin the restore. The Task List window appears showing the progress of
the restore. The Restore Report window displays a detailed status report.
Results
The following are some items to consider when you perform an image restore using the GUI:
• You can select View → File Details from the main window or click the View File details button to
display the following statistics about file system images backed up by the client:
– Image Size - This is the volume size which was backed up.
– Stored Size - This is the actual image size stored on the server. Because image backup allows you to
back up only used blocks in a file system, the stored image size on the IBM Spectrum Protect server
could be smaller than the volume size. For online image backups, the stored image can be larger than
the file system based on the size of the cache files.
– File system type
– Backup date and time
– Management class assigned to image backup
– Whether the image backup is an active or inactive copy
• To modify specific restore options, click the Options button. Any options you change are effective
during the current session only.
• In the Restore Options window, you can choose to restore the image only or the image and incremental
directories files. If you choose Image Only, you restore the image from your last image backup only.
This is the default.
If you ran incremental-by-date image backup on a volume or image backups on a volume with
incrementals, you can choose the Image plus incremental directories and files option. If you choose
Image plus incremental directories and files, you can also select Delete inactive files from local to
delete the inactive files that are restored to your local file system. If incremental-by-date image backup
was the only type of incremental backup you performed on the file system, deletion of files will not
occur.
192 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• You can perform an ASR restore using a backup set volume.
Restoring a backup set from the IBM Spectrum Protect server provides a larger set of restore options
than restoring from a local backup set. However, restoring from a local backup set can be preferable
in some cases:
• It is possible that you need to restore your data when a network connection to the IBM Spectrum
Protect server is not available. This is possible in a disaster recovery situation.
• The local restore may be faster than restoring over a network connection to your IBM Spectrum
Protect server.
A backup set can be restored from the IBM Spectrum Protect server while the backup set volumes are
available to the server, or they can be moved to the client system for a local backup set restore. A backup
set can be generated with or without a table of contents (TOC), and can contain file data or image data.
The backup set can contain system state data.
Your ability to restore data from backup sets is restricted by the location of the backup set and the type of
data in the backup set. The command-line client can restore some data that the GUI cannot restore, but
the GUI can allow you to browse and choose which objects to restore. Generally, backup sets from the
server with a TOC allow more options when restoring. However, local backup sets provide options that are
sometimes preferable to restoring from theIBM Spectrum Protect server.
The restrictions for restoring data from backup sets using the GUI are summarized in the following table.
Each interior cell represents one combination of data type and backup set location. For each situation, the
cell indicates if you can use the GUI to restore only the entire backup set, to select objects within the
backup set, or if you cannot use the GUI to restore the backup set.
The restrictions for restoring data from backup sets using the command-line client are summarized in the
following table. Each interior cell represents one combination of data type and backup set location. For
each situation, the cell lists the restore commands you can use. Except as noted, you can restore specific
objects within a backup set, as well as the entire backup set.
restore image
Restriction: When restoring system state data using the restore backupset command, you cannot
specify individual objects. You can only restore the entire system state.
Related reference
“Localbackupset” on page 433
The localbackupset option specifies whether the backup-archive client GUI bypasses initial logon with
the IBM Spectrum Protect server to restore a local backup set on a standalone workstation.
“Query Backupset” on page 661
The query backupset command queries a backup set from a local file, tape device (if applicable), or
the IBM Spectrum Protect server.
“Query Image” on page 668
The query image command displays information about file system images that are stored on the IBM
Spectrum Protect server, or that are inside a backup set from the IBM Spectrum Protect server, when the
backupsetname option is specified.
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
“Restore Backupset” on page 693
The restore backupset command restores a backup set from the IBM Spectrum Protect server, a
local file, or a local tape device. You can restore the entire backup set, or, in some cases, specific files
within the backup set.
“Restore Image” on page 701
The restore image command restores a file system or raw volume image that was backed up using the
backup image command.
“Restore Systemstate” on page 706
The restore systemstate command is deprecated for online system state restore operations.
194 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• If you use the restore backupset command on the initial command line with the parameter -
location=tape or -location=file, the client does not attempt to contact the IBM Spectrum
Protect server.
• When restoring a group from a backup set:
– The entire group, or all groups, in the virtual file space are restored. You cannot restore a single group
by specifying the group name, if there are several groups in the same virtual file space. You cannot
restore a part of a group by specifying a file path.
– Specify a group by using the following values:
- Specify the virtual file space name with the filespacename parameter.
- Use the subdir option to include subdirectories.
• Limited support is provided for restoring backup sets from tape devices attached to the client system. A
native device driver provided by the device manufacturer must always be used. The device driver
provided by IBM to be used with the IBM Spectrum Protect server cannot be used on the client system
for restoring local backup sets.
• To enable the client GUI to restore a backup set from a local device, without requiring a server
connection, use the localbackupset option.
196 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Certain local devices such as tape devices (tape devices do not apply to Mac OS X) require device
drivers to be set up prior to performing a restore. See the device manual for assistance with this task.
You also need to know the device address in order to perform the restore.
• The following features of a backup set restore from the server are not available when restoring locally:
1. Image restore.
2. Restoring individual system state components.
3. The GUI display and restore of individual files and directories. The command line can be used to
restore an individual directory or file from a local backup set.
4. Application data restore if the server was migrated from the Tivoli Storage Manager Express product.
If the CIFS share definition is deleted on the Net Appliance file server, the client is unable to directly
restore the share definition because the share is no longer accessible.
The share definition can be restored indirectly by creating a temporary local share and restoring the share
definition to the temporary share as follows:
This restores the original share definition (including permissions) on the file server.
Older versions of the IBM Spectrum Protect server might have a problem which prevents restoring the
root directory and the CIFS share definition. If this problem occurs, it can be circumvented by using by
one of the following methods:
1. Use the DISABLENQR testflag to restore the root directory as follows:
2. Use the command line client -pick option with a restore command and select the root directory:
Related tasks
“Backing up Net Appliance CIFS share definitions” on page 170
Network Appliance (NetApp) CIFS share definitions include share permissions that are set on the file
server.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Full VM restore
Use the restore vm command to restore an entire virtual machine from a full VM backup. When you
restore a full VM backup, the restored image replaces the virtual machine or a new virtual machine is
created. In a full VM restore, you restore all of the VMware files and the system state on Windows
systems. If you have access to IBM Spectrum Protect recovery agent, you can restore individual files.
Depending on the version of the backup-archive client that is running on the VMware client, use the
appropriate method to restore a full VM backup:
198 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Versions of the backup-archive earlier than 6.2.2:
Restore the full VM backup by using VMware Consolidated Backup. For more information, see the
following topic:
“Restoring full VM backups that were created with VMware Consolidated Backup” on page 210
Versions of the backup-archive client at 6.2.2 or later:
Restore the full VM backup by using the vStorage API. The IBM Spectrum Protect V6.2.2 or later
client can restore full VMware backups that were created with versions of the client that is earlier
than V6.2.2. For more information, see the following topic:
“Restoring full VM backups” on page 199
File-level restore
Use the restore command to restore individual files from a file-level VM backup. Use this method
when you cannot practically restore an entire VMware image. File-level backups were created with
the version 7.1 or earlier backup-archive clients.
The following restrictions apply to file-level restores:
• You can use the file-level restore method only if a file-level backup of the virtual machine exists.
• You cannot restore an entire virtual machine from file-level backups because the restore
command does not re-create Windows system states.
• You cannot use this method to restore individual files from a full VM backup of a virtual machine.
Depending on the configuration of the virtual machine where you restore the files, use the appropriate
method to restore files from a file-level backup:
The backup-archive client is not installed on the VM:
Restore the files from the vStorage backup server that backed up the virtual machine.
The backup-archive client is installed on the VM:
Restore the file from the backup-archive client that is installed on the virtual machine.
For more information, see the following topic:
“Scenario: Restoring file-level VM backups” on page 207
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
To restore a full VMware backup that was created by using VCB tools in IBM Spectrum Protect Version
6.2.0 or earlier, see the topic "Restoring full VM backups that were created with VMware Consolidated
Backup".
Note: A virtual machine is uniquely identified with the original host and datacenter name. If the
datacenter or host name is changed, the currently defined restore will fail. In this case, you must restore
the virtual machine using the new naming details.
Procedure
1. Depending on the target location for the restore, complete the appropriate step:
• If the restore of the full VM backup is going to overwrite the existing VMware virtual machine, delete
the existing virtual machine.
dsmc q vm *
b) From the results that are returned by the query command, identify a virtual machine to restore.
3. Restore the full VMware backup, by using the restore vm command. To restore the backup to a
virtual machine with a new name, use the -vmname option. For example, in the following command the
virtual machine is restored and a new name is specified for the restored virtual machine:
4. When the restore is complete, the virtual machine is powered off. Start the virtual machine from the
VMware vCenter.
What to do next
If you are restoring application protection backups, see “Shadow copy considerations for restoring an
application protection backup from the data mover” on page 201.
Related tasks
“Restoring full VM backups that were created with VMware Consolidated Backup” on page 210
You can restore a full VMware backup to re-create all of the files for a VMware virtual machine (VM).
Complete these steps to restore full VM backups that were created by using VMware Consolidated
Backup (VCB) running on IBM Spectrum Protect Version 6.2.0 or earlier.
Related reference
“Query VM” on page 679
Use the query VM command to list and verify the successful backups of virtual machines (VMs).
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“INCLUDE.VMSNAPSHOTATTEMPTS” on page 419
200 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the INCLUDE.VMSNAPSHOTATTEMPTS option to determine the total number of snapshot attempts to
try for a virtual machine (VM) backup operation that fails due to snapshot failure.
Shadow copy considerations for restoring an application protection backup from the data mover
For Windows VMware virtual machines (VMs), if you attempt to restore an application protection backup
from the data mover, be aware of shadow copy restrictions when you restore the application protection
backup.
The shadow copy must be available on the restored volume during an application protection restore
In some cases, an application protection backup operation might use the Volume Shadow Copy Service
(VSS) to create an application-consistent shadow copy before you start a VM backup. All changes that are
made after the creation time of the shadow copy are saved to the shadow storage.
A database restore might fail if the shadow copy is not available during an application restore. The
shadow copy is used at the time of restore to revert the restored volume to an application-consistent
state. If the shadow copy not available, the restored data will be in an inconsistent state.
The following situations can cause the shadow copy to be unavailable:
• Typically, the shadow storage is part of a volume. However, sometimes the shadow storage space is
configured to be on a different volume either by default or manually. In this case, the database restore
might fail because the shadow copy that was created during the VM backup operation is not available at
restore time.
• The shadow storage is not available because the volume with the shadow storage was excluded at
backup time.
The following workarounds are available for this issue:
• Before you run a VM backup, add the shadow copy storage association for each volume that is available
on the guest VM by using the vssadmin add shadowstorage command. For example, to set the
shadow storage location for volume E: on volume E:, issue following command:
Important: The vssadmin add shadowstorage command might fail if the VM has existing VSS
snapshots. You must delete the VSS snapshots by using the same application that created them.
4. In the root directory of each mounted drive, locate the dsmShadowCopyID.txt file. This file
contains the globally unique identifier (GUID) of the VSS shadow copy that is needed in the volume
revert operation.
5. Open the dsmShadowCopyID.txt file and identity the GUID of the volume where the database files
are located.
6. In the interactive diskshadow mode, issue the following command:
revert GUID
where GUID is the snapshot GUID that was identified in the dsmShadowCopyID.txt file.
In order for the revert operation to succeed, the application database must be on a non-boot drive.
Recovering from an application protect restore failure of a guest VM with Microsoft Exchange Server
Restoring a guest VM from an application protection backup can fail if the guest VM contains disks of
different sizes and the original application protection snapshot of the VM took more than 10 seconds to
complete.
This situation applies to application protection restore operations that fail when the /
RECOVer=APPLYALLlogs AND /MOUNTDAtabases=Yes option is specified with the database restore
command.
For example, a restore operation failed when the following Data Protection for Microsoft Exchange Server
command is run:
To resolve this problem, you must enable disk shadow copies for each disk in the guest VM and rerun the
application protection backup. To avoid this problem in the future, enable disk shadow copies of each
disk in the guest VM before you run application protection backups.
To recover from the restore failure, complete the following steps:
1. Ensure that the guest VM snapshot takes less than 10 seconds to complete.
2. If the snapshot takes longer than 10 seconds to complete, and the source disks on the guest VM are of
different sizes, enable the shadow copies on each disk in the guest VM.
3. Run a guest VM backup on data mover machine.
4. Restore the databases again.
Important: If this problem occurs, the VM backup cannot be used to perform an application-consistent
restore. You can perform only a crash-consistent restore. You must correct the configuration and run a
new backup in order to have an application-consistent restore.
202 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Scenarios for running full VM instant access and full VM instant restore from the backup-
archive client command line
Full VM instant access and full VM instant restore operations require a license for IBM Spectrum Protect
for Virtual Environments. You can perform either of these operations from the backup-archive client
command line. Instant access and instant restore operations and options are supported only for VMware
virtual machines that are hosted on VMware ESXi 5.1 servers, or later versions.
The following scenarios demonstrate the full VM instant access or full VM instant restore operations that
you might perform. Before you can complete the operations that are described in the following text, you
must configure at least one data mover node on the vStorage backup server so it can protect the virtual
machines by starting off host backup and restore operations. The steps for setting up the data mover
nodes are described in Setting up the data mover nodes in a vSphere environment.
Scenario: You want to perform a full VM instant access to verify the integrity of a backed up image of
a VMware virtual machine, without actually restoring the virtual machine or disks to the ESXi host
The purpose of this goal is to verify that a backed up virtual machine image can be used to successfully
restore a system if the virtual machine is deleted or its disks and data are corrupted or otherwise
unusable.
For this scenario, assume that an ESX server has a virtual machine named Orion running on it. You want to
verify that the backed up image that is stored by the IBM Spectrum Protect server can be used to restore
this virtual machine if the current virtual machine fails.
You perform a VM instant access operation, you use the restore vm command with inventory location
options specified to identify the location for the restored virtual machine. All inventory location options,
such as vmname, datacenter, host, and datastore can be used in combination with the instant
access option (-VMRESToretype=INSTANTAccess) to specify the location for the restored (instant
access) virtual machine.
Because the Orion virtual machine does exist in the inventory and is running, you must provide a new
name for a temporary virtual machine by adding the new name to the vmname option. You must also add
the –VMRESToretype=INSTANTAccess option to the command line to indicate that this is an instant
access restore operation.
Entering the following command prepares a virtual machine named "Orion_verify" so it is available for
instant access. You can use this virtual machine to verify that the backed-up image can be restored.
The –VMAUTOSTARTvm=YES option indicates that the virtual machine is started when it is restored. By
default, the new virtual machine is not automatically started. With this default setting, you can
reconfigure the virtual machine before you start it.
You can also list the versions of a virtual machine that were backed up by using the inactive or pick
options or the pittime or pitdate options to select an inactive or active backup, from a particular date
or time. For example, to display a list of backed up versions of the Orion virtual machine, by using the
following command:
-VMRESToretype=INSTANTAccess
-VMRESToretype=ALLtype
Where:
-VMRESToretype=INSTANTAccess
Displays all temporary virtual machines that are running in instant access mode, created by a
restore vm -VMRESToretype=INSTANTAccess operation.
-VMRESToretype=ALLtype
Displays all virtual machines with active instant access or instant restore sessions that were started
by a restore vm command that uses either the -VMRESToretype=INSTANTAccess or
VMRESToretype=-INSTANTRestore options.
The following examples show the syntax for the various options:
query vm * -VMREST=INSTANTA
query vm * -VMREST=ALL
You can add a –Detail option to each of the query vm commands shown to display more information
about each of the temporary virtual machines.
To remove the resources that were created for a temporary virtual machine named "Orion_verify", run the
following command:
The –VMRESToretype=VMCLeanup option deletes the temporary virtual machine from the ESXi host,
unmounts any iSCIS mounts that were mounted, and clears the iSCSI device list from the ESX host. All
temporary data for the temporary virtual machine is deleted from the VMware snapshot.
Scenario: You want to start an instant restore operation to restore a failed virtual machine to an ESX
host, from a backup image created by IBM Spectrum Protect
The advantage of a full VM instant restore, as opposed to a classic full VM restore, is that an instant
restore operation makes the virtual machine ready for immediate use, as soon as it is started. You do not
have to wait for all data to be restored before you can use the virtual machine. During an instant restore
operation, the virtual machine uses iSCSI disks until its local disks are fully restored. When the local disks
are restored, the virtual machine switches I/O from the iSCSI disks to the local disks, without noticeable
interruption of service.
Restore a virtual machine named Orion by using the following command:
This command specifies the name of the virtual machine to restore, the host and data center to restore it
to, and the restore type (-VMRESToretype=INSTANTRestore). The VMTEMPDAtastore option is a
mandatory parameter for instant restore operations.
The temporary datastore is used by vMotion to store the configuration of the restored virtual machine
during the instant restore process. The name that you specify must be unique. It cannot match the name
of any of the original datastores that were used by the virtual machine when it was backed up, and it
cannot be the same as the name specified on the optional –datastore option. If the –datastore
204 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
option is omitted, the virtual machine files are restored to the datastores that they used when the virtual
machine was backed up.
By default, virtual machines that are instantly restored are provisioned with thick disks. You can change
this behavior and provision thin disks by adding the –VMDISKProvision=THIN option to the command
line, or in the client options file.
Important: For instant restore operations, ensure that both the temporary datastore that you specify with
the vmtempdatastore option and the VMware datastore that is specified by the datastore option on
the restore VM command have enough free storage to save the virtual machine that you are restoring,
and the snapshot file that contains changes that were made to the data. If you are restoring a virtual
machine and you specify thin or thick provisioning (-vmdiskprovision=thin or -
vmdiskprovision=thick), the datastore that you restore the VM to must have enough free space to
accommodate the total capacity of the VM disk, and not just the amount of disk that is used. For example,
if a VM has 300 GB total capacity for its disk, you cannot restore that VM to a datastore that has less than
300 GB available, even if only a portion of the total capacity is being used.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
An instant restore operation that fails with storage vMotion running creates either of the following
situations:
• The instant restore operation generates an error message.
• The instant restore operation suspends indefinitely and the VM is not responsive.
To determine the cause of the problem, perform a detailed query of the VM by using the following
command:
In the output that is produced by this command, for each VM in the output, look for the line that contains
Action Needed. Use the following Action Needed paragraphs to recover from failed instant restore
operation, depending on the Action Needed status.
To attempt recovery after a Data Protection for VMware Recovery Agent service failure, complete the
following steps:
1. Investigate that cause of the failure and restart the Data Protection for VMware Recovery Agent
service if it does not start automatically. This action starts an automatic recovery of the mounted iSCSI
disks.
2. In the output of the query vm * -vmrestoretype=instantrestore -detail command, verify
that the VM disks are active (Disk Path: Active). This status means that the VM was restored and
is available for use.
3. If the Data Protection for VMware Recovery Agent service failure did not cause storage vMotion to time
out, no action is required.
4. If the Data Protection for VMware Recovery Agent service failure caused storage vMotion to time out,
and the error message indicates that the source disk as not responding, restart storage vMotion in the
vSphere client. When storage vMotion processing completes, run the restore vm command with the
-vmrestoretype=VMCLeanup parameter to clean up the iSCSI disks. For example:
206 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Full cleanup
If you are not able to recover from a failure and want to remove the VM and its components, run the
restore vm with the -vmrestoretype=VMFULLCLeanup parameter. For example:
A VMFULLCLeanup operation forces removal of the VM and all of its components, regardless of the state
of the virtual machine. Do not start a full clean up operation while vMotion is still migrating a virtual
machine.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Procedure
1. Examine the ESX server Task and Event log for an All Paths Down (APD) error.
It can take time for this error to display in the logs, but it must be present before you continue to the
next steps. If you do not wait for the error before you attempt more troubleshooting, you might bring
the ESX server down.
2. Power off the virtual machine.
3. Rescan the HBA.
Rescanning the HBA on the ESX server might reactivate the failed device. If VMware kernel locks
prevent you from rescanning the HBA, perform the following steps:
a) In the vCenter interface, select the ESX host.
b) Click Configuration.
c) Right click iSCSI Software Adapter and select Properties.
d) Click Static Discovery.
e) Delete any static addresses and click Close.
f) Rescan the HBA.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Procedure
1. Query the IBM Spectrum Protect server to determine the file spaces that are registered for Orion:
2. Restore files for the Orion file space, by running one of the following commands:
Restore files to the computer where you are currently logged on:
Assume that you are currently logged on to the computer called Orion. Run one of the following
commands:
a. If you know the password for the node that you are restoring, use the -virtualnodename
option in the restore command. For example, run the following command to restore the files to
Orion:
b. If you have proxy authority, you can restore files on behalf of the target node. Proxy authority
must be granted from the agent node, in other words the node of the computer that the restore
is run from. You must know the password for the agent node so that you can access the target
node. For example, run the following command to restore the files to Orion:
208 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 28. Components for the restore command when you restore files to the same computer
Command component Description
\\orion\c$\mydocs\ Source file specification on the IBM Spectrum
Protect server. This location contains the
backed up files that you are restoring. The files
are backed up for the orion VM, so the file
specification must be in UNC format.
c:\restore_temp\ Destination file specification on the computer
where you are currently logged on. The files are
restored to this location.
-sub=yes Specifies that all subdirectories in the source
file specification are included when you run the
restore operation.
-virtualnodename=orion Notifies the IBM Spectrum Protect server that
the backup is running from the node orion.
-asnodename=orion Notifies the IBM Spectrum Protect server that
the backup is running from the node orion.
Table 29. Components for the restore command when you restore files to a different computer
Command component Description
\\orion\c$mydocs\ Identifies the source file specification on the
IBM Spectrum Protect server. This location
contains the backed up files that you are
restoring. The files are backed up for the orion
VM, so the file specification must be in UNC
format.
\\orion\c$\restore_temp\ Identifies the destination file specification on a
computer other than the computer where you
are logged on. The You are restoring the files to
the orion VM over the network, by using a
Microsoft feature that identifies network
locations in UNC notation.
-sub=yes Specifies that all subdirectories in the source
file specification are included when you run the
restore operation.
-virtualnodename=orion Notifies the IBM Spectrum Protect server that
the backup is running from the node orion.
Related concepts
“Restoring data from a VMware backup” on page 198
Restoring full VM backups that were created with VMware Consolidated Backup
You can restore a full VMware backup to re-create all of the files for a VMware virtual machine (VM).
Complete these steps to restore full VM backups that were created by using VMware Consolidated
Backup (VCB) running on IBM Spectrum Protect Version 6.2.0 or earlier.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Procedure
1. Depending on the target location for the restore, complete the appropriate step:
• If the restore of the full VM backup is going to overwrite the existing VMware virtual machine, delete
the existing virtual machine.
• If you restore the full VM backup to a new virtual machine, you do not need to delete the existing
virtual machine. You can delete the existing virtual machine, otherwise proceed to the next step.
2. Query the virtual machine for full VMware backups, by completing the following steps:
a) From the off-host backup server, run the following command:
dsmc q vm *
210 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
# Backup Date Mgmt Class Type A/I Virtual Machine
--- ----------- ---------- ---- --- ---------------
1 12/03/2009 03:05:03 DEFAULT VMFULL A vm_guest1
2 09/02/2010 10:45:09 DEFAULT VMFULL A vm_guest11
3 09/02/2010 09:34:40 DEFAULT VMFULL A vm_guest12
4 09/02/2010 10:10:10 DEFAULT VMFULL A vm_guest13
5 12/04/2009 20:39:35 DEFAULT VMFULL A vm_guest14
6 09/02/2010 11:15:18 DEFAULT VMFULL A vm_guest15
7 09/02/2010 02:52:44 DEFAULT VMFULL A vm_guest16
8 08/05/2010 04:28:03 DEFAULT VMFULL A vm_guest17
9 08/05/2010 05:20:27 DEFAULT VMFULL A vm_guest18
10 08/12/2010 04:06:13 DEFAULT VMFULL A vm_guest19
11 09/02/2010 00:47:01 DEFAULT VMFULL A vm_guest7
12 09/02/2010 01:59:02 DEFAULT VMFULL A vm_guest8
13 09/02/2010 05:20:42 DEFAULT VMFULL A vm_guest9
ANS1900I Return code is 0.
ANS1901I Highest return code was 0.
b) From the results that are returned by the query command, identify a virtual machine to restore.
3. Restore the full VMware backup, by using the restore vm command. To restore a virtual machine
from a specific point in time, include the -pitdate and -pittime options, for example:
Where:
my_vm_name
Name of the virtual machine that you are restoring.
destination
Directory location for the restored vmdk file.
-pitdate
Date that the backup was created.
-pittime
Time that the backup was created.
4. When the restore is completed, the following message is returned. Enter Y.
Virtual Infrastructure Client or VMware Converter tool
can be used to redefine virtual machine to the VMware Virtual Center Inventory.
Would you like to launch VMware Converter now? (Yes (Y)/No (N))
Tip: If you enter N, the command-line returns without opening the VMware Converter. However, you
must convert the image before the image can be restored.
5. To convert the restored VCB image into a virtual machine on a VMware server by using the VMware
vCenter Converter tool, complete following steps:
a) From the Windows Start menu, open the Converter tool.
b) From the Converter tool, click Convert Machine.
c) In the Virtual machine file field, enter the location of the restored .vmx file.
Tip: The .vmx file is restored to the directory specified by the vmbackdir option of the restore
vm command.
d) Follow the remaining steps in the wizard to convert the full VM backup.
6. When the restore is complete, the virtual machine is powered off. Start the virtual machine from the
VMware vCenter.
Related tasks
“Restoring full VM backups” on page 199
You can restore a full VMware backup to re-create all of the files for a VMware virtual machine (VM)
directly to the VMware server. This method replaces the deprecated method of restoring backups that
were created by using the VMware Consolidated Backup (VCB) tools. This restore method does not
require you to use the VMware converter tool before you restore the backup to the VMware server. You
cannot use this restore method to restore individual files from a full VM backup.
212 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Group membership is restored.
Although all attributes that can be set and the group links are recreated, the restored objects might not be
immediately available after the restore operation. An Active Directory administrator might have to
manually update the restored objects in order to make them available. Make sure to read “Restrictions
and limitations when restoring Active Directory objects” on page 214 before performing the restore.
Related concepts
“Preserve attributes in tombstone objects” on page 215
To specify an attribute to be preserved in the tombstone object, first locate this attribute in the Active
Directory schema, then update the searchFlags attribute of the schema object.
“Restoring your data” on page 181
Use IBM Spectrum Protect to restore backup versions of specific files, a group of files with similar names,
or entire directories.
“Restrictions and limitations when restoring Active Directory objects” on page 214
There are some restrictions and limitations to be aware of when restoring Active Directory objects.
Related tasks
“Restoring Windows system state” on page 187
The Microsoft Volume Shadowcopy Service (VSS) is supported on Windows backup-archive clients. The
client uses VSS to restore the system state. The system state restore function is deprecated for online
system state restore operations.
Related reference
“Restore Adobjects” on page 691
Use the restore adobjects command to restore individual Active Directory objects from the local
Deleted Objects container.
Restoring Active Directory objects using the GUI and command line
To restore individual Active Directory objects, you must run the backup-archive client on a domain
controller and your user account must be a member of the Administrators group. The Active Directory
objects are not displayed in the directory tree if your user account is not a member of the Administrators
group.
You can restore active directory objects or tombstone objects using either the GUI or the command line.
To restore individual objects from the GUI:
1. Click Restore in the IBM Spectrum Protect window. The Restore window opens.
2. Expand the directory tree if necessary. To expand an object in the tree, click the plus sign (+) next to
the object.
3. Locate the Active Directory node in the directory tree. Expand it to reveal Local Deleted Objects. The
Server object is also available.
• To restore tombstone objects, expand Local Deleted Objects, navigate to the tombstone objects
that you want to restore, and select the tombstone objects.
• To restore Active Directory objects that are backed up to the IBM Spectrum Protect server:
a. Expand the Server object. A window opens displaying a list of system state backups (with
different time stamps) on the server.
b. Select a system state backup from the list. The Active Directory database from that system state
is restored in the background, and the tree is populated with Active Directory objects.
c. Navigate to the Active Directory objects that you want to restore and select the Active Directory
objects.
Tip: To see the attributes for an Active Directory object, keep expanding each Active Directory object
in the tree until you reach the one you want. The attributes for an object are displayed in the display
area that is adjacent to the tree. You can search or filter the tree for an Active Directory object based
on its name.
214 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• When you restore an object from the IBM Spectrum Protect server, if the live Active Directory object
exists and has the prevent deletion bit on, the client can modify the attributes of the object. However, if
there is a tombstone object of the same name but a different object GUID, the Directory Services
returns the access denied error.
• When you restore an object from the IBM Spectrum Protect server and the container of the object has
been renamed, the client recreates the container using the original name at the time of the backup.
When restoring a tombstone object, the client restores it to the renamed container because the
lastKnownParent attribute of the tombstone object has been updated to reflect the new container
name.
Related concepts
“Preserve attributes in tombstone objects” on page 215
To specify an attribute to be preserved in the tombstone object, first locate this attribute in the Active
Directory schema, then update the searchFlags attribute of the schema object.
“Restoring your data” on page 181
Use IBM Spectrum Protect to restore backup versions of specific files, a group of files with similar names,
or entire directories.
Related reference
“Restore Adobjects” on page 691
Use the restore adobjects command to restore individual Active Directory objects from the local
Deleted Objects container.
“Stagingdirectory” on page 518
The stagingdirectory option defines the location where the client stores any data that it generates to
perform its operations. The data is deleted when processing is complete.
Modifying the client acceptor and agent services to use the web client
You cannot restore individual Active Directory objects using the web client by default. The web client
services (client acceptor and agent) run under the Local System account by default. The Local System
account does not have enough privileges to restore Active Directory objects.
To enable this restore operation in the web client, follow these steps:
1. Modify the client acceptor and agent services to use an administrative account such as Administrator
when logging on to Windows.
2. You can edit the properties for the client acceptor and agent services (typically called TSM Client
Acceptor and TSM Remote Client Agent) in the Control Panel.
Procedure
To restore or retrieve data during a failover, complete the following steps:
1. Verify the replication status of the client data on the secondary server. The replication status indicates
whether the most recent backup was replicated to the secondary server.
2. Restore or retrieve your data as you would normally do from the client GUI or from the command-line
interface.
Tip: Restartable restore operations function as expected when you are connected to the secondary
server. However, restore operations that are interrupted when the primary server goes down cannot
be restarted after the client fails over. You must run the whole restore operation again after the client
fails over to the secondary server.
Results
If the replicated data on the secondary server is not current, you are prompted to continue or to stop the
restore or retrieve operation.
For example, to restore the build.sh directory at the command-line interface, you issue the following
command:
216 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
IBM Spectrum Protect
Command Line Backup-Archive Client Interface
Client Version 8, Release 1, Level 0.0
Client date/time: 11/16/2016 12:05:35
(c) Copyright by IBM Corporation and other(s) 1990, 2016. All Rights Reserved.
ANS2120W The last store operation date reported by the server TARGET of
05/16/2013 22:38:23 does not match the last store operation date of
05/21/2013 21:32:20 stored by the client.
Continue (Yes (Y)/No (N))
If you respond with Y, restore processing continues as normal, but the data that you restore might not be
the most current.
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Determining the status of replicated client data
You can verify whether the most recent backup of the client was replicated to the secondary server before
you restore or retrieve client data from the secondary server.
Procedure
1. Click Utilities → Node Access List from the main window.
2. In the Node Access List window, click the Add button.
Results
For example, to give the node user2 access to all backup files and subdirectories under the d:\user1
directory, create a rule with the following values:
The node you are authorizing must be registered with your IBM Spectrum Protect server.
On the command line of the client, use the set access command to authorize another node to restore
or retrieve your files. You can also use the query access command to see your current list, and delete
access to delete nodes from the list.
Related reference
“Delete Access” on page 630
The delete access command deletes authorization rules for files that are stored on the server.
“Query Access” on page 653
The query access command shows who was given access to backup versions or archive copies of
specific files.
“Set Access” on page 727
The set access command gives users at other nodes access to your backup versions or archived
copies.
218 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Procedure
1. Click Utilities from the main window.
2. Click Access Another Node.
3. Type the node name of the host workstation of the user in the Node name field and click Set.
Results
If you are using commands, use the fromnode option to indicate the node. You must also use the file
space name, rather than the drive letter, to select the restore-retrieve drive that you want to access.
Include the file space name in braces and specify it as you would specify a drive letter. For example, to
restore the files from the cougar node \projx directory on the d–disk file space to your own \projx
directory, enter:
Use the query filespace command to display a list of file spaces. For example, to display a list of the
file spaces of cougar, enter:
Important: The backup-archive client can use file space information when restoring files. The file space
information can contain the name of the computer from which the files were backed up. If you restore
files from another client node and do not specify a destination for the restored files, the client uses the file
space information to restore the files. In this case, the client attempts to restore the files to the drive on
the original computer. If the restoring computer has access to the drive of the original computer, you can
restore files to the original drive. If the restoring computer cannot access the drive of the original
computer, the client returns a network error message. If you want to restore the original directory
structure but on a different computer, specify only the target drive when you restore the files. This is true
when restoring files from another node and when retrieving files from another node.
Related reference
“Fromnode” on page 398
The fromnode option permits one node to perform commands for another node. A user on another node
must use the set access command to permit you to query, restore, or retrieve files for the other node.
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
“Retrieve” on page 718
The retrieve command obtains copies of archived files from the IBM Spectrum Protect server. You can
retrieve specific files or entire directories.
You can then restore or retrieve files as if you were working from your original workstation.
If you do not want to restore or retrieve the files to the same directory name on the alternate workstation,
enter a different destination.
You can delete file spaces using the GUI or the command-line client. To delete network-attached storage
(NAS) file spaces, use the web client or command-line client.
To delete a file space using the GUI client, perform the following steps:
Procedure
1. From the main window, click Utilities → Delete Filespaces.
2. Select the file spaces you want to delete.
3. Click Delete. The client prompts you for confirmation before deleting the file space.
Results
You can also delete a file space using the delete filespace command. Use the class option with the
delete filespace command to delete NAS file spaces.
220 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Related reference
“Class” on page 327
The class option specifies whether to display a list of NAS or client objects when using the delete
filespace, query backup, and query filespace commands.
“Delete Filespace” on page 636
The delete filespace command deletes file spaces in IBM Spectrum Protect server storage. A file
space is a logical space on the server that contains files you backed up or archived.
Procedure
To perform a point-in-time restore by using the client GUI, complete the following steps:
1. Click the Restore button in the main window. The Restore window appears.
2. Click the Point-in-Time button from the Restore window. The Point in Time Restore window appears.
3. Select the Use a Point-in-Time Date selection box. Select the date and time and click OK. The point in
time that you specified appears in the Point in Time display field in the Restore window.
Results
Note: If there are no backup versions of a directory for the point-in-time you specify, files within that
directory are not restorable from the GUI. However, you can restore these files from the command line.
You can start point-in-time restore from the command-line client by using the pitdate and pittime
options with the query backup and restore commands. For example, when you use the pitdate and
pittime options with the query backup command, you establish the point-in-time for which file
information is returned. When you use pitdate and pittime with the restore command, the date and
time values you specify establish the point-in-time for which files are returned. If you specify pitdate
without a pittime value, pittime defaults to 23:59:59. If you specify pittime without a pitdate
value, it is ignored.
Related concepts
“Storage management policies” on page 255
Storage management policies are rules your administrator defines in order to manage your backups and
archives on the server.
Related reference
“Backup Image” on page 615
The backup image command creates an image backup of one or more volumes on your system.
Procedure
To restore data from a retention set by using the command-line client, complete the following steps:
1. Determine the point in time from which to restore data. On the server command line, issue the QUERY
RETSET command. For example, if the retention set ID is 42, issue the following command:
query retset 42
222 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Retention Set ID: 42
Retention Rule Name: XMP1
Point-In-Time Date: 01/07/2019 05:00:00 PM
Retention Period: 60
Expiration Date: 03/08/2019 05:00:00 PM
Retention Set State: Active
Total File Sizes (MB): 180
Last Update by (administrator): SERVER_CONSOLE
Last Update Date/Time: 01/07/2019 05:00:12 PM
Description: Example 1: weekly retention rule runs on Monday
at 5:00pm
Retention Set Contents: GRASSHOPPER:/home GRASSHOPPER:/home/hannigan/b-
uild CRICKET:/home/hannigan/build FLEA:\\flea-
\c$
2. To list the contents of the retention set, on the backup-archive client command line, issue the query
backup command. Specify the pitdate and pittime options with the date and time of the retention
set's snapshot. For example:
3. Restore the contents of the retention set. On the client command line, issue the restore command.
Specify the pitdate and pittime options with the date and time of the retention set's snapshot. For
example:
Results
The data is restored to the server.
Related tasks
“Restoring data to a point in time” on page 221
Use a point-in-time restore to restore files to the state that existed at a specific date and time.
Related reference
“Query Backup” on page 657
The query backup command displays a list of backup versions of your files that are stored on the IBM
Spectrum Protect server, or that are inside a backup set from the server when the backupsetname
option is specified.
“Restore” on page 684
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
Related information
Configuring rules for long-term data retention
Procedure
1. Click the Restore button from the main window. The Restore window appears.
2. Expand the directory tree if necessary. To expand a node in the tree, click the plus sign (+) next to an
object in the tree. Nodes shown are those that have been backed up and to which your administrator
has authority. The root node called Nodes is not selectable. This node only appears if a NAS plug-in is
present on the client workstation. NAS nodes display on the same level as the node of the client
workstation. Only nodes to which the administrator has authority appear.
3. Expand the NAS node to reveal the Image object.
4. Expand the Image object to display volumes that you can restore. You cannot expand Volume objects.
5. Click the selection boxes next to the volumes under the Image object that you want to restore. If you
want to restore a NAS image that was backed up on a particular date, click the Point In Time button.
After you select a date, the last object that was backed up on or prior to that date appears, including
any inactive objects. If you want to display all images (including active images and inactive images),
before you select them, select View > Display active/inactive files from the menu bar.
6. Click Restore. The Restore Destination window appears. Enter the information in the Restore
Destination window. If you choose to restore to a different destination, you can only restore one
volume at a time to a different destination. You can restore NAS file system images to any volume on
the NAS file server from which they were backed up. You cannot restore images to another NAS file
server.
7. Click Restore. The NAS Restore Task List window displays the restore processing status and progress
bar. If there is a number next to the progress bar, it indicates the size of the restore, if known. After the
restore completes, the NAS Restore Report window displays processing details. If you must close the
backup-archive client GUI session, current NAS operations continue after you disconnect. You can use
the Dismiss button on the NAS Restore Task List window to quit monitoring processes without ending
the current operation.
8. Optional: To monitor processing of an operation, select the Actions > IBM Spectrum Protect
Activities from the main window.
Results
Considerations:
• Workstation and remote (NAS) backups are mutually exclusive in a Restore window. After selecting an
item for restore, the next item you select must be of the same type (either NAS or non NAS).
• Details will not appear in the right-frame of the Restore window for NAS nodes or images. To view
information about a NAS image, highlight the NAS image and select View > File Details from the menu.
• To delete NAS file spaces, select Utilities > Delete Filespaces. You can delete both workstation and
remote objects.
224 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restoring NAS files and directories using the backup-archive client GUI
You can use the toc option with the include.fs.nas option in your client options file to specify
whether the client saves Table of Contents (TOC) information for each file system backup.
Procedure
1. Click Restore from the main window. The Restore window appears.
2. Expand the directory tree if necessary. To expand a node in the tree, click the plus sign (+) next to an
object in the tree. Nodes shown are those that have been backed up and to which your administrator
has authority. The root node called Nodes is not selectable. This node only appears if a NAS plug-in is
present on the client workstation. NAS nodes appear on the same level as the node of the client
workstation. Only nodes to which the administrator has authority appear.
3. Expand the NAS node to display the File Level object.
4. Expand the File Level object to display the volumes, directories, and files that were last backed up.
When you expand the volume object, and complete TOC information is available on the server for the
latest backup, the Load Table of Contents dialog appears. If complete TOC information is not available
for the latest backup, no objects appear below the volume object. The next step explains how to
display objects from backups other than the latest backup. Complete TOC information is provided if
you performed either of the following operations: (1) A differential image backup with TOC information
and its corresponding full image backup with TOC information, or (2) A full image backup with TOC
information.
5. Click the selection boxes next to the directories or files that you want to restore.
a) If you want to restore files from a NAS image that was backed up on a particular date or display
files from several older versions, highlight the volume you want to restore and click the Point In
Time button.
b) If you select Use a Point in Time Date in the Point in Time Restore windows, files from the image
backed up on that date, and if it is a differential image, files from its corresponding full image
appear under the File Level object.
c) If you click Use Selected Images in the Point in Time Restore window, the Selected Images
window appears for you to select images. The contents of the selected images appear in the File
Level object.
6. Click Restore. The Restore Destination window appears. Enter the information in the Restore
Destination window. If you choose to restore to a different destination, you can only restore one
volume at a time to a different destination.
7. Click Restore. The NAS Restore Task List window displays the restore processing status and progress
bar. If there is a number next to the progress bar, it indicates the size of the restore, if known. After the
restore completes, the NAS Restore Report window displays processing details. If you must close the
backup-archive client GUI session, current NAS operations continue after you disconnect. You can use
Results
Considerations:
• Workstation and remote (NAS) backups are mutually exclusive in a Restore window. After selecting an
item for restore, the next item you select must be of the same type either (either workstation or NAS).
• To view information about objects in a NAS node, highlight the object and select View > File Details
from the menu.
• To delete NAS file spaces, select Utilities > Delete Filespaces. You can delete both workstation and
remote objects.
Related reference
“Toc” on page 534
Use the toc option with the backup nas command or the include.fs.nas option to specify whether
the backup-archive client saves table of contents (TOC) information for each file system backup.
Options and commands to restore NAS file systems from the command line
This topic lists some examples of options and commands you can use to restore NAS file system images
from the command line.
query backup Use the query backup command with the class “Query Backup” on page
option to display information about file system 657
images backed up for a NAS file server.
query filespace Use the query filespace command with the “Query Filespace” on
class option to display a list of file spaces page 664
belonging to a NAS node.
restore nas Restores the image of a file system belonging to a “Restore NAS” on page
Network Attached Storage (NAS) file server. 704
monitor process Displays current backup and restore processes for “Monitor Process” on
all NAS nodes for which an administrative user has page 650
authority. The administrative user can then select
one process to monitor.
cancel process Displays current backup and restore processes for “Cancel Process” on
all NAS nodes for which an administrative user has page 629
authority. From the display, the administrative user
can select one process to cancel.
226 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 30. NAS options and commands (continued)
Option or command Definition Page
delete filespace Use the delete filespace with the class “Delete Filespace” on
option to display a list of file spaces belonging to a page 636
NAS node so that you can choose one to delete.
Archive files
To archive files, select the files that you want to archive. You can select the files by name or description,
or select them from a directory tree.
Your administrator might set up schedules to automatically archive certain files on your workstation. The
following sections contain information about how to archive files without using a schedule.
You must assign an archive description for all archived files. An archive description identifies data through
a meaningful description that you can use later to identify files and directories. You can enter as many as
254 characters to describe your archived data. If you do not enter a description, the following default
archive description is assigned:
When you select the archive function from the backup-archive GUI, a list of all previously used archive
descriptions are displayed. You can assign these archive descriptions to future archives.
Incremental backup might recall migrated files, while selective backup and archive always recall migrated
files, if you do not use the skipmigrated option.
Related concepts
Options for backing up migrated files: skipmigrated, checkreparsecontent, stagingdirectory
Procedure
1. Click Archive in the GUI main window. The Archive window displays.
2. Expand the directory tree by clicking the plus sign (+) or a folder icon in the tree. To search or filter
files, click the Search icon from the toolbar.
3. Enter a description, accept the default description, or select an existing description for your archive
package in the Description field.
230 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
4. To modify specific archive options, click Options. Any options that you change are effective during the
current session only.
5. Click Archive. The Archive Status window displays the progress of the archive operation.
Related reference
“Archive” on page 605
The archive command archives a single file, selected files, or all files in a directory and its
subdirectories on a server.
232 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
2. Register each node with the IBM Spectrum Protect server, if it does not exist. Register the common
target node name to be shared by each of the agent nodes used in your shared data environment.
3. Register each of the nodes in the shared data environment with the IBM Spectrum Protect server. This
is the agent node name that is used for authentication purposes. Data is not stored using the node
name when the asnodename option is used.
4. The IBM Spectrum Protect administrator must grant proxy authority to all nodes in the shared
environment to access the target node name on the IBM Spectrum Protect server, using the GRANT
PROXYNODE server command.
5. Use the QUERY PROXYNODE administrative client command to display the client nodes of the
authorized user, granted by the GRANT PROXYNODE command.
Follow these steps to set up encryption with the encryptkey=save option:
Procedure
1. Specify encryptkey=save in the options file.
2. Back up at least one file with asnode=ProxyNodeName to create a local encryption key on each agent
node in the multiple node environment.
Results
Follow these steps to set up encryption with the encryptkey=prompt option:
1. Specify encryptkey=prompt in the options file.
2. Ensure that users of the agent nodes in the multiple node environment are using the same encryption
key.
• If you change the encryption key, you must repeat the previous steps.
• Use the same encryption key for all files backed up in the shared node environment.
Follow these steps to enable multinode operation from the GUI:
1. Verify that the client node has proxy authority to a target node (or authorized to act as the target node)
using the QUERY PROXYNODE administrative client command.
2. Select Edit > Preferences to open the preferences window.
3. Select the General tab and fill in the As Node Name field with the name of the proxy authorized target
node.
4. Click Apply and then OK to close the preferences window.
Follow these steps to verify that your client node is now accessing the server as the target node:
1. Open the tree window and check that the target node name specified by the As Node Name field
appears, or
2. Verify the target node name in the Accessing As Node field in the Connection Information window.
To return to single node operation, delete the As Node Name from the Accessing As Node field in the
General > Preferences tab.
Considerations for a proxied session:
• A proxy operation uses the settings for the target node (such as maxnummp and deduplication) and
schedules that are defined on the IBM Spectrum Protect server. The IBM Spectrum Protect server node
settings and schedules for the agent node are ignored.
• All agent nodes in the multiple node environment must be of the same platform type.
• Do not use target nodes as traditional nodes. Use them only for multiple node processing.
• You cannot perform a system object or system state backup or restore.
• You cannot access another node (either from GUI drop down or use of the fromnode option).
• You cannot use the clusternode option.
Procedure
To delete an archived object from the server, perform the following steps in the web client or GUI. As an
alternative to using the web client or GUI, you can also delete archived objects from the command line by
using the delete archive command.
1. Select Delete Archive Data from the Utilities menu.
2. In the Archive Delete window, expand the directory tree by clicking the plus sign (+) or folder icon
next to the object you want to expand. Objects on the tree are grouped by archive package description.
3. Select the archived objects that you want to delete.
4. Click Delete.
The client prompts you for confirmation before it starts to delete the selected objects.
The Archive Delete Task List window shows the progress of the delete operation.
Related reference
“Delete Archive” on page 631
The delete archive command deletes archived files from IBM Spectrum Protect server storage. Your
administrator must give you the authority to delete archived files.
Retrieve archives
Select the Retrieve function to recover an archive copy of a file or a directory.
Note: When you retrieve a directory, its modification date and time is set to the date and time of the
retrieve, not to the date and time the directory had when it was archived. This is because a retrieve
operation retrieves the directories first, and then adds the files to the directories.
You can also retrieve archive copies from the directory tree, filter the directory tree, and retrieve archive
copies of files owned by someone else. To do any of these, click the Retrieve button on the main window
of the backup-archive client GUI and follow the directions provided in the task help of the GUI.
Important: When you retrieve a file without any specifications, and more than one version of the archive
copy exists on the server, all of the copies are retrieved. After the first copy is retrieved, the second copy
is retrieved. If there is an existing copy on your client workstation, you are prompted to replace, skip, or
cancel.
234 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Related concepts
“Duplicate file names” on page 181
If you attempt to restore or retrieve a file whose name is the same as the short name of an existing file, a
file name collision occurs (existence of duplicate file names).
Procedure
1. Click Retrieve on the GUI main window. The Retrieve window displays.
2. Expand the directory tree by clicking the plus sign (+) or the folder icon next to an object you want to
expand. To search or filter files, click the Search icon from the toolbar.
3. Enter your search criteria in the Find Files window.
4. Click Search. The Matching Files window displays.
5. Click the selection boxes of the files that you want to retrieve and close the Matching Files window.
6. Enter your filter criteria in the Find Files window.
7. Click Filter. The Retrieve window displays the filtered files.
8. Click the selection boxes of the filtered files or directories that you want to retrieve.
9. To modify specific retrieve options, click Options. Any options that you change are effective during
the current session only.
10. Click Retrieve. The Retrieve Destination window displays. You can retrieve files to a directory or
drive other than the one from where they were originally archived. You can also select how much of
the parent directory structure is re-created at the retrieve location.
11. Click Retrieve. The Retrieve Status window displays the processing status.
Related reference
“Retrieve” on page 718
The retrieve command obtains copies of archived files from the IBM Spectrum Protect server. You can
retrieve specific files or entire directories.
236 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 7. IBM Spectrum Protect scheduler overview
The IBM Spectrum Protect central scheduler allows client operations to occur automatically at specified
times.
To understand scheduling with IBM Spectrum Protect, several terms need to be defined:
schedule definition
A schedule definition on the IBM Spectrum Protect server specifies critical properties of an
automated activity, including the type of action, the time the action should take place, and how
frequently the action takes place. Numerous other properties can be set for a schedule. For
information about the DEFINE SCHEDULE, see the IBM Spectrum Protect server documentation.
schedule association
A schedule association is an assignment to a specific schedule definition for a client node. Multiple
schedule associations allow single schedule definitions to be used by many client nodes. Because
schedule definitions are included with specific policy domains, it is only possible for nodes that are
defined to a certain policy domain to be associated with schedules defined in that domain.
scheduled event
A scheduled event is a specific occurrence of when a schedule is run for a node. The following
conditions must be met before automatic scheduled events take place for a client:
• A schedule definition must exist for a specific policy domain.
• A schedule association must exist for the required node, which belongs to that policy domain.
• The client scheduler process must be running on the client system.
When creating a schedule definition on the IBM Spectrum Protect server, schedule actions that you can
take include incremental, selective, archive, restore, retrieve, imagebackup, imagerestore, command, and
macro. The scheduled action that is most frequently used is incremental with the objects parameter left
undefined. With this setting, the IBM Spectrum Protect client performs a domain incremental backup of
all drives defined by the client domain option. A schedule definition using the command action allows an
operating system command or shell script to be executed. When automating tasks for IBM Spectrum
Protect for Data Protection clients, you must use command action schedule definitions, which invoke the
command-line utilities for those applications.
The schedule startup window indicates the acceptable time period for a scheduled event to start. The
startup window is defined by these schedule definition parameters: startdate, starttime, durunits,
and duration. The startdate and starttime options define the beginning of the startup window for
the very first scheduled event. The beginning of the startup windows for subsequent scheduled events
vary depending on the period and perunit values of the schedule definition. The duration and
durunits parameters define the length of the startup window. The schedule action is required to start
within the startup window. To illustrate, consider the results of the following schedule definition:
objects=’"c:\home\proj1\Some file.doc"’
objects=’"c:\home\proj1\Some file.doc" "c:\home\Another file.txt"
c:\home\noblanks.txt’
objects=’"c:\home\My Directory With Blank Spaces\"’
objects=’"c:\Users\user1\Documents\Some file.doc"’
objects=’"c:\Users\user1\Documents\Some file.doc"
"c:\Users\user5\Documents\ Another file.txt" c:\Users\user3\Documents\noblanks.txt’
objects=’"c:\Users\user1\My Directory With Blank Spaces\"’
This syntax ensures that a file specification containing a space, such as c:\home\proj1\Some
file.doc, is treated as a single file name, and not as two separate files (c:\home\proj1\Some, and
file.doc)
The following examples show how to delimit schedule options parameters when file specifications
contain space characters:
options='-preschedulecmd="c:\home\me\my files\bin\myscript"
-postschedulecmd="c:\home\me\my files\bin\mypostscript" -quiet'
options='-presched="c:\home\me\my files\bin\precmd" -postsched=finish'
You can also refer to the objects and options parameter information for the DEFINE SCHEDULE and
UPDATE SCHEDULE commands. For descriptions of these commands and parameters, see the IBM
Spectrum Protect server documentation..
Related concepts
“Specifying input strings that contain blank spaces or quotation marks” on page 110
You must follow certain rules when you specify an input string that has blanks or quotation marks.
238 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Scheduler processing options
Scheduler processing options determine what operations are performed when a scheduler job is started.
You can define most of these scheduler processing options in the client options file. However, some of
these options can be set on the IBM Spectrum Protect server, so they affect all clients.
The following table shows which options are defined by the client and server, and which options are
overridden by the server. An X in a column indicates where the option can be specified.
tcpclientport X X
(also defined on server
when
sessioninit=servero
nly as
part of the node
definition)
if [[ -n ${TSM_PRE_CMD_RC} ]] ; then
if [[ ${TSM_PRE_CMD_RC} == 0 ]] ; then
echo "The TSM_PRE_CMD_RC is 0"
fi
else
echo "The TSM_PRE_CMD_RC is not set"
fi
240 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
postschedulecmd command fails, the administrative query event command shows that the event
completed with return code 8. If the scheduled operation completes with return code 12, that return
code takes precedence, and query event shows that the event failed with return code 12.
When you interpret the return code from a command, IBM Spectrum Protect considers 0 to mean
success, and anything else to mean failure. While this behavior is widely accepted in the industry, it is not
100% guaranteed. For example, the developer of the widget.exe command might exit with return code
3, if widget.exe ran successfully. Therefore, it is possible that the preschedulecmd or
postschedulecmd command might end with a nonzero return code and still be successful. To prevent
IBM Spectrum Protect from treating such commands as failed, you can wrap these commands in a script,
and code the script so that it interprets the command return codes correctly. The script should exit with
return code 0 if the command was successful; otherwise it should exit with a nonzero return code. The
logic for a script that runs widget.exe might look like this example:
run 'widget.exe'
if lastcc == 3
exit 0
else
exit 1
Related reference
“Postschedulecmd/Postnschedulecmd” on page 456
The postschedulecmd/postnschedulecmd option specifies a command that the client program
processes after it runs a schedule.
“Preschedulecmd/Prenschedulecmd” on page 459
The preschedulecmd option specifies a command that the client program processes before it runs a
schedule.
Setting the client scheduler process to run as a background task and start
automatically at startup
You can configure the IBM Spectrum Protect client scheduler to run as a background system task that
starts automatically when your system is started.
cd /d "c:\program files\tivoli\tsm\baclient"
Use dsmcutil to manage the client acceptor service or the scheduler service. Full documentation on
how to use dsmcutil is available by entering dsmcutil help.
The client scheduler can be managed by the client acceptor. When setting up scheduler services to run
with client acceptor management, two services must be created: the scheduler service and the client
acceptor service. When you install the client acceptor service with dsmcutil.exe, use the /
cadschedname: parameter to identify which scheduler service the client acceptor manages. If you use
the setup wizard to install the scheduler, you can select the Use the client acceptor to manage the
scheduler check box, which automatically creates both services and associates them.
Using the Client Service Configuration Utility, you can use either of the following methods:
Client acceptor-managed method
1. In your client options file (dsm.opt), either set the managedservices option to schedule or
schedule webclient.
2. In your client options file (dsm.opt), set the passwordaccess option to generate.
3. Create the scheduler service:
4. Create the client acceptor and associate scheduler service with the client acceptor:
242 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
5. Manually start the client acceptor service:
Traditional method
1. In your client options file (dsm.opt), either remove the managedservices entirely (it defaults to
webclient) or set it to webclient.
2. In your client options file (dsm.opt), set the passwordaccess option to generate.
3. Create the scheduler service:
To increase the reliability of the client scheduler service on Windows, set the services to automatically
recover from a failure as follows:
• Start the Windows services management console (Start > Settings > Control Panel > Administrative
Tools > Services)
• Right-click the TSM Client Scheduler service and select Properties.
• Click the Recovery tab.
• Define the recovery action as Restart the service for first, second, and subsequent failures.
If you are using the client acceptor to manage the scheduler, you must set the recovery properties for the
TSM Client Acceptor service, but leave the recovery settings for the TSM Client Scheduler service as
Take No Action for the first, second, and subsequent failures. The same recovery settings can also be
defined to increase the reliability of the TSM Journal Service.
Related reference
“Cadlistenonport” on page 324
The cadlistenonport option specifies whether to open a listening port for the client acceptor.
The backup-archive client displays detailed information about all scheduled work for your client node.
Table 33 on page 244 displays sample classic query schedule output.
The schedule name, WEEKLY_INC, starts a weekly incremental backup on the e: and f: drives.
The schedule name, DAILY_INC, starts a daily incremental backup. The next incremental backup starts
in 30 minutes. Because no objects are listed, the client runs the incremental backup on your default
domain. The schedule has no expiration date.
To more accurately determine the status of scheduled events, the query schedule output for an
enhanced schedule, on IBM Spectrum Protect Version 5.3 client and above, includes new fields. These
fields are always displayed, even if it is a classic schedule or a version 5.3 client session with a pre-
version 5.3 server, but the new fields are blank. Note that for a down-level (prior to verrsion 5.3) client,
the server reports the period as indefinite and the day of week as an illegal day. Table 34 on page 244
displays sample enhanced query schedule output.
244 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Display information about completed work
When you run the schedule command in the foreground, your screen displays output from the
scheduled commands.
Output is also directed to the dsmsched.log file in the installation directory unless you change the
directory and file name using the schedlogname option.
When you run the schedule command as a service, output from scheduled commands displays in the
application event log. Output is also directed to the dsmsched.log file in the current directory unless you
change the path and file name using the schedlogname option. The amount of detail is determined by
whether verbose or quiet is set in the dsm.opt file. The scheduler service also posts messages to the
Windows event log.
After scheduled work is performed, check the schedule log to verify that all work completed successfully.
When a scheduled command is processed the schedule log contains the following entry:
If the scheduled event does not complete successfully, you receive a message similar to the following:
The client indicates whether IBM Spectrum Protect successfully issued the scheduled command
associated with the eventname (action=command). No attempt is made to determine the success or
failure of the command. You can assess the status of the command by evaluating the return code from
the scheduled command in the schedule log. The schedule log entry for the return code of the command
is prefaced with the following text:
The schedule log continues to grow unless you prune it using the schedlogretention option or specify
a maximum size using the schedlogmax option.
Related concepts
“Specify scheduling options” on page 248
You can modify scheduling options in the client options file or the graphical user interface (GUI).
Scheduler service
Event 4097 (informational message)
Example 1:
Example 2:
Example 3:
Example 4:
Example 5:
Example 2:
246 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
User: DILE\Administrator
Computer: MIKEDILE
Description:
ANS1802E Incremental backup of '\\mikedile\
c$' finished with 3 failure
Example 2:
248 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This topic discusses the options that you can use to regulate central scheduling. The backup-archive
client uses scheduling options only when the Scheduler is running.
250 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
/node:tsmcli_sched1 /password:secret /autostart:no /startnow:no
Unique option files are required for each schedule instance, and must be identified at the time of service
creation:
Option file #1 (c:\program files\tivoli\tsm\baclient\dsm.opt1)
tcps tsmserv1.example.com
nodename tsmcli_sched1
passwordaccess generate
schedlogname "c:\program files\tivoli\tsm\baclient\dsmsched1.log"
errorlogname "c:\program files\tivoli\tsm\baclient\dsmerror1.log"
schedmode prompted
tcpclientport 1507
domain h:
managedservices schedule
tcps tsmserv1.example.com
nodename tsmcli_sched2
passwordaccess generate
schedlogname "c:\program files\tivoli\tsm\baclient\dsmsched2.log"
errorlogname "c:\program files\tivoli\tsm\baclient\dsmerror2.log"
schedmode prompted
tcpclientport 1508
domain i:
managedservices schedule
Related concepts
“Change processing options used by the scheduler service” on page 249
When you configure the IBM Spectrum Protect central-scheduling services (the scheduler, the client
acceptor, or the remote client agent), some of the processing options that you specify are defined in the
Windows registry.
8 The operation completed with at least one warning message. For scheduled events, the
status is Completed. Review the dsmerror.log file (and dsmsched.log for scheduled
events) to determine what warning messages were issued and to assess their impact on
the operation.
12 The operation completed with at least one error message (except for error messages for
skipped files). For scheduled events, the status is Failed. Review the dsmerror.log
file (and dsmsched.log for scheduled events) to determine what error messages were
issued and to assess their impact on the operation. Generally, this return code means
that the error was severe enough to prevent the successful completion of the operation.
For example, an error that prevents an entire drive from being processed yields return
code 12.
The return code for a client macro is the highest return code that is issued among the individual
commands that comprise the macro. For example, suppose a macro consists of these commands:
If the first command completes with return code 0, and the second command completes with return code
8, and the third command completed with return code 4, the return code for the macro is 8.
For more information about the QUERY EVENT command, see the IBM Spectrum Protect server
documentation.
254 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 9. Storage management policies
Storage management policies are rules your administrator defines in order to manage your backups and
archives on the server.
Your data is associated (or bound) to these policies; then when the data is backed up or archived, it is
managed according to policy criteria. Policy criteria include a policy domain, a policy set, a management
class, and a copy group.
Policies determine:
• Whether a file is eligible for backup or archive services.
• How many backup versions to keep.
• How long to keep inactive backup versions and archive copies.
• Where to place the copies in storage.
• For incremental backup, policies also determine:
– How frequently a file can be backed up.
– Whether a file must change before it is backed up again.
This topic explains:
• Policy criteria (policy domains, policy sets, copy groups, and management classes).
• How to display policies.
• How your data is associated with policies.
256 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
IBM Spectrum Protect also provides a backup retention grace period and an archive retention grace period
to help protect your backup and archive data when it is unable to rebind a file to an appropriate
management class.
258 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Dynamic. A file or directory is backed up or archived on the first attempt regardless of whether it
changes during a backup or archive.
• Shared dynamic. A file or directory is backed up or archived regardless of whether it changes during a
backup or archive. The client attempts to back up or archive as many as four additional times. The
number of attempts depend on the value that was specified on the changingretries option in your
options file, without the file changing during the attempt. The file is backed up or archived on the last try
even if it has changed.
If you select a management class that permits a file to be backed up or archived while it is in use, the
backup version or archived copy that is stored on the server might be a fuzzy copy. A fuzzy copy is a
backup version or archived copy that does not accurately reflect what is currently in the file. It might
contain some, but not all, of the changes. If that is not acceptable, select a management class that
creates a backup version or archive copy only if the file does not change during a backup or archive.
When you use static serialization, applications cannot open a file for write access while the file is being
backed up.
If you restore or retrieve a file that contains a fuzzy copy, the file might not be usable. Do not use
dynamic or shared dynamic serialization to back up files unless you are certain that a fuzzy copy that is
restored is usable.
Important: Be careful when you select a management class containing a copy group that specifies
shared dynamic or serialization dynamic backup.
Related concepts
“Open file support for backup operations” on page 123
The VSS snapshot provider is used for open file support.
Related tasks
“Configuring Open File Support” on page 72
You configure Open File Support (OFS) after you install the Window client.
Related reference
“Snapshotproviderimage” on page 507
Use the snapshotproviderimage option to enable snapshot-based image backup, and to specify a
snapshot provider.
260 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• Does the backup copy group specify an adequate number of backup versions to keep, along with an
adequate length of time to keep them?
• Does the archive copy group specify an adequate length of time to keep archived copies of files?
Related concepts
“Copy serialization attribute” on page 258
The copy serialization attribute determines whether a file can be in use during a backup or archive,
and what to do if it is.
To specify a management class named managall to use for all files to which you do not explicitly assign
a management class, enter the following:
exclude ?:\...\*.sno
include c:\winter\...\*.ice mcweekly
include c:\winter\december\*.ice mcdaily
include c:\winter\january\*.ice mcmonthly
include c:\winter\february\white.sno
262 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If the backup copy group for the management class specifies keeping multiple backup versions of the file,
and you request multiple backups, the server always has one active backup version (the current version)
and one or more inactive backup versions of the file. All backup versions of a file are bound to the same
management class and are managed based on the attributes in the backup copy group.
When you archive a file for the first time, IBM Spectrum Protect binds it to the default management class,
to the management class specified in your include-exclude list, or to a management class you specify
when modifying your archive options during an archive.
Archived files are never rebound to a different management class. If you change the management class
for a file using an include.archive statement, the archmc option, or through the backup-archive
client GUI, any previous copies of the file that you archived remain bound to the management class
specified when you archived them.
If a file is deleted on the client system then that inactive objects of the file are not rebound.
For information about how to associate files and directories with management classes, see the IBM
Spectrum Protect server documentation.
Ten days later, the user issues the set event -type=hold command for the create.file file, so the
file cannot be deleted. On the same day the user issues the set event -type=activate for the
event.file file. At this time, create.file has 50 days left on its retention period, and event.file
has 60 days. If no other action is taken, create.file remains on the server forever, and event.file is
expired 70 days after it was created (60 days after its event occurred). However, if 20 days after the initial
archive, the user issues set event -type=release for the create.file file. Thirty days of its retention
period have passed, so the file is expired in 30 days (the hold does not extend the retention period).
For information about the RETINIT copy group value, see the IBM Spectrum Protect server
documentation.
Related reference
“Set Event” on page 729
Using the set event command, you can specify the circumstances for when archived data is deleted.
264 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 10. IBM Spectrum Protect Client Service
Configuration Utility
The following client services can be installed when you install the backup-archive client, or when you use
the IBM Spectrum Protect Client Service Configuration Utility after the backup-archive client is installed:
• Backup-Archive Scheduler Service
• Client Acceptor Service
• Remote Client Agent Service
• Journal Engine Service
For more information about using the IBM Spectrum Protect Client Service Configuration Utility to install
client services, see the related information about using the dsmcutil command.
Related concepts
“dsmcutil command” on page 269
The IBM Spectrum Protect Client Service Configuration Utility, dsmcutil, can be used to install backup-
archive client services on local and remote Windows workstations.
Procedure
1. On the server:
a) Define a schedule for the policy domain to which the backup-archive client is registered.
b) Associate the backup-archive client node to the defined schedule.
2. On the backup-archive client:
a) Install the scheduler as a Windows service for the backup-archive client.
b) Start the scheduler service installed for the backup-archive client.
Procedure
• On the server:
a) Enter the following command on the server console or from an administrative client to define the
schedule: def sched bacliwnt wnt_daily_incr desc="Daily Incremental Backup"
priority=2 starttime=21:00 duration=15 durunits=minutes period=1
perunits=days dayofweek=any
The administrative client does not have to be running on the same system as the IBM Spectrum
Protect server.
The following message is displayed:
b) To associate the backup-archive client to this schedule, issue the following command: define
association bacliwnt wnt_daily_incr mars.
The following message is displayed:
A schedule that performs an incremental backup is defined on the IBM Spectrum Protect server.
The schedule starts around 9:00 PM. The schedule is re-executed once a day and can start on any
day of the week. If you want to confirm that the schedule and association are set correctly, you can
use the Query Schedule command.
• On the backup-archive client:
This example assumes that you installed the backup-archive client in the c:\program files
\tivoli\tsm\baclient directory. It also assumes that the options files in each of these directories
are updated so that the communication parameters point to the IBM Spectrum Protect server.
a) Log in using an account with administrative privileges.
b) Open a command prompt window and issue the following command: cd /d "c:\program
files\tivoli\tsm\baclient"
If the path contains a space, for example c:\program files\tivoli\tsm\baclient, enclose
the name in double quotation marks.
c) In the window, issue the following command: dsmcutil inst scheduler /name:"TSM
Client Scheduler" /node:mars /password:marspswd /clientdir:"c:\program
files\tivoli\tsm\baclient" /optfile:"c:\program files\tivoli\tsm\baclient
\dsm.opt" /autostart:yes
Your system is now ready to run automatic daily incremental backups. The /autostart:yes option
specifies that the scheduler service starts automatically each time the system is rebooted. You can
266 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
use the /startnow:[Yes|No] option to specify whether to start the scheduler service after the
command is executed; the default is Yes.
If you specify /startnow:No you must start the service manually using the Services Control Panel,
or issue the following command: net start "TSM Client Scheduler"
d) The scheduler uses the backup-archive client options file to validate the node and password, and to
contact the server for schedule information. This example assumes that the dsm.opt file is
updated so that the communication parameters point to the IBM Spectrum Protect server.
If you see the following message:
Ensure that the options file contains entries that point to the correct IBM Spectrum Protect server.
Also, ensure that the server is running.
Use the dsmcutil update command to correct one of the parameters that was incorrectly
specified with the dsmcutil install command. For example, to update the client directory and
options file for the specified scheduler service, enter: dsmcutil update scheduler /
name:"TSM Central Scheduler Service" /clientdir:"c:\program files\tivoli
\tsm\baclient" /optfile:"c:\program files\tivoli\tsm\baclient\dsm.opt"
Then, reissue the net start "TSM Client Scheduler" command.
Results
Note:
• If any changes that affect the scheduler service are made to the backup-archive client options file, the
scheduler service must be restarted. If you are using client acceptor-managed scheduling, the restart is
not necessary since the scheduler is restarted by the client acceptor for each backup and the changes
are picked up.
For example, the IBM Spectrum Protect server address or the schedule mode was changed in the
options file. You can stop and restart the scheduler service by issuing the following commands: net
stop "TSM Client Scheduler" and then net start "TSM Client Scheduler".
• The dsmsched.log file contains status information for the IBM Spectrum Protect scheduler service. In
this example, the file is located in this path: c:\program files\tivoli\tsm\baclient
\dsmsched.log. You can override this file name by specifying the schedlogname option in the
options file, dsm.opt.
• Output from scheduled commands is sent to the log file. After scheduled work is performed, check the
log to ensure that the work is completed successfully. When a scheduled command is processed, the
schedule log might contain the following entry: Scheduled event eventname completed
successfully.
This entry is merely an indication that the scheduled command that is associated with the eventname
was successfully issued. No attempt is made to determine the success or failure of the command. You
can assess the success or failure of the command by evaluating the return code from the scheduled
command in the schedule log. The schedule log entry for the return code of the command is prefaced
with the following text: Finished command. Return code is:
Related tasks
“Dsmcutil valid options” on page 279
This section lists the valid dsmcutil options that you can specify to use the scheduler service.
Related reference
“Query Schedule” on page 675
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 267
The query schedule command displays the events that are scheduled for your node. Your
administrator can set up schedules to perform automatic backups and archives for you. To plan your
work, use this command to determine when the next scheduled events occur.
Procedure
1. Stop the scheduler service and the client acceptor as follows:
a) Run the following command: dsmcutil stop /name:"tsm central scheduler service"
b) Then, run the following command: dsmcutil stop /name:"tsm client acceptor"
2. Set the managedservices option to schedule in the client options file (dsm.opt).
3. Update the scheduler service so that it does not start automatically after a reboot: dsmcutil
update /name:"tsm central scheduler service" /autostart:no
4. Associate the scheduler service with the client acceptor: dsmcutil update cad /name:"tsm
client acceptor" /cadschedname:"tsm central scheduler service" /
autostart:yes
If this command is successful, the dsmwebcl.log file includes this message: Command will be
executed in 1 minute. After 1 minute, the client acceptor starts the scheduler and you see
information about the next scheduled event in the dsmwebcl.log file.
Related concepts
“Dsmcutil commands: Required options and examples” on page 269
Reference information for the dsmcutil commands and examples are provided.
Related tasks
“Dsmcutil valid options” on page 279
This section lists the valid dsmcutil options that you can specify to use the scheduler service.
Creating a new scheduler and associating a client acceptor to manage the scheduler
Use step-by-step instructions to create a new scheduler and associate a client acceptor to manage the
scheduler.
Procedure
Complete the following steps to create a new scheduler and associate a client acceptor:
1. Set the managedservices option to schedule in the client options file (dsm.opt).
2. Create the scheduler service:
dsmcutil install scheduler /name:"NEW_SCHEDULE_NAME" /node:yournode /
password:xxxxx /startnow:no
Do not use the /autostart:yes option when you install a scheduler that is managed by the client
acceptor.
3. Create the client acceptor service. The default name, tsm client acceptor, is used:
dsmcutil install cad /node:yournode /password:xxxxx /autostart:yes /
startnow:no
4. Associate the scheduler with the client acceptor:
268 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
dsmcutil update cad /name:"tsm client acceptor" /
cadschedname:"NEW_SCHEDULE_NAME"
5. Start the client acceptor:
dsmcutil start /name:"tsm client acceptor"
Results
The client acceptor and scheduler start as described. Since the client acceptor is controlling the
scheduler, you do not see the scheduler running as a service, either through the Services applet or the
NET START command. To stop the scheduler, you must stop the client acceptor service.
dsmcutil command
The IBM Spectrum Protect Client Service Configuration Utility, dsmcutil, can be used to install backup-
archive client services on local and remote Windows workstations.
You can use the dsmcutil command to install the following client services:
• Backup-Archive Scheduler Service
• Client Acceptor Service
• Remote Client Agent Service
• Journal Engine Service
The Client Service Configuration Utility must be run from an account that belongs to the Administrator/
Domain Administrator group. The syntax for the command is as shown in the following text:
SCHEDuler
CAD
JOURnal
REMOTEagent
Note: Options that you specify with dsmcutil commands override option that you specify in your options
file (dsm.opt).
The account that runs the utility must have the appropriate user rights for installing services and updating
the Windows Registry on the target workstation.
If a remote workstation is specified, the account must be authorized to connect to the Windows Registry
of the specified workstation.
Note: For the commands and options that are documented here, the minimum abbreviation that you can
type is shown in uppercase letters.
Related concepts
“Configure the IBM Spectrum Protect client” on page 19
After installing the backup-archive client, you must configure it before performing any operations.
INSTall Scheduler
Installs and configures the IBM Spectrum Protect Scheduler Service.
These are the required INSTall command options:
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 269
• /name:service_name
• /password:password
• /clusternode:Yes | No (required if running the Microsoft Cluster Server (MSCS) or Veritas Cluster
Server (VCS)).
• /clustername:cluster_name (required if running the MSCS or VCS).
Restriction: Do not specify a clustername of more than 64 characters. If you specify more than 64
characters and you are using Veritas Storage Foundation with High Availability or a Microsoft Cluster
Server configuration, you might not be able to install or start the scheduler service.
The /clientdir:client_dir option can also be used, the default is the current directory.
The following files must exist in the directory specified by client_dir:
• dsmcsvc.exe
• dscenu.txt
• dsm.opt
• dsmntapi.dll
• tsmutil1.dll
Note: If the service is being installed on a remote workstation, the fully qualified client directory path
should be relative to the target workstation. UNC names are not allowed for the local system account.
Multiple services can be installed on the same workstation.
Tip: In the commands that are provided in the following examples, the default location of the client
installation program (c:\program files\tivoli\tsm\baclient) is used. If you installed the client
to a different location, replace the default path with your custom installation path. If the path contains a
space, enclose the path in double quotation marks (for example, "c:\program files\tivoli\tsm
\baclient").
Task
Install a scheduler service that is named TSM Central Scheduler Service on the local
workstation. Start the service automatically at system boot time. All required files must reside in the
current directory and the client options file must point to the IBM Spectrum Protect server where
node ALPHA1 is defined with password nodepw. The server is contacted to verify that the specified
node and password are valid. When the password is validated it is generated (encrypted) into the
password store:
Command:
Task
Install a scheduler service named TSM Central Scheduler Service on remote workstation PDC.
Start the service automatically at system boot time. The required scheduler service files and the
specified options file must reside on the remote workstation in the c:\program files\tivoli
\tsm\baclient directory. The password is encrypted into the password store. The IBM Spectrum
Protect server is not contacted to validate the password.
Command:
Task
Install a scheduler service named TSM Central Scheduler Service on remote workstation PDC.
Start the service automatically at system boot time. The required scheduler service files and the
specified options file must reside on the remote workstation in the c:\program files\tivoli
270 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
\tsm\baclient directory. The password is encrypted into the password store. The IBM Spectrum
Protect server residing at the specified TCP/IP host and port is contacted to validate the password.
Command:
Task
Install the TSM Central Scheduler Service on one node of a MSCS (or VCS) cluster. For group-a
from workstation node-1, ensure that node-1 currently owns group-a and then issue the following
command.
Command:
INSTall CAD
Installs and configures the Client Acceptor Service. Required options are:
• /name:service_name
• /node:node_name
• /password:password
• /httpport:http_port
Other valid options are:
• /optfile:options_file
• /webports:web_ports
Task
Install a Client Acceptor Service called TSM CAD. The client acceptor uses a node called test to
connect to the IBM Spectrum Protect server. Use the options file c:\program files\tivoli\tsm
\baclient\dsm.opt to connect to the server.
Command:
INSTall Journal
Installs a journaling engine service on all Windows clients. A journal database is created that stores
information the client uses to determine which files are eligible for backup before an operation starts.
If necessary, you can use the nojournal option with the incremental command to specify that you
want to perform a traditional full incremental backup.
The journaling engine service is named TSM Journal Service and uses the configuration file
tsmjbbd.ini from the backup-archive client installation directory.
Note: The Journal Service is supported in a Microsoft Cluster Server environment. Multiple journal
services can be installed by specifying unique pipe names using the JournalPipe journal config setting and
client options.
There are no valid options for this command.
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 271
Task
Install the journal engine service (TSM Journal Service).
Command:
INSTall REMOTEAgent
Installs and configures a Remote Client Agent Service. Required options are:
• /name:service_name
• /node:node_name
• /password:password
• /partnername:partner_service_name
Other valid options are:
• /optfile:options_file
Task
Install a Remote Client Agent Service called TSM AGENT. The remote client agent uses a node called
test to connect to the IBM Spectrum Protect server. The options file c:\program files\tivoli
\tsm\baclient\dsm.opt is used to connect to. The partner client acceptor service is TSM CAD.
Command:
Note: Both the Remote Client Agent Service and the Client Acceptor Service must be installed to run the
web client. The Client Acceptor Service must be installed before the Remote Client Agent Service. Use
the /partnername: option to specify the name of the partner Client Acceptor Service.
REMove
Remove an installed Client Service. The required option is /name:service_name.
Task
Remove the specified scheduler service from the local workstation.
Command:
Task
Remove the journaling engine service (TSM Journal Service) from the local workstation.
Command:
UPDate
Updates Scheduler Service registry values. The required option for this command is /
name:service_name, and the registry values to update. Other valid options are:
• /clientdir:client_dir
• /optfile::options_file
• /eventlogging:Yes | No
• /node:node_name
272 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• /autostart:Yes | No
• /clusternode:Yes | No (required if running the MSCS or VCS).
• /clustername:cluster_name (required if running the MSCS or VCS).
Task
Update the client directory and options file for the specified scheduler service. All required client
service files must reside in the specified directory.
Note: The communication options specified with the dsmcutil command here take precedence over
those specified in the client options file.
Command:
Task
Update the specified scheduler service to use the TCP/IP protocol to connect to the IBM Spectrum
Protect server at the specified host name on the specified port.
Command:
UPDate CAD
Updates Client Acceptor Service registry values. The required option for this command is /
name:service_name, and the registry values to update. Other valid options are:
• /node:node_name
• /password:password
• /optfile:options_file
• /httpport:http_port
• /webports:web_ports
• /cadschedname:scheduler_name
Task
Update the Client Acceptor Service to use the specified client password and options file. All required
client service files must reside in the specified directory.
Command:
UPDate REMOTEAgent
Updates Remote Client Agent Service registry values. The required option for this command is /
name:service_name, and the registry values to update. Other valid options are:
• /node:node_name
• /password:password
• /optfile:options_file
• /partnername:partner_service_name
Task
Update a Remote Client Agent Service called TSM AGENT. The remote client agent service uses a
node called test to connect to the IBM Spectrum Protect server. The options file c:\program files
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 273
\tivoli\tsm\baclient\dsm.opt is used to connect to the server. The partner client acceptor
service is TSM CAD.
Command:
Query Scheduler
Query Scheduler Service registry values. Required options are: /name:service_name. Other valid options
are:
• /machine:machine_name
• /clientdir
• /optfile
• /eventlogging
• /node
• /commmethod
• /commport
• /commserver
• /errorlog
• /schedlog
Note: Do not specify a value for the non-required options. The client returns option registry values for the
scheduler service you specify.
Task
Query registry settings for the scheduler service you specify.
Command:
Task
Query the client directory registry setting for the scheduler service you specify.
Command:
Query CAD
Queries Client Acceptor Service registry values. The required option for this command is /
name:service_name. Other valid options are:
• /machine:machine_name
• /node
• /optfile
• /httpport
• /webports
• /clientdir
• /partnername
Note: Do not specify a value for these options.
274 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Query registry settings for the Client Acceptor Service you specify.
Command:
Query Journal
Query the journaling engine service, TSM Journal Service, on a Windows system. There are no valid
options for this command.
Task
Query the journaling engine service, TSM Journal Service.
Command:
Query REMOTEAgent
Queries Remote Client Agent Service registry values. The required option for this command is /
name:service_name. Other valid options are:
• /machine:machine_name
• /node
• /optfile
• /partnername
• /clientdir
Note: Do not specify a value for these options.
Task
Query registry settings for the specified Remote Client Agent Service.
Command:
List
Lists installed Client Services. There are no required options.
Task
Locate and list the installed backup-archive client services on the local workstation.
Command:
dsmcutil list
Task
List the installed backup-archive client services on remote workstation PDC.
Command:
START
Use the Start command to start a client service. The Start command requires the /
name:service_name option.
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 275
Task
Start the journaling engine service, TSM Journal Service.
Command:
STOP
Use the Stop command to stop a client service. The Stop command requires the /name:service_name
option.
Task
Stop the journaling engine service, TSM Journal Service.
Command:
UPDATEPW
Generate an encrypted IBM Spectrum Protect password. The UPDATEPW command requires the /
node:node_name, /password:password, and /commserver:server_name options. If the
clusternode option is set to YES, the /optfile: parameter is also required.
Optionally, you can use the following options:
• /validate:Yes | No
• /clusternode:Yes | No (required if running the MSCS or VCS).
• /clustername:cluster_name (required if running the MSCS or VCS).
• /force:Yes | No
• /optfile: (for non-cluster operations)
• /commmethod:
• /commport:
The password is validated with the IBM Spectrum Protect server if /validate:Yes is specified. The
password is updated on the server if you specify /updateonserver:Yes. If you specify this option, you
must specify the current password with the /oldpassword: option.
Task
Update the encrypted password for the specified node. Validate and update the password on the
specified IBM Spectrum Protect server which resides on the specified TCP/IP hostname and port:
Command:
ADDACE
Grants access to the IBM Spectrum Protect backup-archive client password and the client SSL certificates
for non-administrators.
Beginning with IBM Spectrum Protect Version 8.1.2, stricter access control is enforced for the IBM
Spectrum Protect password storage on Windows operating systems. By default, only the Administrator,
SYSTEM, or LocalSystem account has access to the password store and SSL certificates.
You can use the addace command to modify the access control list to allow additional users, such as
non-administrative users, or processes such as the IBM Spectrum Protect Data Protection client
processes to access the password store and SSL certificates.
276 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The following options are required:
• -entity:user | group
• -object:ALL | NODENAME | path\TSM.* | path\spclient.*
Where:
user | group
The Windows user or user group that is given read/write access to the password store.
ALL
Grants access to all password files and SSL certificates in the subdirectories of the C:\ProgramData
\Tivoli\TSM\baclient directory.
NODENAME
Grants access to all password files and SSL certificates that are found in the subdirectories of the
C:\ProgramData\Tivoli\TSM\baclient\Nodes\nodename directory.
path\TSM.* | path\spclient.*
For cluster passwords that can exist on a shared resource directory, grants access to the password
files or certificate files in a specific directory for a node.
For more information about the secure password locations on Windows, see “Secure password storage”
on page 100.
Tip: The dsmcutil deleteace command revokes access to password files and SSL certificates.
Task
After you installed and configured the backup-archive client as Administrator, you need to give Susan,
a non-administrative user on your Windows system, access to the password files and SSL certificates
on the client node Alpha1.
Command:
Task
A non-administrative user of IBM Spectrum Protect for Databases: Data Protection for Microsoft SQL
Server configured the IBM Spectrum Protect passwords but the administrator also needs access to
the passwords. The Data Protection for Microsoft SQL Server user grants access to the password files
to the administrator by issuing the following command:
Command:
Task
During a cluster configuration, the Windows administrator needs to give the cluster node
clusnode_A access to the client SSL certificates.
Command:
DELETEACE
Revokes access to the IBM Spectrum Protect backup-archive client password and the client SSL
certificates for non-administrators.
You can use the deleteace command to modify the access control list to remove access to the
password store and client certificates for users, such as non-administrative users or processes such as
the IBM Spectrum Protect Data Protection client processes.
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 277
The following options are required:
• -entity:user | group
• -object:ALL | NODENAME | path\TSM.* | path\spclient.*
Where:
user | group
The Windows user or user group for which access to the password store and client certificates is
removed.
ALL
Removes access to all password files and SSL certificates in the subdirectories of the
C:\ProgramData\Tivoli\TSM\baclient directory.
NODENAME
Removes access to all password files and SSL certificates that are found in the subdirectories of the
C:\ProgramData\Tivoli\TSM\baclient\Nodes\nodename directory.
path\TSM.* | path\spclient.*
For cluster passwords that can exist on a shared resource directory, removes access to the password
files or certificate files in a specific directory for a node.
For more information about the secure password locations on Windows, see “Secure password storage”
on page 100.
Tip: The dsmcutil addace command grants access to password files and SSL certificates.
Task
Susan, a non-administrative user, left the company two days ago and the administrator must revoke
access to the password files and SSL certificates on the client node Alpha1.
Command:
Task
Cluster node clusnode_Z is moved out of the cluster configuration and no longer needs to access to
the client SSL certificates. Issue the following command to remove access for clusnode_Z.
Command:
278 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The incremental command backs up all new or changed data in the locations that you specify, unless
you exclude them from backup services.
haclus -display
Restriction: Do not specify a clustername of more than 64 characters. If you specify more than 64
characters and you are using Veritas Storage Foundation with High Availability or a Microsoft Cluster
Server configuration, you might not be able to install or start the IBM Spectrum Protect scheduler
service.
This option must be used with the /clusternode:Yes option. This option must be specified when using
the INSTALL command in a cluster environment. It must also be specified when using the UPDATE
command to modify the cluster settings (/clusternode and /clustername).
This option can also be specified when using the UPDATEPW command in a cluster environment.
Normally this is not required. However, if more than one scheduler service with different cluster
settings are defined for a particular node, the utility cannot determine which settings are correct. In
this case, correct the discrepancies between the services.
Alternatively, you can specify this option with /clusternode:Yes and /force:Yes, to force the utility to
show or update the password with the specified cluster settings.
This option is not required if /clusternode:No is specified.
/clusternode:Yes|No
Specifies whether to enable support for cluster resources. The default value is No. You must be
running the MSCS or VCS to specify /clusternode:Yes. This option must be specified when using the
INSTALL command in a cluster environment. This option must also be specified when using the
UPDATE command to modify the cluster settings (/clusternode, /clustername).
This option can also be specified when using the UPDATEPW command in a cluster environment.
Normally this is not required. However, if more than one scheduler service with different cluster
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 279
settings are defined for a particular node, the utility cannot determine which settings are correct. In
this case, correct the discrepancies between the services.
Alternatively, you can specify this option with /clustername and /force:Yes, to force the utility to show
or update the password with the specified cluster settings. If /clusternode:No is specified, /
clustername is not required.
/commmethod:protocol
Specifies client communications protocol to communicate with the IBM Spectrum Protect server.
Valid protocols are: TCP/IP and Named Pipes. If you do not specify a value, the value is obtained from
the client options file or set to the default client value. You can also use this option with the
UPDATEPW command to specify a communication protocol to connect to a server when updating
passwords.
/commport:serverport
Specifies the protocol specific IBM Spectrum Protect server port. For TCP/IP, this is the port on the
specified hostname. If this option is not specified, the value is obtained from the client options file or
set to the default client value. You can also use this option with the UPDATEPW command to specify a
protocol specific server port to connect to for updating passwords.
/commserver:servername
Specifies the protocol specific IBM Spectrum Protect server name. Depending on the protocol used,
this can be a TCP/IP hostname or a Named Pipes name. If not specified, the value is obtained from
the client options file or set to the default client value.
This option can also be used with the UPDATEPW command to specify a protocol specific server name
to connect to for updating passwords.
Beginning with IBM Spectrum Protect server version 8.1.2, when /validate:No is specified, /
commserver:servername must also be specified. The servername must match the server name
reported by the IBM Spectrum Protect server command QUERY STATUS. For more information on the
QUERY STATUS command, see QUERY STATUS (Query system parameters).
/copyfiles
Specifies that the service installation is copied to another location prior to installing the service. Use
the /srcdir option to specify the fully qualified source path.
/errorlog:errorlog
Specifies the fully qualified name of the client error log.
/eventlogging:[Yes|No]
Turns detailed event logging on or off for the specified scheduler service. The default is Yes.
/force:[Yes|No]
This option can also be specified when using the UPDATEPW command in a cluster environment.
Normally this is not required. However, if more than one scheduler service with different cluster
settings is defined for a particular node, the utility cannot determine which settings are correct. In this
case, correct the discrepancies between the services.
Alternatively, you can specify this option with /clusternode and /clustername (if /clusternode:Yes is
specified), to force the utility to show or update the password with the specified cluster settings.
/httpport:httpport
Specifies a TCP/IP port address for the web client.
/machine:machinename
Specifies the name of a remote workstation to connect to.
/name:servicename
Specifies the name of the Client service. The name must be quote delimited if it contains embedded
spaces.
/node:nodename
Specifies the IBM Spectrum Protect node name the Client Service uses when connecting to the IBM
Spectrum Protect server. Also used when displaying or updating the IBM Spectrum Protect password.
The default is the workstation name.
280 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
/ntaccount:ntaccount
Specifies the Windows account which the service logs in as.
/ntdomain:ntdomain
Specifies the Windows domain which the service logs in as.
/ntpassword:ntpassword
Specifies the Windows password for the account under which the service logs in.
/oldpassword:oldpw
Current® IBM Spectrum Protect server password. Used in conjunction with the /updateonserver
option when updating a password on the server.
/optfile:optionsfile
The fully qualified path of the client options file. This is the options file the specified Client Service
uses to connect to the IBM Spectrum Protect server. The utility also uses the file to connect to the
IBM Spectrum Protect server to validate and update passwords. Note that although this option
overrides the default option file in the current directory (dsm.opt), the IBM Spectrum Protect API
requires that a default option file exists in the current directory. UNC names are not allowed if the
local system account is set to logon. The default is the dsm.opt file in the /clientdir directory.
/partnername:partner service name
This option is used when installing a Remote Client Agent Service to specify the partner Client
Acceptor Service.
/password:password
The IBM Spectrum Protect password which is generated and encrypted.
/schedlog:schedlog
Specifies the fully qualified name of the client schedule log.
/srcdir:pathname
Use this option in conjunction with the /copyfiles option to specify the fully qualified source path to
copy the service installation to another location prior to installing the service.
/startnow:[Yes|No]
Specifies whether dsmcutil starts the specified service after executing the command; the default is
Yes. If you specify No, you must start the service manually using the services control panel applet, or
the NET START name of the service.
/updateonserver:[Yes|No]
Specifies whether the specified password is updated on the IBM Spectrum Protect server. Requires
using the /oldpassword option.
/validate:[Yes|No]
Specifies whether to verify that the node name and password can successfully log in to the IBM
Spectrum Protect server. The default is Yes.
Beginning with IBM Spectrum Protect server version 8.1.2, when /validate:No is specified, /
commserver:servername must also be specified. The servername must match the server name
reported by the IBM Spectrum Protect server command QUERY STATUS. For more information on the
QUERY STATUS command, see QUERY STATUS (Query system parameters)..
/webports: webports
Specifies the TCP/IP port number used by the Client Acceptor service and the web client agent service
for communications with the web GUI.
Chapter 10. IBM Spectrum Protect Client Service Configuration Utility 281
282 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Chapter 11. Processing options
You can use defaults for processing client options or you can tailor the processing options to meet your
specific needs. Read about an overview of processing options and explore the options reference that
provides detailed information about each option.
Related concepts
“Using options with commands” on page 301
You can override some of the options in your client options file (dsm.opt) file by entering them with
appropriate backup-archive client commands.
Related reference
“Reading syntax diagrams” on page xxii
To read a syntax diagram for entering a command, follow the path of the line. Read from left to right and
from top to bottom.
Communication options
You use communication options to specify how your client node communicates with the IBM Spectrum
Protect server. This topic provides information about the types of communication options you can use.
• TCP/IP
For all Windows clients, use one of the following protocols:
• TCP/IP
• Named pipes
• Shared memory
Use the commmethod option to specify the communication protocol.
Ask your IBM Spectrum Protect administrator for assistance in setting your communication options.
Related reference
“Commmethod” on page 333
The commmethod option specifies the communication method you use to provide connectivity for client-
server communication.
TCP/IP options
To use the TCP/IP communication protocol, you must include the tcpserveraddress option in your
client options file.
The other TCP/IP options have default values that you can modify if you want to change the default value.
This topic provides information about the types of communication options you can use.
284 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 37. TCP/IP options (continued)
Option Description
tcpserveraddress Specifies the TCP/IP address for an IBM Spectrum Protect server.
“Tcpserveraddress” on page 531
tcpwindowsize Specifies the size, in kilobytes, of the TCP/IP sliding window for your
“Tcpwindowsize” on page 532 client node.
webports “Webports” on page Enables the use of the web client outside a firewall by specifying the
595 TCP/IP port number used by the client acceptor service and the web
client agent service for communications with the web GUI.
286 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 40. Backup and archive processing options (continued)
Option Description
288 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 40. Backup and archive processing options (continued)
Option Description
Specifies the location of the Tivoli Storage
fbreposlocation
Manager FastBack repository for the IBM
“Fbreposlocation” on page 389
Spectrum Protect client proxy to connect to
issue MOUNT DUMP, MOUNT ADD, and MOUNT
DEL commands.
Specifies host name of the FastBack server
fbserver
workstation or the FastBack Disaster
“Fbserver” on page 391
Recovery Hub workstation that owns the
repository that is specified by the
fbreposlocation option.
Specifies the name of one or more Tivoli
fbvolumename
Storage Manager FastBack volumes to back
“Fbvolumename” on page 392
up from the backup proxy.
Specifies a list of files to be processed for the
filelist
command. The client opens the designated
“Filelist” on page 393
file list and processes the files that are listed
within according to the command.
Backs up, restores, retrieves, or queries files
filesonly
only.
“Filesonly” on page 396
“Include options” on page 407 Use these options to include files or assign
management classes for backup processing.
include
include.backup
include.file
290 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 40. Backup and archive processing options (continued)
Option Description
Use the mode option with these commands,
mode
as follows:
“Mode” on page 439
backup image
To specify whether to perform a selective
or incremental image backup of client file
systems.
backup nas
To specify whether to perform a full or
differential image backup of NAS file
systems.
backup group
To specify whether to perform a full or
differential group backup that contains a
list of files from one or more file space
origins.
backup vm
To specify whether to perform a full or
incremental backup of a VMware virtual
machine when vmbackuptype=fullvm,
and when you have installed IBM
Spectrum Protect for Virtual
Environments.
292 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 40. Backup and archive processing options (continued)
Option Description
Specifies whether you want the client to wait
tapeprompt
for a tape mount if it is required for a backup,
“Tapeprompt” on page 525
archive, restore, or retrieve process, or to be
prompted for a choice.
Use the toc option with the backup nas
toc
command or the include.fs.nas option to
“Toc” on page 534
specify whether the client saves Table of
Contents (TOC) information for each file
system backup. If you save TOC information,
you can use the QUERY TOC server command
to determine the contents of a file system
backup with the RESTORE NODE server
command to restore individual files or
directory trees. You can also use the web
client to examine the entire file system tree
and select files and directories to restore.
Use the type option with the query node
type
command to specify the type of node to
“Type” on page 537
query.
Use the v2archive option with the
v2archive
archive command to archive only files to
“V2archive” on page 540
the server. The client does not process
directories that exist in the path of the source
file specification.
Use this option with the backup group
virtualfsname
command to specify the name of the
“Virtualfsname” on page 542
container for the group on which you want to
(does not apply to Mac OS X)
perform the operation.
Used with the backup VM, restore VM, or
vmchost
query VM commands to specify the host
“Vmchost” on page 548
name of the VMware VirtualCenter or ESX
server where the commands are directed.
Used with the backup VM, restore VM, or
vmcpw
query VM commands to specify the
“Vmcpw” on page 549
password of the VirtualCenter or ESX user
that is specified with the vmcuser option.
Used with the backup VM, restore VM, or
vmcuser
query VM commands to specify the user
“Vmcuser” on page 551
name for the VMware VirtualCenter or ESX
server where the commands are directed.
Used with the backup VM command to
vmmaxvirtualdisks
specify the maximum size of the VMware
“Vmmaxvirtualdisks” on page 569
virtual machine disks (VMDKs) to include in a
backup operation.
The following options are backup-archive client options that apply only to IBM Spectrum Protect HSM for
Windows migrated files.
• Restorecheckstubaccess
• Restoremigstate
• Skipmigrated
Related concepts
Options for backing up migrated files: skipmigrated, checkreparsecontent, stagingdirectory
Options for restoring migrated files: restorecheckstubaccess, restoremigstate
294 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 41. Restore and retrieve processing options (continued)
Option Description
fromdate “Fromdate” on page 398 Use the fromdate option with the fromtime option to
specify a date and time from which you want to search for
backups or archives during a restore, retrieve, or query
operation.
fromnode “Fromnode” on page 398 Permits one node to perform commands for another node.
A user on another node must use the set access
command to give you permission to query, restore, or
retrieve files or images for the other node.
fromtime “Fromtime” on page 399 Use the fromtime option with the fromdate option to
specify a beginning time from which you want to search for
backups or archives during a restore, retrieve, or query
operation.
ifnewer “Ifnewer” on page 403 Replaces an existing file with the latest backup version
only if the backup version is newer than the existing file.
imagetofile “Imagetofile” on page 405 Use the imagetofile option with the restore image
command to specify that you want to restore the source
image to a file. You might need to restore the image to a
file in the event of bad sectors present on the target
volume, or if you want to do some manipulations with the
image data.
inactive “Inactive” on page 405 Displays a list of active and inactive files when used with
the pick option.
latest “Latest” on page 432 Restores the most recent backup version of a file whether
it is active or inactive.
localbackupset “Localbackupset” on Specifies whether the backup-archive client GUI bypasses
page 433 initial logon with the server to restore a local backup set on
a stand-alone workstation.
monitor “Monitor” on page 441 Specifies whether you want to monitor an image restore of
one or more file systems that belong to a network-
attached storage (NAS) file server.
noprompt “Noprompt” on page 447 suppresses the confirmation prompt that is presented by
the delete group, delete archive, expire,
restore image, and set event commands.
optfile “Optfile” on page 451 Specifies the client options file you want to use when you
start a backup-archive client session.
pick “Pick” on page 454 Creates a list of backup versions, images, or archive copies
that match the file specification you enter. From the list,
you can select the versions to process. Include the
inactive option to view both active and inactive objects.
pitdate “Pitdate” on page 455 Use the pitdate option with the pittime option to
establish a point in time for which you want to display or
restore the latest version of your backups.
pittime “Pittime” on page 456 Use the pittime option with the pitdate option to
establish a point in time for which you want to display or
restore the latest version of your backups.
The following options are backup-archive client options that apply to IBM Spectrum Protect HSM for
Windows migrated files. For more information about these options, see the IBM Knowledge Center topics
at IBM Spectrum Protect HSM for Windows .
• Checkreparsecontent
• Restorecheckstubaccess
• Restoremigstate
• Skipmigrated
The following options are backup-archive client options that apply to IBM Spectrum Protect for Space
Management migrated files. For more information about these options, see the IBM Knowledge Center
topics at IBM Spectrum Protect for Space Management .
• Restoremigstate
• Skipmigrated
296 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Scheduling options
This topic discusses the options that you can use to regulate central scheduling. The backup-archive
client uses scheduling options only when the Scheduler is running.
Table 42 on page 297 lists the scheduling options that are available.
298 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 44. Command processing options
Option Description
quiet “Quiet” on page 468 Limits the number of messages that are displayed on your screen
during processing. This option can be overridden by the server.
scrolllines “Scrolllines” on Specifies the number of lines of information that are displayed on
page 490 your screen at one time. Use this option only when scrollprompt
is set to yes.
scrollprompt “Scrollprompt” on Specifies whether you want the backup-archive client to stop and
page 491 wait after displaying the number of lines of information you
specified with the scrolllines option, or scroll through and stop
at the end of the information list.
setwindowtitle Specifies whether to display the IBM Spectrum Protect server name
and host server name in the title of the administrative client
“Setwindowtitle” on page 493 command window.
verbose “Verbose” on page 541 Specifies that processing information should be displayed on your
screen. The alternative is quiet. This option can be overridden by
the server.
Authorization options
Authorization options control access to the IBM Spectrum Protect server.
Table 45 on page 299 lists the authorization options that are available.
password “Password” on page 451 Specifies the IBM Spectrum Protect password.
passwordaccess Specifies whether you want to use a generated password or be
“Passwordaccess” on page 453 prompted for a password each time you start the client.
revokeremoteaccess Restricts an administrator with client access privileges from
“Revokeremoteaccess” on page 480 accessing your workstation through the web client.
300 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Web client options
Several backup-archive client options are used to configure the IBM Spectrum Protect web client.
Table 48 on page 301 lists the web client options that are available.
Diagnostics options
Use the query systeminfo command to gather IBM Spectrum Protect system information and output
this information to a file or the console.
The query systeminfo command is intended primarily as a diagnostic aid. You can submit the
resulting information to technical support personnel for problem diagnosis.
Table 49 on page 301 lists the diagnostics options that are available.
Related reference
“Query Systeminfo” on page 676
Use the query systeminfo command to gather information and output this information to a file or the
console.
• For options that do not include parameters, enter a command, a dash (–), and the option name. For
example,
Note: Use a leading dash (-) to indicate that the following text is the name of an option. If an object
name begins with a dash, you must surround it in either single quotation marks (') or quotation marks
("). Most operating system command line processors strip the quotation marks before the command-
line arguments are submitted to the IBM Spectrum Protect client application. In such cases, by using
escape characters or doubling the quotation marks allows the client to receive the quoted object name.
In loop mode, surround such objects in either single quotation marks (') or quotation marks (").
• Enter either the option name, or an abbreviation for the option name. For example, to enter the latest
option, enter either -lat or -latest. The capital letters in the syntax of each option indicate the
minimum abbreviation for that option name.
• Enter options before or after command parameters. For example, you can enter the option before or
after a file specification:
• When you enter several options on a command, separate them with a blank space.
• Enclose the value in quotation marks (" ") if the option value that you enter contains a blank space. For
example:
• Most options that you enter on the command line override the value that is set in the preferences file.
However, when you use the domain option with the incremental command, it adds to the domain
specified in your client options file rather than overriding the current value.
• The maximum number of bytes for a file name and file path is 6255 combined. However, the file name
itself cannot exceed 255 bytes and the path that leads to the file cannot exceed 6000 bytes.
Furthermore, directory names (including the directory delimiter) within a path are limited to 255 bytes.
The Unicode representation of a character can occupy several bytes, so the maximum number of
characters that a file name might contain can vary.
Table 50 on page 303 lists client command options that you can enter only on the command line with
specific commands.
302 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 50. Client command options
Command option Description Commands
archmc “Archmc” on Use the archmc option with the archive command to archive
page 311 specify the available management class for your policy
domain to which you want to bind your archived files.
class “Class” on page Specifies whether to display a list of NAS objects or query backup
327 client objects when you use the following commands. delete filespace
query filespace
console “Console” on Use the console option with the query systeminfo query systeminfo
page 337 command to output system information to the console.
deletefiles Deletes the local copy of files from your workstation archive
“Deletefiles” on page 348 after they are archived on the server. Can also be used restore image
with the restore image command and the
incremental option to delete files from the restored
image that are deleted from the file space after the
image is created.
description Assigns or specifies a description for files when archive
“Description” on page archive, delete, retrieve, or query archive operations delete archive
349 are performed. query archive
query backupset
retrieve
detail “Detail” on page Displays management class, file space, backup, and delete filespace
350 archive information, depending on the command with query archive
which it is used. query backup
query filespace
query mgmtclass
fromdate “Fromdate” on Use the fromdate option with the fromtime option to delete backup
page 398 specify a date and time from which you want to search query archive
for backups or archives during a restore, retrieve, or query backup
query operation. restore
restore group
retrieve
fromnode “Fromnode” Permits one node to perform commands for another query archive
on page 398 node. A user on another node must use the set query backup
access command to permit you to query, restore, or query filespace
retrieve files or images for the other node. query group
query image
query mgmtclass
restore
restore group
restore image
retrieve
fromtime “Fromtime” on Specifies a beginning time on the specified date. Use query archive
page 399 with the fromdate option. This option is ignored if the query backup
fromdate option is absent. restore
restore group
retrieve
groupname Specifies the fully qualified name for a group. backup group
“Groupname” on page
400
ifnewer “Ifnewer” on Replaces existing files with the latest backup version restore
page 403 only if the backup version is newer than the existing restore backupset
version. restore group
retrieve
imagetofile Use the imagetofile option with the restore restore image
“Imagetofile” on page image command to specify that you want to restore
405 the source image to a file. You might need to restore
the image to a file in the event of bad sectors present
on the target volume, or if you want to do some
manipulations with the image data.
304 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 50. Client command options (continued)
Command option Description Commands
inactive “Inactive” on Displays a list of active and inactive files when used delete group
page 405 with the pick option. query backup
query group
query image
query nas
query systemstate
restore
restore group
restore image
restore nas
restore systemstate
mode “Mode” on page Use the mode option with these commands, as follows: backup group
439 backup image backup nas
To specify whether to perform a selective or backup image
incremental image backup of client file systems. restore nas
backup nas
To specify whether to perform a full or differential
image backup of NAS file systems.
backup group
To specify whether to perform a full or differential
group backup that contains a list of files from one
or more file space origins.
monitor “Monitor” on Specifies whether you want to monitor an image backup nas
page 441 backup or restore of one or more file systems that restore nas
belong to a network-attached storage (NAS) file server.
nojournal “Nojournal” Use this option with the incremental command to incremental
on page 447 specify that you want to perform the traditional full
incremental backup, instead of the default journal-
based backup.
noprompt “Noprompt” Suppresses the confirmation prompt that is presented delete archive
on page 447 by the delete group, delete archive, expire, delete backup
restore image, and set event commands. delete group
expire
restore image
optfile “Optfile” on Specifies the client options file you want to use when dsmc.exe
page 451 you start a backup-archive client session.
pitdate “Pitdate” on Use the pitdate option with the pittime option to query backup
page 455 establish a point in time for which you want to display query group
or restore the latest version of your backups. query image
query nas
query systemstate
restore
restore group
restore image
restore nas
restore systemstate
All query and restore
system object
commands
pittime “Pittime” on Use the pittime option with the pitdate option to query backup
page 456 establish a point in time for which you want to display query image
or restore the latest version of your backups. query nas
query systemstate
restore
restore image
restore nas
restore systemstate
All query and
restore system
object commands
306 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 50. Client command options (continued)
Command option Description Commands
todate “Todate” on page Use the todate option with the totime option to query archive
535 specify an ending date and time to which you want to query backup
search for backups or archives during a restore, restore
retrieve, or query operation. restore group
retrieve
totime “Totime” on Use the totime option with the todate option to query archive
page 536 specify an ending date and time to which you want to query backup
search for backups or archives during a restore, restore
retrieve, or query operation. restore group
retrieve
type “Type” on page 537 Use the type option with the query node command query node
to specify the type of node to query.
v2archive “V2archive” Use the v2archive option with the archive archive
on page 540 command to archive only files to the server. The client
will not process directories that exist in the path of the
source file specification.
verifyimage Use the verifyimage option with the restore restore image
“Verifyimage” on page image command to specify that you want to enable
542 detection of bad sectors on the destination target
volume. If bad sectors are detected on the target
volume, the client issues a warning message on the
console and in the error log. This option is valid for all
Windows clients.
virtualfsname Specifies the name of the virtual file space for the backup group
“Virtualfsname” on page group on which you want to run the operation.
542
Client options that can be set by the IBM Spectrum Protect server
Some client options can be set by the IBM Spectrum Protect server.
Table 52 on page 309 lists the options that can be set by the server.
308 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 52. Options that can be set by the IBM Spectrum Protect server
Options that can be set by the IBM Spectrum
Protect server
Note:
1. See IBM Spectrum Protect for Space Management product documentation on IBM Knowledge Center
at http://www.ibm.com/support/knowledgecenter/SSERBH/welcome.
2. See IBM Spectrum Protect for Mail: Data Protection for Microsoft Exchange Server product
documentation on IBM Knowledge Center at http://www.ibm.com/support/knowledgecenter/
SSERBW/welcome.
Related tasks
Controlling client operations through client option sets
Absolute
Use the absolute option with the incremental command to force a backup of all files and directories
that match the file specification or domain, even if the objects were not changed since the last
incremental backup.
This option overrides the management class copy group mode parameter for backup copy groups; it does
not affect the frequency parameter or any other backup copy group parameters. This option does not
override exclude statements, so objects that are excluded from backup are not eligible for backup even
when the absolute option is specified.
Important: Before you use the absolute option, consider the following effects that this option can have on
backup and IBM Spectrum Protect server operations:
• Backups consume more server storage and database resources.
• Backups consume more network bandwidth.
• Server operations, such as inventory expiration, storage pool backup, storage pool migration,
reclamation, and node replication, require more time to complete. Data deduplication might help
mitigate some of these effects, but it does not avoid the processing that is required to reconstitute the
deduplicated data back to its original form when the storage pool is migrated or backed up to non-
deduplicated storage.
This option is valid only as a command-line parameter for the incremental command when you are
performing the following operations:
• Full or partial progressive incremental backups of file systems or disk drives.
• Snapshot differential backups when createnewbase=yes is also specified.
To force a full backup of a file system that uses journal-based backup, specify both the nojournal and
absolute options on the incremental command.
During a domain incremental backup, where systemstate is specified as part of the domain, the
absolute option does not force a full backup of system state objects. To force a domain incremental
backup operation to create a full backup of system state objects, you must add
systemstatebackupmethod full to the client options file.
To use the absolute option on scheduled incremental backups, the IBM Spectrum Protect server
administrator must create a separate backup schedule that includes the absolute option on the
schedule’s options parameter.
Supported Clients
This option is valid for all clients as a command-line parameter for the incremental command. This
option cannot be added to a client option set on the IBM Spectrum Protect server.
Syntax
ABSolute
310 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
There are no parameters for this option.
Examples
Command line:
Adlocation
You can use the adlocation option with the query adobjects or restore adobjects commands
to indicate whether the Active Directory objects are to be queried or restored from the local Active
Directory Deleted Objects container or from a system state backup on the IBM Spectrum Protect server.
Supported Clients
This option is valid for supported Windows Server clients. The IBM Spectrum Protect API does not
support this option.
Syntax
local
ADLOCation
server
Parameters
server
Specifies that the Active Directory objects are to be queried or restored from a system state backup
on the IBM Spectrum Protect server. Valid for all supported Windows server clients.
local
Specifies that the Active Directory objects are to be queried or restored from the local Active Directory
Deleted Objects container. This is the default.
Example
Command line:
query adobjects "cn=Jim Smith" -adlocation=server
Archmc
Use the archmc option with the archive command to specify the available management class for your
policy domain to which you want to bind your archived files and directories.
When you archive a file, you can override the assigned management class using the archmc option on the
archive command or by using the web client. Overriding the management class using the web client is
equivalent to using the archmc option on the archive command.
If you do not use the archmc option, the server binds archived directories to the default management
class. If the default management class has no archive copy group, the server binds archived directories to
the management class with the shortest retention period.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Parameters
managementclass
Specifies an available management class in the active policy set of your policy domain. This
management class overrides the default management class and any include statements for the files
and directories you are archiving.
Examples
Command line:
Asnodename
Use the asnodename option to allow an agent node to back up, archive, restore, retrieve, and query data
on behalf of a target node.
An agent node is a client node that the IBM Spectrum Protect administrator grants the authority to
perform client operations on behalf of a target node. The target node is the client node that the agent
node performs the actions for. The administrator uses the grant proxynode command on the IBM
Spectrum Protect server to grant this authority.
Agent nodes can be used to distribute the workload of backing up a computer’s volumes, across multiple
client systems. Each system that is involved in the backup uses its own agent node name, but the backup
data is stored in a common file space that is owned by the target node.
For example, assume that you plan to back up four volumes that belong to a node that is named
SCORPIO, but the backup operation takes too long to run. You can distribute part of the workload to three
other machines: TAURUS, ARIES, and LEO. SCORPIO and the three other machines each back up one of
SCORPIO’s volumes. Each node that is involved in the backup connects to the server by using its own
agent node name, and each node specifies a unique value for the asnodename option. Do not use a
computer name or cluster name for the asnodename value. The following table illustrates an example
configuration.
Table 53. Setting the value of the asnodename option to distribute backups.
312 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
To create the relationships between the target node and the proxy nodes, the IBM Spectrum Protect
server administrator needs to take the following actions:
1. Register nodes SCORPIO, TAURUS, ARIES, LEO, and TARGET_SCORPIO.
2. Grant nodes SCORPIO, TAURUS, ARIES, and LEO proxy authority to node TARGET_SCORPIO
When you back up or archive data without the asnodename option, the backed up data is stored in a file
space on the server that matches the UNC name of the drive on which the original data exists.
When you use the asnodename option to back up data on behalf of a target node, the data is stored in a
file space that is owned by the target node. However, instead of using the host name in the file space
name, the target node name is used in the file space name. For example, if node TAURUS backs up data
on SCORPIO's S drive and sets the asnodename option value to -asnodename=target_scorpio, the
backup data is stored in a file space named \\target_scorpio\s$. The file space is owned by the
TARGET_SCORPIO node.
When you restore or retrieve data, the default behavior is to restore or retrieve the data to a location that
matches the file space name.
Continuing with the preceding example, if node SCORPIO uses -asnodename=target_scorpio to
restore data from \\target_scorpio\s$, the client attempts to restore the data to the S drive on a
computer named TARGET_SCORPIO. This operation does not produce the expected result because, in
this sample configuration, there is no computer that is named TARGET_SCORPIO.
In the following example, the restore command is entered on the SCORPIO node. The command
restores all files and subdirectories from the Users\andy\education directory in the \
\target_scorpio\s$ file space to the S drive on the computer that is named SCORPIO:
The following considerations apply when you use a proxy node to back up or restore data on other nodes:
• A proxy operation uses the settings for the target node (such as maxnummp and deduplication) and
schedules that are defined on the IBM Spectrum Protect server. The IBM Spectrum Protect server node
settings and schedules for the agent node are ignored.
• You cannot use asnodename with the backup nas command.
• You cannot use asnodename with the fromnode option.
• If you use asnodename to backup and restore volumes that are in a cluster configuration, do not use
clusternode yes.
• You cannot use asnodename to back up or restore system state.
• If an agent node restores data from a backup set, the system state object in the backup set is not
restored.
• You can use asnodename with the backup image command, but you must specify the volume by UNC
name. You cannot use the drive letter.
• If you use the same asnodename value to back up files from different machines, you need to keep track
which files or volumes are backed up from each system so that you can restore them to the correct
location.
• All agent nodes in a multiple node environment should be of the same platform type.
• Do not use target nodes as traditional nodes, especially if you encrypt your files before backing them up
to the server.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the dsm.opt file. You can set this option on the General tab of the Preferences editor.
Parameters
targetnode
Specifies the node name on the IBM Spectrum Protect server under which you want to back up or
restore data.
Examples
Options file:
asnodename target_scorpio
Command line:
This command backs up the entire F: drive to a server file space named \\target_scorpio\f$.
This option is not valid in interactive mode, but it can be defined in the options portion of a schedule
definition.
Asrmode
Use the asrmode option with the restore and restore systemstate commands to specify whether
to perform a restore operation in system ASR recovery mode.
This option is used in the context of restore commands generated in the asr.sif file by the backup
asr command only.
314 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for supported Windows clients that are running in a Windows Preinstallation
Environment; both BIOS and UEFI boot architectures are supported.
Syntax
ASRMODE =
No
Yes
Parameters
No
Specifies that the client does not perform the restore operation in system ASR recovery mode.
Yes
Specifies that the client performs the restore operation in ASR recovery mode. This is the default for
Windows clients during ASR recovery. These clients are running in Windows Preinstallation
Environment (WinPE) during ASR recovery.
Examples
Command line:
This option is valid for an interactive session, but cannot be changed by entering the option while
running an interactive session.
Auditlogging
Use the auditlogging option to generate an audit log that contains an entry for each file that is
processed during an incremental, selective, archive, restore, or retrieve operation.
The audit log can be configured to capture either a basic level of information or a more inclusive (full)
level of information.
The basic level of the audit logging feature captures the information that is in the schedule log and it
records information that a file has been backed up, archived, updated, restored, retrieved, expired,
deleted, skipped or failed during an incremental backup, selective backup, archive, restore or retrieve
operation. In addition, the basic level of audit logging captures the input command for commands run
through the backup-archive command line or scheduler clients.
The full level of audit logging records an action for each file that is processed by the backup-archive
client. In addition to all of the events recorded by the basic level of audit logging, the full level of audit
logging records information for a file that has been excluded or not sent during a progressive incremental
backup operation because the file had not changed.
The following is an example of the messages that are issued when the audit log is configured to capture
the basic level of information:
The following is an example of the messages that are issued when the audit log is configured to capture
the full level of information (in addition to all messages issued for the basic level of audit logging):
The audit log is not a substitute or a replacement for the standard error log (dsmerror.log) or for the
schedule log (dsmsched.log). If an error occurs that prevents a file from being processed, a message
indicating that an error has occurred is written to the audit log, but the message will not indicate the
nature of the error. For problem diagnostics the standard error log must still be used.
The audit log entries only contain a time stamp and object name. There is no information to distinguish
between files and directories or any information about the size of an object.
When using the Windows backup-archive client, all object names are written in the UNC format. The
Windows backup-archive client creates the audit log as a Unicode file.
By default, the name of the audit log is dsmaudit.log and it is contained in the same directory as the
error log, dsmerror.log. The name and location of the audit log can be configured using the
auditlogname option. There are no parameters to control the size of the audit log or to prune the audit
log. The auditlogname option cannot be set as an option in an IBM Spectrum Protect server client
options set.
The auditlogging command is not supported with backup commands which interact with image-level
objects such as backup image or restore image. The auditlogging command is supported with
backup commands that interact with file-level objects such as backup groups, and backup
systemstate.
If you have enabled audit logging for an operation and there is a failure trying to write to the audit log (for
example, the disk on which the audit log resides is out of space), the audit logging is disabled for the rest
of the operation and the return code for the operation is set to 12, regardless of the outcome of the
operation.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the dsm.opt file.
Syntax
off
AUDITLOGGing
basic
full
Parameters
off
Specifies that the audit logging facility is not engaged. This is the default.
316 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
basic
Specifies that the audit log captures a basic level of information.
full
Specifies that the audit log captures a more extensive level of information.
Examples
Run an incremental backup with audit logging enabled.
Command line:
dsmc i -auditlogging=basic
Back up a list of files using the maximum level of auditing, which enables a separate application, such
as a Perl script, to verify the results.
Auditlogname
The auditlogname option specifies the path and file name where you want to store audit log
information. This option applies when audit logging is enabled.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the dsm.opt file.
Syntax
AUDITLOGName filespec
Parameters
filespec
Specifies the path and file name where you want the backup-archive client to store audit log
information.
If you specify a file name only, the file is stored in your current directory. The default is the installation
directory with a file name of dsmaudit.log. The dsmaudit.log file cannot be a symbolic link.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
example, the path contains the drive letter D$: \\computer7\D$\logs\tsmaudit.log.
Examples
Run an incremental backup with audit logging enabled.
Options file:
Store the audit log in a non-default path.
auditlogname c:\mypath\myaudit.log
Command line:
Back up a list of files using the maximum level of auditing, which would enable a separate application,
such as a Perl script, to verify the results:
Sample output
The following is a sample execution and output file:
C:\Program Files\Tivoli\TSM\baclient>dsmc i
c:\test\* -sub=yes -auditlogging=full
IBM Spectrum Protect
Command Line Backup-Archive Client Interface
Client Version 8, Release 1, Level 0.0
Client date/time: 11/16/2016 12:05:35
(c) Copyright by IBM Corporation and other(s) 1990, 2016.
All Rights Reserved.
318 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
\\patmos\c$\test\dir2\file2
04/21/2007 15:52:26 ANS1651I Backed Up:
\\patmos\c$\test\dir2\file3
Related information
For more information about the audit logging facility refer to “Auditlogging” on page 315.
Autodeploy
Use the autodeploy option to enable or disable an automatic deployment of the client if a restart is
required.
Supported Clients
This option is valid for Windows clients
Options File
You can set this option by including it in your client options file. You can also set in using the Java GUI by
clicking Edit > Client Preferences and selecting the appropriate option on the General tab.
Syntax
Yes
AUTODEPLOY
No
NOReboot
Parameters
Yes
Specifies that the client is automatically deployed from the server. Yes is the default.
Important:
• When you set autodeploy to yes, if a restart of the client workstation is required to complete the
deployment, you cannot disable the restart. The client workstation will be restarted. If it is
important that the workstation is not automatically restarted, set autodeploy to noreboot. The
deployment will be canceled if a restart is required. The current client is not affected.
• If a restart is required, the deployment manager initiates a restart for the client computer and exits.
However, it is possible that you cancel or interrupt the restart. Since the deployment manager is
already terminated, a message is not sent to the server to indicate the failure of the restart. The
deployment result is still successful. You must restart the computer so that the new client
deployment completes.
No
Specifies that the client is not automatically deployed from the server.
NOReboot
Specifies that the deployment manager never automatically restarts the client computer, even if a
restart is required. If a restart is required, allowing automatic deployment to many machines with the
NOReboot parameter can result in only a partial update of, potentially, many clients.
To alleviate this problem, the deployment manager tries to detect if a restart is required. If a restart is
required, the deployment manager cancels the deployment before the new client installation. This
guarantees that the client computer still has a working backup-archive client, and the new client
deployment can be rescheduled.
There are rare cases where the deployment manager cannot detect the restart; for example, if client
processes are started from a script. In these cases, the new client installation will continue, but a
manual restart of the client computer is required.
Autofsrename
The autofsrename option renames an existing file space that is not Unicode-enabled on the IBM
Spectrum Protect server so that a Unicode-enabled file space with the original name can be created for
the current operation.
When you specify autofsrename yes in your client options file, and the server value of autofsrename
is set to client, the IBM Spectrum Protect server generates a unique name by appending _OLD to the
file space name you specify in the current operation. For example, the server renames the file space \
\your-node-name\h$ to \\your-node-name\h$_OLD. If the new file space name is too long, the
suffix replaces the last characters of the file space name, as follows:
\\your-node-name_OLD
If the new file space name already exists on the server, the server renames the new file space \\your-
node-name_OLDx, where x is a unique number.
The server creates new Unicode-enabled file spaces that contain only the data specified in the current
operation. For example, to archive files from your H: disk named \\your-node\h$, issue the following
archive command:
arc h:\logs\*.log
Before the archive takes place, the server renames the file space to \\your-node\h$_OLD. The archive
places the data specified in the current operation into the Unicode-enabled file space named \\your-
node\h$. The new Unicode-enabled file space now contains only the \logs directory and the *.log
files specified in the operation. All subsequent full and partial incremental, selective backup, and archive
data are stored in the new Unicode-enabled file spaces.
Renamed file spaces remain on the server as stabilized file spaces. These file spaces contain all the
original data, which you can restore as long as they remain on the server.
Note: When an existing file space is renamed during Unicode conversion, any access rules defined for the
file space remain applicable to the original file space. New access rules must be defined to apply to the
new Unicode file space.
After installation, perform a full incremental backup and rename all existing file spaces that are not
Unicode-enabled and back up the files and directories within them under the new Unicode-enabled file
spaces. This operation requires increased processing time and storage on the server.
File spaces that are not Unicode-enabled can be viewed in the character set of the locale from which the
files were backed up. A workstation running in a different locale might be unable to view or restore from
320 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
these file spaces. Unicode-enabled file spaces that are backed up in one locale are visible in all other
locales, provided that the workstation has the proper fonts installed.
To restore or retrieve from a file space that is not Unicode-enabled, specify the source on the server and
the destination on the client. See
Supported Clients
This option is valid for all Windows clients. The server can define the autofsrename option and override
the autofsrename setting on the client. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt) file. You can set this option on the General tab,
Rename non-Unicode filespaces during backup/archive drop-down list box of the Preferences editor.
Syntax
Prompt
AUTOFsrename
Yes
No
Parameters
Yes
Specifies that the IBM Spectrum Protectserver automatically renames all file spaces that are not
Unicode-enabled in the current backup or archive operation.
No
Specifies that the server does not rename file spaces that are not Unicode-enabled in the current
backup or archive operation.
Prompt
Specifies that you are prompted whether to rename the file spaces that are not Unicode-enabled in
the current operation. This is the default.
Considerations:
• This option applies only when the server sets the autofsrename option to client.
• When the client scheduler is running, the default behavior is to not prompt you. The next interactive
session prompts you to rename the file space.
• The client prompts you only one time per file space. If you specify no at the prompt, the client cannot
rename the file spaces later. However, the IBM Spectrum Protect administrator can rename the file
spaces on the server.
• When backing up files to a file space that is not Unicode-enabled, the Unicode-enabled client skips the
files and directories with names containing characters from a code page that is different from the
current locale.
• If files and directories with names containing characters from a code page other than the current locale
were previously backed up with a client that was not Unicode-enabled, they might be expired. The
Unicode-enabled client expires these files if you do not migrate the file space to a Unicode-enabled file
space. You can back up and archive these files to a Unicode-enabled file space.
Examples
Options file:
autofsrename yes
Backmc
The backmc option specifies the management class to apply to the backup fastback command for
retention purposes.
Use the backmc option with the backup fastback command.
If you back up an object more than once and specify a different management class for each backup, all
backup versions of the object are rebound to the last management class specified.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line or on the scheduler.
Syntax
BACKMc= management_class_name
Parameters
management_class_name
Specifies the management class name.
Examples
Command line:
dsmc backup fastback -fbpolicyname=policy1 -fbserver=server1 -backmc=ret2yrs
Backupsetname
The backupsetname option specifies the name of a backup set from the IBM Spectrum Protect server.
You can use backupsetname option with the following commands:
• query backup
• query filespace
• query image
• query systemstate
• restore image
Note: The following commands take backupsetname as a positional parameter. The backupsetname
positional parameter behaves differently from the backupsetname option. See the command
explanations for a discussion of how the backupsetname positional parameter affects each of these
commands:
query backupset
restore
restore backupset
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
322 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
None. You can specify this option only on the command line.
Syntax
BACKUPSETName backupsetname
Parameters
backupsetname
Specifies the name of a backup set from the IBM Spectrum Protect server. You cannot use wildcards.
Examples
Command line:
Related information
“Restore data from a backup set” on page 192
Basesnapshotname
The basesnapshotname option specifies the snapshot to use as the base snapshot, when you perform a
snapshot differential (snapdiff) backup of a NetApp filer volume. If you specify this option, you must
also use the snapdiff option or an error occurs. If basesnapshotname is not specified, the
useexistingbase option selects the most recent snapshot on the filer volume as the base snapshot.
If the specified snapshot cannot be found, an error is reported and the backup operation fails.
Supported Clients
This option can be used with supported Windows clients.
Options File
This option can be specified in the client options file or on the command line.
Syntax
BASESNAPSHOTName snapshot_name
Parameters
snapshot_name
Specifies the name of an existing snapshot to use as the base snapshot. The name specified can be a
snapshot name, such as vol1_snap, or it can be the name of a scheduled NetApp backup that has a
name like nightly.x, where x is the sequence number (where nightly.0 is the oldest snapshot).
You can also use a pattern with wildcard characters to select a snapshot. The wildcard characters can
be either of the following:
*
An asterisk (*) matches any character.
-basesnapshotname="UserDataVol_*_snapshot"
Question marks work well for scheduled backups that follow a consistent name pattern. This syntax
selects the latest "nightly" backup as the snapshot to use as the existing base.
-basenameshotname="nightly.?"
Examples
Options file:
basesnapshotname nightly.?
basesnapshotname volum_base_snap
Command line:
Related information
Useexistingbase
Cadlistenonport
The cadlistenonport option specifies whether to open a listening port for the client acceptor.
When a listening port is open, it can accept any inbound connections. However, the port is not used when
the client acceptor manages only the scheduler and the scheduler runs in polling mode. You can use this
option to prevent the acceptor from opening the unused port.
The default setting for this option is yes. Use cadlistenonport no only when managedservices
schedule and schedmode polling are used.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
CADLISTENONPort
No
324 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
Yes
Specifies that the client acceptor opens a listening port. This parameter is the default.
No
Specifies that the client acceptor does not open a listening port. Use this setting when you use the
client acceptor only to manage the scheduler in polling mode.
This setting effectively disables other client features that depend on the client acceptor, such as web
client backup and restore operations, IBM Spectrum Protect for Virtual Environments: Data Protection
for VMware vSphere GUI operations, and IBM Spectrum Protect Snapshot backup and restore
operations.
Example
Options file:
cadlistenonport no
Command line:
Does not apply.
Related reference
“Managedservices” on page 434
The managedservices option specifies whether the IBM Spectrum Protect client acceptor service
manages the scheduler, the web client, or both.
“Schedmode” on page 488
The schedmode option specifies whether you want to use the polling mode (your client node
periodically queries the server for scheduled work), or the prompted mode (the server contacts your
client node when it is time to start a scheduled operation).
Casesensitiveaware
The casesensitiveaware option specifies whether the Windows backup-archive client attempts to
filter out file and directory objects that have name conflicts that are caused by different capitalization of
the object names.
NTFS and ReFS volumes are case-sensitive and allow case-sensitive file names to be stored. Although the
Windows operating system is not case-sensitive, applications such as Windows Services for UNIX (SFU)
uses POSIX conventions and allow case-sensitive file names. SFU is typically included with Windows
operating systems such as Windows Powered OS and Windows Storage Server. These operating systems
are typically deployed on hardware (for example, NAS hardware) which is acting as a dedicated file server
in a heterogeneous environment.
If there are UNIX clients that store files on NTFS or ReFS volumes in these Windows file server
environments, use the casesensitiveaware option. If this option is not used in these environments,
unpredictable results occur during backup and archive operations if case-sensitive file name conflicts are
encountered. For homogeneous Windows file server environments, the casesensitiveaware option is
not necessary.
For example, if there is a set of objects that are called ’MyWork.xls', 'MYWORK.xls', and
'mywork.xls', because the Windows operating system is not case-sensitive, applications cannot
distinguish between two objects named 'mywork.xls' and 'MyWork.xls'
For this reason, the Windows backup-archive client cannot guarantee the restore integrity of such objects.
When a name casing conflict arises, the backup-archive client can guarantee only the restore integrity of
the first file in an alphabetical sort. On an ASCII-based operating system such as Windows, this means
that capital letters come first, alphabetically, before their lowercase counterparts, so 'MySwork.xls'
would alphabetically precede 'mywork.xls'.
In this example, if the casesensitiveaware option is used, only 'MyWork.xls' is processed. An error
message is issued for 'mywork.xls' and it is skipped. If 'mywork.xls' is a directory, then the
directory subtree 'mywork.xls' would be skipped. In all cases, messages are written to both the local
Supported Clients
This option is valid for all Windows clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
CASESENSITIVEAware
Yes
Parameters
yes
Specifies that the client will attempt to identify object names which differ in casing only and filter out
objects which have casing conflicts and cannot be guaranteed to be restored properly.
no
Specifies that the client will not attempt to identify object names which differ in casing only. This is
the default.
Changingretries
The changingretries option specifies how many additional times you want the client to attempt to
back up or archive a file that is in use. Use this option with the archive, incremental, and selective
commands.
This option is applied only when copy serialization, an attribute in a management class copy group,
is shared static or shared dynamic.
With shared static serialization, if a file is open during an operation, the operation repeats the number
of times that you specify. If the file is open during each attempt, the operation does not complete.
With shared dynamic serialization, if a file is open during an operation, the operation repeats the
number of times that you specify. The backup or archive occurs during the last attempt whether the file is
open or not. Open file support can be used to back up files that are locked or in use.
Supported Clients
This option is valid for all Windows clients. The server can also define this option. The IBM Spectrum
Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup tab, Number
of retries if file is in use field of the Preferences editor.
Syntax
CHAngingretries numberretries
326 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
numberretries
Specifies the number of times a backup or archive operation is attempted if the file is in use. The
range of values is zero through 4; the default is 4.
Examples
Options file:
changingretries 3
Command line:
-cha=3
Class
The class option specifies whether to display a list of NAS or client objects when using the delete
filespace, query backup, and query filespace commands.
For example, to display a list of the file spaces belonging to a NAS node, enter the following command:
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Options File
None. You can specify this option only on the command line.
Syntax
client
CLASS =
nas
Parameters
client
Specifies that you want to display a list of file spaces for a client node. This is the default.
nas
Specifies that you want to display a list of file spaces for a NAS node.
Examples
None. You can specify this option only on the command line.
Command line:
q backup -nasnodename=nodename -class=nas
Clientview
The clientview option is available to users who have upgraded from the IBM Tivoli Storage Manager
Express backup client to the enterprise backup-archive client.
You must be connected to the Tivoli Storage Manager Version 5.4 or higher server to use this option. The
clientview option allows you to choose either the express view or the standard view of the client
graphical user interface (GUI).
Options File
Place this option in the dsm.opt file. To switch to the Express view:
1. In the backup-archive client GUI, select Edit > Preference from the menu bar.
2. From the General tab of the Preferences editor, in the Client View field, click Express.
3. Click OK to save your change.
To switch to the Standard view:
1. In the backup-archive client GUI, click Modify Settings.
2. From the General tab of the Preferences Editor, in the Client View field, click Standard.
3. Click OK to save your change.
Syntax
standard
CLIENTVIEW =
express
Parameters
standard
Specifies that the standard, or enterprise, view of the backup-archive client GUI should be used. The
standard view contains the advanced features of the backup-archive client GUI. This is the default.
express
Specifies that the express view of the backup-archive client GUI should be used. The express view
contains the same features as the Express backup client GUI.
Clusterdisksonly
The clusterdisksonly option specifies whether the backup-archive client allows the backup of only
clustered disks in specific environments.
The backup-archive client allows for the backup of only clustered disks when the client is running in the
following environments:
• In a Microsoft Cluster Server (MSCS)
• When failover clustering is employed on a supported Windows Server client
• In a VERITAS Cluster Server (VCS) environment, when you set clusternode yes
The backup-archive client previously allowed only backups and restores of data on clustered drives that
were mounted as a drive letter.
It is common to find clustered drives that are mounted as volume mount points. Windows Server
operating systems allow users to surpass the 26-drive-letter limitation by allowing volume mount points
to be defined on a clustered server. The client can protect data on cluster disks that are mounted as drive
letters on Windows Server OS computers. The client can also protect data on cluster disks that are
mounted as volume mount points. The backup-archive client can automatically determine whether a
volume that is using a volume mount point is a cluster volume.
When you set clusterdisksonly yes, the backup-archive client continues to segregate local drives
from cluster drives when it evaluates the ALL-LOCAL domain option. When clusterdisksonly no is
specified, you must explicitly define the backup domains. When clusterdisksonly no is specified, the
backup-archive client also bypasses enumeration of cluster resources to determine which resources
represent cluster drives.
328 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all supported Windows Server clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
CLUSTERDISKSOnly
No
Parameters
Yes
Specifies that the client allows only the processing of cluster drives. Yes is the default.
No
Specifies that the client allows the processing of any disk when clusternode yes is set.
Examples
Scenario 1: Back up a node that manages the local (non-clustered) drives and the system state
information
This is the node that is dedicated to the restoration of the physical system if a hardware failure
occurs. There are no clustered drives that are mounted as volume mount points.
Options file:
CLUSTERNODE NO (default)
CLUSTERDISKSONLY YES (default)
DOMAIN ALL-LOCAL (default)
EXCLUDE c:\...\file.txt
Scenario 1b: Back up a node that manages the local (non-clustered) drives and the system state
information and bypass enumeration of cluster resources
This is a scenario similar to scenario 1, which can be deployed if the backup-archive client takes an
inappropriate amount of time during startup processing. During initialization of the backup-archive
client, all of the cluster resources are enumerated to determine which resources represent cluster
disk devices. This processing can be skipped by setting clusterdisksonly no.
Options file:
CLUSTERNODE NO (default)
CLUSTERDISKSONLY NO
DOMAIN C: D: (local drives must be explicitly enumerated)
EXCLUDE c:\...\file.txt
Scenario 2: Back up a node that manages the clustered drives within a cluster resource group and
bypass enumeration of cluster resources
This is a scenario that can be deployed if the backup-archive client takes an inappropriate amount of
time during startup processing. During initialization of the backup-archive client, all of the cluster
resources are enumerated to determine which resources represent cluster disk devices. This
processing can be skipped by setting clusterdisksonly no.
Options file:
CLUSTERNODE YES
CLUSTERDISKSONLY NO
DOMAIN f: g:
EXCLUDE f:\...\file.txt
CLUSTERNODE YES
CLUSTERDISKSONLY YES
DOMAIN f: f:\mnt
EXCLUDE f:\mnt\...\file.txt
Clustersharedfolder
Use the clustersharedfolder option to specify the directory location in which to store an encrypted
password file when you set up a cluster environment. Place the encrypted password file on a resource
that is shared among the different nodes in the cluster. This directory location is also used for the key
database to store the server's public certificate in the dsmcert.kdb file.
Supported Clients
This option is valid for all supported Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
CLUSTERSHAREDFOLDER directoryname
330 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
DIRECTORYNAME
Specifies the path in which to store the encrypted password files. If any part of the specified path
does not exist, IBM Spectrum Protect attempts to create it.
Options file:
clustersharedfolder directoryname
Command line:
Does not apply.
Clusternode
The clusternode option specifies how the backup-archive client manages cluster drives.
The backup-archive client manages clustered drives in the following environments:
• A Microsoft Cluster Server (MSCS)
• Failover Clustering on Windows Server systems
• VERITAS Cluster Server (VCS)
When the clusternode yes is set, only shared cluster drives are available for backup and archive
processing. When you set clusternode yes, the node name defaults to the cluster name.
To back up local drives or Windows Server system state, you must set clusternode no.
Note: You must set the clusternode yes for all IBM Spectrum Protect-managed cluster operations.
Inconsistent use of the clusternode option for a given IBM Spectrum Protect cluster node name can
cause the cluster node name encrypted password to be invalidated, and prompt the user to reenter the
password during the next IBM Spectrum Protect program invocation.
Use the optfile option to properly call the correct (cluster) dsm.opt for all IBM Spectrum Protect
programs to ensure proper functionality for cluster related operations. See the optfile option
description for more information.
Supported Clients
This option is valid for Windows Server operating system clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
CLUSTERnode
Yes
Parameters
Yes
Specifies that you want the client to manage cluster drives in the following environments:
• A MSCS
• Failover Clustering on Windows Server systems
• VCS
No
Specifies that you want to back up local disks. This is the default.
Collocatebyfilespec
Use the collocatebyfilespec option to specify whether the backup-archive client uses only one
server session to send objects generated from one file specification.
Setting the collocatebyfilespec option to yes attempts to eliminate interspersing of files from
different file specifications, by limiting the client to one server session per file specification. Therefore, if
you store the data to tape, files for each file specification are stored together on one tape (unless another
tape is required for more capacity).
Considerations:
• Use the collocatebyfilespec option only if the storage pool is going directly to tape. If you use this
option going to a disk storage pool, you could affect some load balancing, and therefore, performance.
Supported Clients
This option is valid for all Windows clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
COLlocatebyfilespec
Yes
Parameters
Yes
Specifies that you want the client to use only one server session to send objects generated from one
file specification. Therefore, if you store the data to tape, files for each file specification are stored
together on one tape, unless another tape is required for more capacity. Restore performance can
increase as a result.
No
Specifies that the client can (depending on the execution dynamics and on the setting of the
resourceutilization option of 3 or higher) use more than one server session to send the files
from one file specification. This is the default.
Backup performance might increase as a result. If the files are backed up to tape, files are stored on
multiple tapes. Generally, the files specified in the file specification are still contiguous.
Examples
Options file:
collocatebyfilespec yes
332 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Command line:
-collocatebyfilespec=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Commmethod
The commmethod option specifies the communication method you use to provide connectivity for client-
server communication.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab of
the Preferences editor.
Syntax
TCPip
COMMMethod
SHAREdmem
V6TCPIP
NAMedpipes
Parameters
TCPip
The Transmission Control Protocol/Internet Protocol (TCP/IP) communication method. This is the
default.
V6Tcpip
Indicates that either TCP/IP V4 or V6 should be used, depending on the system configuration and the
results of a domain name service lookup. A valid DNS environment must be available.
NAMedpipes
The interprocess communication method that permits message data streams to pass between a client
and a server. Use this communication method with an IBM Spectrum Protect server that is running on
the same workstation as the client.
SHAREdmem
Use the shared memory communication method when the client and server are running on the same
system. This provides better performance than the TCP/IP protocol.
Note: Use of this communication method requires that both client and server run under the same
Windows account.
Examples
Options file:
Use only TCP/IP V4.
commmethod tcpip
Use both TCP/IP V4 and V6, depending on how the system is configured, and the results of a domain
name service lookup.
commmethod V6Tcpip
Commrestartduration
The commrestartduration option specifies the maximum number of minutes you want the client to try
to reconnect to the IBM Spectrum Protect server after a communication error occurs.
Note: A scheduled event continues if the client reconnects with the server before the
commrestartduration value elapses, even if the startup window of the event has elapsed.
You can use the commrestartduration option and the commrestartinterval in busy or unstable
network environments to decrease connection failures.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab,
Common Options section of the Preferences editor.
Syntax
COMMRESTARTDuration minutes
Parameters
minutes
The maximum number of minutes you want the client to attempt to reconnect with a server after a
communication failure occurs. The range of values is zero through 9999; the default is 60.
Examples
Options file:
commrestartduration 90
Command line:
Does not apply.
Commrestartinterval
The commrestartinterval option specifies the number of seconds you want the client to wait between
attempts to reconnect to the IBM Spectrum Protect server after a communication error occurs.
Note: Use this option only when commrestartduration is a value greater than zero.
You can use the commrestartduration option and the commrestartinterval in busy or unstable
network environments to decrease connection failures.
Supported Clients
This option is valid for all clients.
334 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab,
Common Options section of the Preferences editor.
Syntax
COMMRESTARTInterval seconds
Parameters
seconds
The number of seconds you want the client to wait between attempts to reconnect with a server after
a communication failure occurs. The range of values is zero through 65535; the default is 15.
Examples
Options file:
commrestartinterval 30
Command line:
Does not apply.
Compressalways
The compressalways option specifies whether to continue compressing an object if it grows during
compression.
Use this option with the compression option, and with the archive, incremental, and selective
commands.
The compressalways option is ignored when client-side deduplication is enabled.
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup tab, Continue
Compressing if Object Grows check box of the Preferences editor.
Syntax
Yes
COMPRESSAlways
No
Parameters
Yes
File compression continues even if the file grows as a result of compression. This is the default.
No
Backup-archive client objects are resent uncompressed if they grow during compression. API
behavior depends on the application. Application backups might fail.
Examples
Options file:
compressalways yes
Compression
The compression option compresses files before you send them to the server.
Compressing your files reduces data storage for backup versions and archive copies of your files. It can,
however, affect IBM Spectrum Protect throughput. A fast processor on a slow network connection
benefits from compression, but a slow processor on a fast network connection does not.
Use the compression option with the archive, incremental, and selective commands.
The backup image command uses the compression option value specified in the dsm.opt file. This
option is valid on the initial command line and in interactive mode. The server can also define this option
which overrides the client value.
The backup-archive client backs up a sparse file as a regular file if client compression is off. Set
compression yes to enable file compression when backing up sparse files to minimize network
transaction time and maximize server storage space.
If you set compressalways yes, compression continues even if the file size increases. To stop
compression if the file size grows, and resend the file uncompressed, set compressalways no.
If you set compression yes, you can control compression processing in the following ways:
• Use the exclude.compression option in your client options file (dsm.opt) to exclude specific files or
groups of files from compression processing.
• Use the include.compression option in your client options file (dsm.opt) to include files within a
broad group of excluded files for compression processing.
This option controls compression only if your administrator specifies that your client node can compress
files before sending them to the server.
The type of compression that the client uses is determined by the combination of compression and client-
side data deduplication that is used during backup or archive processing. The following types of
compression are used:
LZ4
A faster and more efficient compression method that the client uses when client-deduplicated data is
sent to an LZ4-compatible container storage pool on the IBM Spectrum Protect server. The server
must be at version 7.1.5 or later, and must use container storage pools. Client-side LZ4 compression
is used only when client-side data deduplication is enabled.
LZW
A traditional type of compression that the client uses in any of the following situations:
• Client-deduplicated data is sent to traditional (non-container) storage pools on the server.
• The client data does not undergo client-side data deduplication. (Does not apply to Data Protection
for VMware and Data Protection for Microsoft Hyper-V, in which only client-deduplicated data can
be compressed.)
• The client data undergoes only traditional server-side data deduplication. (Does not apply to Data
Protection for VMware and Data Protection for Microsoft Hyper-V, in which only client-deduplicated
data can be compressed.)
None
The object is not compressed by the client. The object is not compressed because the compression
option is set to no, or the option is not specified during backup or archive processing. Although the
object is not compressed by the client, it might be compressed by the server.
You do not need to set the compression type. It is determined by the backup-archive client at the time of
backup or archive processing.
336 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup tab, Compress
objects check box of the Preferences editor.
Syntax
No
COMPRESSIon
Yes
Parameters
No
Files are not compressed before they are sent to the server. This is the default.
Yes
Files are compressed before they are sent to the server.
Examples
Options file:
compression yes
Command line:
-compressi=no
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
“Deduplication” on page 347
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
Console
Use the console option with the query systeminfo command to output information to the console.
• DSMOPTFILE - The contents of the dsm.opt file.
• ENV - Environment variables.
• ERRORLOG - The IBM Spectrum Protect error log file.
• FILE - Attributes for the file name that you specify.
• FILESNOTTOBACKUP - Enumeration of Windows Registry key:
HKEY_LOCAL_MACHINE\
SYSTEM\
CurrentControlSet\
BackupRestore\
FilesNotToBackup
This key specifies those files that backup products should not back up. The query inclexcl
command indicates that these files are excluded per the operating system.
HKEY_LOCAL_MACHINE\
SYSTEM\
ControlSet001\
BackupRestore\
KeysNotToRestore
This key specifies those Windows Registry keys that backup products should not restore.
• MSINFO - Windows system information (output from MSINFO32.EXE).
• OPTIONS - Compiled options.
• OSINFO - Name and version of the client operating system
• POLICY - Policy set dump.
• REGISTRY - Windows IBM Spectrum Protect-related Windows Registry entries.
• SCHEDLOG - The contents of the IBM Spectrum Protect schedule log (usually dsmsched.log).
• SFP - The list of files protected by Windows System File Protection, and for each file, indicates whether
that file exists. These files are backed up as part of the SYSFILES system object.
• SFP=filename - Indicates whether the specified file (filename) is protected by Windows System File
Protection. For example:
SFP=C:\WINNT\SYSTEM32\MSVCRT.DLL
Supported Clients
This option is valid for all clients.
Syntax
CONsole
Parameters
There are no parameters for this option.
Examples
Command line:
query systeminfo dsmoptfile errorlog -console
Related information
“Filename” on page 395
338 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Createnewbase
The createnewbase option creates a base snapshot and uses it as a source to run a full incremental
backup.
Some files might not be backed up when the snapshot difference incremental backup command is run. If
the files are skipped, you can run a snapshot difference incremental backup with the createnewbase
option to back up these files. See “Snapdiff” on page 498 for a list of reasons why a file might not be
backed up when the snapshot difference command is run.
One reason that a file can be skipped during backup processing is because the file name is not supported
by NetApp Data ONTAP. NetApp Data ONTAP Versions 8.0 and versions lower than 7.3.3 only support file
names that are within the 7 bit ASCII character set. NetApp Data ONTAP Version 7.3.3 and versions
greater than 8.0.0 support Unicode file names. If you upgraded NetApp Data ONTAP from a version that
does not support Unicode file names to a version that does support Unicode files names, run a full
incremental backup with the createnewbase=migrate option.
Supported Clients
This option is valid for the following clients:
• All Windows clients
Enter the createnewbase option on the command line. Specify this option with the snapdiff option.
Syntax
No
Createnewbase
Yes
IGNore
MIGRate
Parameters
No
Specifies that a snapshot difference incremental is run. If the backup-archive client detects that the
NetApp Data ONTAP file server has been migrated from a version that does not support Unicode file
names to a file server that does, a warning message is recorded to the error log and the IBM Spectrum
Protect server activity log. The warning message indicates that you must run a full incremental backup
and logs a return code of 8 even if the operation completed successfully.
This parameter is the default value.
Yes
Specifies that a full incremental is run by creating a new base snapshot and is using it to run a scan-
based incremental backup. Use this option to back up any file changes that might not have been
detected by the snapshot difference API.
If the operation finished successfully, the command ends with a return code of 0.
Do not set createnewbase=yes for any schedule that runs a daily snapshot difference backup.
Instead, create a separate, monthly schedule that has the createnewbase=yes option.
IGNore
Specifies that a snapshot difference incremental backup is run when the backup-archive client
detects that the NetApp Data ONTAP file server was upgraded to support Unicode file names.
The ignore option is different from the no parameter because the ignore option suppresses the
warning message. Instead, an informational message is recorded in the error log and the IBM
Spectrum Protect activity log that informs you to run a full incremental backup.
If the command finishes successfully, it returns a code of 0.
Examples
Command line:
dsmc incremental -snapdiff -createnewbase=yes /net/home1
Related tasks
“Configuring NetApp and IBM Spectrum Protect for snapshot difference incremental backups” on page 73
You must configure the NetApp file server connection information to run the snapshot difference
incremental backup command on the backup-archive client. You must also use the set password
command to specify the file server host name, and the password and user name that is used to access the
file server.
Related reference
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
Csv
The csv option enables the client to use a comma-separated values (csv) file to define and apply different
restore settings across a series of virtual machine restore operations.
In the specified .csv file, you can define column headings with settings that override equivalent client
options. Column names are case-sensitive.
Using a CSV column overrides the equivalent command line option. The equivalent option is ignored if
used with the restore vm -csv command:
• "New Virtual Machine Name" overrides the -vmname option on restore.
• "New Datastore" overrides the -datastore option on restore.
• "New Datacenter" overrides the -datacenter option on restore.
• "New Host" overrides the -host option on restore.
• "PITDATE" overrides the -pitdate option on restore.
• "PITTIME" overrides the -pittime option on restore.
Supported clients
This option can be used with supported Windows clients. This option is not valid for Data Protection for
Microsoft Hyper-V backups.
340 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Restore VM. It can
also be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
Csv csvfilespec
Parameters
csvfilespec
Using a CSV column overrides the equivalent command line option. Any equivalent option is ignored if
it is used with the restore vm -csv command.
For example, if you specify the command restore vm "restore_vm_list.csv" -csv -
datacenter="Mambo 5", and the "New Datacenter" column is already specified in the CSV file, the
-datacenter option is ignored.
The following list shows the CSV columns that override the equivalent client options:
The asterisk, *, denotes reuse of the original VM name as part of a wild-card construct for the name of a
restored VM.
The following command line conventions are also observed:
• <date> is replaced by the date of the restore.
• <time> is replaced by the time of the restore.
• <timestamp> is replaced by a combination of <date> and <time> outputs.
Elements can be placed in quotes: for example, VMs with commas and quotes in their names.
Examples
The following example shows how a CSV file looks when opened in a spreadsheet view:
Virtual Machine Name New Virtual Machine Name New Host New Datastore New Datacenter NOTES1 NOTES2
PITDATE PITTIME
VM1 *-DR_restore esx4.ibm.com DS_8 DC_RecoverSite1 group1
VM2 *-DR_restore esx4.ibm.com DS_8 DC_RecoverSite1 group1
VM3 *-DR_restore esx4.ibm.com DS_8 DC_RecoverSite1 group1
VM4 *-DR_restore esx5.ibm.com DS_10 DC_RecoverSite1 group2
VM5 *-DR_restore esx5.ibm.com DS_10 DC_RecoverSite1 group2
The following examples show comma-separated text files that were exported from CSV files.
Example 1:
342 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Example 2:
Related reference
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
Datacenter
Specifies the target location of the data center that will contain the restored machine data.
Use this option on restore vm commands.
If folders are used within virtual center to organize datacenters, then the folder name needs to be
included in the datacenter specification, separated by a slash.
If you are restoring through a ESX server rather than a virtual center, the -datacenter=ha-datacenter
option should be used.
The default target location is the datacenter which the virtual machine was stored at the time of backup.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Examples
Restore a virtual machine to USEast datacenter which is organizaed under a folder named Production in
the virtual center.
Restore a virtual machine backup taken from a virtual center, but using a ESX server at the time of
restore.
Datastore
Specifies the datastore target to be used during VMware restore operation.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Example
Restore the virtual machine to a datastore named ds8k_prod1:
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Regional Settings tab,
Date Format drop-down list of the Preferences editor.
Syntax
DATEformat format_number
344 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
format_number
Displays the date using one of the following formats. Select the number that corresponds to the date
format you want to use:
1
MM/DD/YYYY
This is the default for the following available translations:
• US English
• Chinese (Traditional)
• Korean
2
DD-MM-YYYY
This is the default for the following available translations:
• Brazilian Portuguese
• Italian
3
YYYY-MM-DD
This is the default for the following available translations:
• Japanese
• Chinese (Simplified)
• Polish
4
DD.MM.YYYY
This is the default for the following available translations:
• German
• French
• Spanish
• Czech
• Russian
5
YYYY.MM.DD
This is the default for the following available translations:
• Hungarian
6
YYYY/MM/DD
7
DD/MM/YYYY
Examples
Options file:
dateformat 3
Command line:
-date=3
Dedupcachepath
Use the dedupcachepath option to specify the location where the client-side data deduplication cache
database is created.
This option is ignored if the enablededupcache=no option is set during backup or archive processing.
Supported Clients
This option is valid for all clients. This option is also valid for the IBM Spectrum Protect API.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Deduplication >
Deduplication Cache Location text box of the Preferences editor. The option can be set in the client
option set on the IBM Spectrum Protect server.
Syntax
DEDUPCACHEPath path
Parameters
path
Specifies the location where the client-side data deduplication cache database is created if the
enablededupcache option is set to yes. The default location is to create the data deduplication
cache file in the backup-archive client or API installation directory.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$: \\computer7\D$\stgmgr
\dedupecache.
Examples
Options file:
dedupcachepath c:\logs\dedup\
Command line:
Does not apply.
Related reference
“Enablededupcache” on page 370
346 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the enablededupcache option to specify whether you want to use a cache during client-side data
deduplication. Using a local cache can reduce network traffic between the IBM Spectrum Protect server
and the client.
Dedupcachesize
Use the dedupcachesize option to determine the maximum size of the data deduplication cache file.
When the cache file reaches its maximum size, the contents of the cache are deleted and new entries are
added.
Supported Clients
This option is valid for all clients. This option is also valid for the IBM Spectrum Protect API.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Deduplication >
Deduplication Cache > Maximum Size field of the Preferences editor. The option can be set in the client
option set on IBM Spectrum Protect server.
Syntax
DEDUPCACHESize dedupcachesize
Parameters
dedupcachesize
Specifies the maximum size, in megabytes, of the data deduplication cache file. The range of values is
1 - 2048; the default is 256.
Examples
Options file:
dedupcachesize 1024
Command line:
Does not apply.
Related reference
“Deduplication” on page 347
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
Deduplication
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
Data deduplication is disabled if the enablelanfree option is set. Backup-archive client encrypted files
are excluded from client-side data deduplication. Files from encrypted file systems are also excluded.
To support client-side data deduplication, the following criteria must be met:
• Client-side data deduplication for the node is enabled on the server.
• The storage pool destination for the data must be a storage pool that is enabled for data deduplication.
The storage pool must have a device type of "file".
• A file can be excluded from client-side data deduplication processing (by default all files are included).
• The server can limit the maximum transaction size for data deduplication by setting the
CLIENTDEDUPTXNLIMIT option on the server. For more information about the option, refer to the IBM
Spectrum Protect server documentation.
• The file size must be larger than 2 KB.
Options File
Place this option in the client options file (dsm.opt). You can set this option by selecting the
Deduplication > Enable Deduplication check box of the Preferences editor. The option can be set in the
client option set on IBM Spectrum Protect server.
Syntax
No
DEDUPLication
Yes
Parameters
No
Specifies that you do not want to enable client-side data deduplication for backup and archive
processing. No is the default.
Yes
Specifies that you want to enable client-side data deduplication for backup and archive processing.
Examples
Options file:
deduplication yes
Command line:
-deduplication=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
Deletefiles
Use the deletefiles option with the archive command to delete files from your workstation after you
archive them.
You can also use this option with the restore image command and the incremental option to delete
files from the restored image if they were deleted after the image was created. Deletion of files is
performed correctly if the backup copy group of the IBM Spectrum Protect server has enough versions for
existing and deleted files.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
DELetefiles
348 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
There are no parameters for this option.
Examples
Command line:
Description
The description option assigns or specifies a description for files when performing archive, delete
archive, retrieve, query archive, or query backupset.
For example, if you want to archive a file named budget.jan and assign to it the description "2002 Budget
for Proj 1", you would enter:
Note:
1. The maximum length of a description is 254 characters.
2. Enclose the value in quotation marks (" ") if the option value that you enter contains a blank space.
Use the description option with the following commands:
• archive
• delete archive
• query archive
• query backupset
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
DEScription = description
Parameters
description
Assigns a description to the file you are archiving. If you do not specify a description with the
archive command, the default is Archive Date:x, where x is the current system date. Note that
the date is always 10 characters long. If your date format uses a two digit year, there are two blank
spaces at the end of the date. For example, a default description using a four-digit year might be
"Archive Date: 2002/05/03", and the same default with a two-digit year might be "Archive
Date: 02/05/03 " (note the two spaces at the end). When retrieving files using the two-digit year
description, you can enter the -description option string in either of the following ways:
You can then use the description to retrieve all of the files.
Examples
Command line:
Detail
Use the detail option to display management class, file space, backup, archive information, and
additional information, depending on the command with which it is used.
Use the detail option with the query mgmtclass command to display detailed information about each
management class in your active policy set. If you do not use the detail option, only the management
class name and a brief description are displayed on the screen. If you specify the detail option,
information about attributes in each copy group contained in each management class is displayed on the
screen. A management class can contain a backup copy group, an archive copy group, both, or neither.
A Unicode-enabled file space might not display correctly if the server cannot display the Unicode name.
In this case, use the file space identifier (fsID) of the file space to identify these file spaces on the server.
Use the detail option with the delete filespace and query filespace commands to determine
the fsID of a file space. The fsID also appears in the file information dialog in the backup-archive client
GUI.
Use the detail option with the query backup and query archive commands to display these
attributes of the file that you specify:
• Last modification date
• Last access date
• Compression
• Encryption type
• Client-side data deduplication
• Whether the HSM client migrated or premigrated the file
Use the detail option with the query adobjects command to display detailed information about
Active Directory objects, including all of their attributes.
Use the detail option with the query adobjects command to display detailed information about
Active Directory objects, including all of their attributes.
Use the detail with the query vm command to display the following statistics:
• The average number of IBM Spectrum Protect objects that are needed to describe a single megablock,
across all megablocks in a backup.
• The average number of IBM Spectrum Protect objects that are needed to describe a single megablock,
for all megablocks in a filespace.
• The ratio of the amount of data, reported by Change Block Tracking, versus the amount of data that was
actually backed up, in a specific backup.
• The ratio of the amount of data, reported by Change Block Tracking, versus the amount of data that was
actually backed up, for all backups in this filespace.
• The number of backups that were created since the last full backup was created from the production
disks.
350 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The values returned on query vm can help you fine tune the heuristics (see the Mbobjrefreshthresh
and Mbpctrefreshthresh options) to fine tune the values trigger for megablock refreshes.
Use the detail option with the following commands:
• delete filespace
• incremental
• query adobjects
• query archive
• query backup
• query filespace
• query inclexcl
• query mgmtclass
• query systemstate
• query vm
Supported Clients
This option is valid for all clients. This option is not set in the client options file; use it by adding it to the
command line when you enter any of the commands that support it. The IBM Spectrum Protect API does
not support this option.
Syntax
DETail
Parameters
There are no parameters for this option.
Examples
Command line:
Diffsnapshot
The diffsnapshot option controls whether the backup-archive client creates the differential snapshot
when it runs a snapshot difference incremental backup.
If the differential snapshot is not created by the client, the latest snapshot found on the volume is used as
the differential snapshot and as the source for the backup operation.
The default value is to create the differential snapshot. This option is ignored the first time that the
snapdiff option is used. The first time the snapdiff option is used on a volume, a snapshot must be
created and used as the source for a full incremental backup. Snapshots that are created by the backup-
archive client are deleted by the client after the next snapshot difference incremental backup is complete.
Supported Clients
This option is valid for all Windows clients.
Syntax
create
DIFFSNAPSHOT
latest
Parameters
create
Specifies that you want to create a new, persistent, snapshot to use as the source snapshot. This
value is the default.
latest
Specifies that you want to use the latest snapshot that is found on the file server as the source
snapshot.
Examples
Command line:
Perform a snapdiff incremental backup from a snapshot that was taken of a network share //
homestore.example.com/vol/vol1 mounted on drive H:, where homestore.example.com is a
file server.
incremental -snapdiff H:
Perform a snapdiff incremental backup from a snapshot that was taken of a network share //
homestore.example.com/vol/vol1 mounted on drive H:, where homestore.example.com is a
file server. The -diffsnapshot option value of LATEST means the operation uses the latest
snapshot (the active snapshot) for volume H:.
incremental -snapdiff H: -diffsnapshot=latest
Related concepts
“Snapshot differential backup with an HTTPS connection” on page 141
You can use a secure HTTPS connection for the backup-archive client to communicate with a NetApp filer
during a snapshot differential backup.
Related tasks
“Configuring NetApp and IBM Spectrum Protect for snapshot difference incremental backups” on page 73
You must configure the NetApp file server connection information to run the snapshot difference
incremental backup command on the backup-archive client. You must also use the set password
command to specify the file server host name, and the password and user name that is used to access the
file server.
Related reference
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
“Snapdiffhttps” on page 504
352 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Specify the snapdiffhttps option to use a secure HTTPS connection for communicating with a NetApp
filer during a snapshot differential backup.
“Createnewbase” on page 339
The createnewbase option creates a base snapshot and uses it as a source to run a full incremental
backup.
Diffsnapshotname
The diffsnapshotname option allows you to specify which differential snapshot, on the target filer
volume, to use during a snapshot differential backup. This option is only specified if you also specify
diffsnapshot=latest.
If this option is not specified, diffsnapshot=latest selects the most recent existing snapshot on the
filer volume and uses it as the differential snapshot.
Supported Clients
This option can be used with supported Windows clients.
Options File
This option can be specified in the client options file or on the command line.
Syntax
DIFFSNAPSHOTName snapshot_name
Parameters
snapshot_name
Specifies the name of an existing snapshot to use as the differential snapshot.
You can also use a pattern with wildcard characters to select a snapshot. Wildcards can be either of
the following characters:
*
An asterisk (*) matches any character.
?
A question mark (?) matches a single character.
The most recent snapshot that matches the wildcard pattern is selected as the differential snapshot.
Examples
Options file:
diffsnapshotname volume_base_snap
diffsnapshotname nightly.?
Command line:
Related information
Basesnapshotname
Useexistingbase
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup tab, Directory
Management Class section in the Preferences editor.
Syntax
DIRMc mgmtclassname
Parameters
mgmtclassname
Specifies the name of the management class that you want to associate with directories. The client
uses the management class name that you specify for all of the directories that you back up. If you do
not specify this option, the client associates the management class with the longest retention period
with directories.
Examples
Options file:
dirm managdir
Command line
Does not apply.
Related information
If you want to back up specific files to a management class see “Assign a management class to files” on
page 261 for more information.
Dirsonly
The dirsonly option processes directories only. The client does not process files.
Use the dirsonly option with the following commands:
• archive
354 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• incremental
• query archive
• query backup
• restore
• restore backupset
• retrieve
• selective
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
DIrsonly
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc query backup -dirsonly c:*
Disablenqr
The disablenqr option specifies whether the backup-archive client can use the no-query restore
method for restoring files and directories from the server.
If you set the disablenqr option to no (the default), the client can use the no-query restore process.
If you set the disablenqr option to yes, the client can use only the standard restore process (also
known as "classic restore").
Note: There is no option or value to specify that the client can use only the no-query restore method.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Options File
Place this option in the dsm.opt file.
Syntax
No
DISABLENQR
Yes
Parameters
No
Specifies that the client can use the no-query restore method. This is the default.
Examples
Options file:
disablenqr yes
Command line
-disablenqr=yes
Diskbuffsize
The diskbuffsize option specifies the maximum disk I/O buffer size (in kilobytes) that the client can
use when reading files. The diskbuffsize option replaces the largecommbuffers option.
Optimal backup, archive migration client performance can usually be achieved if the value for this option
is equal to or smaller than the amount of file read ahead provided by the client file system. A larger buffer
requires more memory and it might not improve performance.
Important: Use the default setting, unless otherwise directed by IBM support personnel.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
DISKBuffsize size
Parameters
size
Specifies the maximum disk I/O buffer size (in kilobytes) that the client uses when reading files. The
range of values is 16 through 1023; the default is 32.
Examples
Options file:
diskbuffsize 64
Command line:
Does not apply.
Diskcachelocation
The diskcachelocation option specifies the location where the disk cache database is created if the
option memoryefficientbackup=diskcachemethod is set during an incremental backup.
You can specify the diskcachelocation option in your option file, or with the include.fs option. If
the diskcachelocation option appears in the option file, its value is used for all file systems not
represented by an include.fs option containing the diskcachelocation option.
The disk cache is a temporary file which is deleted after the incremental command is run. Use this
option to select one of the following:
1. A location that has more free disk space if, when you are using
memoryefficientbackup=diskcachemethod, you get the message that the disk cache file cannot
be created because you do not have enough disk space.
356 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
2. A location on a different physical volume to reduce contention for the disk access mechanism, and
therefore improve performance.
Important: For performance reasons, do not use a remote drive for diskcachelocation.
The actual amount of disk space required for the disk cache file created by disk cache incremental
backups depends on the number of files and directories included in the backup and on the average length
of the files and directories to be backed up. Estimate 2 bytes per character in the path name. For
example, if there are 1 000 000 files and directories to be backed up and the average path length is 200
characters, then the database occupies approximately 400 MB. Another way to estimate for planning
purposes is to multiply the number of files and directories by the length of the longest path to establish a
maximum database size.
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
DISKCACHELocation path
Parameters
path
Specifies the location where the disk cache database is created if
memoryefficientbackup=diskcachemethod. The default location is to create the disk cache file
in the root of the file space being processed.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$: \\computer7\D$\temp\diskcache.
Examples
Options file:
diskcachelocation c:\temp
diskcachelocation c:\tivoli\data
Command line:
Does not apply.
See “Include options” on page 407 for more information about include.fs.
Domain
The domain option specifies what you want to include for incremental backup.
Domain objects are backed up only if you start the incremental command without a file specification.
The backup-archive client uses the domain value in the following situations to determine which drives to
process during an incremental backup:
• When you run an incremental backup by using the incremental command, and you do not specify
which drives to process.
• When your IBM Spectrum Protect administrator defines a schedule to run an incremental backup for
you, but does not specify which drives to process.
• When you select the Backup Domain action from the backup-archive client GUI
You can define the domain option in the following locations:
Example 2: This example uses multiple domain statements to back up all local file systems except for the
system state:
Example 3: This example excludes the system state from a backup operation. If no other domain
statement is used, the result is an empty domain. Nothing is backed up.
domain -systemstate
If you start the incremental command with a file specification, the client ignores any domain definitions
and backs up only the file specification.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the options file, dsm.opt. You can set this option on the Backup tab, Domain for
Backup section of the Preferences editor.
Syntax
all-local
DOMain
object
-object
systemstate
-systemstate
358 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
all-local
Back up all local volumes on the system, and the Windows system state. This is the default setting.
Local volumes are defined as volumes that are formatted with a supported file system (ReFS, NTFS,
FAT32, or FAT) on a direct-attached storage device, including SAN and iSCSI attached storage.
Directories that are mapped to drive letters by using the Windows subst command are included in a
backup if the mapped directory is on a local disk.
The following types of volumes are not included when all-local is specified:
• Network attached volumes, including CIFS shares that are mapped to drive letters.
• Removable volumes, including CD/DVD drives, USB thumb drives, and floppy diskette drives. Some
USB-attached hard disks are included in the all-local domain if Windows does not classify them
as a removable storage device.
object
Specifies the domain objects to include in the domain.
An object name must be enclosed in quotation marks if the name includes any spaces.
-object
Specifies the domain objects to exclude from the domain.
An object name must be enclosed in quotation marks if the name includes any spaces.
systemstate
Back up the Windows system state. The systemstate domain is included in the all- local
domain.
-systemstate
Exclude system state from backup processing.
Examples
Options file:
An options file can contain more than one domain statement. However, each of the domain
statements is an example of a single statement in an options file.
domain c: d: e:
domain c: systemstate
domain ALL-LOCAL -systemstate
domain ALL-LOCAL -c:
domain ALL-LOCAL -\\florence\e$
A single domain statement can list one or more objects for the domain. You can use more than one
domain statement. The following two examples from two options files yield the same domain result:
Example 1
...
domain fs1
domain all-local
domain -fs3
...
Example 2
...
domain all-local fs1 -fs3
...
Command line:
-domain="c: d:"
-domain="ALL-LOCAL -c: -systemstate"
Related information
Domain.image
The domain.image option specifies what you want to include in your client domain for an image backup.
Raw logical volumes must be named explicitly.
If you do not specify a file system with the backup image command, the file systems you specify with
the domain.image option are backed up.
When you specify a file system with the backup image command, the domain.image option is ignored.
If you do not use the domain.image option to specify file systems in your client options file, and you do
not specify a file system with the backup image command, a message is issued and no backup occurs.
Supported Clients
This option is valid for all supported Windows clients. The server can also define this option. The IBM
Spectrum Protect API does not support this option.
360 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place this option in the client options file (dsm.opt). You can set this option in the Backup > Domain for
Backup box in the Preferences editor.
Syntax
DOMAIN.IMage
domain
Parameters
domain
Defines the file systems or raw logical volumes to include in your default client image domain.
Examples
Options file:
domain.image d: e: f: domain.image f:\mnt\raw\rawmnt1 f:\mnt\fs\fsmnt1
Command line:
Does not apply.
Domain.nas
The domain.nas option specifies the volumes to include in your NAS image backups.
You can specify all-nas to include all the mounted file systems on the NAS file server, except those you
exclude with the exclude.fs.nas option.
The backup-archive client uses your domain for NAS image backups when you run a backup nas
command and you do not specify which volumes to process.
When you use this option in your client system options file (dsm.opt), the domain.nas option defines
your default domain for NAS image backups.
When you perform a NAS file system image backup using the backup nas command, the client adds
volumes that you specify on the command line to the volumes defined in your dsm.opt file. For example, if
you enter domain.nas nas1/vol/vol0 nas1/vol/vol1 in your dsm.opt file and you enter dsmc
backup nas -nasnodename=nas1 /vol/vol2 on the command line, the client backs up the vol/
vol0, vol/vol1, and vol/vol2 volumes on node nas1.
If you set the domain.nas option to all-nas in the dsm.opt file, the client backs up all mounted
volumes on the NAS file server. When performing a backup, if you use a file specification and set the
domain.nas option to all-nas in the dsm.opt file, all-nas takes precedence.
Supported Clients
This option is valid for all Windows clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt).
all-nas
DOMAIN.Nas
domain
Parameters
domain
Defines the volumes you want to process. You cannot exclude volumes by specifying the dash (-)
operator.
all-nas
Processes all mounted volumes on the NAS file server, except those you exclude with the
exclude.fs.nas option. This is the default. If there is no domain.nas statement in the dsm.opt file
and no volumes specified on the command line, the client backs up all mounted volumes on the NAS
server.
Examples
Options file:
Command line:
Does not apply.
Domain.vmfull
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
362 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
vmhostfolder
vmdatacenter
When you use domain-level parameters, virtual machines that are created in the domain are
automatically included when the next backup occurs. For example, if you use the vmfolder parameter to
back up all virtual machines included in a folder, any new virtual machines that get added to that folder
are included in the next backup. The same is true of pattern-matched names that are included in a
wildcard match.
The virtual machines that are specified on the domain.vmfull option are processed only when the
backup vm command is entered without specifying a virtual machine or a list of virtual machines on the
command line.
Supported Clients
This option can be used with supported Windows clients.
The server can also define this option.
Options file
Set this option in the client options, by using the command line, or by using the VM Backup tab of the
Preferences editor.
Restriction: The following parameters cannot be set in the Preferences Editor. Include this setting in the
options file, or on the command line when you run a backup vm command:
vmname:vmdk=vmdk_label
schedule-tag
vmresourcepool
vmhostfolder
vmdatacenter
vmname1,vmname2
DOMAIN.VMFUll
VM=vmname1,vmname2
-VM=vmname1,vmname2
ALL-VM
ALL-WINdows
SCHEDULE-TAG
VMHost=srv1,srv2
VMFolder=foldername1,foldername2
VMHOSTCLUSTER=cluster1,cluster2
VMDATASTORE=datastore1,datastore2
VMRESOURCEPOOL=resourcepool1,resourcepool2
VMHOSTFOLDER=hostfolder1,hostfolder2
VMDATACENTER=datacenter1,datacenter2
Syntax rules: Multiple keywords must be separated by a semicolon. Do not include any spaces after the
semicolons. Multiple virtual machine or domain names must be separated by commas, with no space
Parameters
vmname
Specifies the virtual machine name that you want to process. The name is the virtual machine display
name. You can specify a list of virtual machine host names by separating the names with commas
(vm1,vm2,vm5). The names are case-sensitive.
vm=vmname
The vm= keyword specifies that the next set of values is a list of virtual machine names. The vm=
keyword is the default and is not required.
In this example, vm= is not specified and commas are used to separate the machine names.
domain.vmfull my_vm1,my_vm2
If you specify multiple keywords, such as vm= and vmfolder=, the values that the keywords refer to
must be separated by semicolons, with no intervening space characters:
domain.vmfull vm=my_vm1;vm=my_vm2
domain.vmfull vm=my_vm1;vmfolder=folder1;vmfolder=folder2
Wildcard characters can be used to select virtual machine names that match a pattern. An asterisk (*)
matches any sequence of characters. A question mark (?) matches any single character, for example:
• Exclude all files that have "test" in the host name: -vm=*test*
• Include all virtual machines with names such as: "test20", "test25", "test29", "test2A": vm=test2?
You can exclude a virtual machine from a backup operation by specifying the exclude operator (-)
before the vm= keyword. For example, -vm is used to exclude a particular machine, or machines, from
a domain level backup, such as, ALL-Windows, ALL-VM, and VMFolder. If "vm1" is the name of a
virtual machine in a folder that is named "accountingDept", you can back up all of the virtual machines
in the folder, but prevent the virtual machine "vm1" from being backed up. Set the following option:
domain.vmfull VMFolder=accountingDept;-vm=vm1
You cannot use the exclude operator (-) to exclude a domain, such as ALL-VM, ALL-Windows, or
VMFolder. The exclude operator works only at the virtual machine name level.
vmname:vmdk=vmdk_label
The :vmdk= keyword applies only to VMware virtual machines and its use requires a license for IBM
Spectrum Protect for Virtual Environments: Data Protection for VMware.
This option is typically used to exclude disks (see the :-vmdk syntax) from being backed up. You can
also include virtual machine disks by using the INCLUDE.VMDISK option or exclude virtual machine
disks by using the EXCLUDE.VMDISK option.
The virtual disks within a virtual machine have disk labels that uniquely identify each virtual disk. You
use the :vmdk= keyword to specify the labels of the virtual disks that you want to be included in a
Backup VM operation. If you do not specify :vmdk= and a disk label, all virtual disks in the virtual
machine are backed up.
Assume that there is a virtual machine named "my_vm_example". This virtual machine has four disks
(labeled Hard Disk 1, Hard Disk 2, Hard Disk 3, Hard Disk 4). To include only Hard
Disk 2 and Hard Disk 3 in a backup, add the :vmdk= keyword and disk label for those disks. Quotation
marks are necessary around the parameters because the disk labels contain space characters. For
example:
This next example backs up Hard Disk 1 and Hard Disk 2 on VM1, and Hard Disk 3 and Hard Disk 4 on
VM2. A comma is used to separate the virtual machine information.
364 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
domain.vmfull "vm1:vmdk=Hard Disk 1:vmdk=Hard Disk 2",
"vm2:vmdk=Hard Disk 3:vmdk=Hard Disk 4"
Similar to the -vm= keyword, you can also use the exclusion operator (-) with :vmdk= to exclude disks
from a backup operation.
To back up a virtual machine (vm1) and exclude disks 3 and 4, use the following syntax:
To back up two virtual machines, vm1 and vm2, and exclude the first two disks on each machine, use
the following syntax:
You can include one or more disks on a domain.vmfull statement. You can exclude one or more
disks on a domain.vmfull statement. You can mix include and exclude disks on the same
statement. For example, the following statement is valid:
domain.vmfull
"vm1:vmdk=Hard Disk 1:-vmdk=Hard Disk 2:vmdk=Hard Disk 3:vmdk:Hard Disk 4"
If an include statement is present, all other disks in the virtual machine are excluded from a backup
operation, unless the other disks are also specified in an include statement. For example, the
following statement excludes all hard disks on vm1, except for Hard Disk 1:
all-vm
For VMware virtual machines. This option processes all virtual machines that are defined to the Virtual
Center or to the ESX server that is specified on the vmchost option.
all-windows
For VMware virtual machines. This option processes all virtual machines that are defined to the Virtual
Center or to the ESX server that is specified on the vmchost option. The virtual machines must also
have a guest operating system type of Windows.
schedule-tag
For scheduled backups of VMware virtual machines. This option processes all virtual machines that
are defined to the Virtual Center server that is specified on the vmchost option.
The IBM Spectrum Protect server administrator can add this option to a schedule definition to
indicate that the schedule is compatible with the Schedule (IBM Spectrum Protect) category
and tag. Virtual machines in VMware objects that are assigned with the Schedule tag are backed up
according to the schedule.
Requirement: To be compatible for tagging, the -domain.vmfull option must contain no additional
domain-level parameters other than the Schedule-Tag parameter in the schedule definition.
Otherwise, the Schedule (IBM Spectrum Protect) tag is ignored. The option is case insensitive
and must contain no spaces. Quotation marks that enclose the Schedule-Tag parameter are
optional. Virtual machines in VMware containers that are tagged with incompatible schedules are not
backed up.
For more information about the Schedule tag, see "Supported data protection tags.".
vmhost=hostname
For VMware virtual machines. This option processes all virtual machines that are defined to the Virtual
Center or to the ESX server that is specified on the vmchost option. The host name that you specify
366 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
vmhostfolder=hostfoldername
For VMware virtual machines. This option processes all virtual machines that are defined to the Virtual
Center server that is specified on the vmchost option. The virtual machines must also exist in the
VMware host folder that is specified by the host folder name. The host folder name can include
multiple VMware host folders that are separated by commas, for example:
VMHOSTFOLDER=hostfolder1,hostfolder2
vmdatacenter=datacentername
For VMware virtual machines. This option processes all virtual machines that are defined to the Virtual
Center server that is specified on the vmchost option. The virtual machines must also exist in the
VMware datacenter that is specified by the datacenter name. The datacenter name can include
multiple datacenters that are separated by commas, for example:
VMDATACENTER=datacenter1,datacenter2
Tip: If you specify more than one container type, for example, vmfolder=folder1 and
vmhostcluster=cluster2, all virtual machines that are contained in folder1 and cluster2 are
protected. The virtual machines do not have to be in both folder1 and cluster2.
You can specify the virtual machines as shown in this example:
domain.vmfull=vmfolder=folder1;vmhostcluster=cluster2
domain.vmfull all-vm
Include all virtual machines in full VM backup operations, except for the ones that have a name suffix
of _test.
domain.vmfull all-vm;-vm=*_test
Include all virtual machines that have Windows as the operating system, in full VM backup operations.
domain.vmfull all-windows
Include all virtual machines in cluster servers 1, 2, and 3 in full VM backup operations.
domain.vmfull vmhostcluster=cluster1,cluster2,cluster3
domain.vmfull vmdatastore=datastore1
Include all virtual machines in full VM backup operations, but exclude virtual machines testvm1 and
testmvm2.
domain.vmfull all-vm;-VM=testvm1,testvm2
Include the virtual machines that are defined in the VM folders that are named lab1 and lab2 in full
VM backup operations.
domain.vmfull vmfolder=lab1,lab2
Include all virtual machines on the ESX hosts named "brovar", "doomzoo", and "kepler" in full VM
backup operations.
domain.vmfull vmhost=brovar.example.com,
doomzoo.example.com,kepler.example.com
domain.vmfull vmresourcepool=resourcepool_A,resroucepool_B
Include the virtual machines that are defined in the VMware host folders named hostfolder1 and
hostfolder2 in full VM backup operations.
domain.vmfull vmhostfolder=hostfolder1,hostfolder2
Include all virtual machines in VMware datacenter dc1 in full VM backup operations.
domain.vmfull vmdatacenter=dc1
Related reference
“Supported data protection tags” on page 739
IBM Spectrum Protect data protection tags can be assigned to VMware inventory objects to control how
virtual machine backups are managed.
“Exclude.vmdisk” on page 384
The EXCLUDE.VMDISK option excludes a virtual machine disk from backup operations.
“Include.vmdisk” on page 414
The INCLUDE.VMDISK option includes a virtual machine (VM) disk in backup operations. If you do not
specify one or more disk labels, all disks in the VM are backed up.
Enable8dot3namesupport
The enable8dot3namesupport option specifies whether the client backs up and restores short 8.3
names for files that have long names on NTFS file systems.
Supported Clients
This option is valid for all Windows clients.
A file with a long file name might not have a short 8.3 name if short name generation is disabled on the
Windows system. This option is effective only for NTFS file systems.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab of the
Preferences editor.
Syntax
No
ENABLE8DOT3NAMESupport
Yes
Parameters
No
Short 8.3 names for files with long file names are not backed up or restored. This is the default.
Yes
Short 8.3 names for files with long file names are backed up and restored.
Each short name uses up to 14 additional bytes in the server database. Although this is a small
number, if there are many files with short 8.3 names on many Windows systems, this can increase the
size of the IBM Spectrum Protect server database.
Important: Consult with your IBM Spectrum Protect server administrator before you use this option.
368 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The first backup that runs with this option causes all files that have short 8.3 names to be updated on the
IBM Spectrum Protect server, even if the files have not otherwise changed. This is because the client is
adding the short 8.3 names to the active backup versions.
If this option is enabled for restore, the client attempts to set the short 8.3 name for restored files, even if
short name generation is disabled on the Windows system. The client must run under a Windows account
that possesses the SE_RESTORE_NAME privilege in order for this option to be effective. See your system
administrator if you have questions about account privileges.
During restore, the short 8.3 name of a file is not restored if another object in the same directory already
has the same short 8.3 name. In this case, the file is restored and an informational message is logged
indicating that the short name could not be set. If the file must be restored with its original short name,
you must resolve the conflict with the existing file, and then try the restore again.
Important: This parameter can cause unexpected results in some cases. For example, if the short name
of a file changes between the last time the file was backed up and the time it is restored, and there is a
link or registry entry that refers to the newer short name, then restoring the file with the older short name
invalidates the references to the newer short name.
Examples
Options file:
enable8dot3namesupport yes
Command line:
-enable8dot3namesupport=yes
Enablearchiveretentionprotection
The enablearchiveretentionprotection option allows the client to connect to the IBM Spectrum
Protect for Data Retention server. This ensures that archive objects will not be deleted from the server
until policy-based retention requirements for that object have been satisfied.
This option is ignored if the client connects to a server that is not retention protection enabled. If the
option is no (the default) and an attempt is made to connect to a data retention server, the connection is
refused.
The data retention server is specially configured for this task, so normal backup or restore processing is
rejected by the server. When the client is connected to a data retention server, the following commands
will not be available. If you attempt to use these commands, a message is displayed indicating that they
are not valid with this server.
• incremental
• backup (all subcommands)
• selective
• restore (all subcommands except restore backupset -location=file or -location=tape)
Note: restore backupset -location=file or -location=tape do not connect to any server
(except the virtual one) and thus will not be blocked under any circumstances.
• restart restore
• delete backup
• delete group
• expire
• All queries except:
– query access
– query archive
– query filespace
– query inclexcl
Supported Clients
This option is valid for all clients.
Options File
This option is valid only in client options file (dsm.opt) and is not valid in a client option set from the
server. It is not valid on any command line.
Syntax
No
ENABLEARCHIVERETENTIONProtection
Yes
Parameters
No
The data retention server connection is refused. This is the default.
Yes
The client connects to a data retention server.
Enablededupcache
Use the enablededupcache option to specify whether you want to use a cache during client-side data
deduplication. Using a local cache can reduce network traffic between the IBM Spectrum Protect server
and the client.
When you perform a backup or archive operation with the data deduplication cache enabled, the
specification of data extents that are backed up or archived are saved to the cache database. The next
time you run a backup or archive, the client queries the data deduplication cache and identifies the
extents of data that have been previously saved to the server. Data extents that are identical to data
extents on the server are not resent to the server.
If the server and the cache are not synchronized, the cache is removed and a new one is created.
Only one process can access the distributed data deduplication cache at a time. Concurrent backup
instances on a workstation, that use the same server and storage pool, must either use unique node
names or unique cache specifications. In this way, all the instances can use a local cache and optimize
the client-side data deduplication.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API also supports this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Deduplication >
Enable Deduplication Cache check box of the Preferences editor. The option can be set in the client
option set on the IBM Spectrum Protect server.
370 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
Yes*
ENABLEDEDUPCache
No
Parameters
Yes
Specifies that you want to enable data deduplication cache. If data deduplication is not enabled, this
setting is not valid. Yes is the default for the backup-archive client. No is the default for the IBM
Spectrum Protect API.
No
Specifies that you do not want to enable data deduplication cache.
Examples
Options file:
enablededupcache no
Command line:
-enablededupcache=no
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
“Deduplication” on page 347
Use the deduplication option to specify whether to enable redundant client-side data elimination
when data is transferred to the IBM Spectrum Protect server during backup and archive processing.
“Dedupcachepath” on page 346
Use the dedupcachepath option to specify the location where the client-side data deduplication cache
database is created.
“Dedupcachesize” on page 347
Use the dedupcachesize option to determine the maximum size of the data deduplication cache file.
When the cache file reaches its maximum size, the contents of the cache are deleted and new entries are
added.
Enableinstrumentation
By default, instrumentation data is automatically collected by the backup-archive client and IBM
Spectrum Protect API to identify performance bottlenecks during backup and restore processing. To
disable or later enable instrumentation, use the enableinstrumentation option.
With this option enabled, you do not have to wait for a customer service representative to direct you to
collect performance data when a problem occurs. Instead, the data can be collected whenever you run a
backup or restore operation. This feature can be helpful because you do not have to re-create the
problem just to collect performance data. The information is already collected by the client.
This option replaces the -TESTFLAG=instrument:detail, -TESTFLAG=instrument:API, and -
TESTFLAG=instrument:detail/API options that are used in previous versions of the client and API.
For each process, the following types of performance instrumentation data are collected:
• The activity names for each thread (such as File I/O, Data Verb, Compression, and
Transaction), the average elapsed time per activity, and the frequency of the activity.
• The total activity time of each thread.
• The command that was issued and the options that were used.
• The summary of the backup, restore, or query command.
Supported Clients
This option is valid for all clients and the IBM Spectrum Protect API.
Options File
Place this option in the client options file (dsm.opt).
Tip: This option is enabled by default, so typically, you do not need to place this option in the client
options file unless you need to disable the option.
Syntax
Yes
ENABLEINSTRUMENTATION
No
Parameters
Yes
Specifies that you want to collect performance data during backup and restore operations. The
default value is Yes, which means that performance data is collected even if you do not specify this
option.
By default, the performance data is stored in the instrumentation log file (dsminstr.log) in the
directory that is specified by the DSM_LOG environment variable. If you did not set the DSM_LOG
environment variable, the instrumentation log file is stored in the current directory (the directory
where you issued the dsmc command). If the file does not exist, the client creates the file and adds
performance data to the file.
No
Specifies that you do not want to collect performance data during backup and restore operations. If
the instrumentation log exists, no more data is added to the file.
372 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
enableinstrumentation yes
Command line:
This option is valid only on the initial command line. It is not valid in interactive mode.
Related tasks
Collecting client instrumentation data
Collecting API instrumentation data
Related reference
Instrlogmax
The instrlogmax option specifies the maximum size of the instrumentation log (dsminstr.log), in
MB. Performance data for the client is collected in the dsminstr.log file during backup or restore
processing when the enableinstrumentation option is set to yes.
Instrlogname
The instrlogname option specifies the path and file name where you want to store performance
information that the backup-archive client collects.
Enablelanfree
The enablelanfree option specifies whether to enable an available LAN-free path to a storage area
network (SAN) attached storage device.
A LAN-free path allows backup, restore, archive, and retrieve processing between the backup-archive
client and the SAN-attached storage device.
To support LAN-free data movement you must install and configure the IBM Spectrum Protect for SAN
storage agent on the client workstation.
Notes:
• If you place the enablelanfree option in the client options file (dsm.opt), but zero (0) bytes were
transferred through the SAN during an operation, ensure that you bind the data to a LAN-free enabled
management class.
• To restore backup sets in a SAN environment, see “Restore Backupset” on page 693 for more
information.
• When a LAN-free path is enabled, the SAN Storage Agent settings override the client
tcpserveraddress, tcpport, and ssl options. This override action occurs to ensure that both the
client and the Storage Agent use the same server communication options.
• Client encryption with the include.encrypt option is no longer supported for LAN-free backup and
archive operations to the IBM Spectrum Protect server V8.1.1 and later levels, or V7.1.8 and later V7
levels. LAN-free restore and retrieve operations of encrypted backup versions and archive copies
continue to be supported. If you need to encrypt data by using the include.encrypt option, in which
data is encrypted before it is sent to the server, use LAN-based backup or archive operations.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). You can also set this option by selecting the Enable
Lanfree check box on the General tab in the Preferences editor.
Parameters
Yes
Specifies that you want to enable an available LAN-free path to a SAN-attached storage device.
No
Specifies that you do not want to enable a LAN-free path to a SAN-attached storage device. This is the
default.
Examples
Options file:
enablelanfree yes
Command line:
-enablelanfree=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
To specify a communication protocol between the backup-archive client and storage agent, see
“Lanfreecommmethod” on page 427.
Encryptiontype
Use the encryptiontype option to specify the algorithm for data encryption.
The encryptiontype affects only backup and archive operations. The data that you include is stored in
encrypted form, and encryption does not affect the amount of data that is sent or received. During restore
and retrieve operations the encrypted data is decrypted with the proper encryption algorithm, regardless
of the setting for this option.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can also set this option on the Authorization tab
of the Preferences editor. The server can override this.
Syntax
AES128
ENCRYPTIONType
AES256
Parameters
AES128
AES 128-bit data encryption. AES 128-bit is the default.
AES256
AES 256-bit data encryption. AES 256-bit data encryption provides the highest level of data
encryption available in backup and archive operations.
374 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
encryptiontype aes128
Command line:
Does not apply.
Encryptkey
The backup-archive client supports the option to encrypt files that are being backed up or archived to the
IBM Spectrum Protect server. This option is enabled with the include.encrypt option.
All files matching the pattern on the include.encrypt specification are encrypted before the data is
sent to the server. There are three options for managing the key used to encrypt the files (prompt, save,
and generate). All three options can be used with either the backup-archive client or the IBM Spectrum
Protect API.
The encryption key password is case-sensitive and can be up to 63 characters in length
The following characters can be included in the encryption key password:
A-Z
Any letter, A through Z, uppercase or lowercase. You cannot specify national language characters.
0-9
Any number, 0 through 9
+
Plus
.
Period
_
Underscore
-
Hyphen
&
Ampersand
Note:
1. The API has an alternate way of specifying encryptkey=generate; the previous
enableclientencryptkey=yes option can also be specified to request generate encryption
processing.
2. The enableclientencryptkey=yes API option is still supported, so it is possible when using the
API to specify two conflicting options. For example, enableclientencryptkey=yes and
encryptkey=prompt or encryptkey=save.
3. When conflicting values are specified, the API returns an error message.
Attention: When using the prompt option, your encryption key is not saved in the Windows
Registry. If you forget the key, your data cannot be recovered.
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Authorization tab,
Encryption Key Password section of the Preferences editor.
generate
Parameters
save
The encryption key password is saved in the backup-archive client password file. A prompt is issued
for an initial encryption key password, and after the initial prompt, the saved encryption key password
in the password file is used for the backups and archives of files matching the include.encrypt
specification. The key is retrieved from the password file on restore and retrieve operations.
The password can be up to 63 bytes in length.
When the save option is specified for an API application, the initial key password must be provided
by the application using the API in the dsmInitEx function call. The API itself does not issue a
prompt to the user but relies on the application to prompt the user as necessary.
This parameter is the default.
Note: The following restrictions apply:
• This option can only be used when passwordaccess generate is also specified.
• The root user or an authorized user must specify the initial encryption key password.
prompt
The management of the encryption key password is provided by the user. The user is prompted for
the encryption key password when the client begins a backup or archive. A prompt for the same
password is issued when restoring or retrieving the encrypted file.
This password can be up to 63 bytes in length.
When the prompt option is specified for an API application, the key password must be provided by
the application using the API in the dsmInitEx function call. The API itself does not issue a prompt
to the user but relies on the application to prompt the user as necessary.
generate
An encryption key password is dynamically generated when the client begins a backup or archive.
This generated key password is used for the backups of files matching the include.encrypt
specification. The generated key password, in an encrypted form, is kept on the IBM Spectrum
Protect server. The key password is returned to the client to enable the file to be decrypted on restore
and retrieve operations.
Examples
Options file:
encryptkey prompt
Command line:
Does not apply.
Errorlogmax
The errorlogmax option specifies the maximum size of the error log, in megabytes. The default name
for the error log is dsmerror.log.
Log wrapping is controlled by the errorlogmax option. If errorlogmax is set to zero (0), the size of the
log is unlimited; logged entries never "wrap" and begin overwriting earlier logged entries. If
errorlogmax is not set to zero, the newest log entries overwrite the oldest log entries after the log file
reaches its maximum size.
376 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Log pruning is controlled by the errorlogretention option. Pruned logs do not wrap. Instead, log
entries that are older than the number of days specified by the errorlogretention option are removed
from the log file.
If you change from log wrapping (errorlogmax option) to log pruning (errorlogretention option), all
existing log entries are retained and the log is pruned using the new errorlogretention criteria.
Pruned log entries are saved in a file called dsmerlog.pru.
If you change from using log pruning (errorlogretention option) to using log wrapping (errlogmax
option), all records in the existing log are copied to the dsmerlog.pru log file, the existing log is
emptied, and logging begins using the new log wrapping criteria.
If you simply change the value of the errorlogmax option, the existing log is extended or shortened to
accommodate the new size. If the value is reduced, the oldest entries are deleted to reduce the file to the
new size.
If neither errologmax nor errorlogretention is specified, the error log can grow without any limit on
its size. You must manually manage the log contents to prevent the log from depleting disk resources.
When the log has been created with neither option specified, if you later issue a command and specify the
errorlogretention option, the log is pruned using the retention value specified. When the log has
been created with neither option specified, if you later issue a command and specify the errorlogmax
option, the existing log is treated as if it was a pruned log. That is, the content of the dsmerror.log file
is copied to a file called dsmerlog.pru and new log entries are created in dsmerror.log and the log is
wrapped when it reaches its maximum size.
Note: If you specify a non-zero value for errorlogmax (which enables log wrapping), you cannot use the
errorlogretention option to create pruned logs. Logs can be pruned or wrapped, but not both.
Logs created with the errorlogmax option contain a log header record that contains information similar
to this example record:
LOGHEADERREC 661 104857600 IBM Spectrum Protect 8.1.0 Fri Dec 9 06:46:53 2011
Note that the dates and time stamps in the LOGHEADERREC text are not translated or formatted using the
settings specified on the dateformat or timeformat options.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
You can also set this option on the Client preferences tab in the GUI, by selecting Enable error log file
wrapping and by specifying a non-zero maximum size for the log file. To prevent log file wrapping, set
the maximum size to zero. When the maximum wrapping is set to zero, clearing or setting the Enable
error log file wrapping option has no effect; log wrapping does not occur if the maximum size is set to
zero.
Syntax
ERRORLOGMAX size
Parameters
size
Specifies the maximum size, in megabytes, for the log file. The range of values is 0 to 2047; the
default is 0, which disables log file wrapping and allows the log file to grow indefinitely.
Errorlogname
This option specifies the fully qualified path and file name of the file that contains the error messages.
The value for this option overrides the DSM_LOG environment variable. The dsmwebcl.log and
dsmsched.log files are created in the same directory as the error log file you specify with the
errorlogname option.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab, Select
Error Log button of the Preferences editor.
Syntax
ERRORLOGName filespec
Parameters
filespec
The fully qualified path and file name in which to store error log information. If any part of the path
you specify does not exist, the client attempts to create it.
Examples
Options file:
errorlogname c:\temp\dsmerror.log
Command line:
-errorlogname=c:\temp\dsmerror.log
This option is valid only on the initial command line. It is not valid in interactive mode.
The location of the log file specified using the Client Service Configuration Utility or the client
configuration wizard overrides the location specified in the client options file (dsm.opt).
Errorlogretention
The errorlogretention option specifies how many days to maintain error log entries before pruning,
and whether to save the pruned entries in other files.
The error log is pruned when the first error is written to the log after a client session is started. If the only
session you run is the client scheduler, and you run it twenty-four hours a day, the error log might not be
pruned according to your expectations. Stop the session and start it again to allow the scheduler to prune
the error log.
If you change from log pruning (errorlogretention option) to log wrapping (errorlogmax option), all
records in the existing log are copied to the dsmerlog.pru log file, the existing log is emptied, and
logging begins using the new log wrapping criteria.
378 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you change from log wrapping (errorlogmax option) to log pruning (errorlogretention option), all
existing log entries are retained and the log is pruned using the new errorlogretention criteria.
Pruned log entries are saved in a file called dsmerlog.pru.
If neither errologmax nor errorlogretention is specified, the error log can grow without any limit on
its size. You must manually manage the log contents to prevent the log from depleting disk resources.
When the log has been created with neither option specified, if you later issue a command and specify the
errorlogretention option, the log is pruned using the retention value specified. When the log has
been created with neither option specified, if you later issue a command and specify the errorlogmax
option, the existing log is treated as if it was a pruned log. That is, the content of the dsmerror.log file
is copied to a file called dsmerlog.pru and new log entries are created in dsmerror.log and the log is
wrapped when it reaches its maximum size.
Note: If you specify errorlogretention option to create pruned logs, you cannot specify the
errorlogmax option. Logs can be pruned or wrapped, but not both.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
You can also set this option on the Client preferences tab in the GUI, by selecting Prune old entries and
by specifying a value for Prune entries older than. Selecting the Save pruned entries option saves the
pruned log entries in the dsmerlog.pru log file.
Syntax
N D
ERRORLOGRetention
days S
Parameters
N or days
Specifies how long to wait before pruning the error log.
N
Do not prune the error log. This permits the error log to grow indefinitely. This is the default.
days
The number of days to keep log file entries before pruning the log. The range of values is zero
through 9999.
D or S
Specifies whether to save the pruned entries. Enter a space or comma to separate this parameter
from the previous one.
D
Discard the error log entries when you prune the log. This is the default.
S
Save the error log entries when you prune the log.
The pruned entries are copied from the error log to the dsmerlog.pru file located in the same
directory as the dsmerror.log file.
Exclude options
Use the exclude options to exclude objects from backup, image, or archive services.
For example, you might want to exclude this type of information:
• All temporary files
• Any local caches of network files
• All files that contain compiled object code that you can easily reproduce using other methods
• Your operating system files
You can exclude specific files from encryption processing during a backup.
You can exclude remotely accessed files by specifying Universal Naming Convention (UNC) names in your
exclude statement.
Note:
1. When you exclude a file that was previously included, existing backup versions become inactive during
the next incremental backup.
2. The exclude statements are not case sensitive.
3. The server can define exclude options with the inclexcl option.
4. As with other include-exclude statements, you can use the inclexcl option to specify a file that can
be in Unicode format, containing exclude statements with file names in Unicode.
Exclude any system files or images that could corrupt the operating system when recovered. Also exclude
the directory containing the IBM Spectrum Protect client files.
Use wildcard characters to exclude a broad range of files.
To exclude an entire directory called any\test, enter the following:
exclude.dir c:\any\test
To exclude subdirectories that begin with test under the any directory, enter the following:
exclude.dir c:\any\test*
Note: Defining an exclude statement without using a drive letter, such as exclude.dir code, excludes
the code directory on any drive from processing.
Supported Clients
This option is valid for all clients.
380 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place these options in the client options file (dsm.opt). You can set these options on the Include-Exclude
tab, Define Include-Exclude Options section of the Preferences editor.
Syntax
options pattern
Parameters
pattern
Specifies the file or group of files that you want to exclude.
Note: For NAS file systems: You must prefix the NAS node name to the file specification to specify the
file server to which the exclude statement applies. If you do not specify a NAS node name, the file
system identified refers to the NAS node name specified in the client options file (dsm.opt) or on the
command line.
If the pattern begins with a single or double quote or contains any embedded blanks or equal signs,
you must surround the value in either single (') or double (") quotation marks. The opening and closing
quotation marks must be the same type of quotation marks.
• For the exclude.image option, the pattern is the name of a file system or raw logical volume.
Examples
Options file:
exclude ?:\...\swapper.dat
exclude "*:\ea data. sf"
exclude ?:\io.sys
exclude ?:\...\spart.par
exclude c:\*\budget.fin
exclude c:\devel\*
exclude.dir c:\home\jodda
exclude.archive c:\home\*.obj
exclude.encrypt c:\system32\mydocs\*
exclude.compression c:\test\file.txt
exclude.fs.nas netappsj/vol/vol0
exclude.dedup c:\Users\Administrator\Documents\Important\...\*
exclude.dedup e:\*\* ieobjtype=image
exclude.dedup ALL ieobjtype=systemstate
exclude.dedup ALL ieobjtype=ASR
Command line:
Does not apply.
Related information
See “Exclude files with UNC names” on page 87 for examples of statements using UNC file names.
See “System files to exclude” on page 86 for a list of files that you should always exclude.
“Inclexcl” on page 406
See “Include and exclude groups of files with wildcard characters” on page 88 for a list of wildcard
characters that you can use. Then, if necessary, use the include option to make exceptions.
382 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Controlling compression processing
This topic lists some items to consider if you want to exclude specific files or groups of files from
compression processing during a backup or archive operation.
• Remember that the backup-archive client compares the files it processes against the patterns specified
in the include-exclude statements, reading from the bottom to the top of the options file.
• You must set the compression option to yes to enable compression processing. If you do not specify
the compression option or you set the compression option to no, the client does not perform
compression processing.
If you set the compression option to yes and no exclude.compression statements exist, the client
considers all files for compression processing.
• The client processes exclude.dir and other include-exclude statements first. The client then
considers any exclude.compression statements. For example, consider the following include-
exclude list:
exclude c:\test\*.*
exclude.compression c:\test\file.txt
include c:\test\file.txt
The client examines the statements (reading from bottom to top) and determines that the c:\test
\file.txt file is a candidate for backup, but is not a candidate for compression processing.
• Include-exclude compression processing is valid only for backup and archive processing. The
exclude.compression option does not affect whether files are excluded from backup or archive
processing, only whether they are excluded from compression processing.
Related reference
“Compression” on page 336
The compression option compresses files before you send them to the server.
exclude.fs.nas */vol/vol1
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Related reference
“Exclude.vmdisk” on page 384
Exclude.vmdisk
The EXCLUDE.VMDISK option excludes a virtual machine disk from backup operations.
The EXCLUDE.VMDISK option specifies the label of a virtual machine's disk to be excluded from a
backup vm operation. If you exclude a disk on the backup vm command, the command-line parameters
override any EXCLUDE.VMDISK statements in the options file.
This option is available only if you are using the IBM Spectrum Protect for Virtual Environments licensed
product. For more information about this option, see the IBM Spectrum Protect for Virtual Environments
product documentation on IBM Knowledge Center at http://www.ibm.com/support/knowledgecenter/
SSERB6/welcome.
Supported clients
This option can be used with supported Windows clients.
Options file
Set this option in the client options file. Command line parameters override statements in the options file.
Parameters
vmname
Specifies the name of the virtual machine that contains a disk that you want to exclude from a Backup
VM operation. The name is the virtual machine display name. You can specify only one virtual machine
name on each EXCLUDE.VMDISK statement. Specify additional EXCLUDE.VMDISK statements for
each virtual machine disk to exclude.
The virtual machine name can contain an asterisk (*), to match any character string, and question
mark (?) to match any one character. Surround the VM name with quotation marks (" ") if the VM name
contains space characters.
Tip: If the virtual machine name contains special characters, such as bracket characters ([) or (]), the
virtual machine name might not be correctly matched. If a virtual machine name uses special
characters in the name, you might need to use the question mark character (?) to match the special
characters in the VM name.
For example, to exclude Hard Disk 1 in the backup of a virtual machine named "Windows VM3
[2012R2]", use this syntax in the options file: EXCLUDE.VMDISK "Windows VM3 ?2012R2?"
"Hard Disk 1"
vmdk_label
Specifies the disk label of the disk that you want to exclude. Wildcard characters are not allowed. Use
the Backup VM command with the -preview option to determine the disk labels of disks in a given
virtual machine. See the "Backup VM" topic for the syntax.
Do not exclude disks on virtual machines that you are protecting with the INCLUDE.VMTSMVSS
option, if the disks contain application data.
384 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file
Assume that a virtual machine named vm1 contains four disks, labeled Hard Disk 1, Hard Disk 2, Hard
Disk 3, and Hard Disk 4. To exclude disk 2 from Backup VM operations, specify the following
statement in the options file:
Command line
The command line examples show the use of the exclusion operator (-) before the vmdk= keyword, to
indicate that the disk is to be excluded.
Exclude a single disk:
Related reference
“Backup VM” on page 622
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Include.vmdisk” on page 414
The INCLUDE.VMDISK option includes a virtual machine (VM) disk in backup operations. If you do not
specify one or more disk labels, all disks in the VM are backed up.
“INCLUDE.VMTSMVSS” on page 421
The INCLUDE.VMTSMVSS option notifies virtual machine applications that a backup is about to occur.
This option allows the application to truncate transaction logs and commit transactions so that the
application can resume from a consistent state when the backup completes. An optional parameter can
be specified to suppress truncation of the transaction logs.
Exclude.vmlocalsnapshot
This option excludes a VMware virtual machine from local backup operations.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
You can use this option only for virtual machines that are stored in a virtual volume (VVOL) datastore.
Supported clients
This option can be used with supported Windows clients that are configured to back up VMware virtual
machines.
Syntax
EXCLUDE.VMLOCALSNAPSHOT vmname
Parameters
vmname
Specifies the name of a virtual machine that you want to exclude from local backup operations. The
name is the virtual machine display name.
Only one virtual machine can be specified on each EXCLUDE.VMLOCALSNAPSHOT statement.
However, you can specify as many EXCLUDE.VMLOCALSNAPSHOT statements as needed to exclude
multiple virtual machines.
You can include wildcards in the virtual machine name. An asterisk (*) matches any character string. A
question mark (?) matches a single character. If the virtual machine name contains a space character,
enclose the name in double quotation marks (").
Tip: If the virtual machine name contains special characters, type the question mark wildcard in place
of the special characters when you specify the virtual machine name.
Example
The following EXCLUDE.VMLOCALSNAPSHOT statement in the client options file excludes a virtual
machine that is named VM1 from local backup operations:
exclude.vmlocalsnapshot VM1
Related reference
“Backup VM” on page 622
Fbbranch
Use the fbbranch option with the backup fastback or archive fastback commands.
The fbbranch option specifies the branch ID of the remote FastBack server to back up or archive. The
fbbranch option is only required when the backup-archive client is installed on the FastBack Disaster
Recovery Hub or when a dedicated proxy is connecting to a replicated FastBack Disaster Recovery Hub
repository. Do not specify the fbbranch option when the backup-archive client is installed on the
FastBack server.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
FBBranch= branch_ID
386 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
branch_ID
Specifies the FastBack server branch ID. The value is part of the disaster recovery configuration of the
FastBack server.
Examples
Command line:
-FBBranch=oracle
On a backup-archive client that is installed on the FastBack Disaster Recovery Hub:
Command line:
On a backup-archive client that is connecting to a repository on a remote FastBack Disaster Recovery
Hub:
If the fbbranch option is specified on a backup-archive client workstation that is installed on the
FastBack server, the fbbranch option is ignored.
Fbclientname
Use the fbclientname option with the backup fastback or archive fastback commands.
The fbclientname option is the name of one or more comma-separated FastBack clients to back up or
archive from the backup proxy. The values for the fbclientname option are invalid if more than one
policy is specified in the fbpolicyname option.
You cannot include spaces in the fbclientname option values.
If you do not specify any values for the fbvolumename option, all the volumes from all the FastBack
clients in the policy that is specified are backed up. If you specify multiple FastBack clients in the
fbclientname option, you cannot specify values for the fbvolumename option.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
,
FBClientname client_name
Parameters
client_name
Specifies the name of one or more FastBack clients. You can specify up to 10 FastBack client names.
Important:
When specifying the archive fastback or backup fastback command:
Examples
Command line:
Backs up all volumes for FastBack clients fbclient1 and fbclient2 that are found in policy Policy1.
Command line:
Backs up volumes C:\ and F:\ for FastBack client fbclient1 found in policy Policy1.
Command line:
Backs up all volumes for FastBack client fbWindowsClient found in policy Policy1.
The volumes for Linux FastBack client fbLinuxClient will not be backed up from the Windows
backup-archive client. To back up or archive volumes from a Linux FastBack client, use the Linux
backup-archive client.
Fbpolicyname
Use the fbpolicyname option with the backup fastback or archive fastback commands.
The fbpolicyname option is the name of one or more comma-separated FastBack policies that you want
to back up or archive from the backup proxy. You must specify at least one policy name. Specify multiple
policy names using a comma-delimited list of policies. There is no default value.
If one or more FB policy names contain spaces, you must specify them within quotation marks. Here is an
example: "FB Policy NAME1, FBPolicy Name 2".
If you do not specify any values for the fbclientname and fbvolumename options, all the volumes from
all the FastBack clients in the policies that are specified are backed up. If you specify multiple policies in
the fbpolicyname option, you cannot specify values for the fbclientname and fbvolumename
options.
If a policy specification contains both Windows and Linux FastBack clients, only the Windows volumes
will be backed up or archived to the IBM Spectrum Protect server by the Windows backup-archive client.
388 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
At least one snapshot should exist in the FastBack repository for the FastBack policies being archived or
backed up prior to issuing the dsmc command
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
,
FBPolicyname policy_name
Parameters
policy_name
Specifies the name of the FastBack policies. You can specify up to 10 FastBack policy names.
Important:
When specifying the archive fastback or backup fastback command:
1. At least one FBpolicyName is always required.
2. You can specify up to 10 values for FBPolicyName, if no values are specified for both FBClientName
and FBVolumeName.
3. When you specify a FBClientName value, there must be only one value for FBPolicyName.
4. You can specify up to 10 values for FBClientName if only one PolicyName is specified, and no values
for FBVolumeName are specified.
5. When you specify the FBVolumeName option, you can have only one FBPolicy, and only one
FBCLientName specified. You must specify exactly one FBClientName. It cannot be omitted.
6. You can specify multiple FBVolumeNames if condition 5 is satisfied.
7. You must always specify the FBReposLocation option for Linux.
Examples
Command line:
Backs up all volumes for all FastBack clients found in policies Policy1, Policy2 and Policy3.
To specify policies with spaces, enclose them in double quotation marks, for example:
-fbpolicyname="Policy 1,Policy2,Policy3"
Fbreposlocation
Use the fbreposlocation option with the backup fastback or archive fastback commands.
The fbreposlocation option specifies the location of the Tivoli Storage Manager FastBack repository
for the backup-archive client proxy to connect to issue Tivoli Storage Manager FastBack shell commands
necessary to mount appropriate snapshots.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
FBReposlocation repository_location
Parameters
repository_location
Specifies the Tivoli Storage Manager FastBack repository location.
Examples
Command line:
The fbreposlocation option is only required on a dedicated proxy machine. If the
fbreposlocation option is specified on a machine where the FastBack server or FastBack Disaster
Recovery Hub is installed, it is ignored.
Use this command when the IBM Spectrum Protect dedicated proxy client is connecting to a remote
Tivoli Storage Manager FastBack server repository:
390 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Fbserver
Use the fbserver option with the backup fastback or archive fastback commands.
The fbserver option specifies the short host name of the Tivoli Storage Manager FastBack server
workstation that owns the repository specified by the fbreposlocation option. For a DR Hub, the
fbserver option specifies the short name of the FastBack server workstation whose branch repository
the backup-archive client is connecting to.
The fbserver option is a key to retrieving the necessary user credentials required to connect to the
FastBack server repository or the DR Hub server repository for mount processing.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
-FBServer server_name
Parameters
server_name
Specifies the short hostname of the machine on which the FastBack server is installed.
Examples
Command line:
The IBM Spectrum Protect backup-archive client is running on the FastBack server machine whose
short name is myFbServer:
Command line:
The IBM Spectrum Protect backup-archive client is running on the FastBack Disaster Recovery Hub
machine and is connecting to the FastBack Server branch repository branch1. The short host name of
the FastBack server is myFbServer:
Command line:
The backup-archive client is running on a dedicated proxy machine and is connecting to a remote
FastBack server repository. The FastBack server is installed on a machine whose short name is
myFbServerMachine:
Command line:
The backup-archive client is running on a dedicated proxy machine and is connecting to a remote
FastBack repository on the FastBack DR Hub. The FastBack Server with branch ID branch1 is
installed on a machine whose short name is myFbServer.
Supported Clients
This option is valid for all Windows clients.
Options File
None. You can specify this option only on the command line. The server can also define or override this
option.
Syntax
,
FBVolumename volume_name
Parameters
volume_name
Specifies the name of the Tivoli Storage Manager FastBack volumes. You can specify up to 10
FastBack volume names.
Important:
When specifying the archive fastback or backup fastback command:
1. At least one FBpolicyName is always required.
2. You can specify up to 10 values for FBPolicyName, if no values are specified for both FBClientName
and FBVolumeName.
3. When you specify a FBClientName value, there must be only one value for FBPolicyName.
4. You can specify up to 10 values for FBClientName if only one PolicyName is specified, and no values
for FBVolumeName are specified.
5. When you specify the FBVolumeName option, you can have only one FBPolicy, and only one
FBCLientName specified. You must specify exactly one FBClientName. It cannot be omitted.
6. You can specify multiple FBVolumeNames if condition 5 is satisfied.
Examples
Command line:
Backs up volumes C:\ and F:\ from FastBack client Client1, found in policy Policy1.
Command line:
392 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Archives volumes C: and F: from FastBack client Client1, found in policy Policy1.
Filelist
Use the filelist option to process a list of files.
You can use the filelist option with the following commands:
• archive
• backup group
• delete archive
• delete backup
• expire
• incremental
• query archive
• query backup
• restore
• retrieve
• selective
The backup-archive client opens the file you specify with this option and processes the list of files within
according to the specific command. Except for the restore and retrieve commands, when you use the
filelist option, the client ignores all other file specifications on the command line.
The files (entries) listed in the filelist must adhere to the following rules:
• Each entry must be a fully-qualified or a relative path to a file or directory. Note that if you include a
directory in a filelist entry, the directory is backed up, but the contents of the directory are not.
• Each path must be specified on a single line. A line can contain only one path.
• Paths must not contain control characters, such as 0x18 (CTRL-X), 0x19 (CTRL-Y) and 0x0A (newline).
• By default, paths must not contain wildcard characters. Do not include asterisk (*) or question marks (?)
in a path.
• The filelist can be an MBCS file or a Unicode file with all Unicode entries. For Mac OS X, the filelist can
be encoded in the current operating system language or UTF-16.
• Quotation mark and wildcard processing works as described in the following list:
– If a path or file name contains a space, enclose the entire path in quotation marks (") or single
quotation marks ('). For example "C:\My Documents\spreadsheet.xls" or
'C:\My documents\spreadsheet.xls'.
– If a path contains one or more single quotation marks ('), enclose the entire entry in quotation marks
("). If a path contains one or more quotation marks, enclose the entire path in single quotation marks.
File list processing does not support paths that include a mix of quotation marks and single quotation
marks.
The following examples illustrate the correct and incorrect use of quotation marks and single
quotation marks in paths.
This path example contains a single quotation mark, so the path must be enclosed in quotation
marks:
"/home/gatzby/mydir/gatzby's_report.out"
This path example contains quotation marks, so it must be enclosed in single quotation marks:
'/home/gatzby/mydir/"top10".out'
This path example contains a space character, so it must be enclosed in either quotation marks or
single quotation marks:
or
'/home/gatzby/mydir/top 10.out'
This path example is not supported for filelist processing because it contains unmatched delimiters ("
and ’):
These paths are not supported for filelist processing because they contain wildcard characters:
/home/gatzby*
/home/*/20??.txt
• Any IBM Spectrum Protect filelist entry that does not comply with these rules is ignored.
The following are examples of valid paths in a filelist:
c:\myfiles\directory\file1
c:\tivoli\mydir\yourfile.doc
..\notes\avi\dir1
..\fs1\dir2\file3
"d:\fs2\Ha Ha Ha\file.txt"
"d:\fs3\file.txt"
You can use the filelist option during an open file support operation. In this case, the client processes
the entries in the filelist from the virtual volume instead of the real volume.
If an entry in the filelist indicates a directory, only that directory is processed and not the files within the
directory.
If the file name (the filelistspec) you specify with the filelist option does not exist, the command
fails. The client skips any entries in the filelist that are not valid files or directories. The client logs errors
and processing continues to the next entry.
Use file specifications with the restore and retrieve commands to denote the destination for the
restored filelist entries. For example, in the following restore command, d:\dir\ represents the
restore destination for all entries in the filelist.
However, in the following selective command, the file specification d:\dir\ is ignored.
If you specify a directory in a filelist for the delete archive or delete backup command, the
directory is not deleted. filelists that you use with the delete archive or delete backup command
should not include directories.
The entries in the list are processed in the order they appear in the filelist. For optimal processing
performance, pre-sort the filelist by file space name and path.
Note: The client might back up a directory twice if the following conditions exist:
• The filelist contains an entry for the directory
• The filelist contains one or more entries for files within that directory
• No backup of the directory exists
For example, your filelist includes the entries c:\dir0\myfile and c:\dir0. If the \dir0 directory
does not exist on the server, the c:\dir0 directory is sent to the server a second time.
394 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
FILEList = filelistspec
Parameters
filelistspec
Specifies the location and name of the file that contains the list of files to process with the command.
Note: When you specify the filelist option on the command line, the subdir option is ignored.
Examples
Command line:
sel -filelist=c:\avi\filelist.txt
Filename
Use the filename option with the query systeminfo command to specify a file name in which to store
information.
You can store information gathered from one or more of the following items:
• DSMOPTFILE - The contents of the dsm.opt file.
• ENV - Environment variables.
• ERRORLOG - The IBM Spectrum Protect error log file.
• FILE - Attributes for the file name that you specify.
• FILESNOTTOBACKUP - Enumeration of Windows Registry key:
HKEY_LOCAL_MACHINE\
SYSTEM\
CurrentControlSet\
BackupRestore\
FilesNotToBackup
This key specifies those files that back up products should not back up. The query inclexcl
command indicates that these files are excluded per the operating system.
• INCLEXCL - Compiles a list of include-exclude in the order in which they are processed during backup
and archive operations.
• KEYSNOTTORESTORE - Enumeration of Windows Registry key:
HKEY_LOCAL_MACHINE\
SYSTEM\
ControlSet001\
BackupRestore\
KeysNotToRestore
This key specifies those Windows Registry keys that back up products should not restore.
• MSINFO - Windows system information (output from MSINFO32.EXE).
• OPTIONS - Compiled options.
• OSINFO - Name and version of the client operating system.
• POLICY - Policy set dump.
• REGISTRY - IBM Spectrum Protect-related Windows Registry entries.
• SCHEDLOG - The contents of the schedule log (usually dsmsched.log.
SFP=C:\WINNT\SYSTEM32\MSVCRT.DLL
Supported Clients
This option is valid for all clients.
Syntax
FILEName = outputfilename
Parameters
outputfilename
Specifies a file name in which to store the information. If you do not specify a file name, by default the
information is stored in the dsminfo.txt file.
Examples
Command line:
query systeminfo dsmoptfile errorlog -filename=tsminfo.txt
Related information
“Console” on page 337
Filesonly
The filesonly option restricts backup, restore, retrieve, or query processing to files only.
You cannot restore or retrieve directories from the IBM Spectrum Protect server when using the
filesonly option with the restore or retrieve commands. However, directories with default
attributes are created, if required, as placeholders for files that you restore or retrieve.
You can also use the filesonly option with the following commands:
• archive
• incremental
• query archive
• query backup
• restore
• restore backupset
• restore group
• retrieve
• selective
396 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
FILESOnly
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc incremental -filesonly
Forcefailover
The forcefailover option enables the client to immediately fail over to the secondary server.
You can use the forcefailover option to immediately connect to the secondary server, even if the
primary server is still online. For example, you can use this option to verify that the backup-archive client
is failing over to the expected secondary server.
Do not edit this option during normal operations.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
FORCEFAILOVER
Yes
Parameters
Yes
Specifies that the client immediately connects to the secondary server.
No
Specifies that the client fails over to the secondary server during the next logon if the primary server is
unavailable. This value is the default.
Examples
Options file:
FORCEFAILOVER yes
Command line:
-FORCEFAILOVER=yes
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
Fromdate
Use the fromdate option with the fromtime option to specify a date and time from which you want to
search for backups or archives during a restore, retrieve, or query operation.
Files that were backed up or archived before this date and time are not included, although older
directories might be included, if necessary, to restore or retrieve the files.
Use the fromdate option with the following commands:
• delete backup
• query archive
• query backup
• restore
• restore group
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
FROMDate = date
Parameters
date
Specifies the date from which you want to search for backup copies or archived files. Enter the date in
the format you selected with the dateformat option.
When you include dateformat with a command, it must precede the fromdate, pitdate, and
todate options.
Examples
Command line:
dsmc query backup -fromdate=12/11/2003 c:\Windows\Program Files\*.exe
Fromnode
The fromnode option permits one node to perform commands for another node. A user on another node
must use the set access command to permit you to query, restore, or retrieve files for the other node.
Use the fromnode option with the following commands:
• query archive
• query backup
• query filespace
• query group
• query mgmtclass
• restore
398 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• restore group
• restore image
• retrieve
Supported Clients
This option is valid for all clients.
Syntax
FROMNode = node
Parameters
node
Specifies the node name on a workstation or a file server whose backup copies or archived files you
want to access.
Examples
Command line:
dsmc query archive -fromnode=bob -subdir=yes d:\
Note: The backup-archive client can use file space information when restoring files. The file space
information can contain the name of the computer from which the files were backed up. If you restore
from another backup-archive client node and do not specify a destination for the restored files, the client
uses the file space information to restore the files. In such a case, the client attempts to restore the files
to the file system on the original computer. If the restoring computer has access to the file system of the
original computer, you can restore files to the original file system. If the restoring computer can not
access the file system of the original computer, the client can return a network error message. If you want
to restore the original directory structure but on a different computer, specify only the target file system
when you restore. This is true when restoring files from another node and when retrieving files from
another node.
Fromtime
Use the fromtime option with the fromdate option to specify a beginning time from which you want to
search for backups or archives during a restore, retrieve, or query operation.
The backup-archive client ignores this option if you do not specify the fromdate option.
Use the fromtime option with the following commands:
• delete backup
• query archive
• query backup
• restore
• restore group
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
FROMTime = time
Examples
Command line:
dsmc q b -timeformat=4 -fromt=11:59AM -fromd=06/30/2003 -tot=11:59PM -
tod=06/30/2003 c:\*
Groupname
Use the groupname option with the backup group command to specify the name for a group. You can
only perform operations on new groups or the current active version of the group.
Supported Clients
This option is valid for all Windows clients.
Syntax
GROUPName = name
Parameters
name
Specifies the name of the group which contains the files backed up using the filelist option.
Directory delimiters are not allowed in the group name since the group name is not a file specification,
but a name field.
Examples
Command line:
Host
The host option specifies the target ESX server location where the new virtual machine is created during a
VMware restore operation.
Use this option on restore vm commands to specify the ESX host server to restore the data to.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Example
Restore the virtual machine to the ESX server named vmesxbld1.
restore vm -host=vmesxbld1.us.acme.com
400 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Httpport
The httpport option specifies a TCP/IP port address for the web client.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client system options file (dsm.opt). You can set this option on the Web Client tab,
in the HTTP Port field of the Preferences editor.
Syntax
HTTPport port_address
Parameters
port_address
Specifies the TCP/IP port address that is used to communicate with the web client. The range of
values is 1000 through 32767; the default is 1581.
Examples
Options file:
httpport 1502
Command line:
-httpport=1502
Hsmreparsetag
The hsmreparsetag option specifies a unique reparse tag that is created by an HSM product installed on
your system.
Many HSM products use reparse points to retrieve or recall migrated files. After a file is migrated, a small
stub file, with the same name as the original file, is left on the file system. The stub file is a reparse point
that triggers a recall of the original file when a user or application accesses the stub file. The reparse point
includes a unique identifier called a reparse tag to identify which HSM product migrated the file.
If the IBM Spectrum Protect backup-archive client does not recognize the reparse tag in a stub file, the
Backup-Archive Client causes the HSM product to recall the original file. You can prevent files from being
recalled if you specify the reparse tag with the hsmreparsetag option.
The backup-archive client recognizes the reparse tag of HSM products from the following companies:
• International Business Machines Corp.
• Wisdata System Co. Ltd.
• BridgeHead Software Ltd.
• CommVault Systems, Inc.
• Data Storage Group, Inc.
• Enigma Data Solutions, Ltd.
• Enterprise Data Solutions, Inc.
• Global 360
• GRAU DATA AG
• Hermes Software GmbH
• Hewlett Packard Company
Supported clients
This option is valid for all Windows clients.
Option file
Place this option in the client options file (dsm.opt).
Syntax
HSMREPARSETAG reparse_tag_value
Parameters
reparse_tag_value
A decimal (base 10) or hexadecimal (base 16) value that specifies the reparse tag.
Examples
Options file:
Specify an HSM reparse tag in decimal format:
hsmreparsetag 22
hsmreparsetag 0x16
Command line:
Does not apply.
Ieobjtype
Use the ieobjtype option to specify an object type for a client-side data deduplication operation within
include-exclude statements.
The ieobjtype option is an additional parameter to the include.dedup or exclude.dedup options.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API also supports this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Include/Exclude tab of
the Preferences editor. The option can be set in the client option set on IBM Spectrum Protect server.
402 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
File
IEObjtype Image
SYSTEMState
Asr
Parameters
File
Specifies that you want to include files for, or exclude files from, client-side data deduplication
processing. File is the default.
Image
Specifies that you want to include images for, or exclude images from, client-side data deduplication
processing.
System State
Specifies that you want to include system state for, or exclude system state from, client-side data
deduplication processing.
Asr
Specifies that you want to include automatic system recovery objects for, or exclude ASR objects
from, client-side data deduplication processing.
Examples
Options file:
exclude.dedup e:\*\* ieobjtype=image
Command line:
Does not apply.
Related reference
“Exclude options” on page 380
Use the exclude options to exclude objects from backup, image, or archive services.
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
Ifnewer
The ifnewer option replaces an existing file with the latest backup version only if the backup version is
newer than the existing file.
Only active backups are considered unless you also use the inactive or latest options.
Note: Directory entries are replaced with the latest backup version, whether the backup version is older
or newer than the existing version.
Use the ifnewer option with the following commands:
• restore
• restore backupset
• restore group
• retrieve
Note: This option is ignored if the replace option is set to No.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore -ifnewer d:\logs\*.log
Imagegapsize
Use the imagegapsize option with the backup image command, in the options file, or with the
include.image option to specify the minimum size of empty regions on a volume that you want to skip
during image backup.
Use this option for LAN-based and LAN-free image backup.
For example, if you specify a gap size of 10, this means that an empty region on the disk that is larger than
10 KB in size is not backed up. Gaps that are exactly 10 KB are backed up. Empty regions that are exactly
10 KB and that are smaller than 10 KB is backed up, even though they do not contain data. However, an
empty region that is smaller than 10 KB is backed up, even though it does not contain data. A smaller
image gap size means less data needs to be transferred, but with potentially decreased throughput. A
larger image gap size results in more data being transferred, but with potentially better throughput.
Place the include.image statement containing the imagegapsize value in your dsm.opt file.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
IMAGEGapsize size
Parameters
size
Specifies the minimum size of empty regions in a formatted logical volume that should be skipped
during an image backup. You can specify k (kilobytes) m (megabytes) or g (gigabytes) qualifiers with
the value. Without a qualifier, the value is interpreted in KB. Valid values are 0 through 4294967295
KB. If you specify a value of 0, all blocks, including unused blocks at the end of the volume, is backed
up. If you specify any value other than 0, unused blocks at the end of the volume are not backed up.
For LAN-based and LAN-free image backup the default value is 32 KB.
Note: Because of operating system limitations, use this option for NTFS file systems only. If you
specify an imagegapsize that is greater than 0 for a file system other than NTFS, you get a warning
message.
Examples
Options file:
imagegapsize 1m
Include-exclude list example: include.image h: MYMC imagegapsize=1m
404 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Command line:
-imagegapsize=64k
Imagetofile
Use the imagetofile option with the restore image command to specify that you want to restore the
source image to a file.
You might need to restore the image to a file if bad sectors are present on the target volume, or if you
want to manipulate the image data. Later, you can use a data copy utility of your choice to transfer the
image from the file to a disk volume.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Syntax
IMAGETOfile
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore image d: e:\diskD.img -imagetofile
Inactive
Use the inactive option to display both active and inactive objects.
You can use the inactive option with the following commands:
• delete group
• query asr
• query backup
• query image
• query nas
• query systemstate
• query vm (vmbackuptype=fullvm and vmbackuptype=hypervfull)
• restore
• restore group
• restore image
• restore nas
• restore vm (vmbackuptype=fullvm and vmbackuptype=hypervfull)
Important: When using the inactive option during a restore operation, also use the pick or some other
filtering option because, unlike the latest option, all versions are restored in an indeterminate order.
This option is implicit when pitdate is used.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore -inactive c:\id\projecta\ -pick
Inclexcl
The inclexcl option specifies the path and file name of an include-exclude options file.
Multiple inclexcl statements are permitted. However, you must specify this option for each include-
exclude file.
Ensure that you store your include-exclude options file in a directory to which all users have read access.
When processing occurs, the include-exclude statements within the include-exclude file are placed in the
list position occupied by the inclexcl option, in the same order, and processed accordingly.
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Include-Exclude tab of
the Preferences editor.
Syntax
INCLExcl filespec
Parameters
filespec
Specifies the path and file name of one include-exclude options file.
Examples
Options file:
inclexcl c:\dsm\backup.excl
Command line:
Does not apply.
Related information
For more information about creating an include-exclude options file, see “Creating an include-exclude
list ” on page 81.
406 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Using Unicode encoding for files containing include-exclude lists eliminates the unmapped character
problem, so you no longer need to use wildcard characters as substitutes for the unrecognized
characters.
Windows users: Create an include-exclude file in Unicode format by performing the following steps:
1. Open Notepad.
2. Enter your include and exclude statements. You might need to copy file names with characters
from other code pages using Microsoft Windows Explorer.
3. Click File and then click Save As.
4. Select the Save as Unicode check box, specify the file and target directory, and then save the file.
5. Place an inclexcl option specifying the include-exclude file you just created in your client options
file (dsm.opt).
6. Restart the backup-archive client.
Include options
The include options specify objects that you want to include for backup and archive services.
The include options specify any of the following:
• Objects within a broad group of excluded objects that you want to include for backup, archive, and
image services.
• Files that are included for backup or archive processing that you want to include for encryption
processing.
• Files that are included for backup or archive processing that you also want to include for compression
processing.
• Objects to which you want to assign a specific management class.
• A management class to assign to all objects to which you do not explicitly assign a management class.
• File spaces to which you want to assign memory-efficient backup processing
• File spaces where you want to use the diskcachelocation option to cause specific file systems to
use different, specific locations for their disk cache.
If you do not assign a specific management class to objects, the default management class in the active
policy set of your policy domain is used. Use the query mgmtclass command to display information
about the management classes available in your active policy set.
You can include remotely accessed files by specifying Universal Naming Convention (UNC) names in your
include statement.
Remember: The backup-archive client compares the files it processes against the patterns specified in
the include-exclude statements, reading from the bottom to the top of the options file.
Note:
1. The exclude.dir statement overrides all include statements that match the pattern.
2. The include statements are not case-sensitive.
3. The server can also define these options with the inclexcl option.
Supported Clients
This option is valid for all clients. The server can also define include.fs.nas.
Options File
Place these options in the client options file (dsm.opt). You can set these options on the Include-Exclude
tab in the Preferences editor.
include.archive
Includes files or assigns management classes for archive processing.
include.compression
Includes files for compression processing if you set the compression option to yes. This option
applies to backups and archives.
include.dedup
Includes files for client-side data deduplication. To control a client-side data deduplication operation,
specify ieobjtype as the value of the include.dedup option. By default, all data deduplication-
eligible objects are included for client-side data deduplication.
Valid ieobjtype parameters are:
File
Image
SYSTEMState
Asr
The default is File.
include.encrypt
Includes the specified files for encryption processing. By default, the client does not perform
encryption processing.
Important: The include.encrypt option is the only way to enable encryption on the backup-
archive client. If no include.encrypt statements are used, encryption does not occur.
Restrictions:
• Encryption is not compatible with client-side deduplication. Files that are included for encryption
are not deduplicated by client-side deduplication.
• Client encryption with the include.encrypt option is no longer supported for LAN-free backup
and archive operations to the IBM Spectrum Protect server V8.1.1 and later levels, or V7.1.8 and
later V7 levels. LAN-free restore and retrieve operations of encrypted backup versions and archive
copies continue to be supported. If you need to encrypt data by using the include.encrypt
option, in which data is encrypted before it is sent to the server, use LAN-based backup or archive
operations.
• Encryption is not compatible with VMware virtual machine backups that use the incremental forever
backup modes (MODE=IFIncremental and MODE=IFFull). If the client is configured for
encryption, you cannot use incremental forever backup.
• Encryption is not compatible with the IBM Spectrum Protect for Virtual Environments Data
Protection for VMware Recovery Agent. If the client is configured for encryption, you can use the
client to restore backups that were created with the V7.1 client full or incremental backup modes
408 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
(MODE=Full and MODE=Incremental). However, you cannot use the Recover Agent to restore the
encrypted backups.
include.fs
If open file support has been configured, the client performs a snapshot backup or archive of files that
are locked (or in use) by other applications. The snapshot allows the backup to be taken from a point-
in-time copy that matches the file system at the time the snapshot is taken. Subsequent changes to
the file system are not included in the backup. You can set the snapshotproviderfs parameter of
the include.fs option to none to specify which drives do not use open file support.
To control how the client processes your file space for incremental backup, you can specify these
additional options in your dsm.opt file as values of the include.fs option: diskcachelocation
and memoryefficientbackup.
include.fs d: memoryefficientbackup=diskcachem
diskcachelocation=e:\temp
include.fs e: memoryefficientbackup=diskcachem
diskcachelocation=c:\temp
If these options appear both in the options file and an include.fs option, the include.fs values
are used for the specified file space in place of any values in an option file or on the command line.
include.fs.nas
Use the include.fs.nas option to bind a management class to Network Attached Storage (NAS) file
systems. You can also specify whether the client saves Table of Contents (TOC) information during a
NAS file system image backup, using the toc option with the include.fs.nas option in your client
options file (dsm.opt).
include.image
Includes a file space or logical volume, or assigns a management class when used with the backup
image command. The backup image command ignores all other include options.
By default, the client performs an offline image backup. To enable and control an online image
operation, you can specify these options in your dsm.opt file as values of the include.image option:
snapshotproviderimage, presnapshotcmd, postsnapshotcmd.
include.systemstate
This option binds system state backups to the specified management class. If you specify this option,
specify all as the pattern. If you do not specify this option system state backups are bound to the
default management class.
Parameters
pattern
Specifies the objects to include for backup or archive processing or to assign a specific management
class.
Note: For NAS file systems: You must prefix the NAS node name to the file specification to specify the
file server to which the include statement applies. If you do not specify a NAS node name, the file
system identified refers to the NAS node name specified in the client options file (dsm.opt) or on the
command line.
If the pattern begins with a single or double quotation mark, or contains any embedded blanks or
equal signs, you must surround the value in either single (') or double (") quotation marks. The
opening and closing quotation marks must be the same type of quotation marks.
For the include.image option, the pattern is the name of a file system or raw logical volume.
Note: When you specify include.systemstate, the only valid pattern is all.
where:
virtual_filespace_name
Specifies the name of the IBM Spectrum Protect server virtual filespace that you associated with
the group, on the Backup Group command.
group_name
Is the name of the group that you created when you ran the Backup Group command.
management_class_name
Is the name of the management class to associate with the files in the group.
For example, a group named MyGroup is stored in a virtual file space called MyVirtualFileSpace.
To associate a management class, named TEST, with the group, use the following syntax:
memoryefficientbackup include.fs
diskcachelocation include.fs
postsnapshotcmd include.image
“Postsnapshotcmd” on page 458
presnapshotcmd include.image
snapshotproviderfs include.image
snapshotproviderimage include.image
Examples
Options file:
Windows only:
410 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
include c:\proj\text\devel.*
include c:\proj\text\* textfiles
include ?:\* managall
include WAS_ND_NDNODE mgmtclass
include WAS_APPNODE mgmtclass
include.backup c:\win98\system\* mybackupclass
include.archive c:\win98\system\* myarchiveclass
include.encrypt c:\win98\proj\gordon\*
include.compress c:\test\file.txt
include.image h: MGMTCLASSNAME
snapshotproviderimage=vss
include.image x:
snapshotproviderimage=none
include.image y:
snapshotproviderimage=vss
include.image z: MGMTCLASSNAME
snapshotproviderimage=none
include.fs c:
snapshotproviderfs=vss
include.encrypt ?:\...\*
Command line:
Does not apply.
Related concepts
Exclude files with UNC names
You can exclude remotely accessed files by specifying their universal naming convention (UNC) names in
your exclude statement.
Related tasks
Configuring Open File Support
You configure Open File Support (OFS) after you install the Window client.
exclude c:\test\file.txt
include.compression c:\test\file.txt
include.encrypt c:\test\file.txt
The client examines the exclude c:\test\file.txt statement first and determines that c:\test
\file.txt is excluded from backup processing and is, therefore, not a candidate for compression or
encryption processing.
• Include-exclude compression and encryption processing is valid for backup and archive processing
only.
• Client encryption with the include.encrypt option is no longer supported for LAN-free backup and
archive operations to the IBM Spectrum Protect server V8.1.1 and later levels, or V7.1.8 and later V7
levels. LAN-free restore and retrieve operations of encrypted backup versions and archive copies
Where:
pattern
Specifies the objects to include for backup services, to assign a specific management class, or to
control TOC creation. You can use wildcards in the pattern.
mgmtclassname
Specifies the name of the management class to assign to the objects. If a management class is not
specified, the default management class is used.
toc=value
For more information, see “Toc” on page 534.
Example 1: To assign a management class to the /vol/vol1 file system of a NAS node that is called
netappsj, specify the following include statement:
Example 2: To assign the same management class to all paths that are subordinate to the /vol/ file
system on a NAS node called netappsj (for example, /vol/vol1, /vol/vol2, and /vol/vol3),
specify the following include statement:
412 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
or virtual machine exclude options. See the individual option descriptions for information about the
options.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Related reference
“Include.vmdisk” on page 414
The INCLUDE.VMDISK option includes a virtual machine (VM) disk in backup operations. If you do not
specify one or more disk labels, all disks in the VM are backed up.
“INCLUDE.VMTSMVSS” on page 421
The INCLUDE.VMTSMVSS option notifies virtual machine applications that a backup is about to occur.
This option allows the application to truncate transaction logs and commit transactions so that the
application can resume from a consistent state when the backup completes. An optional parameter can
be specified to suppress truncation of the transaction logs.
“INCLUDE.VMSNAPSHOTATTEMPTS” on page 419
Use the INCLUDE.VMSNAPSHOTATTEMPTS option to determine the total number of snapshot attempts to
try for a virtual machine (VM) backup operation that fails due to snapshot failure.
Include.vm
For virtual machine operations, this option overrides the management class that is specified on the vmmc
option.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
The management class specified on the vmmc option applies to all VMware backups.
You can use the include.vm option to override that management class, for one or more virtual
machines. The include.vm option does not override or affect the management class that is specified by
the vmctlmc option. The vmctlmc option binds backed-up virtual machine control files to a specific
management class.
Supported Clients
This option can be used with supported Windows clients that are configured to back up VMware virtual
machines.
Options File
Set this option in the client options file.
Syntax
INCLUDE.VM vmname
mgmtclassname
Parameters
vmname
Required parameter. Specifies the name of a virtual machine that you want to bind to the specified
management class. The name is the virtual machine display name. Only one virtual machine can be
specified on each include.vm statement. However, you can specify as many include.vm
statements as needed to bind each virtual machine to a specific management class.
You can include wildcards in the virtual machine name. An asterisk (*) matches any character string. A
question mark (?) matches a single character. If the virtual machine name contains a space character,
enclose the name in double quotation marks (").
Examples
Assume that the following management classes exist and are active on the IBM Spectrum Protect server:
• MCFORTESTVMS
• MCFORPRODVMS
• MCUNIQUEVM
Example 1
The following include.vm statement in the client options file binds all virtual machines that have
names that begin with VMTEST to the management class called MCFORTESTVMS:
Example 2
The following include.vm statement in the client options file binds a virtual machine that is named
WHOPPER VM1 [PRODUCTION] to the management class called MCFORPRODVMS:
The virtual machine name must be enclosed in quotation marks because it contains space characters.
Also, the question mark wildcard is used to match the special characters in the virtual machine name.
Example 3
The following include.vm statement in the client options file binds a virtual machine that is named
VM1 to a management class that is named MCUNIQUEVM:
Include.vmdisk
The INCLUDE.VMDISK option includes a virtual machine (VM) disk in backup operations. If you do not
specify one or more disk labels, all disks in the VM are backed up.
This option is available only if you are using the IBM Spectrum Protect for Virtual Environments licensed
product. For more information about this option, see the IBM Spectrum Protect for Virtual Environments
product documentation on IBM Knowledge Center at http://www.ibm.com/support/knowledgecenter/
SSERB6/welcome.
The INCLUDE.VMDISK option specifies the label of a VM disk to be included in a backup vm operation. If
you include a disk on the backup vm command, the command-line parameters override any
INCLUDE.VMDISK statements in the options file.
Supported clients
This option can be used with supported Windows clients.
Options file
Set this option in the client options file. Command line parameters override statements in the options file.
414 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax for VMware virtual machines
INCLUDE.VMDISK vmname vmdk_label
Parameters
vmname
Specifies the name of the virtual machine that contains a disk that you want to include in a Backup
VM operation. The name is the virtual machine display name. You can specify only one virtual machine
name on each INCLUDE.VMDISK statement. Specify additional INCLUDE.VMDISK statements for
each virtual machine disk to include.
The virtual machine name can contain an asterisk (*), to match any character string, and question
mark (?) to match any one character. Surround the VM name with quotation marks (" ") if the VM name
contains space characters.
Tip: If the virtual machine name contains special characters, such as bracket characters ([ or ]), the
virtual machine name might not be correctly matched. If a virtual machine name uses special
characters in the name, you might need to use the question mark character (?) to match the special
characters in the VM name
For example, to include Hard Disk 1 in the backup of a virtual machine named "Windows VM3
[2012R2]", use this syntax in the options file: INCLUDE.VMDISK "Windows VM3 ?2012R2?"
"Hard Disk 1"
vmdk_label
Specifies the disk label of the disk that you want to include. Wildcard characters are not allowed. Use
the Backup VM command with the -preview option to determine the disk labels of disks in a given
virtual machine. See "Backup VM" for the syntax.
Examples
Options file
Assume that a virtual machine named vm1 contains four disks, labeled Hard Disk 1, Hard Disk 2, Hard
Disk 3, and Hard Disk 4. To include only disk 2 in a Backup VM operations, specify the following in the
options file:
Command line
Include a single disk when backing up vm1:
Related reference
“Backup VM” on page 622
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Exclude.vmdisk” on page 384
Include.vmlocalsnapshot
This option specifies the management class that is applied to local backups of a VMware virtual machine.
The management class defines the retention policies for the local backups.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
You can use this option only for virtual machines that are stored in a virtual volume (VVOL) datastore.
Supported Clients
This option can be used with supported Windows clients that are configured to back up VMware virtual
machines.
Options File
Set this option in the client options file.
Syntax
INCLUDE.VMLOCALSNAPSHOT vmname
mgmtclassname
Parameters
vmname
Specifies the name of a virtual machine that you want to bind to the specified management class for
local backup operations. The name is the virtual machine display name.
Only one virtual machine can be specified on each INCLUDE.VMLOCALSNAPSHOT statement.
However, you can specify as many INCLUDE.VMLOCALSNAPSHOT statements as needed to bind each
VM to a specific management class.
You can include wildcards in the virtual machine name. An asterisk (*) matches any character string. A
question mark (?) matches a single character. If the virtual machine name contains a space character,
enclose the name in double quotation marks (").
Tip: If the virtual machine name contains special characters, type the question mark wildcard in place
of the special characters when you specify the virtual machine name.
mgmtclassname
Specifies the management class to use for local backups of the virtual machine. If this parameter is
not specified, the management class defaults to the global virtual machine management class that is
specified by the vmmc option.
Examples
Assume that the following management classes exist and are active on the IBM Spectrum Protect server:
• MCFORTESTVMS
• MCFORPRODVMS
• MCUNIQUEVM
Example 1
The following INCLUDE.VMLOCALSNAPSHOT statement in the client options file binds all virtual
machines that have names that begin with VMTEST to the management class called MCFORTESTVMS:
416 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Example 2
The following INCLUDE.VMLOCALSNAPSHOT statement in the client options file binds a virtual
machine that is named WHOPPER VM1 [PRODUCTION] to the management class called
MCFORPRODVMS:
The virtual machine name must be enclosed in quotation marks because it contains space characters.
Also, the question mark wildcard is used to match the special characters in the virtual machine name.
Example 3
The following INCLUDE.VMLOCALSNAPSHOT statement in the client options file binds a virtual
machine that is named VM1 to a management class that is named MCUNIQUEVM:
Related reference
“Backup VM” on page 622
“Vmmc” on page 571
Use the vmmc option to store virtual machine backups by using a management class other than the
default management class. For VMware VM backups, the vmmc option is valid only if the
vmbackuptype=fullvm option is set.
Include.vmresetcbt
Use the include.vmresetcbt to reset the change block tracking (CBT) mechanism for a virtual
machine (VM) or a group of VMs.
If you need to reset the change block tracking on a VM or set of VMs, use this option to manage which
VMs are reset so that all VMs are not reset at the same time. Managing which VM's change block tracking
is reset is important because resetting change block tracking for a VM forces a full backup of that VM.
While there can be different reasons for resetting change block tracking, one reason is if you suspect that
a snapshot existed at the time change block tracking was initially enabled for a VM. Enabling change block
tracking on Data Protection for VMware means to complete an incremental-forever backup operation.
Enabling change block tracking when a snapshot exists is a known issue with VMware change block
tracking. This known issue might cause incomplete or invalid change blocks information to be returned
during a backup operation. To resolve this issue, you must remove all existing snapshots for a VM, and
reset change block tracking for the VM before you run an incremental-forever backup operation.
Subsequent incremental backups will track the blocks that changed since the last backup operation.
Specify this option only for one-time use for a VM or group of VMs. After you reset change block tracking
for a VM by running an incremental-forever backup operation, remove the include.vmresetcbt option
from the options file. Use this option only if change block tracking needs to be reset for a VM, such as
when one or more third-party or manual snapshots exist on a VM.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported Clients
This option can be used with supported Windows and Linux clients.
Options file
Place this option in the client options file (dsm.opt).
Syntax
INCLUDE.VMResetcbt vmname
Examples
Task 1
Reset change block tracking on all VMs with names that begin with "Prod" followed by any single
character:
INCLUDE.VMRESETCBT Prod?
Task 2
Reset change block tracking on all VMs with names that begin with any two characters, followed by
"Prod", followed by zero or more characters:
INCLUDE.VMR ??Prod*
Task 3
Reset change block tracking on all VMs with names that begin with one or more characters, and end
with "Prod":
INCLUDE.VMRESETCBT ?*Prod
or
INCLUDE.VMRESETCBT *?Prod
Task 4
Reset change block tracking on all VMs with names that begin with "Corporate Mail", followed by zero
or more characters:
Task 5
Reset change block tracking on all VMs:
include.vmresetcbt *
Related reference
“Vmnocbtcontinue” on page 572
418 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the vmnocbtcontinue option to specify whether to back up a virtual machine (VM) without using
the change block tracking function when one or more snapshots already exist on the VM and change block
tracking must be enabled or reset.
INCLUDE.VMSNAPSHOTATTEMPTS
Use the INCLUDE.VMSNAPSHOTATTEMPTS option to determine the total number of snapshot attempts to
try for a virtual machine (VM) backup operation that fails due to snapshot failure.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This option can be used with supported Windows clients that are configured to back up VMware virtual
machines.
Options File
This option is valid in the client options file (dsm.opt). It can also be included on the server in a client
option set. It is not valid on the command line.
Syntax
INCLUDE.VMSNAPSHOTATTEMPTS vmname num_with_quiescing
num_without_quiescing
Parameters
vmname
A required positional parameter that specifies the name of the virtual machine to attempt the total
number of snapshots for, if a backup attempt fails due to snapshot failure. The name is the virtual
machine display name.
Only one virtual machine can be specified on each INCLUDE.VMSNAPSHOTATTEMPTS statement.
However, to configure the total snapshot attempts for other virtual machines, you can use the
following methods:
• For each virtual machine that you want this option to apply to, specify as many
INCLUDE.VMSNAPSHOTATTEMPTS statements as needed to reattempt snapshots that failed.
• Use wildcard characters for the vmname parameter value to specify virtual machine names that
match the wildcard pattern. An asterisk (*) matches any character string. A question mark (?)
matches a single character. If the virtual machine name contains a space character, enclose the
name in double quotation marks (").
Tip: If the virtual machine name contains special characters, type the question mark wildcard (?) in
place of the special characters when you specify the virtual machine name.
num_with_quiescing
A positional parameter that specifies the following action:
For VMware backup operations:
• For Windows virtual machines with IBM Spectrum Protect application protection enabled,
num_with_quiescing specifies the number of times to attempt the snapshot with IBM Spectrum
Protect VSS quiescing and Microsoft Windows system provider VSS quiescing. VSS quiescing
applies only to Windows virtual machines.
Depending on the number that you specify, the first snapshot attempt is always made with IBM
Spectrum Protect VSS quiescing. Subsequent snapshot attempts are made with Windows
system provider VSS quiescing.
Examples
VMware examples:
Example 1
The following INCLUDE.VMSNAPSHOTATTEMPTS statement in the client options file tries two total
snapshot attempts (with VSS quiescing) for virtual machine VM_a:
INCLUDE.VMSNAPSHOTATTEMPTS VM_a 2 0
Example 2
The following INCLUDE.VMSNAPSHOTATTEMPTS statement in the client options file tries three total
snapshot attempts for Windows virtual machines that match the vmServer_Dept* string:
• The first attempt is made with IBM Spectrum Protect VSS quiescing.
• The second attempt is made with Windows system provider VSS quiescing.
• The third snapshot attempt is taken without VSS quiescing.
INCLUDE.VMSNAPSHOTATTEMPTS vmServer_Dept* 2 1
Example 3
The following INCLUDE.VMSNAPSHOTATTEMPTS statement in the client options file tries one total
snapshot attempt (with VSS quiescing) for virtual machines that match the vmDB_Dept* string:
INCLUDE.VMSNAPSHOTATTEMPTS vmDB_Dept* 1 0
Example 4
The following INCLUDE.VMSNAPSHOTATTEMPTS statement in the client options file tries two total
snapshot attempts (with VSS quiescing) for all virtual machines:
• The first attempt is made with IBM Spectrum Protect VSS quiescing.
• The second attempt is made with Windows system provider VSS quiescing.
INCLUDE.VMSNAPSHOTATTEMPTS * 2 0
Example 5
In this example, the virtual machine DB15 has an IBM Data Protection agent that is installed in a
guest virtual machine and does not need an application-consistent snapshot. The following
420 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
INCLUDE.VMSNAPSHOTATTEMPTS statement in the client options file tries one total snapshot
attempt (without VSS quiescing) for virtual machine DB15:
INCLUDE.VMSNAPSHOTATTEMPTS DB15 0 1
If you are restoring application protection backups, see “Shadow copy considerations for restoring an
application protection backup from the data mover” on page 201.
Related reference
“INCLUDE.VMTSMVSS” on page 421
The INCLUDE.VMTSMVSS option notifies virtual machine applications that a backup is about to occur.
This option allows the application to truncate transaction logs and commit transactions so that the
application can resume from a consistent state when the backup completes. An optional parameter can
be specified to suppress truncation of the transaction logs.
INCLUDE.VMTSMVSS
The INCLUDE.VMTSMVSS option notifies virtual machine applications that a backup is about to occur.
This option allows the application to truncate transaction logs and commit transactions so that the
application can resume from a consistent state when the backup completes. An optional parameter can
be specified to suppress truncation of the transaction logs.
When a virtual machine is included by this option, IBM Spectrum Protect provides application protection.
That is, the client freezes and thaws the VSS writers and, optionally, truncates the application logs.
If a VMware virtual machine is not protected by this option, application protection is provided by VMware,
and VMware freezes and thaws the VSS writers, but application logs are not truncated.
If a Hyper-V virtual machine is not protected by this option, application protection is provided by Hyper-V,
which freezes and thaws the VSS writers, but does not truncate application logs.
Important: Before you begin application protection backups, ensure that the application database, such
as the Microsoft SQL Server database or Microsoft Exchange Server database, is on a non-boot drive (any
drive other than the boot drive), in case a diskshadow revert operation is needed during restore.
Supported clients
This option can be used with supported Windows clients.
Options file
Set this option in the client options file. This option cannot be set by the preferences editor or on the
command line.
Syntax
INCLUDE.VMTSMVSS vmname OPTions=KEEPSqllog
Parameters
vmname
Specifies the name of the virtual machine that contains the applications to quiesce. The name is the
virtual machine display name. Specify one virtual machine per INCLUDE.VMTSMVSS statement. For
example, to include a virtual machine named Windows VM3 [2012R2], use this syntax in the options
file: INCLUDE.VMTSMVSS "Windows VM3 [2012R2]".
To protect all virtual machines with this option, use an asterisk as a wildcard (INCLUDE.VMTSMVSS
*). You can also use question marks to match any single character. For example,
INCLUDE.VMTSMVSS vm?? protects all virtual machines that have names that begin with vm and are
followed by any two characters (vm10, vm11, vm17, and so on).
Tip: If the virtual machine name contains special characters, such as bracket characters ([ or ]), the
virtual machine name might not be correctly matched. If a virtual machine name uses special
Examples
Options file
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Configure application protection for a virtual machine that is named vm_example:
INCLUDE.VMTSMVSS vm_example
INCLUDE.VMTSMVSS vm11
INCLUDE.VMTSMVSS vm12
INCLUDE.VMTSMVSS vm15 options=keepsqllog
Command line
Not applicable; this option cannot be specified on the command line.
Related concepts
“Shadow copy considerations for restoring an application protection backup from the data mover” on
page 201
For Windows VMware virtual machines (VMs), if you attempt to restore an application protection backup
from the data mover, be aware of shadow copy restrictions when you restore the application protection
backup.
Related reference
“Vmtimeout” on page 592
VMTIMEOut specifies the maximum time, in seconds, to wait before abandoning a backup vm operation,
when the INCLUDE.VMTSMVSS option is used to provide application protection. To use this option, the
IBM Spectrum Protect for Virtual Environments license must be installed.
“Exclude.vmdisk” on page 384
The EXCLUDE.VMDISK option excludes a virtual machine disk from backup operations.
“Include.vmdisk” on page 414
422 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The INCLUDE.VMDISK option includes a virtual machine (VM) disk in backup operations. If you do not
specify one or more disk labels, all disks in the VM are backed up.
“INCLUDE.VMSNAPSHOTATTEMPTS” on page 419
Use the INCLUDE.VMSNAPSHOTATTEMPTS option to determine the total number of snapshot attempts to
try for a virtual machine (VM) backup operation that fails due to snapshot failure.
Incrbydate
Use the incrbydate option with the incremental command to back up new and changed files with a
modification date later than the last incremental backup stored at the server, unless you exclude the file
from backup.
Important: Files that are modified or created after their respective directory was processed by the
backup-archive client, but before the incremental-by-date backup completes, are not backed up and will
not be backed up in future incremental-by-date backups, unless the files are modified again. For this
reason, a run a regular incremental backup periodically, without specifying the incrbydate option.
An incremental-by-date updates the date and time of the last incremental at the server. If you perform an
incremental-by-date on only part of a file system, the date of the last full incremental is not updated and
the next incremental-by-date backs up these files again.
Both full incremental backups and incrementals-by-date backups backup new and changed files. An
incremental-by-date takes less time to process than a full incremental and requires less memory.
However, unlike a full incremental backup, an incremental-by-date backup does not maintain current
server storage of all your workstation files for the following reasons:
• It does not expire backup versions of files that are deleted from the workstation.
• It does not rebind backup versions to a new management class if the management class has changed.
• It does not back up files with attributes that have changed, such as NTFS security information, unless
the modification dates and times have also changed.
• It ignores the copy group frequency attribute of management classes.
Tip: If you have limited time during the week to perform backups, but extra time on weekends, you can
maintain current server storage of your workstation files by performing an incremental backup with the
incrbydate option on weekdays and a full incremental backup on weekends.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
INCRbydate
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc incremental -incrbydate
Incremental
Use the incremental option with the restore image command to ensure that any changes that were
made to the base image are also applied to the restored image.
If you also use the deletefiles option, changes include the deletion of files and directories that were in
the original image but later deleted from the workstation.
Syntax
INCREmental
Examples
Command line:
res i d: -incremental
Incrthreshold
The incrthreshold option specifies the threshold value for the number of directories in any journaled
file space that might have active objects on the server, but no equivalent object on the workstation.
When a Windows client deletes a file or directory with a long name, it sometimes reports this using a
compressed name. After the object is deleted, the compressed name might be reused and the deletion
notice can no longer identify a unique object. During a journaled incremental backup of a file space, this
can result in the no active version response from the server resulting in an unsuccessful expire for an
object.
The incrthreshold option allows you to specify what to do when this condition arises:
• If you set the incrthreshold option to 0 (the default), no action is taken. The primary consequence is
that, during a restore of such a directory, these objects might be inadvertently restored. When the next
non-journaled incremental backup is run on this directory, the IBM Spectrum Protect server expires all
objects in the directory that exist on the server but not on the workstation.
• If you specify a value greater than zero, the client saves the directory name of an object in the journal
during journaled backups. During a full file space journaled incremental backup, if the number of
directories in the file space is greater than or equal to this value, a full incremental backup of each
directory occurs. This takes place automatically after completion of the journaled backup and does not
require entry of another command.
• If you set the incrthreshold option to 1, the client performs a full incremental backup of these
directories whenever a no active version response is received during a full file space journaled
incremental backup.
Supported Clients
This option is for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup > Threshold
for non-journal incremental backup field of the Preferences editor.
Syntax
INCRTHreshold numberdirectories
Parameters
numberdirectories
Specifies the threshold value for the number of directories in any journaled file space that might
contain active files that should be expired. When this threshold is reached during a full file space
journaled incremental, the client initiates an incremental backup on each such directory at the
completion of the journaled backup. The range of values is 0 through 2,000,000,000; the default is 0.
424 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
incrthreshold 1
Command line:
-increthreshold=1
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
See “Incremental” on page 641 for more information about journaled backups.
Instrlogmax
The instrlogmax option specifies the maximum size of the instrumentation log (dsminstr.log), in
MB. Performance data for the client is collected in the dsminstr.log file during backup or restore
processing when the enableinstrumentation option is set to yes.
If you change the value of the instrlogmax option, the existing log is extended or shortened to
accommodate the new size. If the value is reduced, the oldest entries are deleted to reduce the file to the
new size.
Supported Clients
This option is valid for all clients and the IBM Spectrum Protect API.
Options File
Place this option in the client options file (dsm.opt).
Syntax
INSTRLOGMAX size
Parameters
size
Specifies the maximum size, in MB, for the instrumentation log file. The range of values is 0 - 2047.
The default value is 25.
When the size of the dsminstr.log file exceeds the maximum size, the log file is renamed to
dsminstr.log.bak. Subsequent instrumentation data continues to be saved to the dsminstr.log
file.
If you specify 0, the log file grows indefinitely.
Examples
Options file:
instrlogmax 100
Command line:
dsmc sel c:\mydir\* -subdir=yes -enableinstrumentation=yes -instrlogmax=100
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
Enableinstrumentation
By default, instrumentation data is automatically collected by the backup-archive client and IBM
Spectrum Protect API to identify performance bottlenecks during backup and restore processing. To
disable or later enable instrumentation, use the enableinstrumentation option.
Instrlogname
Instrlogname
The instrlogname option specifies the path and file name where you want to store performance
information that the backup-archive client collects.
When you use the enableinstrumentation yes option to collect performance data during backup
and restore operations, the client automatically stores the information in a log file.
By default, the performance data is stored in the instrumentation log file (dsminstr.log) in the
directory that is specified by the DSM_LOG environment variable (or the DSMI_LOG environment variable
for the API-dependent products IBM Spectrum Protect for Databases: Data Protection for Microsoft SQL
Server and IBM Spectrum Protect for Mail: Data Protection for Microsoft Exchange Server). If you did not
set the DSM_LOG environment variable, the instrumentation log file is stored in the current directory (the
directory where you issued the dsmc command).
Use this option only when you want to change the file name and location of the instrumentation log.
If you want to control the size of the log file, use the instrlogmax option.
Supported Clients
This option is valid for all clients and the IBM Spectrum Protect API.
Options File
Place this option in the client options file (dsm.opt).
Important: Set the DSM_LOG environment variable to name a directory where the log is to be placed. The
directory that is specified must have permissions that allow write-access from the account under which
the client is run.
Syntax
INSTRLOGNAME filespec
Parameters
filespec
Specifies the path and file name where you want to store performance information during backup or
restore processing. If any part of the path that you specify does not exist, the client attempts to create
it.
If you specify a file name only, the file is stored in the directory that is specified by the DSM_LOG
environment variable. If you did not set the DSM_LOG environment variable, the instrumentation log
file is stored in the current directory (the directory where you issued the dsmc command).
This instrumentation log file name replaces the previous instrumentation log file name
dsminstr.report.pXXX that was created by the TESTFLAG=instrument:detail or
instrument:API option.
Examples
Options file:
For Windows clients:
instrlogname c:\mydir\mydsminstr.log
426 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Command line:
For Windows clients:
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
Enableinstrumentation
By default, instrumentation data is automatically collected by the backup-archive client and IBM
Spectrum Protect API to identify performance bottlenecks during backup and restore processing. To
disable or later enable instrumentation, use the enableinstrumentation option.
Instrlogmax
The instrlogmax option specifies the maximum size of the instrumentation log (dsminstr.log), in
MB. Performance data for the client is collected in the dsminstr.log file during backup or restore
processing when the enableinstrumentation option is set to yes.
Journalpipe
The journalpipe option specifies the pipe name of a journal daemon session manager to which the
backup clients attach.
Supported Clients
This option is for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
JournalPipe \\.\pipe\jnlSessionMgr1
Syntax
JOURNALPipe pipename
Parameters
pipename
Specify the name of the pipe the client attaches to when performing a journal-based backup. The
default pipe name is \\.\pipe\jnlSessionMgr.
Examples
Options file:
JOURNALPipe \\.\pipe\jnlSessionMgr
Command line:
This option cannot be set on the command line.
Lanfreecommmethod
The lanfreecommmethod option specifies the communications protocol between the IBM Spectrum
Protect client and Storage Agent. This enables processing between the client and the SAN-attached
storage device.
If you are using LAN failover, you must have lanfreecommmethod TCPip in the client options file
(dsm.opt).
For Windows, use the lanfreeshmport option to uniquely identify the storage agent to which the client
is trying to connect.
Options File
Place this option in the client options file (dsm.opt).
Syntax
LANFREECommmethod commmethod
Parameters
commmethod
Specifies the supported protocol for the backup-archive client:
TCPip
The Transmission Control Protocol/Internet Protocol (TCP/IP) communication method.
Use the lanfreetcpport option to specify the TCP/IP port number where the Storage Agent is
listening.
V6Tcpip
Indicates that either TCP/IP v4 or v6 should be used, depending on the system configuration and
results of a domain name service lookup. The only time this is not true is when dsmc schedule is
used and schedmode is prompt. A valid DNS environment must be available.
NAMedpipes
The interprocess communication method that permits message data streams to pass between a
client and a server. This is the default. Do not specify the lanfreetcpport option if you want to
use the NAMedpipes communication method for LAN-free communication.
SHAREdmem
Use the shared memory communication method when the client and Storage Agent are running on
the same system. Shared memory provides better performance than the TCP/IP protocol. The
backup-archive client must have local administrator permissions.
Examples
Options file:
lanfreecommmethod tcp
Use only TCP/IP v4
lanfreecommmethod V6Tcpip
Use both TCP/IP v4 or v6, depending on how the system is configured and the results of a domain
name service lookup.
Command line:
-lanfreec=tcp
-lanfreec=V6Tcpip
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Lanfreeshmport” on page 429
“Lanfreetcpport” on page 429
428 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Lanfreeshmport
Use the lanfreeshmport option when lanfreecommmethod=SHAREdmem is specified for
communication between the backup-archive client and the storage agent. This enables processing
between the client and the SAN-attached storage device.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
LANFREEShmport port_address
Parameters
port_address
Specifies the number that is used to connect to the storage agent. The range of values is 1 through
32767.
For Windows clients, the default is 1.
For all clients except Windows clients, the default is 1510.
Examples
Options file:
lanfrees 1520
Command line:
-lanfrees=1520
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Lanfreecommmethod” on page 427
Lanfreetcpport
The lanfreetcpport option specifies the TCP/IP port number where the IBM Spectrum Protect Storage
Agent is listening.
Use this option when you specify lanfreecommmethod=TCPip for communication between the backup-
archive client and Storage Agent. Do not specify the lanfreetcpport option if you want to use the
NAMedpipes communication method for LAN-free communication.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
LANFREETCPPort port_address
Examples
Options file:
lanfreetcpp 1520
Command line:
-lanfreetcpp=1520
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Lanfreecommmethod” on page 427
Lanfreessl
Use the lanfreessl option to enable Secure Sockets Layer (SSL) to provide secure client and Storage
Agent communications. This option is deprecated if you are connecting to an IBM Spectrum Protect
server V8.1.2 and later levels, and V7.1.8 and later V7 levels.
To enable SSL for data movement, set SSL YES on the client and the storage agent. To disable SSL for
data movement, set SSL NO on the client and the storage agent. When the client and storage agent are
on the same system, use of SSL between them is not recommended for performance reasons. Use shared
memory or named pipes instead.
The client SSL option is set in the client options file. For more information, see “Ssl” on page 512.
The storage agent SSL option is set when it is defined by the DSMSTA SETSTORAGESERVER command.
For more information, see Configuring a storage agent to use SSL.
Note: Authentication is always achieved by using SSL, regardless of the SSL option setting.
Supported Clients
This option is supported on all clients, except for Mac OS X clients.
Options File
Place this option in the client options file. You cannot set this option in the GUI or on the command line.
Syntax
No
LANFREESSL
Yes
Parameters
No
Specifies that the backup-archive client does not use SSL when communicating with the Storage
Agent. No is the default.
Yes
Specifies that the backup-archive client enables SSL when communicating with the Storage Agent. To
enable SSL, specify lanfreessl=yes and change the value of the lanfreetcpport option.
430 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Changing the value of the lanfreetcpport option is necessary because the IBM Spectrum Protect
Storage Agent is typically set up to listen for SSL connections on a separate port.
Examples
Options file:
lanfreessl yes
lanfreessl no
Command line:
Not applicable. You cannot set this option on the command line.
Lanfreetcpserveraddress
The lanfreetcpserveraddress option specifies the TCP/IP address for the IBM Spectrum Protect
Storage Agent.
Use this option when you specify lanfreecommmethod=TCPip or V6Tcpip for communication between
the backup-archive client and Storage Agent.
Overriding the default for this option is useful when configuring LAN-free in an environment where the
client and storage agent are running on different systems. You can obtain this Storage Agent address from
your administrator.
Supported Clients
This option is valid for all supported Windows clients.
Options File
Place this option in the client system-options file.
Syntax
LANFREETCPServeraddress stagent_address
Parameters
stagent_address
Specifies a 1 to 64 character TCP/IP address for a server. Specify a TCP/IP domain name or a numeric
IP address. The numeric IP address can be either a TCP/IP v4 or TCP/IP v6 address. The default value
is 127.0.0.1 (localhost).
Examples
Options file:
LANFREETCPServeraddress stagent.example.com
LANFREETCPServeraddress 192.0.2.1
Command line:
Does not apply.
Language
The language option specifies the national language in which to present client messages.
You can use US English (ENU) with all clients.
The language that is displayed by the backup-archive client GUI is defined by the Windows display locale
and not the Windows system locale. For example, if the Windows system and input locale is French, but
the display locale is Russian, the language that is displayed by the backup-archive client GUI is Russian
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Regional Settings tab,
Language drop-down list of the Preferences editor.
Syntax
LANGuage language
Parameters
language
Specifies the language that you want to use. The available languages include:
• ENU (English, United States).
• PTB (Brazilian Portuguese)
• CHS (Chinese, Simplified)
• CHT (Chinese, Traditional)
• FRA (Standard French)
• DEU (Standard German)
• ITA (Standard Italian)
• JPN (Japanese)
• KOR (Korean)
• ESP (Standard Spanish)
• CSY (Czech)
• HUN (Hungarian)
• PLK (Polish)
• RUS (Russian)
Examples
Options file:
language enu
Command line:
Does not apply.
Latest
Use the latest option to restore the most recent backup version of a file, even if the backup is inactive.
You can use the latest option with the following commands:
• restore
• restore group
432 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you are performing a point-in-time restore (using the pitdate option), it is not necessary to specify
latest since this option is implicit when pitdate is used.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
LATest
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore c:\devel\projecta\ -latest
Localbackupset
The localbackupset option specifies whether the backup-archive client GUI bypasses initial logon with
the IBM Spectrum Protect server to restore a local backup set on a standalone workstation.
If you set the localbackupset option to yes, the GUI does not attempt initial logon with the server. In
this case, the GUI only enables the restore functionality.
If you set the localbackupset option to no (the default), the GUI attempts initial logon with the server
and enables all GUI functions.
Note: The restore backupset command supports restore of local backup sets on a standalone
workstation without using the localbackupset option.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the dsm.opt file.
Syntax
No
LOCALbackupset
Yes
Parameters
No
Specifies that the GUI attempts initial logon with the server and enables all functions. This is the
default.
Yes
Specifies that the GUI does not attempt initial logon with the server and enables only the restore
functionality.
Managedservices
The managedservices option specifies whether the IBM Spectrum Protect client acceptor service
manages the scheduler, the web client, or both.
Restriction: You cannot use the dsmcad for scheduling when you set the sessioninitiation option to
serveronly.
The client acceptor daemon serves as an external timer for the scheduler. When the scheduler is started,
it queries the server for the next scheduled event. The event is either executed immediately or the
scheduler exits. The client acceptor daemon restarts the scheduler when it is time to execute the
scheduled event.
Note:
1. If you set the schedmode option to prompt, the server prompts the client acceptor daemon when it is
time to run the schedule. The scheduler connects to and disconnects from the server when the client
acceptor daemon is first started.
The dsmc schedule command cannot be used when both schedmode prompt and commmethod
V6Tcpip are specified.
2. Set the passwordaccess option to generate in your client options file (dsm.opt) and generate a
password, so IBM Spectrum Protect can manage your password automatically.
Using the client acceptor daemon to manage the scheduler service can provide the following benefits:
• Memory retention problems that can occur when using traditional methods of running the scheduler are
resolved. Using the client acceptor daemon to manage the scheduler requires very little memory
between scheduled operations.
• The client acceptor daemon can manage both the scheduler program and the web client, reducing the
number of background processes on your workstation.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Web Client tab of the
Preferences editor.
Syntax
MANAGEDServices mode
Parameters
mode
Specifies whether the client acceptor daemon manages the scheduler, the web client, or both.
webclient
Specifies that the client acceptor daemon manages the web client.
434 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
schedule
Specifies that the client acceptor daemon manages the scheduler. Both webclient and
schedule are the defaults for Mac OS X.
Examples
Options file:
The following are examples of how you might specify the managedservices option in your client
options file (dsm.opt).
Task
Specify that the client acceptor daemon manages only the web client.
managedservices webclient
Task
Specify that the client acceptor daemon manages only the scheduler.
managedservices schedule
Task
Specify that the client acceptor daemon manages both the web client and the scheduler.
Note: The order in which these values are specified is not important.
Command line:
Does not apply.
Related information
“Passwordaccess” on page 453
See “Configuring the scheduler” on page 28 for instructions to set up the client acceptor daemon to
manage the scheduler.
“Sessioninitiation” on page 492
“Cadlistenonport” on page 324
Maxcmdretries
The maxcmdretries option specifies the maximum number of times the client scheduler (on your
workstation) attempts to process a scheduled command that fails.
The command retry starts only if the client scheduler has not yet backed up a file, never connected to the
server, or failed before backing up a file. This option is only used when the scheduler is running.
Your IBM Spectrum Protect administrator can also set this option. If your administrator specifies a value
for this option, that value overrides what you specify in the client options file after your client node
successfully contacts the server.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab, in the
Maximum command retries field of the Preferences editor.
Parameters
maxcmdretries
Specifies the number of times the client scheduler can attempt to process a scheduled command that
fails. The range of values is zero through 9999; the default is 2.
Examples
Options file:
maxcmdr 4
Command line:
-maxcmdretries=4
This option is valid only on the initial command line. It is not valid in interactive mode.
Mbobjrefreshthresh
The mbobjrefreshthresh (megablock object refresh threshold) option is a number defining a
threshold. When the number of IBM Spectrum Protect objects that are needed to describe any 128 MB
megablock exceeds this value, the entire megablock is refreshed and the objects that were used to
represent this area, in previous backups, are expired.
When you backup a virtual machine, the data is stored on the IBM Spectrum Protect server in 128 MB
units, called megablocks. If an area on the production disk changes and a new incremental backup is
performed, a new megablock is created to represent the changes that were made to the previously
backed up data. Because a new megablock can be created with each incremental backup, eventually the
megablocks can adversely affect the performance of the IBM Spectrum Protect database, and therefore,
adversely affect the performance of most IBM Spectrum Protect operations.
Use this option when estimating IBM Spectrum Protect objects that represent production data for each
virtual machine backup. For example, when the number of IBM Spectrum Protect objects exceed this
value, the megablock is refreshed. This action means that the entire 128-MB block is copied to the server
and is represented as a single IBM Spectrum Protect object. The minimum value is 2 and the maximum
value is 8192. The default value is 50.
Supported clients
This option is valid for data movers that protect VMware virtual machines. To use this option, you must
have a license agreement to use IBM Spectrum Protect for Virtual Environments: Data Protection for
VMware.
Options file
This option is valid in the client options file (dsm.opt). It can also be included on the server in a client
options set. It is not valid on the command line.
Syntax
50
MBOBJREFRESHTHRESH
integer
Parameters
The minimum value you can specify is 2 megablocks, the largest value is 8192 megablocks; the default is
50 megablocks.
436 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Set this option to trigger a megablock refresh when the number of objects needed to represent an
updated megablock exceeds 20 objects:
MBOBJREFRESHTHRESH 20
Mbpctrefreshthresh
The mbpctrefreshthresh (megablock percentage refresh threshold) option is a number defining a
threshold. When the percentage of IBM Spectrum Protect objects that are needed to describe any 128
MB megablock exceeds this value, the entire megablock is refreshed and the objects that were used to
represent this area, in previous backups, are expired.
When you backup a virtual machine, data is stored on the IBM Spectrum Protect server in 128 MB units,
called megablocks. If an area on the production disk changes and a new incremental backup is
performed, a new megablock is created to represent the changes that were made to the previously
backed up data. Because a new megablock can be created with each incremental backup, eventually the
megablocks can adversely affect the performance of the IBM Spectrum Protect database, and therefore,
adversely affect the performance of most IBM Spectrum Protect operations.
Use this option when estimating the amount of additional data that is backed up for each virtual machine.
For example, when a 128-MB block of a production disk changes more than the percentage specified, the
entire 128-MB block is copied to the server. The block is represented as a single IBM Spectrum Protect
object.
Supported clients
This option is valid for clients that act as data mover nodes that protect VMware virtual machines. To use
this option, you must have a license agreement to use IBM Spectrum Protect for Virtual Environments:
Data Protection for VMware.
Options file
This option is valid in the client options file (dsm.opt). It can also be included on the server in a client
options set. It is not valid on the command line.
Syntax
50
MBPCTREFRESHTHRESH
integer
Parameters
The minimum value you can specify is 1 percent, the largest value is 99 percent; the default is 50 percent.
Examples
Set this option to trigger a megablock refresh when 50 percent (or more) of the objects in a megablock on
a production disk have changed:
MBPCTREFRESHTHRESHOLD 50
Memoryefficientbackup
The memoryefficientbackup option specifies the memory-conserving algorithm to use for processing
full file space backups.
One method backs up one directory at a time, using less memory. The other method uses much less
memory, but requires more disk space.
Supported Clients
This option is valid for all clients. The server can also define this option.
Options File
Place this option in the client user-options file (dsm.opt), or on the initial command line. You can also set
this option on the Performance Tuning tab in the Preferences editor, and selecting the Use memory-
saving algorithm check box.
Syntax
No
MEMORYEFficientbackup
Yes
DISKCACHEMethod
Parameters
No
Your client node uses the faster, more memory-intensive method when processing incremental
backups. This is the default.
Yes
Your client node uses the method that requires less memory when processing incremental backups.
Diskcachemethod
Your client node uses the method that requires much less memory but more disk space when
processing incremental backups for full file systems.
Examples
Options file:
memoryefficientbackup yes
memoryefficientbackup diskcachem
Command line:
-memoryef=no
Related information
“Include options” on page 407
438 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Mode
Use the mode option to specify the backup mode to use when performing specific backup operations.
The mode option has no effect on a when backing up a raw logical device.
You can use the mode option with the following backup commands:
backup image
To specify whether to perform a selective or incremental image backup of client file systems.
backup nas
To specify whether to perform a full or differential image backup of NAS file systems.
backup group
To specify whether to perform a full or differential group backup containing a list of files from one or
more file space origins.
backup vm
For VMware virtual machines, this parameter specifies whether to perform an incremental-forever-full
or incremental-forever-incremental backup of VMware virtual machines.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This option is valid on all supported clients, except Mac OS. The IBM Spectrum Protect API does not
support this option.
This option is valid for data movers that protect VMware virtual machines. To use this option, you must
have a license agreement to use IBM Spectrum Protect for Virtual Environments: Data Protection for
VMware.
Syntax
For image backups of client file systems
Selective
MODE =
Incremental
440 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For a description of the incremental-forever backup strategy for VMware virtual machines, see
Backup and restore types.
IFIncremental
Specifies that you want to perform an incremental-forever-incremental backup of a virtual
machine. An incremental-forever-incremental backup backs up only the disk blocks that have
changed since the last backup.
This mode is the default backup mode for VMware virtual machine backups.
You cannot use this backup mode to back up a virtual machine if the client is configured to encrypt
the backup data.
Examples
Task
Perform a backup of a VMware virtual machine named vm1, using the incremental-forever-
incremental mode to back up only the data that has changed since the last backup.
Task
Perform the NAS image backup of the entire file system.
Task
Back up the c: drive using an image incremental backup that backs up only new and changed files
after the last full image backup.
Task
Perform a full backup of all the files in filelist c:\dir1\filelist1 to the virtual file space name
\virtfs containing the group leader c:\group1 file.
Related reference
“Backup VM” on page 622
“Backup Group” on page 613
Use the backup group command to create and back up a group containing a list of files from one or
more file space origins to a virtual file space on the IBM Spectrum Protect server.
“Backup Image” on page 615
The backup image command creates an image backup of one or more volumes on your system.
“Backup NAS” on page 618
The backup nas command creates an image backup of one or more file systems that belong to a
Network Attached Storage (NAS) file server, otherwise known as NDMP Backup. You are prompted for the
IBM Spectrum Protect administrator ID.
Monitor
The monitor option specifies whether to monitor an image backup or restore of file systems belonging to
a Network Attached Storage (NAS) file server.
If you specify monitor=yes, the backup-archive client monitors the current NAS image backup or restore
operation and displays processing information on your screen. This is the default.
If you specify monitor=no, the client does not monitor the current NAS image backup or restore
operation and is available to process the next command.
Supported Clients
This option is valid for all Windows clients.
Syntax
Yes
MONitor =
No
Parameters
Yes
Specifies that you want to monitor the current NAS image backup or restore operation and display
processing information on your screen. This is the default.
No
Specifies that you do not want to monitor the current NAS image backup or restore operation.
Examples
Command line:
Myprimaryserver
The myprimaryserver option specifies the primary server name that the client uses to log on to the
secondary server in failover mode.
During the normal (non-failover) logon process, the myprimaryserver option is sent to the client and is
saved in the dsm.opt file. Do not edit this option during normal operations.
Important: If you change the value for the myprimaryserver option, authentication information such
as the IBM Spectrum Protect password and encryption key will no longer work with the new primary
server. You will be prompted for the password and encryption key for operations that require
authentication. Therefore, do not change this value even if you change the secondary server connection
information.
Supported Clients
This option is valid only for Windows clients.
Options File
This option is placed in the client options file (dsm.opt).
Syntax
MYPRIMARYServer primary_servername
Parameters
primary_servername
Specifies the name of the primary server to be used for authentication during a failover. The primary
server is the IBM Spectrum Protect server that a client uses for normal production.
442 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
MYREPLICATIONServer TARGET
MYPRIMARYSERVERNAME SERVER1
*** end of automatically updated options
Command line:
Does not apply.
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Myreplicationserver
The myreplicationserver option specifies which secondary server stanza that the client uses during a
failover.
The secondary server stanza is identified by the replservername option and contains connection
information about the secondary server.
This option is set by the IBM Spectrum Protect server administrator for the client node. During the normal
(non-failover) logon process, the option is sent to the client and is saved in the client options file.
Do not edit this option during normal operations.
Edit this option only during situations such as the following ones:
• The primary server is offline and the information for the secondary server is not in the options file.
• The secondary server information is out-of-date or incorrect.
Any values that you edit are removed or updated the next time you log in to the primary server.
Supported Clients
This option is valid for all clients.
Options File
This option is placed in the client options file (dsm.opt).
Syntax
MYREPLICATIONServer repl_servername
Parameters
repl_servername
Specifies the name of the stanza for the secondary server to be used during a failover. This value is
usually the name of the secondary server, not the host name of the server. Also, the value of the
Examples
Options file:
MYREPLICATIONServer TargetReplicationServer1
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
The connection information for the secondary server is located within the REPLSERVERName stanza.
The MYREPLICATIONServer option points to the secondary server name that is specified by the
REPLSERVERName stanza.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
PASSWORDAccess prompt
MYREPLICATIONServer TargetReplicationServer1
MYPRIMARYSERVER Server1
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Namedpipename
The namedpipename option specifies the name of a named pipe to use for communications between a
client and a server on the same Windows server domain.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab of
the Preferences editor.
Syntax
NAMedpipename name
Parameters
name
The name of a named pipe. The default is \\.\pipe\Server1.
444 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
namedpipename \\.\pipe\dsmser1
Command line:
-namedpipename=\\.\pipe\dsmser1
This option is valid only on the initial command line. It is not valid in interactive mode.
Nasnodename
The nasnodename option specifies the node name for the NAS file server when processing NAS file
systems. The client prompts you for an administrator ID.
The node name identifies the NAS file server to the IBM Spectrum Protect server. The server must
register the NAS file server.
You can specify this option on the command line or in the client options file (dsm.opt).
You can override the default value in the dsm.opt file by entering a different value on the command line. If
you do not specify the nasnodename option in the dsm.opt file, you must specify this option on the
command line when processing NAS file systems.
You can use the nasnodename option with the following commands:
• backup nas
• delete filespace
• query backup
• query filespace
• restore nas
You can use the delete filespace command to interactively delete NAS file spaces from server
storage.
Use the nasnodename option to identify the NAS file server. Place the nasnodename option in your client
options file (dsm.opt). The value in the client options file is the default, but this value can be overridden
on the command line. If the nasnodename option is not specified in the client options file, you must
specify this option on the command line when processing NAS file systems.
Use the class option to specify the class of the file space to delete. To display a list of file spaces
belonging to a NAS node so that you can choose one to delete, use the -class=nas option.
To delete NAS file spaces using the web client, see the topic for backing up your data.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect client API does not support this
option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab of the
Preferences editor.
Syntax
NASNodename nodename
Parameters
nodename
Specifies the node name for the NAS file server.
Nodename
Use the nodename option in your client options file to identify your workstation to the server. You can use
different node names to identify multiple operating systems on your workstation.
When you use the nodename option, you are prompted for the password that is assigned to the node that
you specify, if a password is required.
If you want to restore or retrieve files from the server while you are working from a different workstation,
use the virtualnodename option. You can also use the asnodename option, if it is set up by the
administrator.
If you are working from a different workstation, you can use the nodename option even if the
passwordaccess option is set to generate. To prevent this, use the virtualnodename option instead
of nodename.
The node name is not necessarily the TCP/IP host name.
When connecting to a server, the client must identity itself to the server. This login identification is
determined in the following manner:
• In the absence of a nodename entry in the dsm.opt file, or a virtualnodename entry in the client
options file (dsm.opt), or a virtual node name specified on a command line, the default login ID is the
name that the hostname command returns.
• If a nodename entry exists in the dsm.opt file, the nodename entry overrides the name that the
hostname command returns.
• If a virtualnodename entry exists in the client options file (dsm.opt), or a virtual node name is
specified on a command line, it cannot be the same name as the name returned by the hostname
command. When the server accepts the virtual node name, a password is required (if authentication is
on), even if the passwordaccess option is generate. When a connection to the server is established,
access is permitted to any file that is backed up using this login ID.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab, in the
Node Name field of the Preferences editor.
Syntax
NODename nodename
Parameters
nodename
Specifies a 1 to 64 character node name for which you want to request IBM Spectrum Protect
services. The default is the value returned with the hostname command.
Not specifying a node name permits the node name to default to the host name of the workstation
446 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
nodename cougar
Command line:
-nodename=cougar
This option is valid only on the initial command line. It is not valid in interactive mode.
“Virtualnodename” on page 543
Nojournal
Use the nojournal option with the incremental command to specify that you want to perform a
traditional full incremental backup, instead of the default journal-based backup.
Journal-based incremental backup differs from the traditional full incremental backup in the following
ways:
• Non-default copy frequencies (other than 0) are not enforced on the IBM Spectrum Protect server.
• Attribute changes to an object require a backup of the entire object.
For these reasons, you might want to use the nojournal option periodically to perform a traditional full
incremental backup.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Syntax
NOJournal
Parameters
There are no parameters for this option.
Examples
Command line:
Related concepts
“Journal-based backup” on page 645
If the journal engine service is installed and running, then by default the incremental command
performs a journal-based backup on file systems that are being monitored by the journal engine service.
Noprompt
The noprompt option suppresses the confirmation prompt that is presented by the delete group,
delete archive, expire, restore image, and set event commands.
• delete archive
• delete backup
• delete group
• expire
• restore image
Syntax
NOPrompt
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc delete archive -noprompt c:\home\project\*
Nrtablepath
The nrtablepath option specifies the location of the node replication table on the client. The backup-
archive client uses this table to store information about each backup or archive operation to the IBM
Spectrum Protect server.
The server to which you back up your data must be at version 7.1 or newer and must replicate client node
data to the secondary server.
When a failover occurs, the information that is on the secondary server might not be the most recent
version if replication did not happen before the failover. The client can compare the information in the
node replication table against the information that is on the secondary server to determine whether the
backup on the server is the most recent backup version.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
This option can also be configured in the client option set on the IBM Spectrum Protect server.
Syntax
NRTABLEPath path
Parameters
path
Specifies the location where the node replication table database is created. The default location is the
backup-archive client installation directory.
Restriction: The node replication table cannot be created in the C:\ directory. If you choose to
specify a location for the node replication table, do not specify the C:\ directory.
Example
Options file:
nrtablepath C:\nrtbl
Command line:
Does not apply.
448 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Related tasks
Determining the status of replicated client data
You can verify whether the most recent backup of the client was replicated to the secondary server before
you restore or retrieve client data from the secondary server.
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Numberformat
The numberformat option specifies the format you want to use to display numbers.
Use this option if you want to change the default number format for the language of the message
repository you are using.
By default, the backup-archive and administrative clients obtain format information from the locale
definition in effect at the time the client is called. Consult the documentation on your local system for
details about setting up your locale definition.
Note: The numberformat option does not affect the web client. The web client uses the number format
for the locale that the browser is running in. If the browser is not running in a supported locale, the web
client uses the number format for US English.
You can use the numberformat option with the following commands:
• delete archive
• delete backup
• expire
• query archive
• query asr
• query backup
• query image
• query nas
• query systemstate
• restore
• restore image
• restore nas
• restore registry
• retrieve
• set event
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client user-options file (dsm.opt). You can set this option on the Regional Settings
tab, Number Format field of the Preferences editor.
Syntax
NUMberformat number
Examples
Options file:
num 4
Command line:
-numberformat=4
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
450 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Optfile
The optfile option specifies the client options file to use when you start a backup-archive client
session.
Supported Clients
This option is valid for all clients.
Syntax
OPTFILE = file_name
Parameters
file_name
Specifies an alternate client options file, if you use the fully qualified path name. If you specify only
the file name, the client assumes the file name specified is located in the current working directory.
The default is dsm.opt.
Examples
Command line:
This option is valid only on the initial command line. It is not valid in interactive mode.
Password
The password option specifies a password for IBM Spectrum Protect.
If you do not specify this option and your administrator has set authentication to On, you are prompted for
a password when you start a backup-archive client session.
Note:
1. If the server prompts for a password, the password is not displayed as you enter it. However, if you
use the password option on the command line, your password is displayed as you enter it.
2. If the IBM Spectrum Protect server name changes or the backup-archive clients are directed to a
different server, all clients must re-authenticate with the server because the stored encrypted
password must be regenerated.
The password option is ignored when the passwordaccess option is set to generate.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
PASsword password
Parameters
password
Specifies the password you use to log on to the IBM Spectrum Protect server.
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are case-sensitive and are subject to more restrictions that can be imposed by LDAP
policies.
If your IBM Spectrum Protect server is at version 6.3.3 or later, and if you do not use an LDAP
directory server to authenticate passwords
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are stored in the IBM Spectrum Protect server database and are not case-sensitive.
If your IBM Spectrum Protect server is earlier than version 6.3.3
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9
_ - & + .
Passwords are stored in the IBM Spectrum Protect server database and are not case-sensitive.
Remember:
On the command line, enclose all parameters that contain one or more special characters in quotation
marks. Without quotation marks, the special characters can be interpreted as shell escape characters,
file redirection characters, or other characters that have significance to the operating system.
On Windows systems:
Enclose the command parameters in quotation marks (").
Command line example:
dsmc set password "t67@#$%^&" "pass2><w0rd"
Quotation marks are not required when you type a password with special characters in an options file.
Examples
Options file:
password secretword
Command line:
-password=secretword
-password="secret>shhh"
This option is valid only on the initial command line. It is not valid in interactive mode.
452 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Passwordaccess
The passwordaccess option specifies whether you want to generate your password automatically or set
as a user prompt.
Your administrator can require a password for your client node by enabling the authentication feature.
Ask your administrator if a password is required for your client node.
If a password is required, you can choose one of the following methods:
• Set the password for your client node yourself and have the client prompt for it each time you request
services.
• Let the client automatically generate a new password for your client node each time it expires, encrypt
and store the password in a file, and retrieve the password from that file when you request services.
You are not prompted for the password.
• If the server is not configured to require a password to log on to it, you can still be prompted to enter
your node password when the backup-archive client establishes a connection with the server. This
behavior occurs if this option, passwordaccess, is allowed to default or if you set it to
passwordaccess prompt. The password that you supply in response to the prompt is used only to
encrypt your login information; it is not used to log onto the server. In this configuration, you can avoid
entering a password by setting this option to passwordaccess generate. Setting passwordaccess
generate causes the client to create, store, and submit the password for you. When
passwordaccess generate is set, the password option is ignored.
Setting the passwordaccess option to generate is required in the following situations:
• When using the web client.
• When performing NAS operations.
• When using IBM Spectrum Protect for Workstations.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Authorization tab, in
the Password Access section of the Preferences editor.
Syntax
prompt
PASSWORDAccess
generate
Parameters
prompt
You are prompted for your client node password each time a client connects to the server. This is the
default.
To keep your client node password secure, enter commands without the password and wait for the
client to prompt you for the password.
API applications must supply the password when a session is initiated. The application is responsible
for obtaining the password.
generate
Encrypts and stores your password locally and generates a new password when the old password
expires. The new password is randomly generated by the client. Password constraints vary,
Examples
Options file:
passwordaccess generate
Command line:
Does not apply.
Pick
The pick option creates a list of backup versions or archive copies that match the file specification you
enter.
From the list, you can select the versions to process. Include the inactive option to view both active
and inactive objects.
For images, if you do not specify a source file space and destination file space, the pick list contains all
backed up images. In this case, the images selected from the pick list are restored to their original
location. If you specify the source file space and the destination file space, you can select only one entry
from the pick list.
Use the pick option with the following commands:
• delete archive
• delete backup
• delete group
• expire
• restore
• restore asr
• restore group
• restore image
• restore nas
• restore vm
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
PIck
454 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore c:\project\* -pick -inactive
Pitdate
Use the pitdate option with the pittime option to establish a point in time to display or restore the
latest version of your backups.
Files that were backed up on or before the date and time you specify, and which were not deleted before
the date and time you specify, are processed. Backup versions that you create after this date and time are
ignored.
Use the pitdate option with the following commands:
• delete backup
• query asr
• query backup
• query group
• query image
• query nas
• query systemstate
• query vm (vmbackuptype=fullvm and vmbackuptype=hypervfull)
• restore
• restore group
• restore image
• restore nas
• restore vm (vmbackuptype=fullvm and vmbackuptype=hypervfull)
When pitdate is used, the inactive and latest options are implicit.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
PITDate = date
Parameters
date
Specifies the appropriate date. Enter the date in the format you selected with the dateformat
option.
When you include dateformat with a command, it must precede the fromdate, pitdate, and
todate options.
Examples
Command line:
dsmc restore -pitdate=08/01/2003 c:\myfiles\
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
PITTime = time
Parameters
time
Specifies a time on a specified date. If you do not specify a time, the time defaults to 23:59:59.
Specify the time in the format you selected with the timeformat option.
When you include the timeformat option in a command, it must precede the fromtime, pittime,
and tottime options.
Examples
Command line:
dsmc query backup -pitt=06:00:00 -pitd=08/01/2003 c:\myfiles\
Postschedulecmd/Postnschedulecmd
The postschedulecmd/postnschedulecmd option specifies a command that the client program
processes after it runs a schedule.
If you want the client program to wait for the command to complete before it continues with other
processing, use the postschedulecmd option. If you do not want to wait for the command to complete
before the client continues with other processing, specify the postnschedulecmd option.
Return code handling and scheduled action behavior depends on both the option specified, and the type
of operation that is scheduled:
• For scheduled operations where the scheduled action is something other than COMMAND:
456 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If the postschedulecmd command does not complete with return code 0 (zero), the return code for
the scheduled event is either 8, or the return code of the scheduled operation, whichever is greater. If
you do not want the postschedulecmd command to be governed by this rule, you can create a script
or batch file that starts the command and exits with return code 0. Then configure postschedulecmd
to start the script or batch file.
• For scheduled operations where the scheduled action is COMMAND:
The return code from the command specified on the postschedulecmd option does not affect the
return code that is reported to the server when the scheduled event completes. If you want the results
of postschedulecmd operations to affect the return code of the scheduled event, include the
postschedulecmd operations in the scheduled action command script instead of using the
postschedulecmd option.
• If the scheduler action cannot be started, and the command specified on the preschedulecmd option
completes with a return code of zero (0), the command specified by the postschedulecmd option is
run.
• The return code from an operation specified on the postnschedulecmd option is not tracked, and
does not influence the return code of the scheduled event.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab in the
Schedule Command text box in the Preferences editor. The server can also define these options.
Syntax
POSTSChedulecmd cmdstring
POSTNSChedulecmd
Parameters
cmdstring
Specifies the command to process. You can enter a command to be run after a schedule with this
option. Use only one postschedulecmd option.
Specify the command string just as you would enter it from the operating system command prompt. If
the command string contains any blank spaces, enclose the command string in single quotation
marks. For example:
Use a blank, or null, string for cmdstring if you want to prevent any commands from running that the
IBM Spectrum Protect server administrator uses for postschedulecmd or preschedulecmd. If you
specify a blank or null string on either option, it prevents the administrator from using a command on
both options.
If your administrator uses a blank or null string on the postschedulecmd option, you cannot run a
post-schedule command.
Examples
Options file:
postsc startdb.cmd
postsc 'rename c:\myapp\logfile.log logfile.new'
Command line:
-postschedulecmd="'restart database'"
This option is valid only on the initial command line. It is not valid in interactive mode.
Related concepts
“Client return codes” on page 253
The backup-archive command-line interface and the scheduler exit with return codes that accurately
reflect the success or failure of the client operation.
Related reference
DEFINE SCHEDULE command
Postsnapshotcmd
The postsnapshotcmd option allows you to run operating system shell commands or scripts after the
backup-archive client starts a snapshot during a snapshot-based backup operation.
This option can be used in conjunction with the presnapshotcmd option to allow you to quiesce an
application while a snapshot is created, and then to restart that application after the snapshot is started.
This option is only valid if OFS or online image backup has been configured.
For an online image backup, use this option with the backup image command, the include.image
option, or in the dsm.opt file.
For open file support operations, use the postsnapshotcmd option in an include.fs statement or in
your client options file (dsm.opt).
If the postsnapshotcmd fails the operation continues, but appropriate warnings are logged.
Attention: During image backup operations or snapshot differential backup operations, if the
command that you include on either the presnapshotcmd or postsnapshotcmd statement
starts an asynchronous process, the command might not complete before the backup operation
finishes. If the command does not complete before the backup completes, temporary files might
be locked, which prevents them from being deleted. A database event occurs and the following
message is recorded in the dsmerror.log file:
ANS0361I DIAG: ..\..\common\db\cacheobj.cpp( 777): dbDelete():
remove('C:\adsm.sys\SystemExcludeCache__24400820.TsmCacheDB'):
errno 13: "Permission denied".
The file that is specified in the message (cacheobj.cpp) can be manually deleted after the
command that was started by the presnapshotcmd or postsnapshotcmd option completes.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can also set this option on the Image-Snapshot
tab of the Preferences editor.
Syntax
POSTSNAPshotcmd "cmdstring"
458 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
"cmdstring"
Specifies the quiesce command to process.
Use a blank, or null, string for "cmdstring" if you want to prevent any commands from running that the
administrator uses for postsnapshotcmd. If you specify a blank or null string, it prevents the
administrator from using a command on this option. If your administrator uses a blank or null string
on the postsnapshotcmd option, you cannot run a post-snapshot command.
Use the srvprepostsnapdisabled option to prevent the IBM Spectrum Protect server
administrator from executing operating system commands on the client system.
If the command string contains blanks, enclose the command string in quotation marks:
If you placed quotation marks within the command string, then enclose the entire command string in
single quotation marks:
Examples
Options file:
postsnapshotcmd "restart application"
The command string is a valid command for restarting your application.
Command line:
backup image -postsnapshotcmd="restart application"
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Include options” on page 407
“Srvprepostscheddisabled” on page 511
Preschedulecmd/Prenschedulecmd
The preschedulecmd option specifies a command that the client program processes before it runs a
schedule.
The client program waits for the command to complete before it starts the schedule. If you do not want it
to wait, specify prenschedulecmd.
Note:
1. Successful completion of the preschedulecmd command is considered to be a prerequisite to
running the scheduled operation. If the preschedulecmd command does not complete with return
code 0, the scheduled operation and any postschedulecmd and postnschedulecmd commands
will not run. The client reports that the scheduled event failed, and the return code is 12. If you do not
want the preschedulecmd command to be governed by this rule, you can create a script or batch file
that invokes the command and exits with return code 0. Then configure preschedulecmd to invoke
the script or batch file. The return code for the prenschedulecmd command is not tracked, and does
not influence the return code of the scheduled event.
2. The server can also define the preschedulecmd option (and the prenschedulecmd option).
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Syntax
PRESChedulecmd cmdstring
PRENSChedulecmd
Parameters
cmdstring
Specifies the command to process. Use only one preschedulecmd option. You can enter a command
to be executed before a schedule using this option.
Specify the command string just as you would enter it from the operating system command prompt; if
the string you specify would require quotation marks to run it at a Windows prompt, include the
quotation marks as needed. If the command string contains any blank spaces, enclose the command
string in single quotation marks.
In this example, single quotation marks are needed because the command string contains space
characters:
In this next example, double quotation marks are needed because both the file being renamed, and
the new file name, contain space characters. Because the command string does contain space
characters, the entire string must be enclosed in single quotation marks.
Use a blank or null string for cmdstring if you want to prevent any commands from running that the
IBM Spectrum Protect server administrator uses for postschedulecmd and preschedulecmd. If
you specify a blank or null string on either option, it prevents the administrator from using a command
on both options.
If your administrator uses a blank or null string on the preschedulecmd option, you cannot run a
pre-schedule command.
Examples
Options file:
presc stopdb.cmd
presc 'rename c:\myapp\logfile.log logfile.old'
presc 'net stop "simple service"'
presc 'rename "c:\myapp\log file.log" "log file.old"'
presc '"C:\Program Files\MyTools\runreport.bat"
log1.in log2.in'
Command line:
-preschedulecmd='"quiesce database"'
This option is valid only on the initial command line. It is not valid in interactive mode.
Related concepts
Client return codes
460 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The backup-archive command-line interface and the scheduler exit with return codes that accurately
reflect the success or failure of the client operation.
Preservelastaccessdate
Use the preservelastaccessdate option to specify whether a backup or archive operation changes
the last access time.
A backup or archive operation can change the last access time of a file. After an operation, the backup-
archive client can reset the last access time to the value before the operation. The last access time can be
preserved, rather than modified, by the backup-archive client. Resetting the last access time requires
extra processing for each file that is backed up or archived.
If you enable open file support, the last access date for files is always preserved regardless of the setting
for preservelastaccessdate. When open file support is enabled, do not use the
preservelastaccessdate option.
Use this option with the incremental, selective, or archive commands.
Note:
1. This option applies only to files; it does not apply to directories.
2. Resetting the last access date can affect applications that rely on accurate last-access dates such as a
Storage Resource Management (SRM) application.
3. The last access date cannot be preserved on files that are write-protected either by the read-only
attribute or by a restrictive NTFS security permission.
4. You cannot reset the last access date of read-only files. The preservelastaccessdate option
ignores read-only files and does not change their date.
Supported Clients
This option is valid for all clients.
The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Backup tab of the
Preferences editor.
Syntax
No
PRESERVELAstaccessdate
Yes
Parameters
No
A backup or archive operation can change the last access date. This value is the default.
Yes
A backup or archive operation does not change the last access date.
Examples
Options file:
preservelastaccessdate yes
Command line:
dsmc incr c: e: f: -preservelastaccessdate=yes
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Syntax
Subtree
PRESERvepath =
Complete
NOBase
NONe
Parameters
Subtree
Creates the lowest-level source directory as a subdirectory of the target directory. Files from the
source directory are stored in the new subdirectory. This is the default.
Complete
Restores the entire path, starting from the root, into the specified directory. The entire path includes
all the directories except the file space name.
NOBase
Restores the contents of the source directory without the lowest level, or base directory, into the
specified destination directory.
NONe
Restores all selected source files to the target directory. No part of the source path at or above the
source directory is reproduced at the target.
If you specify SUBDIR=yes, the client restores all files in the source directories to the single target
directory.
Examples
Command line:
Assume the server file space contains the following backup copies:
c:\h1\m1\file.a
c:\h1\m1\file.b
c:\h1\m1\l1\file.x
c:\h1\m1\l1\file.y
462 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This command:
dsmc res backupset my.backupset.file /fs/h1/m1/ /u/ann/ -su=yes creates a local
backupset file named "my.backupset.file".
Restores these directories and files:
c:\ann\h1\m1\file.a
c:\ann\h1\m1\file.b
This command:
dsmc res c:\h1\m1\ c:\ann\ -preser=nobase.
Restores these directories and files:
c:\ann\file.a
c:\ann\file.b
This command:
dsmc res c:\h1\m1\ c:\ann\ -preser=subtree.
Restores these directories and files:
c:\ann\m1\file.a
c:\ann\m1\file.b
This command:
dsmc res c:\h1\m1\ c:\ann\ -preser=none.
Restores these directories and files:
c:\ann\file.a
c:\ann\file.b
This command:
c:\ann\h1\m1\file.a
c:\ann\h1\m1\file.b
c:\ann\h1\m1\l1\file.x
c:\ann\h1\m1\l1\file.y
This command:
dsmc res c:\h1\m1\ c:\ann\ -su=yes -preser=nobase.
Restores these directories and files:
c:\ann\file.a
c:\ann\file.b
c:\ann\l1\file.x
c:\ann\l1\file.y
This command:
dsmc res c:\h1\m1\ c:\ann\ -su=yes -preser=subtree.
Restores these directories and files:
c:\ann\m1\file.a
c:\ann\m1\file.b
c:\ann\m1\l1\file.x
c:\ann\m1\l1\file.y
This command:
dsmc res c:\h1\m1\ c:\ann\ -su=yes -preser=none.
c:\ann\file.a
c:\ann\file.b
c:\ann\file.x
c:\ann\file.y
This command:
c:\ann\file.a
c:\ann\file.b
c:\ann\file.x
c:\ann\file.y
Presnapshotcmd
The presnapshotcmd option allows you to run operating system commands before the backup-archive
client starts a snapshot.
This allows you to quiesce an application before the client starts the snapshot during a snapshot-based
backup or archive.
This option can be used in conjunction with the postsnapshotcmd option to allow you to quiesce an
application while a snapshot is created, and then to restart that application after the snapshot is started.
This option is only valid if OFS or online image backup has been configured.
For an online image backup, use this option with the backup image command, the include.image
option, or in the dsm.opt file.
For open file support operations, use the presnapshotcmd option in an include.fs statement or in
your client options file (dsm.opt).
If the presnapshotcmd fails it is assumed that the application is not in a consistent state and the client
stops the operation and display the appropriate error message.
Attention: During image backup operations or snapshot differential backup operations, if the
command that you include on either the presnapshotcmd or postsnapshotcmd statement
starts an asynchronous process, the command might not complete before the backup operation
finishes. If the command does not complete before the backup completes, temporary files might
be locked, which prevents them from being deleted. A database event occurs and the following
message is recorded in the dsmerror.log file:
ANS0361I DIAG: ..\..\common\db\cacheobj.cpp( 777): dbDelete():
remove('C:\adsm.sys\SystemExcludeCache__24400820.TsmCacheDB'):
errno 13: "Permission denied".
The file that is specified in the message (cacheobj.cpp) can be manually deleted after the
command that was started by the presnapshotcmd or postsnapshotcmd option completes.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). You can set also this option on the Image-Snapshot
tab of the Preferences editor.
464 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
PRESNAPshotcmd "cmdstring"
Parameters
"cmdstring"
Specifies the quiesce command to process.
Use a blank, or null, string for "cmdstring" if you want to prevent any commands from running that the
administrator uses for presnapshotcmd. If you specify a blank or null string, it prevents the
administrator from using a command on this option. If your administrator uses a blank or null string
on the presnapshotcmd option, you cannot run a pre-snapshot command.
Use the srvprepostsnapdisabled option to prevent the IBM Spectrum Protect server
administrator from running operating system commands on the client system.
If the command string contains blanks, enclose the command string in quotation marks:
If you placed quotation marks within the command string, then enclose the entire command string in
single quotation marks:
Examples
Options file:
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Include options” on page 407
“Srvprepostscheddisabled” on page 511
Queryschedperiod
The queryschedperiod option specifies the number of hours you want the client scheduler to wait
between attempts to contact the server for scheduled work.
This option applies only when you set the schedmode option to polling. This option is used only when
the scheduler is running.
Your administrator can also set this option. If your administrator specifies a value for this option, that
value overrides the value set in your client options file after your client node successfully contacts the
server.
Tip: If the period set by the queryschedperiod option is much smaller than the randomization window
of a schedule that is set by the server administrator, the start of the schedule can be delayed. To avoid
such a delay, adjust the following values:
• The client action duration (with the SET CLIENTACTDURATION server command)
• The randomization of scheduled start times (with the SET RANDOMIZE server command)
Example 2:
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option. The server
can also define this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
QUERYSCHedperiod hours
Parameters
hours
Specifies the number of hours the client scheduler waits between attempts to contact the server for
scheduled work. The range of values is 1 - 9999; the default is 4.
Example
Options file:
querysch 6
Querysummary
The querysummary option provides statistics about files, directories and objects that are returned by the
query backup or query archive commands.
The following statistics are provided by the querysummary option:
• The aggregate number of files and directories that are returned by the query backup or query archive
command
• The aggregate amount of data of the objects that are returned by the query backup or query archive
command
• The classic restore memory-utilization estimate to restore objects that are returned by the query
backup or query archive command
• The total number of unique server volumes where the objects that are returned by the query command
reside
466 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Single objects that span multiple volumes only include one volume in the total number of volumes
statistics. For example, if c:\bigfile spans two volumes, only one of the volumes is counted in the
estimated number of volumes.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
QUERYSUMMARY
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc query backup k:\.* -subdir=yes -QUERYSUMMARY
Summary Statistics
Total Files Total Dirs Avg. File Size Total Data Memory Est.
----------- ---------- -------------- ---------- -----------
25 16 11.41 KB 285.37 KB 10.58 KB
Quiet
The quiet option limits the number of messages that are displayed on your screen during processing..
For example, when you run the incremental, selective, or archive commands, information might
appear about each file that is backed up. Use the quiet option if you do not want to display this
information
When you use the quiet option, error and processing information appears on your screen, and messages
are written to log files. If you do not specify quiet, the default option, verbose is used.
Supported Clients
This option is valid for all clients. The server can also define the quiet option, overriding the client
setting. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Command Line tab, Do
not display process information on screen checkbox of the Preferences editor.
Syntax
QUIET
Parameters
There are no parameters for this option.
Examples
Options file:
quiet
Command line:
-quiet
This option is valid only on the initial command line. It is not valid in interactive mode.
Replace
The replace option specifies whether to overwrite existing files on your workstation, or to prompt you
for your selection when you restore or retrieve files.
Important: The replace option does not affect recovery of directory objects. Directory objects are
always recovered, even when specifying replace=no. To prevent overwriting existing directories, use the
filesonly option.
You can use this option with the following commands:
• restore
• restore backupset
• restore group
468 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• retrieve
Note: Replace prompting does not occur during a scheduled operation. If you set the replace option to
prompt, the backup-archive client skips files without prompting you during a scheduled operation.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Restore tab, Action for
files that already exist section of the Preferences editor.
Syntax
Prompt
REPlace
All
Yes
No
Parameters
Prompt
For nonscheduled operations, you specify whether to overwrite existing files. For scheduled
operations, existing files are not overwritten and no prompts are displayed. This is the default.
All
All existing files are overwritten, including read-only files. All locked files are replaced when the
system is rebooted. If access to a file is denied, you are prompted to skip or overwrite the file. No
action is taken on the file until there is a response to the prompt.
Yes
Existing files are overwritten, except read-only files. For nonscheduled operations, you specify
whether to overwrite existing read-only files. For scheduled operations, existing read-only files are
not overwritten and no prompts are displayed. If access to a file is denied, the file is skipped.
No
Existing files are not overwritten. No prompts are displayed.
Note: You can choose to replace locked files when the system is rebooted. The client cannot perform an
in-place restore of active files. However, it stages restored versions of active files for replacement during
the next reboot, except for files containing named streams, sparse files, and directories. You can only
restore these files if they are unlocked.
Examples
Options file:
replace all
Command line:
-replace=no
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
Supported Clients
This option is valid for all clients.
Options File
This option is placed in the client options file (dsm.opt).
Syntax
replserverguid serverguid
Parameters
serverguid
Specifies the GUID of the secondary server that is used during a failover.
Examples
Options file:
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.02
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
The connection information for the secondary server is located within the REPLSERVERName stanza.
The MYREPLICATIONServer option points to the secondary server name that is specified by the
REPLSERVERName stanza.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
PASSWORDAccess prompt
470 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
MYREPLICATIONServer TargetReplicationServer1
MYPRIMARYSERVER Server1
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Replservername
The replservername option specifies the name of the secondary server that the client connects to
during a failover.
The replservername option begins a stanza in the client options file that contains connection
information about the secondary server.
This option is set by the IBM Spectrum Protect server administrator for the client node. During the normal
(non-failover) logon process, the option is sent to the client and is saved in the client options file.
Do not edit this option during normal operations.
Edit this option only during situations such as the following ones:
• The primary server is offline and the information for the secondary server is not in the options file.
• The secondary server information is out-of-date or incorrect.
Any values that you edit are removed or updated the next time you log in to the primary server.
Supported Clients
This option is valid for all clients.
Options File
This option is placed in the client options file (dsm.opt).
Syntax
replservername repl_servername
Parameters
repl_servername
Specifies the name of the secondary server to be used during a failover. This value is usually the name
of the secondary server, not the host name of the server.
Examples
Options file:
REPLSERVERName TargetReplicationServer1
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
PASSWORDAccess prompt
MYREPLICATIONServer TargetReplicationServer1
MYPRIMARYSERVER Server1
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Replsslport
The replsslport option specifies the TCP/IP port on the secondary server that is SSL-enabled. The
replsslport option is used when the client connects to the secondary server during a failover. This
option is deprecated if you are connecting to an IBM Spectrum Protect server V8.1.2 and later levels, and
V7.1.8 and later V7 levels.
The replsslport option is sent to the client by the primary server only if the secondary server is
configured for SSL.
This option is applicable only when the client is configured to use SSL for secure communications
between the IBM Spectrum Protect server and client. If the client is not configured to use SSL, the port
that is specified by the repltcpport option is used. You can determine whether the client uses SSL by
verifying the SSL client option.
This option must be specified within a replservername stanza in the client options file. The
replservername stanza contains connection information about the secondary server.
During the normal (non-failover) logon process, this option is sent to the client and is saved in the client
options file.
Do not edit this option during normal operations.
Edit this option only during situations such as the following ones:
• The primary server is offline and the information for the secondary server is not in the options file.
• The secondary server information is out-of-date or incorrect.
Any values that you edit are removed or updated the next time you log in to the primary server.
Supported Clients
This option is valid for all clients.
Options File
This option is placed in the client options file (dsm.opt).
472 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
replsslport port_address
Parameters
port_address
Specifies the TCP/IP port address that is enabled for SSL and that is used to communicate with the
secondary server.
Examples
Options file:
REPLSSLPORT 1506
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
The connection information for the secondary server is located within the REPLSERVERName stanza.
The MYREPLICATIONServer option points to the secondary server name that is specified by the
REPLSERVERName stanza.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
PASSWORDAccess prompt
MYREPLICATIONServer TargetReplicationServer1
MYPRIMARYSERVER Server1
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Repltcpport
The repltcpport option specifies the TCP/IP port on the secondary server to be used when the client
connects to the secondary server during a failover.
This option must be specified within a replservername stanza in the client options file. The
replservername stanza contains connection information about the secondary server.
This option is set by the IBM Spectrum Protect server administrator for the client node. During the normal
(non-failover) logon process, the option is sent to the client and is saved in the client options file.
Do not edit this option during normal operations.
Edit this option only during situations such as the following ones:
• The primary server is offline and the information for the secondary server is not in the options file.
Supported Clients
This option is valid for all clients.
Options File
This option is placed in the client options file (dsm.opt).
Syntax
repltcpport port_address
Parameters
port_address
Specifies the TCP/IP port address that is used to communicate with the secondary server.
Examples
Options file:
REPLTCPPort 1500
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
The connection information for the secondary server is located within the REPLSERVERName stanza.
The MYREPLICATIONServer option points to the secondary server name that is specified by the
REPLSERVERName stanza.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
PASSWORDAccess prompt
MYREPLICATIONServer TargetReplicationServer1
MYPRIMARYSERVER Server1
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
474 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can manually configure the client to automatically fail over to the secondary server.
Repltcpserveraddress
The repltcpserveraddress option specifies the TCP/IP address of the secondary server to be used
when the client connects to the secondary server during a failover.
This option must be specified within a replservername stanza in the client options file. The
replservername stanza contains connection information about the secondary server.
This option is set by the IBM Spectrum Protect server administrator for the client node. During the normal
(non-failover) logon process, the option is sent to the client and is saved in the client options file.
Do not edit this option during normal operations.
Edit this option only during situations such as the following ones:
• The primary server is offline and the information for the secondary server is not in the options file.
• The secondary server information is out-of-date or incorrect.
Any values that you edit are removed or updated the next time you log in to the primary server.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
REPLTCPServeraddress server_address
Parameters
server_address
Specifies a TCP/IP address for a server that is 1 - 64 characters in length. Specify a TCP/IP domain
name or a numeric IP address. The numeric IP address can be either a TCP/IP v4 or TCP/IP v6
address. You can use only IPv6 addresses if you specified the commmethod V6Tcpip option.
Examples
Options file:
REPLTCPServeraddress dsmchost.example.com
Command line:
Does not apply.
Options file:
The following example demonstrates how to specify options for the secondary server in the dsm.opt
file, and how to reference the secondary server.
The connection information for the secondary server is located within the REPLSERVERName stanza.
The MYREPLICATIONServer option points to the secondary server name that is specified by the
REPLSERVERName stanza.
REPLSERVERNAME TargetReplicationServer1
REPLTCPSERVERADDRESS TargetReplicationServer1
REPLTCPPORT 1505
REPLSSLPORT 1506
REPLSERVERGUID 91.0f.ef.90.5c.cc.11.e1.ae.34.08.00.00.00.00.00
COMMMethod TCPip
TCPPort 1500
TCPServeraddress server_hostname1.example.com
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
Resetarchiveattribute
Use the resetarchiveattribute option to specify whether the backup-archive client resets the
Windows archive attribute on files that are successfully backed up to the IBM Spectrum Protect server.
The client also resets the archive attribute during incremental backups if it is determined that there is
already an active object on the server. The resetarchiveattribute option is useful in conjunction
with applications, such as IBM Spectrum Control, as a simple way to report on the backup status of files.
The Windows archive attribute is used to indicate that a file has changed since the last backup. After the
client resets the archive attribute, the Windows operating system turns the attribute back to ON after the
file has been modified. The client does not use the Windows archive attribute to determine if a file is a
candidate for incremental backup, but only manipulates this attribute for reporting purposes. The client
uses a much more sophisticated method to determine candidacy for incremental backup.
There are several applications which manipulate or examine the Windows archive attribute. Be aware of
the ramifications of using the resetarchiveattribute option in conjunction with these products.
If you set the resetarchiveattribute option to yes, after a file has been successfully backed up to
the IBM Spectrum Protect server, the client resets the Windows archive attribute on the local file system:
• The Windows archive attribute is reset during incremental and selective backups after the file has been
successfully committed to the IBM Spectrum Protect server database. This attribute is not reset for
archive, or image operations.
• The Windows archive attribute is not reset when processing system objects or system state objects.
• The Windows archive attribute is not reset for directory entries.
In addition, in order for the local file system to reflect the current active object inventory on the IBM
Spectrum Protect server, the resetarchiveattribute option instructs the client to reset the Windows
archive attribute on the local file system if it is determined during incremental backup that a valid, active
backup copy of the file already exists on the server. This behavior is not displayed in the following cases:
• Incremental backup operations which do not examine the stored client attributes on the server, such as
journal-based backup or incremental-by-date processing.
• Files that are not examined during an incremental backup operation because they are excluded from
backup processing.
The client does not guarantee the accuracy of the current setting of the Windows archive attribute. For
example, if the resetarchiveattribute option is set to yes and a file examined by a reporting
product indicates that the Windows archive attribute is OFF for a particular file, this does not necessarily
mean that a valid, active backup copy of the file exists on the IBM Spectrum Protect server. Factors that
could contribute to this type of situation include:
• An independent software vendor product is manipulating the Windows archive attribute
• A file space was deleted from the server
• A backup tape was lost or destroyed
476 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
There should be no significant performance degradation when using the resetarchiveattribute
option. The resetarchiveattribute option does not affect restore processing.
Supported Clients
This option is valid for all Windows clients. The server can also define this option.
Options File
This option is valid in the client options file (dsm.opt) or server client options set. You can set this option
on the Backup tab of the Preferences editor.
Syntax
No
RESETARCHIVEATTRibute =
Yes
Parameters
Yes
Specifies that you want to reset the Windows archive attribute for files during a backup operation.
No
Specifies that you do not want to reset the Windows archive attribute for files during a backup
operation. This is the default.
Examples
Options file:
resetarchiveattribute yes
Related information
“Full and partial incremental backup” on page 136
Resourceutilization
Use the resourceutilization option in your option file to regulate the level of resources the IBM
Spectrum Protect server and client can use during processing.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab, in the
Resource Utilization field of the Preferences editor.
Syntax
RESOURceutilization number
Parameters
number
Specifies the level of resources the IBM Spectrum Protect server and client can use during
processing. The range of values that you can specify is 1 - 100. The default value is 2.
Whether the second session starts depends on how long it takes to query the server about files that are
backed up on file space A. The client might also try to read data from the file system and send it to the
server on multiple sessions.
Note: During a backup operation, if you enter multiple file specifications, the result might be that files
from one file specification are stored on multiple tapes and interspersed with files from different file
specifications. This can decrease restore performance. Setting the collocatebyfilespec option to
yes eliminates interspersing of files from different file specifications, by limiting the client to one server
session per file specification. Therefore, if you store the data to tape, files for each file specification are
stored together on one tape (unless another tape is required for more capacity).
Related reference
“Collocatebyfilespec” on page 332
Use the collocatebyfilespec option to specify whether the backup-archive client uses only one
server session to send objects generated from one file specification.
478 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
3. You can get a multi-session restore from your single restore command, and from a single volume on
the server, if that volume is device class FILE.
For example, if the data you want to restore is on 5 different tape volumes, the maximum number of
mount points is 5 for your node, and resourceutilization is set to 3, then 3 sessions are used for the
restore. If you increase the resourceutilization setting to 5, then 5 sessions are used for the
restore. There is a 1 to 1 relationship between the number of restore sessions that are allowed and the
resourceutilization setting. Multiple restore sessions are only allowed for no-query restore
operations.
Retryperiod
The retryperiod option specifies the number of minutes the client scheduler waits between attempts
to process a scheduled command that fails, or between unsuccessful attempts to report results to the
server. Use this option only when the scheduler is running.
Your administrator can also set this option. If your administrator specifies a value for this option, that
value overrides the value in your client options file after your client node successfully contacts the server.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab, in the
Retry period field of the Preferences editor.
Parameters
minutes
Specifies the number of minutes the client scheduler waits between attempts to contact the server, or
to process a scheduled command that fails. The range of values is 1 through 9999; the default is 20.
Examples
Options file:
retryp 10
Command line:
-retryperiod=10
This option is valid only on the initial command line. It is not valid in interactive mode.
Revokeremoteaccess
The revokeremoteaccess option restricts an administrator with client access privilege from accessing
a client workstation that is running the web client.
This option does not restrict administrators with client owner, system, or policy privilege from accessing
your workstation through the web client.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Web Client tab of the
Preferences editor.
Syntax
None
REVOKEremoteaccess
Access
Parameters
None
Does not revoke access to administrators who have client access authority for the client. This is the
default.
Access
Revokes access to administrators who have client access authority for the client.
Examples
Options file:
revokeremoteaccess none
Command line:
Does not apply.
480 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Runasservice
The runasservice option forces the client command process to continue running, even if the account
that started the client logs off.
Use this option with the AT command and the dsmc sched command when you schedule client
command batch jobs. The runasservice option is not valid in any options file (dsm.opt or tsmasr.opt).
Important: Use the scheduler service when running IBM Spectrum Protect services unattended. Set
runasservice=yes only to schedule client commands using the Windows AT command. Setting
runasservice=yes might interfere with other interactive uses of the backup-arcchive client.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Syntax
No
RUNASSERVice
Yes
Parameters
No
Does not force the client command process to continue running, even if the account that started the
client logs off. This is the default.
Yes
Forces the client command process to continue running, even if the account that started the client
logs off.
Restrictions:
1. When runasservice=yes, the setting for the REPLACE is always overridden to the behavior of
replace=no.
2. The option runasservice=yes cannot be used with passwordaccess=prompt.
3. Backup, archive, restore and retrieve operations performed with runasservice=yes that
encounter prompts always fail. To avoid this problem, either save the encryption key password
with encryptkey=save, or turn off the runasservice option.
Examples
Command line:
-runasservice=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Schedcmddisabled
The schedcmddisabled option specifies whether to disable the scheduling of commands by the server
action=command option on the define schedule server command.
This option does not disable the preschedulecmd and postschedulecmd commands. However, you
can specify preschedulecmd or postschedulecmd with a blank or a null string to disable the
scheduling of these commands.
You can disable the scheduling of commands defined by your IBM Spectrum Protect administrator by
setting the schedcmddisabled option to yes.
Use the query schedule command to query the schedules defined by your administrator.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
SCHEDCMDDisabled
Yes
Parameters
Yes
Specifies that the server disables the scheduling of commands using the action=command option on
the DEFINE SCHEDULE server command.
No
Specifies that the server does not disable the scheduling of commands using the action=command
option on the DEFINE SCHEDULE server command. This is the default.
Examples
Options file:
schedcmddisabled no
Command line:
Does not apply.
Related information
“Query Schedule” on page 675
Schedcmdexception
The schedcmexception option is used in conjunction with the schedcmddisabled option to disable
the scheduling of commands by the server action=command option on the DEFINE SCHEDULE server
command, except for specific command strings.
You must specify the exact string that matches the "objects" definition in the schedule for the scheduled
server command to be accepted. If the string does not match exactly (for example, there is an extra space
or the capitalization is different), the scheduled command action is blocked.
You can provide multiple schedcmexception options in the options file. This option is not honored if
schedcmddisabled is not enabled. The placement of this option in the options file is independent of the
placement of the schedcmddisabled option.
Supported Clients
This option is valid for all clients. This option is not valid in the IBM Spectrum Protect server client options
set.
Options File
Place this option in the client options file (dsm.opt).
482 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
SCHEDCMDException string
Parameters
string
For commands scheduled by the action=command option on the DEFINE SCHEDULE server
command, this parameter indicates the objects pattern to enable if the schedcmddisabled=yes
option is specified. This parameter is case sensitive, and must match the command string on the IBM
Spectrum Protect server schedule definition.
Example
Options file:
schedcmddisabled yes
schedcmdexception "start dir c: /s"
schedcmdexception "start echo hello, world!"
Related information
“Schedcmddisabled” on page 481
Schedgroup
The schedgroup option assigns a schedule to a group.
An example of the use of this option is to group multiple daily local backup schedules with a single server
backup schedule.
Supported Clients
This option is valid for all clients as a command-line option for the server DEFINE SCHEDULE command.
This option cannot be added to a client option set that is on the IBM Spectrum Protect server.
Syntax
SCHEDGROUP schedule_group_name
Parameters
schedule_group_name
Specifies the name of the schedule group. You can specify up to 30 characters for the name.
For a list of valid characters that you can use in the schedule group name, see Naming IBM Spectrum
Protect objects.
Examples
The following example commands group schedules SCHED_A_1, SCHED_A_2, SCHED_A_3, and
SCHED_A_4 in to schedule group GROUP_A.
Command line:
This example shows a local backup at 6 AM:
define schedule standard SCHED_A_1 Type=Client ACTion=Backup SUBACTion=VM
OPTions='-vmfulltype=vstor -vmbackuptype=fullvm -vmbackuplocation=local -
domain.vmfull="SCHEDULE-TAG" -asnodename=DC_SARTRE_WB -SCHEDGROUP=GROUP_A'
STARTDate=02/06/2017 STARTTime=06:00:00 SCHEDStyle=Enhanced DAYofweek=ANY
This example shows a local backup at 12 PM:
Schedlogmax
The schedlogmax option specifies the maximum size of the schedule log (dsmsched.log) and web
client log (dsmwebcl.log), in megabytes.
This option causes the log files that get created for scheduler events (dsmsched.log) and web client
events (dsmwebcl.log) to wrap around when they reach their maximum size. As scheduler and web
client events are logged, log records are added to the end of the log files until the maximum specified size
is reached. When the maximum specified size is reached, a log record saying Continued at
beginning of file is placed as the last record in the file. Subsequent logging is resumed at the
beginning of the file. The end of the wrapped log is indicated by a record saying END OF DATA.
When you set the schedlogmax option, scheduler and web client log messages are not saved in a prune
file. If you want to prune logs and save the pruned log entries to another file, see the
schedlogretention option.
If you change from log wrapping (schedlogmax option) to log pruning (schedlogretention option), all
existing log entries are retained and the log is pruned using the new schedlogretention criteria.
If you change from log pruning (schedlogretention option) to log wrapping (schedlogmax option), all
records in the existing logs are copied to a file containing the pruned entries. For example, log records
pruned from the dsmsched.log file are copied to dsmsched.pru. Log records pruned from
dsmwebcl.log are copied to dsmweblog.pru. The existing logs (dsmsched.log and dsmwebcl.log)
are emptied, and logging begins using the new log wrapping criteria.
If you simply change the value of the schedlogmax option, the existing log is extended or shortened to
accommodate the new size. If the value is reduced, the oldest entries are deleted to reduce the file to the
new size.
If neither schedlogmax nor schedlogretention is specified, the error log can grow without any limit
on its size. You must manually manage the log contents to prevent the log from depleting disk resources.
When the log has been created with neither option specified, if you later issue a command and specify the
schedlogretention option, the log is pruned using the retention value specified. When the log has
been created with neither option specified, if you later issue a command and specify the schedlogmax
option, the existing log is treated as if it was a pruned log. That is, the content of the dsmsched.log file
is copied to a file called dsmsched.pru, the content of dsmwebcl.log is copied to a file called
dsmwebcl.pru, and new log entries are created in dsmsched.log and dsmwebcl.log, and both files
wrap when they reach their maximum size.
Note: If you specify a non-zero value for schedlogmax (which enables log wrapping), you cannot use the
schedlogretention option to create pruned logs. Logs can be pruned or wrapped, but not both.
484 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Logs created with the schedlogmax option contain a log header record that contains information similar
to this example record:
LOGHEADERREC 661 104857600 IBM Spectrum Protect 8.1.0.0 Fri Dec 9 06:46:53 2014
Note that the dates and time stamps in the LOGHEADERREC text are not translated or formatted using the
settings specified on the dateformat or timeformat options.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
You can also set this option on the Client Preferences > Scheduler tab in the GUI, by selecting Enable
scheduler log file wrapping and by specifying a non-zero maximum size for the log file. To prevent log
file wrapping, set the maximum size to zero. When the maximum wrapping is set to zero, clearing or
setting the Enable scheduler log file wrapping option has no effect; log wrapping does not occur if the
maximum size is set to zero.
Syntax
SCHEDLOGMAX size
Parameters
size
Specifies the maximum size, in megabytes, for the log file. The range of values is 0 to 2047; the
default is 0, which disables log file wrapping and allows the log file to grow indefinitely.
Examples
Options file:
schedlogmax 100
Command line:
-schedlogmax=100
This option is valid only on the initial command line. It is not valid in interactive mode.
Schedlogname
The schedlogname option specifies the path and file name where you want to store schedule log
information.
Use this option only when you want to store schedule log information. This option applies only when the
scheduler is running.
If this option is not used, the dsmsched.log file is created in the same directory as the dsmerror.log
file.
When you run the schedule command, output from scheduled commands appears on your screen.
Output is also sent to the file you specify with this option. If any part of the path you specify does not
exist, the client attempts to create it.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
SCHEDLOGName filespec
Parameters
filespec
Specifies the path and file name where you want to store schedule log information when processing
scheduled work. If any part of the path you specify does not exist, the client attempts to create it.
If you specify a file name only, the file is stored in your current directory. The default is the current
working directory with a file name of dsmsched.log.
Examples
Options file:
schedlogname c:\mydir\schedlog.jan
Command line:
-schedlogn=c:\mydir\schedlog.jan
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
See “Errorlogname” on page 378 for more information on placement of the dsmsched.log file.
Schedlogretention
The schedlogretention option specifies the number of days to keep entries in the schedule log
(dsmsched.log) and the web client log (dsmwebcl.log), and whether to save the pruned entries in
another file.
The schedule log (dsmsched.log) is pruned when the scheduler starts and after a scheduled event
completes. Pruned entries are written to a file called dsmsched.pru.
The web client log (dsmwebcl.log) is pruned during the initial start of the client acceptor daemon.
Pruned entries are written to a file called dsmwebcl.pru.
If you change from log pruning (schedlogretention option) to log wrapping (schedlogmax option), all
records in the existing log are copied to the pruned log (dsmsched.pru and dsmwebcl.pru), and the
existing logs (dsmsched.log and dsmwebcl.log) are emptied, and logging begins using the new log
wrapping criteria.
If you change from log wrapping (schedlogmax option) to log pruning (schedlogretention option), all
existing log entries are retained and the log is pruned using the new schedlogretention criteria.
Pruned entries are saved in their corresponding *.pru files.
If neither schedlogmax nor schedlogretention is specified, the logs can grow without any limit on
their size. You must manually manage the log contents to prevent the log from depleting disk resources.
When the log has been created with neither option specified, if you later issue a command and specify the
schedlogretention option, the log is pruned using the retention value specified. When the log has
been created with neither option specified, if you later issue a command and specify the schedlogmax
option, the existing log is treated as if it was a pruned log. That is, the content of the dsmsched.log file
486 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
is copied to a file called dsmsched.pru, the content of dsmwebcl.log is copied to dsmwebcl.pru, and
new log entries are created in both dsmsched.log and dsmwebcl.log, and both files wrap when they
reach their maximum size.
Note: If you specify schedlogretention option to create pruned logs, you cannot specify the
schedlogmax option. Logs can be pruned or wrapped, but not both.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
You can also set this option on the Client preferences > Scheduler tab in the GUI, by selecting Prune old
entries and by specifying a value for Prune entries older than. Selecting the Save pruned entries option
saves the pruned scheduler log entries in the dsmsched.pru log file. Selecting Save pruned entries also
saves web client log entries in the dsmwebcl.pru log file.
Syntax
N D
SCHEDLOGRetention
days S
Parameters
N or days
Specifies how long to wait before pruning the log.
N
Do not prune the log. This permits the log to grow indefinitely. This is the default.
days
Specifies the number of days to keep log file entries before pruning. The range of values is zero
through 9999.
D or S
Specifies whether to save the pruned entries. Use a space or comma to separate this parameter from
the previous one.
D
Discards the log entries when pruning the log. This is the default.
S
Saves the log entries when pruning the log.
Pruned entries are copied to the file of pruned entries (dsmsched.pru or dsmsched.pru), which
is stored in the same directory as the log.
Examples
Options file:
schedlogretention 30 S
Command line:
-schedlogretention=30,S
This option is valid only on the initial command line. It is not valid in interactive mode.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab, in the
Schedule Mode section in the Preferences editor.
Syntax
POlling
SCHEDMODe
PRompted
Parameters
POlling
The client scheduler queries the server for scheduled work at prescribed time intervals. This is the
default. You can set the time intervals using the queryschedperiod option.
PRompted
The client scheduler waits for the server to contact your client node when scheduled work needs to be
done.
Note:
1. Use schedmode prompted in conjunction with the autodeploy option, to enable the scheduler
to process the client deployment schedule immediately.
2. If you use the dsmc schedule command and both schedmode prompted and commmethod
V6Tcpip are specified, the client and IBM Spectrum Protect server must be configured for IPv6.
Additionally, the client host name must be set up for the IPv6 address.
488 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
schedmode prompted
Command line:
-schedmod=po
This option is valid only on the initial command line. It is not valid in interactive mode.
Related reference
“Autodeploy” on page 319
Use the autodeploy option to enable or disable an automatic deployment of the client if a restart is
required.
“Cadlistenonport” on page 324
The cadlistenonport option specifies whether to open a listening port for the client acceptor.
“Tcpclientaddress” on page 528
The tcpclientaddress option specifies a TCP/IP address if your client node has more than one
address, and you want the server to contact an address other than the one that was used to make the first
server contact.
“Tcpclientport” on page 529
The tcpclientport option specifies a TCP/IP port number for the server to contact the client when the
server begins the server prompted scheduled operation.
Schedrestretrdisabled
The schedrestretrdisabled option specifies whether to disable the execution of restore or retrieve
schedule operations.
Supported Clients
This option is valid for all clients. The server cannot define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the client options file (dsm.opt) for the scheduler. You can set this option on the
Scheduler tab in the Schedule Command section in the Preferences editor.
Syntax
No
SCHEDRESTRETRDisabled
Yes
Parameters
No
Specifies that the client does not disable the execution of restore and retrieve schedule operations.
This parameter is the default.
Yes
Specifies that the client disables the execution of restore and retrieve schedule operations.
Examples
Options file:
schedrestretrdisabled yes
Command line:
Does not apply.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the client user-options file (dsm.opt). You can set this option in Command Line >
Number of lines to display in the Preferences editor.
Place this option in the client options file (dsm.opt). You can set this option in Command Line > Number
of lines to display in the Preferences editor.
Syntax
SCROLLLines number
Parameters
number
Specifies the number of lines of information that are displayed on your screen at one time. The range
of values is 1 through 80; the default is 20.
Examples
Options file:
scrolllines 25
Command line:
-scrolll=25
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
490 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Scrollprompt
The scrollprompt option specifies whether you want the bakup-archive client to stop and wait after
displaying the number of lines of information you specified with the scrolllines option, or scroll
through and stop at the end of the information list.
You can use the scrollprompt option with the following commands only:
• delete filespace
• query archive
• query backup
• query backupset
• query filespace
• query group
• query image
• query nas
• query node
• query options
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the client user-options file (dsm.opt). You can set this option on the Command Line
tab, Pause after displaying the following number of lines field of the Preferences editor.
Syntax
No
SCROLLPrompt
Yes
Parameters
No
Scrolls to the end of the list and stops. This is the default.
Yes
Stops and waits after displaying the number of lines you specified with the scrolllines option. The
following prompt is displayed on the screen:
Examples
Options file:
scrollprompt yes
Command line:
-scrollp=yes
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
A similar problem can occur if an encryption key is required for backup operations. In this case, you can
execute the scheduler from the command line (dsmc schedule) and enter the encryption key when
prompted. After the password and encryption key are updated, you must restart the scheduler.
If you set the sessioninitiation option to client, the client initiates sessions with the server by
communicating on the TCP/IP port defined with the server option tcpport. This is the default. Server
prompted scheduling can be used to prompt the client to connect to the server.
Note:
1. The IBM Spectrum Protect server can specify SESSIONINITiation=clientorserver or
SESSIONINITiation=serveronly on the register node and update node commands. If the
server specifies SESSIONINITiation=clientorserver, the client can decide which method to
use. If the server specifies SESSIONINITiation=serveronly, all sessions are initiated by the
server.
2. If sessioninitiation is set to serveronly, the value for the tcpclientaddress client option
must be the same as the value for the HLAddress option of the update node or register node
server command. The value for the tcpclientport client option must be the same as the value for
the LLAddress option of the update node or register node server command.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab,
Session Initiation field of the Preferences editor.
Syntax
Client
SESSIONINITiation
SERVEROnly
492 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
Client
Specifies that the client initiates sessions with the server by communicating on the TCP/IP port
defined with the server option TCPPORT. This is the default. Server prompted scheduling can be used
to prompt the client to connect to the server.
SERVEROnly
Specifies that the server will not accept client requests for sessions. All sessions must be initiated by
server prompted scheduling on the port defined on the client with the tcpclientport option.
Except for client acceptor daemon-managed schedulers, the command-line client, and the backup-
archive client GUI still attempt to initiate sessions.
If the server AUTHENTICATION option is set to LDAP, do not set the client sessioninitiation
option to serveronly; if you do, schedules cannot run.
Examples
Options file:
sessioninitiation serveronly
Command line:
schedule -sessioninitiation=serveronly
This option is valid only on the initial command line. It is not valid in interactive mode.
Related information
“Configuring the scheduler” on page 28
“Tcpclientport” on page 529
Setwindowtitle
Use the setwindowtitle option to modify the title of the administrative client command window during
processing.
For example, when you run the administrative client command (dsmadmc) on the client node and the
administrative client connects to the IBM Spectrum Protect server, the following text is displayed in the
title of the command window:
where servername is the name of the IBM Spectrum Protect server, and serverhostname is the host name
of the IBM Spectrum Protect.
When you use the setwindowtitle option, any user-defined title of the command window is
overwritten. After you disconnect the administrative client from the IBM Spectrum Protect server, the
window title is reset to the user-defined window title.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
SETWINDOWTITLE
Yes
Examples
Options file:
SETWINDOWTITLE YES
Command line:
-setwindowtitle=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Shmport
The shmport option specifies the TCP/IP port address of a server when using shared memory. All shared
memory communications start with a TCP/IP connection.
Note: The value specified for the shmport option in the client options file (dsm.opt) must match the
value specified for shmport in the server options file.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
SHMPort port_number
Parameters
port_number
Specifies the port number. You can specify a value from 1 to 32767. The default value is 1510.
Examples
Options file:
shmport 1580
Command line:
Does not apply.
Showmembers
Use the showmembers option to display all members of a group.
You can use the showmembers option with the query group, query systemstate, and restore
group, commands.
The showmembers option is not valid with the inactive option. If you want to display members of a
group that are not currently active, use the pitdate and pittime options.
494 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all Windows clients.
Syntax
SHOWMembers
Parameters
There are no parameters for this option.
Examples
Command line:
Skipmissingsyswfiles
Use the Skipmissingsyswfiles option to specify whether the backup-archive client skips certain
missing VSS writer files and continues the system state backup.
Setting the skipmissingsyswfile option to yes causes certain VSS writer files that are not found
during a system state backup to be skipped. This option is effective only for missing files from the
following VSS writers:
• System Writer
• Windows Deployment Service Writer
• Event Log writer
Consider the following items before you use the skipmissingsyswfile option:
• Setting the skipmissingsyswfile option to yes enables backups that might have failed to complete
with previous versions of the backup-archive client.
• There is a small risk of an inconsistent backup because a file is skipped.
• This risk is minimized by these factors:
– The backup can be done only when the system is running.
– Critical system files are protected from deletion by Microsoft Windows.
Supported Clients
This option is valid for Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
SKIPMISSingsyswfiles
No
Examples
Options file:
SKIPMISSingsyswfiles yes
Command line:
-SKIPMISSingsyswfiles=yes
Related reference
“Backup Systemstate” on page 620
Use the backup systemstate command to back up all bootable system state and system services
components as a single object, to provide a consistent point-in-time snapshot of the system state.
Skipntpermissions
The skipntpermissions option bypasses processing of Windows file system security information.
You can use this option for incremental backups, selective backups, restore operations, and for archive
and retrieve operations.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). It applies to incremental, selective, restore,
archive, and retrieve commands. You can also set this option on the General tab of the Preferences
editor.
Syntax
No
SKIPNTPermissions
Yes
Parameters
No
If you specify No, Windows file system security information is backed up, restored, archived, or
retrieved. This is the default setting.
Yes
If you specify Yes, Windows file system security information is not backed up, restored, archived, or
retrieved.
496 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
skipntp yes
Command line:
–skipntp=yes
Skipntsecuritycrc
The skipntsecuritycrc option controls the computation of the security cyclic redundancy check (CRC)
for a comparison of Windows NTFS or ReFS security information during an incremental or selective
backup, archive, restore, or retrieve operation.
If you set the skipntsecuritycrc option to no (the default), performance might be slower because the
program must retrieve all the security descriptors.
Use this option with the following commands:
• archive
• incremental
• restore
• retrieve
• selective
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
SKIPNTSecuritycrc
Yes
Parameters
No
If you specify No, the security CRC is generated during a backup. This is the default setting.
Yes
If you specify Yes, the security CRC is not generated during a backup. All the permissions are backed
up, but the program cannot determine if the permissions are changed during the next incremental
backup. When the skipntpermissions option is set to yes, the skipntsecuritycrc option does
not apply.
Examples
Options file:
skipnts no
Command line:
–skipnts=no
Support clients
This option is valid for IBM Spectrum Protect for Virtual Environments clients on Windows operating
systems only.
Options file
This option is valid in the client options file (dsm.opt) or on the command line. The option is ignored for
all other clients.
Syntax
Yes
SKIPSYSTemexclude
No
Parameters
Yes
Specify this parameter to skip the processing of exclude statements for certain Windows operating
system files during VM backup operations. This parameter is the default.
No
Specify this parameter to process exclude statements of Windows operating system files. When you
select this parameter and run a file backup of the Hyper-V host, the operating system files are
excluded.
Examples
Options file
SKIPSYSTemexclude yes
Command line
dsmc backup vm -SKIPSYST=yes
dsmc incr -skipsyst=no
Snapdiff
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
The snapdiff option is for backing up NAS/N-Series file server volumes that are CIFS attached.
Restriction: None of the NetApp predefined shares, including C$, works with the IBM Spectrum Protect
snapshot difference option because the backup-archive client cannot determine their mount points
programmatically.
You must configure a user ID and password on the backup-archive client to enable snapshot difference
processing. For more information about setting up the snapdiff option, see “Configuring NetApp and
IBM Spectrum Protect for snapshot difference incremental backups” on page 73.
498 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use this option with an incremental backup of a NAS file server volume, instead of a simple incremental
backup or an incremental backup with the snapshotroot option, whenever the NAS file server is
running ONTAP 7.3.0, or later. Do not use the snapdiff and snapshotroot options together.
The first time that you run an incremental backup with the snapshot difference option, a snapshot is
created (the base snapshot) and a traditional incremental backup is run by using this snapshot as the
source. The name of the snapshot that is created is recorded in the IBM Spectrum Protect server
database. The initial incremental backup must complete without failure in order for the next backup
operation to use snapshot difference processing.
The second time an incremental backup is run with this option, a newer snapshot is either created, or an
existing one is used (depending on the value set for the diffsnapshot option) to find the differences
between these two snapshots. The second snapshot is called the diffsnapshot, or differences snapshot.
The client then incrementally backs up the files that are reported as changed, by NetApp, to the IBM
Spectrum Protect server. The file system that you select for snapshot difference processing must be
mounted to the root of the volume. You cannot use the snapdiff option for any file system that is not
mounted to the root of the volume. After you backed up the data with the snapdiff option, the snapshot
that was used as the base snapshot is deleted from the snapshot directory.
On Windows systems, the snapshot directory is in ~snapshot.
The client does not delete any snapshots that it did not create.
When a snapshot-differential-incremental backup operation completes, the client ensures that only the
most recently-registered base snapshot persists on the filer volume. All snapshots that are created by a
snapshot-differential-incremental backup on the backup-archive client begin with the characters "TSM_".
If you use a snapshot tool other than the backup-archive client to produce snapshots, ensure that you do
not use the string "TSM_" at the beginning of the snapshot name. If the snapshot names begin with
"TSM_", the files are deleted when the client initiates the next snapshot-differential-incremental backup
operation.
To run a snapshot-differential-incremental backup of read-only NetApp filer volumes, the
useexistingbase option must be specified to prevent an attempt to create a snapshot on the read-only
volume. Also, specify the name of the base snapshot to use (basesnapshotname option) and the name
of the differential snapshot to use (diffsnapshotname option).
For NAS and N-Series file servers that are running ONTAP 7.3.0, or later, you can use the
createnewbase option to back up any files that were skipped because of one of the following reasons:
• A file is excluded because the include-exclude file has an exclude rule in effect. A file is excluded when
you did not change the include-exclude file, but you removed the rule that excluded the file. The NetApp
API detects file changes only between two snapshots, not changes to the include-exclude file.
• If you added an include statement to the option file, that include option does not take effect unless
NetApp detects that the file changes occurred. The client does not inspect each file on the volume
during backup.
• You used the dsmc delete backup command to explicitly delete a file from the IBM Spectrum
Protect server inventory. NetApp does not detect that a file was manually deleted from the server.
Therefore, the file remains unprotected in IBM Spectrum Protect storage until it is changed on the
volume and the change is detected by NetApp, signaling the client to back it up again.
• Policy changes such as changing the policy from mode=modified to mode=absolute are not
detected.
• The entire file space is deleted from the IBM Spectrum Protect inventory. This action causes the
snapshot difference option to create a snapshot to use as the source, and runs a full incremental
backup.
• A file is excluded from backup because the file name contains a character that is not in the 7 bit-ASCII
character set. The createnewbase option creates a base snapshot and uses it as a source to run a full
incremental backup. NetApp controls what constitutes a changed object.
Tip: You can use the snapdiffhttps option to run snapshot-differential-incremental backups of
NetApp filers with a secure HTTPS connection. To successfully run snapshot-differential-incremental
500 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 59. Incremental command: Related options (continued)
Option Where specified With
snapdiff
include.fs.nas “Include options” on page 407 Client options file (dsm.opt) or No effect
command line.
inclexcl “Inclexcl” on page 406 Client options file (dsm.opt). Valid, but only
when a file
change is
detected by
NetApp.
incrbydate “Incrbydate” on page 423 Command line only. Not valid
memoryefficientbackup Client options file (dsm.opt), No effect
“Memoryefficientbackup” on page 437 server, or command line.
monitor “Monitor” on page 441 Command line only. Not valid
nojournal “Nojournal” on page 447 Command line only. Not valid
postsnapshotcmd “Postsnapshotcmd” on page Client options file (dsm.opt) or Valid
458 with the include.fs option.
preservelastaccessdate Client options file (dsm.opt) or Valid
“Preservelastaccessdate” on page 461 command line.
presnapshotcmd “Presnapshotcmd” on page 464 Client options file (dsm.opt) or Valid
with the include.fs option.
resetarchiveattribute Client options file (dsm.opt). Valid
“Resetarchiveattribute” on page 476
skipntpermissions “Skipntpermissions” on Client options file (dsm.opt) or Valid
page 496 command line.
skipntsecuritycrc “Skipntsecuritycrc” on page Client options file (dsm.opt) or Valid
497 command line.
snapdiffhttps “Snapdiffhttps” on page 504 Command line only. Valid
snapshotproviderfs “Snapshotproviderfs” on Client options file (dsm.opt) or Not valid
page 506 with the include.fs option.
snapshotproviderimage Client options file (dsm.opt) or Not valid
“Snapshotproviderimage” on page 507 with the include.image option.
snapshotroot “Snapshotroot” on page 508 Command line only. Not valid
subdir “Subdir” on page 519 Client options file (dsm.opt) or Not valid
command line.
tapeprompt “Tapeprompt” on page 525 Client options file (dsm.opt) or Valid
command line.
toc “Toc” on page 534 Command line only. Not valid
useexistingbase “Useexistingbase” on page Command line only. Valid
539
virtualfsname “Virtualfsname” on page 542 Command line only. Not valid
Syntax
SNAPDiff
Parameters
There are no parameters for this option.
Examples
Command line:
Perform a snapshot-differential-incremental backup from a snapshot that is taken of a network
share //homestore.example.com/vol/vol1 mounted on drive H:, where
homestore.example.com is a file server.
incremental -snapdiff H:
Perform a snapshot-differential-incremental backup from a snapshot that is taken of a network
share //homestore.example.com/vol/vol1 mounted on drive H:, where
homestore.example.com is a file server. The -diffsnapshot option value of LATEST means that
the operation uses the latest snapshot (the active snapshot) for volume H:.
incremental -snapdiff H: -diffsnapshot=latest
Command line:
Run a one-time full incremental backup after detecting that the NetApp server has migrated to a
unicode-enabled file server from a server that did not support unicode file names.
Run a snapshot-differential-incremental backup after detecting that the NetApp server has migrated
to a unicode-enabled file server from a server that did not support unicode file names. This command
suppresses the warning message.
Perform a full incremental backup because you made some include or exclude changes:
Related concepts
SnapMirror support for NetApp snapshot-assisted progressive incremental backup (snapdiff)
You can use NetApp's SnapDiff backup processing in conjunction with NetApp's SnapMirror replication to
back up NetApp source or destination filer volumes.
Related tasks
Configuring NetApp and IBM Spectrum Protect for snapshot difference incremental backups
You must configure the NetApp file server connection information to run the snapshot difference
incremental backup command on the backup-archive client. You must also use the set password
command to specify the file server host name, and the password and user name that is used to access the
file server.
Related reference
Snapdiffhttps
Specify the snapdiffhttps option to use a secure HTTPS connection for communicating with a NetApp
filer during a snapshot differential backup.
Basesnapshotname
The basesnapshotname option specifies the snapshot to use as the base snapshot, when you perform a
snapshot differential (snapdiff) backup of a NetApp filer volume. If you specify this option, you must
502 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
also use the snapdiff option or an error occurs. If basesnapshotname is not specified, the
useexistingbase option selects the most recent snapshot on the filer volume as the base snapshot.
Diffsnapshotname
The diffsnapshotname option allows you to specify which differential snapshot, on the target filer
volume, to use during a snapshot differential backup. This option is only specified if you also specify
diffsnapshot=latest.
Useexistingbase
The useexistingbase option is used when you back up snapshots that are on NetApp filer volumes.
The useexistingbase option indicates that the latest snapshot that exists on the volume being backed
up, is to be used as the base snapshot, during a snapshot differential backup operation.
Diffsnapshot
The diffsnapshot option controls whether the backup-archive client creates the differential snapshot
when it runs a snapshot difference incremental backup.
Set Password
The set password command changes the IBM Spectrum Protect password for your workstation, or sets
the credentials that are used to access another server.
Snapdiffchangelogdir
The snapdiffchangelogdir option defines the location where the client stores persistent change logs
that are used for snapshot differential backup operations.
Important: If you previously used snapshot differential backups with a backup-archive client that is older
than Version 8.1.2, the first snapshot differential backup that you run with the V8.1.2 or later client will be
a full progressive incremental backup. To avoid this full progressive incremental backup, move the
existing change log files from the old location specified by the stagingdirectory option to the new
location specified by the snapdiffchangelogdir option before you run the first snapshot differential
backup.
For example, run the following copy command:
xcopy C:\Users\Bob\AppData\Local\Temp\TSM\TsmSnapDiff
"C:\Program Files\Tivoli\TSM\baclient\TsmSnapDiff" /s /y
...\TSM\TsmSnapDiff\.TsmSnapdiffChangeLogs\NetAppFiler\
SnapdiffChangeLog__VolumeName__.tsmDB
...\TSM\TsmSnapDiff\.TsmSnapdiffChangeLogs\NetAppFiler\
SnapdiffChangeLog__VolumeName__.tsmDB.Lock
where:
• NetAppFiler is the host name or IP address of the storage virtual machine (SVM) from the cluster
management server or the 7-mode file server.
• VolumeName is the volume that you want to protect.
Supported Clients
This option is valid for all Windows clients. This option can also be defined on the server.
Options File
Place this option in the client options file (dsm.opt). When snapdiffchangelogdir is specified on the
command line, it overrides the values that are specified in the options file. You can set this option on the
General tab of the Preferences editor.
Syntax
SNAPDIFFCHANGELOGDir path
C:\Program Files\Tivoli\TSM\baclient
The exact name of the change log file is in the following format:
snapdiff_change_log_dir\TsmSnapDiff\.TsmSnapdiffChangeLogs\NetAppFiler\
SnapdiffChangeLog__VolumeName__.tsmDB
where:
• snapdiff_change_log_dir is the name of the directory for storing the snapshot differential change
logs, as specified by the snapdiffchangelogdir option.
• NetAppFiler is the host name or IP address of the storage virtual machine (SVM) from the cluster
management server or the 7-mode file server.
• VolumeName is the volume that you want to protect.
A lock file is also created to prevent the change log file from being updated by different snapshot
differential backups that are running at the same time.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter:
\\computer7\C$\tsmdata
Examples
Options file:
snapdiffchangelogdir c:\tsmdata
Command line:
-snapdiffchangelogd="c:\tsmdata"
Related reference
“Diffsnapshot” on page 351
The diffsnapshot option controls whether the backup-archive client creates the differential snapshot
when it runs a snapshot difference incremental backup.
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
Snapdiffhttps
Specify the snapdiffhttps option to use a secure HTTPS connection for communicating with a NetApp
filer during a snapshot differential backup.
When you specify this option, the backup-archive client can establish a secure administrative session with
the NetApp filer regardless of whether HTTP administrative access is enabled on the NetApp filer.
Important: The default communication protocol that the backup-archive client uses to establish the
administrative session with the NetApp filer is HTTP. To use a secure HTTPS connection, you must specify
the snapdiffhttps option whenever you run a snapshot differential backup.
Restrictions:
The following restrictions apply to snapshot differential backups with HTTPS:
504 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• The HTTPS connection is used only to securely transmit data over the administrative session between
the backup-archive client and the NetApp filer. The administrative session data includes information
such as filer credentials, snapshot information, and file names and attributes that are generated by the
snapshot differencing process. The HTTPS connection is not used to transmit normal file data that is
accessed on the filer by the client through file sharing. The HTTPS connection also does not apply to
normal file data transmitted by the client to the IBM Spectrum Protect server through the normal IBM
Spectrum Protect client/server protocol.
• The snapdiffhttps option does not apply to vFilers because the HTTPS protocol is not supported on
the NetApp vFiler.
• The snapdiffhttps option is available only by using the command-line interface. It is not available for
use with the backup-archive client GUI.
Supported Clients
This option is valid for all Windows clients.
Options File
This option is valid only on the command-line interface. You cannot enter it in a client options file.
Syntax
SNAPDIFFHTTPS
Parameters
There are no parameters for this option.
Examples
Command line:
Issue the following command on a Windows system with a network share \\netapp1\vol1, where
netapp1 is a filer.
Command line:
Issue the following command on a Windows system with a network share \\netapp1.example.com
\petevol mounted on drive v:, where netapp1.example.com is a filer.
Related concepts
Snapshot differential backup with an HTTPS connection
You can use a secure HTTPS connection for the backup-archive client to communicate with a NetApp filer
during a snapshot differential backup.
Related reference
Snapdiff
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
Snapshotproviderfs
Use the snapshotproviderfs option to enable snapshot-based file backup and archive operations, and
to specify a snapshot provider.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
The server can also define this option.
Options File
Specify this option in the client options file, dsm.opt, to enable snapshots. You can override the client-
wide option for a specific operation by specifying this option on the command line for the backup and
archive commands. You can also override the client-wide option for a specific file system by using the
include.fs statement in the dsm.opt file. You can also set this option using the Preferences editor.
Syntax
SNAPSHOTPROVIDERFs value
Parameters
value
Specifies one of the following values:
VSS
Specifies that VSS should be used to provide OFS support. This is the default.
506 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Note: Starting from IBM Spectrum Protect V8.1.8, the default value for SNAPSHOTPROVIDERFS and
SNAPSHOTPROVIDERIMAGE has been changed from NONE to VSS. This change makes the best
practice behavior the default behavior.
NONE
Specifies that no snapshot provider should be used; OFS support is turned off.
Examples
Options file:
snapshotproviderfs VSS
include.fs d: snapshotproviderfs=vss
Command line:
-SNAPSHOTPROVIDERFs=VSS
Related information
For information about configuring open file support, see “Configuring Open File Support” on page 72.
Snapshotproviderimage
Use the snapshotproviderimage option to enable snapshot-based image backup, and to specify a
snapshot provider.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
The server can also define this option.
Options File
Specify this option in the client options file, dsm.opt, to enable snapshots for all the file systems on the
client. You can override the client-wide option for a specific operation by specifying this option on the
command line for the backup image command. You can also override the client-wide option for a
specific file system using the include.image statement in the dsm.opt file. You can also set this option
using the Preferences editor.
Syntax
SNAPSHOTPROVIDERImage value
Parameters
value
Specifies one of the following values:
VSS
Specifies that VSS should be used to provide OFS support. This is the default.
Note: Starting from IBM Spectrum Protect V8.1.8, the default value for SNAPSHOTPROVIDERFS and
SNAPSHOTPROVIDERIMAGE has been changed from NONE to VSS. This change makes the best
practice behavior the default behavior.
NONE
Specifies that no snapshot provider should be used. This turns off online image support.
snapshotprovideri VSS
include.image d: snapshotprovideri=vss
Command line:
-SNAPSHOTPROVIDERImage=NONE
Related information
For information about configuring open file support, see “Configuring Open File Support” on page 72.
Snapshotroot
Use the snapshotroot option with the incremental, selective, or archive commands with an
independent software vendor application that provides a snapshot of a logical volume, to associate the
data on the local snapshot with the real file space data that is stored on the IBM Spectrum Protect server.
This option should be used with an incremental backup of a NAS file server volume instead of a simple
incremental or incremental with snapshotroot option whenever the NAS file server is running ONTAP
V7.3 for performance reasons. The snapdiff and snapshotroot options should not be used together.
The snapshotroot option can be used to back up network share mounted file systems. Both the backup
specification (source) and the snapshotroot value can be a network share mounted file specification.
For example, the snapshotroot option can be used to back up a network share file system hosted on a
network-attached storage (NAS) that supports snapshot.
In the following example, c:\snapshots\snapshot.0 is network share that is mounted from a NAS file
server and \\florance\c$ represents the snapshot that is created at the NAS file server.
You can also specify a directory with the snapshotroot option when you backup each file set as a
separate file space.
The snapshotroot option does not provide any facilities to take a volume snapshot, only to manage
data that is created by a volume snapshot.
For example, consider an application that takes a snapshot of the c: drive and mounts it as the NTFS
junction point \\florence\c$\snapshots\snapshot.0. If you back up this data by using the
following command, a unique file space that is called \\florence\c$\snapshots\snapshot.0 is
created on the server.
However, you might want to associate the snapshot data with the data already processed for the c: drive
(\\florence\c$). Using the snapshotroot option, you can associate the data with the file space
corresponding to the c: drive (\\florence\c$) on the IBM Spectrum Protect server:
On a subsequent day, you can back up a snapshot that was written to an alternative location, but
managed under the same file space on the server:
508 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can perform incremental backups, selective backups, or archives of a single directory, directory
structure, or single file by using the snapshotroot option. In all instances, the snapshotroot option
must identify the root of the logical volume that was created by the snapshot. For example:
If you want to include or exclude specific file specifications, the include and exclude statements should
contain the name of the file system that was the source of the snapshot (the c: drive), and not the name
of the target of the snapshot (\\florence\c$\snapshots\snapshot.1). Doing this allows you to
preserve a set of include and exclude statements regardless of the name of the logical volume to which
the snapshot is written. The following are examples of include and exclude statements.
The following include-exclude statements are not valid because they contain the name of the snapshot:
include \\florence\c$\snapshots\snapshot.1\dir1\...\
*.txt 1yrmgmtclass
exclude \\florence\c$\mydocs\*.doc
You must use the snapshotroot option with a single file specification for an incremental, selective, or
archive operation. You cannot specify multiple file specifications or no file specifications. For example,
these commands are valid:
Notes:
1. Ensure that the snapshotroot option references a snapshot of the correct volume. Ensure that
snapshotroot location refers to the root of the snapshot. If these rules are not followed, unintended
results, such as files that expire incorrectly, can result.
2. If you specify the filelist option and the snapshotroot option, all files that are specified in the
filelist option are assumed to be in the same file system. If there are entries in the filelist in a
different file system, they are skipped and an error is logged. If the filelist contains files that were
created in the file system after the snapshot was taken, these entries are also skipped, and an error is
logged.
3. You cannot use the snapshotroot option with any backup command, such as backup image, or
backup systemstate, and so on.
4. You cannot use the snapshotroot option with the snapdiff option.
5. Use the snapshotroot option with caution if you are using the IBM Spectrum Protect journal-based
backup feature. Since there is no coordination between the IBM Spectrum Protect journal and the
vendor-acquired snapshot provider (VSS), unwanted behavior can occur with journal notifications
received after the snapshot occurs. For example, files might not be backed up, or they might be
backed up redundantly to the IBM Spectrum Protect server.
Supported Clients
This option is valid for the following clients:
• All Windows clients.
Syntax
SNAPSHOTRoot = snapshot_volume_name
Parameters
snapshot_volume_name
Specifies the root of the logical volume that is created by the independent software vendor snapshot
application.
Examples
Command line:
dsmc incr c: -SNAPSHOTRoot=\\florence\c$\snapshots\snapshot.0
Srvoptsetencryptiondisabled
The srvoptsetencryptiondisabled option allows the client to ignore encryption options in a client
options set from the IBM Spectrum Protect server.
If the option is set to yes in the client options file, the client ignores the following options in a client
options set from the server:
• encryptkey
Note: The client ignores only the encryptkey generate option setting. Other possible encryptkey
option settings, for example, encryptkey prompt or encryptkey save are not ignored.
• encryptiontype
• exclude.encrypt
• include.encrypt
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
no
SRVOPTSETENCryptiondisabled
yes
Parameters
yes
The backup-archive client ignores the values of the listed encryption options in a client options set
from the IBM Spectrum Protect server.
510 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
no
The backup-archive client processes the setting of the listed encryption options in a client options set
from the IBM Spectrum Protect server. This is the default.
Examples
Options file:
srvoptsetencryptiondisabled no
Command line:
Does not apply.
Srvprepostscheddisabled
The srvprepostscheddisabled option specifies whether to prevent the pre-schedule and post-
schedule commands specified by the IBM Spectrum Protect administrator from executing on the client
system, when performing scheduled operations.
The srvprepostscheddisabled option can be used in conjunction with the schedcmddisabled and
srvprepostscheddisabled options to disable the execution of any unwanted operating system
command by the IBM Spectrum Protect administrator on a client node.
Supported Clients
This option is valid for all backup-archive clients that use the IBM Spectrum Protect client scheduler. The
server cannot define this option.
Options File
Place this option in the client options file (dsm.opt) for the scheduler. You can set this option on the
Scheduler tab of the Preferences editor, in the Schedule Command section.
Syntax
No
SRVPREPOSTSCHeddisabled
Yes
Parameters
No
Specifies that the client allows pre-schedule and post-schedule commands defined by the IBM
Spectrum Protect administrator to execute on the client system, when performing scheduled
operations. If a pre-schedule or a post-schedule command is defined by both the client and the IBM
Spectrum Protect administrator, the command defined by the administrator overrides the
corresponding command defined in the client option file. This is the default.
Yes
Specifies that the client prevents pre-schedule and post-schedule commands defined by the IBM
Spectrum Protect administrator to execute on the client system, when performing scheduled
operations. If a pre-schedule or a post-schedule command is defined by both the client and the IBM
Spectrum Protect administrator, the command defined by the administrator will not override the
corresponding command defined in the client option file. This option can be used in conjunction with
the schedcmddisabled and srvprepostscheddisabled options.
Examples
Options file:
srvprepostscheddisabled yes
Command line:
Does not apply.
Supported Clients
This option is valid for Windows clients that support the image snapshot backup command. The server
cannot define this option. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt) for the scheduler. You can set this option on the
Snapshot tab of the Preferences editor, in the Snapshot Options section.
Syntax
No
SRVPREPOSTSNApdisabled
Yes
Parameters
No
Specifies that client allows pre-snapshot and post-snapshot commands defined by the IBM Spectrum
Protect administrator to execute on the client system, when performing scheduled image snapshot
backup operations. If a pre-snapshot or a post-snapshot command is defined by both the client and
the IBM Spectrum Protect administrator, the command defined by the administrator overrides the
corresponding command defined in the client option file. This is the default.
Yes
Specifies that the client does not allow pre-snapshot and post-snapshot commands defined by the
IBM Spectrum Protect administrator to execute on the client system, when performing scheduled
image snapshot backup operations. If a pre-snapshot or a post-snapshot command is defined by both
the client and the IBM Spectrum Protect administrator, the command defined by the administrator
will not override the corresponding command defined in the client option file. This option can be used
in conjunction with the schedcmddisabled and srvprepostsnapdisabled options.
Examples
Options file:
srvprepostsnapdisabled yes
Command line:
Does not apply.
Ssl
Use the ssl option to enable Secure Sockets Layer (SSL) to provide secure client and server
communications. When the backup-archive client communicates with an IBM Spectrum Protect server
V8.1.1 and earlier V8 levels, and V7.1.7 and earlier levels, it determines whether SSL is enabled. When
the backup-archive client communicates with an IBM Spectrum Protect server V8.1.2 and later levels,
and V7.1.8 and later V7 levels, SSL is always used and this option controls whether object data is
encrypted or not. For performance reasons, it might be desirable to not encrypt the object data.
512 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all supported clients.
Options File
Place this option in the client options file (dsm.opt). You can also set this option on the Communication
tab of the Preferences editor.
Syntax
No
SSL
Yes
Parameters for communicating with an IBM Spectrum Protect server V8.1.1 and earlier V8 levels,
and V7.1.7 and earlier levels.
No
Specifies that the backup-archive client does not use SSL to encrypt information. No is the default.
Yes
Specifies that the backup-archive client uses SSL to encrypt information.
To enable SSL, specify SSL Yes and change the value of the TCPPORT option. Changing the value of
the TCPPORT option is generally necessary because the IBM Spectrum Protect server is typically set
up to listen for SSL connections on a separate port.
Parameters for communicating with an IBM Spectrum Protect server V8.1.2 and later levels, and
V7.1.8 and later V7 levels.
No
Specifies that the backup-archive client does not use SSL to encrypt object data when communicating
with the server. All other information is encrypted. No is the default.
Yes
Specifies that the backup-archive client uses SSL to encrypt all information, including object data,
when communicating with the server.
To use SSL for all data, specify SSL Yes.
Examples
Options file:
ssl yes
Command line:
Does not apply.
Related information
“Configuring IBM Spectrum Protect client/server communication with Secure Sockets Layer” on page 34.
“Sslrequired” on page 516
“Tcpport” on page 530
Sslacceptcertfromserv
Use the sslacceptcertfromserv option to control whether the backup-archive client or the API
application accept and trust the IBM Spectrum Protect server's Secure Sockets Layer (SSL) public
certificate the first time they connect. This option applies only the first time that the backup-archive client
or the API application connects to the IBM Spectrum Protect server. When the SSL public certificate is
accepted, future changes to the certificate are not automatically accepted, and must be manually
Supported Clients
This option is valid for all supported clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
SSLACCEPTCERTFROMSERV
No
Parameters
Yes
Specifies that the backup-archive client does automatically accept the IBM Spectrum Protect server's
public certificate. Yes is the default.
No
Specifies that the backup-archive client does not automatically accept the IBM Spectrum Protect
server's public certificate.
To disable SSLACCEPTCERTFROMSERV, specify sslacceptcertfromserv no.
Examples
Options file:
sslacceptcertfromserv no
Command line:
Does not apply.
Related information
“Ssl” on page 512
“Sslrequired” on page 516
Ssldisablelegacytls
Use the ssldisablelegacytls option to disallow the use of SSL protocols that are lower than TLS 1.2.
Supported Clients
This option is valid for all supported clients.
Options File
Place this option in the client options (dsm.opt) file. You can also set this option in the GUI by selecting
the Require TLS 1.2 or above check box on the Communication tab of the Preferences editor. You
cannot set this option on the command line.
Syntax
No
SSLDISABLELEGACYtls
Yes
514 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
No
Specifies that the backup-archive client does not require TLS 1.2 for SSL sessions. It allows
connection at TLS 1.1 and lower SSL protocols. When the backup-archive client communicates with
an IBM Spectrum Protect server V8.1.1 and earlier V8 levels, and V7.1.7 and earlier levels, No is the
default.
Yes
Specifies that the backup-archive client requires that all SSL sessions use TLS 1.2 (or higher) protocol.
When the backup-archive client communicates with an IBM Spectrum Protect server V8.1.2 and later
levels, and V7.1.8 and later V7 levels, Yes is the default.
Examples
Options file:
ssldisablelegacytls yes
Command line:
Does not apply.
Related reference
“Ssl” on page 512
Use the ssl option to enable Secure Sockets Layer (SSL) to provide secure client and server
communications. When the backup-archive client communicates with an IBM Spectrum Protect server
V8.1.1 and earlier V8 levels, and V7.1.7 and earlier levels, it determines whether SSL is enabled. When
the backup-archive client communicates with an IBM Spectrum Protect server V8.1.2 and later levels,
and V7.1.8 and later V7 levels, SSL is always used and this option controls whether object data is
encrypted or not. For performance reasons, it might be desirable to not encrypt the object data.
“Sslrequired” on page 516
The sslrequired option specifies the conditions when SSL is or is not required when the client logs on
to the IBM Spectrum Protect server or storage agents. To actually enable SSL so client-to-server and
client-to-storage-agent communications are secure, you must set the client ssl option to yes. When
communicating with the IBM Spectrum Protect server V8.1.2 and later levels, and V7.1.8 and later V7
levels, this option no longer applies since SSL is always used.
“Tcpport” on page 530
The tcpport option specifies a TCP/IP port address for the IBM Spectrum Protect server. You can obtain
this address from your administrator.
Sslfipsmode
The sslfipsmode option specifies whether the client uses SSL Federal Information Processing
Standards (FIPS) mode for Secure Sockets Layer (SSL) communications with the server. The default is no.
Supported clients
This option is supported on all clients.
Options File
Set this option in the client options file. You cannot specify it as a command-line parameter and you
cannot set this option in a client options set.
Syntax
No
SSLFIPSMODE =
Yes
Example
To enable SSL FIPS mode on the client:
SSLFIPSMODE yes
Sslrequired
The sslrequired option specifies the conditions when SSL is or is not required when the client logs on
to the IBM Spectrum Protect server or storage agents. To actually enable SSL so client-to-server and
client-to-storage-agent communications are secure, you must set the client ssl option to yes. When
communicating with the IBM Spectrum Protect server V8.1.2 and later levels, and V7.1.8 and later V7
levels, this option no longer applies since SSL is always used.
Supported Clients
This option is supported on all clients.
Options File
Place this option in the client options file or in the GUI, on the Communications tab. You cannot set this
option on the command line.
Syntax
Default
SSLREQuired
Yes
No
SERVERonly
Parameters
Default
This setting indicates that SSL is required to secure communications between the client and server,
and client and storage agents, if AUTHENTICATION=LDAP is set on the server. To secure
communications by using SSL, you must also set ssl=yes on the client.
If AUTHENTICATION=LOCAL is set on the server, this setting indicates that SSL is not required. Even
though SSL is not required when AUTHENTICATION=LOCAL and sslrequired=default, you can
still use SSL by setting the client ssl option to yes.
Yes
Indicates that SSL is always required to secure communications between the client and server, and
between the client and storage agents. sslrequired=yes has no dependency on the server
AUTHENTICATION option. If you set sslrequired=yes on the client, you must also set ssl=yes on
the client.
516 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
No
Indicates that you do not require SSL to be used to secure communications between the client and
server or between the client and storage agents. Choose this option only if you use a virtual private
network or other method to secure your session communications. You can still enable SSL by setting
ssl=yes on the client; but sslrequired=no specifies that SSL is not a prerequisite.
SERVERonly
Indicates that SSL is required for client-to-server communications and not for server-to-storage agent
communications. To use SSL for client to server communications, set sslrequired=serveronly
and ssl=yes. The server setting for the AUTHENTICATION option can be either LOCAL or LDAP.
For client to storage agent communications, use the client lanfreessl option to enable SSL.
The following table describes the situations under which authentication succeeds or fails, depending on
the settings of the SSLREQUIRED option on the server, and client, and the setting of the ssl option on the
client. The table results assume that valid credentials are supplied.
Table 60. Effects of server and client SSL settings on success or failure of login attempts
No No No Authentication succeeds
Examples
Options file:
sslrequired yes
sslrequired no
Command line:
Not applicable; you cannot set this option on the command line.
Stagingdirectory
The stagingdirectory option defines the location where the client stores any data that it generates to
perform its operations. The data is deleted when processing is complete.
The client uses the stagingdirectory location for Active Directory object query and restore
operations. The client also uses the stagingdirectory location for temporary files when the client
processes files that were migrated with IBM Spectrum Protect HSM for Windows.
Important: Starting with Version 8.1.2, the snapdiffchangelogdir option is used to specify the
location to store change logs for snapshot differential backup operations. The stagingdirectory
option is no longer used for this purpose. For more information, see “Snapdiffchangelogdir” on page 503.
Supported Clients
This option is valid for all Windows clients. The server can also define this option.
Options File
Place this option in the client options file (dsm.opt). When stagingdirectory is specified on the
command line, it overrides the values that are specified in the options file.
Syntax
STAGINGDIRectory path
Parameters
path
Specifies the directory path where the client writes staging data. If you do not specify a staging
directory, the client checks for the existence of the USER environment variables in the following order,
and uses the first path found:
1. The path that is specified by the TMP user variable.
2. The path that is specified by the TMP system variable.
3. The path that is specified by the TEMP user variable.
4. The path that is specified by the TEMP system variable.
5. The Windows system directory.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$:
\\computer7\D$\temp\tsmstaging
Examples
Options file:
stagingdirectory c:\tsmdata
Command line:
-stagingdir="e:\tsmdata"
Related reference
“Query Adobjects” on page 653
518 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the query adobjects command to display information about the deleted objects that are located
on the local Active Directory domain.
“Restore Adobjects” on page 691
Use the restore adobjects command to restore individual Active Directory objects from the local
Deleted Objects container.
“Diffsnapshot” on page 351
The diffsnapshot option controls whether the backup-archive client creates the differential snapshot
when it runs a snapshot difference incremental backup.
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
Subdir
The subdir option specifies whether you want to include subdirectories of named directories for
processing.
You can use the subdir option with the following commands:
• archive
• delete archive
• delete backup
• incremental
• query archive
• query backup
• restore
• restore backupset
• restore group
• retrieve
• selective
If you set the subdir option to yes when backing up a specific path and file, the backup-archive client
recursively searches all of the subdirectories under that path, and looks for any instances of the specified
file that exist under any of those subdirectories. For example, assume that a file called myfile.txt
exists on a client in the following directories:
//myfile.txt
/dir1/myfile.txt
/dir1/dir_a/myfile.txt
/dir1/dir_b/myfile.txt
Performing a selective backup of that file, as follows, backs up all four instances of myfile.txt:
Similarly, the following command displays all instances of myfile.txt if you specify subdir=yes in the
client options file or in a client options set.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Syntax
No
SUbdir
Yes
Parameters
No
Subdirectories are not processed. This is the default.
Yes
Subdirectories are processed. Because the client program searches all subdirectories of a directory
that is being processed, processing can take longer to complete. Specify Yes only when necessary.
If you use the preservepath option in addition to subdir=yes, it can affect which subdirectories
are processed.
Note:
1. When you run the client in interactive mode, and if you use the -subdir=yes option, the setting persists
for all commands entered in interactive mode, until you end interactive mode, by typing Quit.
2. If subdir=yes is in effect when you restore multiple files, place a directory delimeter character at the
end of the destination file specification. If the delimeter is omitted, the client displays a message
indicating that the destination file specification is not valid.
3. It is a best practice to include only the default value for subdir (No) in a client options file or a client
options set.
Examples
Options file:
subdir no
Command line:
To restore the structure:
\path2\dir1
\path2\dir1\file1
\path2\dir1\dir2
\path2\dir1\dir2\file1
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
Related information
“Preservepath” on page 462
520 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Systemstatebackupmethod
Use the systemstatebackupmethod option to specify which backup method to use to back up the
system writer portion of the system state data. The method you select is used when you backup the
system state data.
Supported clients
This option is valid for Windows clients.
Options file
Place this option in the client options file (dsm.opt). When specified in the dsm.opt file, the option
affects system state backups created by BACKUP SYSTEMSTATE commands, and system state data
backed up by INCREMENTAL commands. However, the only command that you can specify this option on
is the BACKUP SYSTEMSTATE command.
Schedule definitions
You can also specify this option on the options parameter of a schedule definition on schedules that
have both action=backup and subaction=systemstate set. Defining an infrequent schedule with
this option set to FULL ensures that you periodically perform a full backup of Windows system state data.
Syntax
PROGressive
SYSTEMSTATEBACKUPMethod
OPPortunistic
FULL
Parameters
PROGressive
With the PROGressive method, the system writer portion of the system state data is backed up using
the progressive incremental backup method. That is, if system writer files have not changed since the
last system state backup, they are not included in this backup. Only the changed system writer files
are backed up. This is the default system state backup method.
This type of system state backup uses the least network bandwidth and IBM Spectrum Protect server
storage, but it increases the amount of server database processing required to keep track of the
changes.
OPPortunistic
With the OPPortunistic method, if any system writer files have changed since the last system state
backup, all system writer files are backed up.
This method, like the PROGressive method, also uses the least network bandwidth and IBM Spectrum
Protect server storage if system writer files have not changed since the last system state backup. If
any system writer files have changed since the last system state backup then the system writer is
backed up in full, which uses more network bandwidth and server storage. With the OPPortunistic
method, the amount of server database processing that occurs is less than that caused by the
PROGressive method.
FULL
When FULL is specified, all system writer files are backed up, even if they have not changed since the
last system state backup.
Examples
Options file:
SYSTEMSTATEBACKUPMETHOD FULL
SYSTEMSTATEBACKUPMETHOD OPPORTUNISTIC
Command line:
backup systemstate -SYSTEMSTATEBACKUPMETHOD=FULL
Tagschedule
Use the -tagschedule option to back up or rebalance VMs.
W you can back up or rebalance VMs that are assigned to, or are associated with, a schedule and data
mover with specified vSphere Web Client GUI and VMware tags. You can use the -tagschedule option
with the backup VM command in two scenarios:
• To run an ad hoc backup operation. For example, you can rerun or preview a scheduled backup
operation.
• To rebalance the data movers on a tagged schedule. You can use the -VMREBALANCESCHEDULEONLY
option to rebalance the data movers on an ad hoc basis and the -VMREBALANCESCHEDULEPERIOD
option to rebalance the data movers on a regular basis.
The -tagschedule option works only with tag-based schedule names.
Supported Clients
This option is valid on Windows and Linux data movers.
Options File
Use the -tagschedule option on the command line. You can also use the options file to schedule
periodic rebalancing operations.
Related reference
UPDATE SCHEDULE (Update a client schedule)
522 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
data mover is designated as default either with the -vmtagdefaultdatamover option specified in the
opt file or passed on the command line.
Run the backup vm command on all data movers associated with a schedule if you want to include all
VMs associated with that schedule. Ensure that at least one of these data movers is run as the default
data mover. It is not always necessary to use the default data mover option. A schedule created by the VE
GUI always sets a default. But if you run the backup vm command ad hoc, the default value will not be
set unless it is explicitly specified in the data mover -optfile. By default, the configuration wizard sets
the first added data mover as the default TAGschedule data mover.
Tip: The query results in the Schedule table in the Monitor Schedule panel will not reflect that a tagged
schedule has run. However, the individual VM status will indicate that a backup operation occurred.
The entire SCHEDULE1 schedule is not rerun; only the machines with the Data Mover (IBM Spectrum
Protect) tag set to the schedule name passed in are backed up. You must run a separate command on the
other data movers to back up the VMs that are assigned to those data movers.
Syntax
TAGSCHEDule= schedule_name -ASNODENAME=
-preview
Parameters
-preview
Specify this parameter to preview the listing that will be obtained when the command is run with the
specified filter.
-schedule_name
Specify the schedule name to run the listing that will be obtained when the schedule is run with the
specified filter.
-ASNODENAME
Use this parameter in the options file to specify the name of the data center.
-OPTFILE
Use this parameter to specify the name of the options file.
Syntax
TAGSCHEDule= schedule_name -VMREBALANCESCHEDULEONLY -ASNODENAME=
Parameters
-VMREBALANCESCHEDULEONLY
Use this parameter to balance data movers in tag schedules according to the size of the VM. Data
movers are assigned to the VMs by size, with the largest VM being assigned to the first data mover on
the list, the next largest VM assigned to the next data mover, and so on. Existing data mover
assignments are overwritten by reassigning the data mover tag on each VM.
-VMREBALANCESCHEDULEPERIOD
Use this parameter in the options file to specify the time (in days) between rebalancing operations by
the client. You can specify a value in the range 0 to 365. If you specify 0, which is the default,
rebalancing never occurs. If you specify 365, rebalancing occurs about once a year. The scheduled
rebalance operation is run on the default data mover.
-ASNODENAME
Use this parameter to specify the name of the data center.
-OPTFILE
Use this parameter to specify the name of the options file.
Examples
Command line:
dsmc backup vm -OPTFILE=dsm.MM1_DATACENTER1_DM1.opt -tagschedule=VMWARE01 -
vmrebalancescheduleonly -asnodename=MY_DATACENTER_NODE
Rebalances the schedule named VMWARE01, which targets the node MY_DATACENTER_NODE. After
the rebalance operation, VMs that were asymmetrically assigned across data movers are now
symmetrically assigned. VMs that were unassigned to data movers are now assigned.
524 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The following output shows before and after scenarios for a rebalance operation for schedule named
vmware_sxf1_cldev:
Before Rebalance
----------------
Data Mover Name : DEFENDER1
Total Bytes Protected : 432.16 GB
Virtual Machines Protected : 10
After Rebalance
----------------
Data Mover Name : DEFENDER1
Total Bytes Protected : 332.08 GB
Virtual Machines Protected : 7
The rebalance output information is recorded in the schedule log and logged to the server activity log.
Specifies that the default data mover rebalances the schedule every day.
Related reference
UPDATE SCHEDULE (Update a client schedule)
Tapeprompt
The tapeprompt option specifies whether you want the backup-archive client to wait for a tape mount if
it is required for a backup, archive, restore, or retrieve process, or to be prompted for a choice.
In the backup-archive client GUI, the Media Mount dialog can display the Information Not
Available value in the Device and Volume Label fields if you perform a standard (also known as classic)
restore or retrieve operation. This value means that this information is only available for no-query restore
or retrieve operations; not a standard restore or retrieve operation. The Device field displays the name of
the device on which to mount the media needed to process an object. The Volume Label field displays
the name of the volume needed to process an object.
Tape prompting does not occur during a scheduled operation regardless of the setting for the
tapeprompt option.
The tapeprompt option can be used with the following commands:
• archive
• delete archive
• delete backup
• incremental
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab, Prompt
before mounting tapes check box of the Preferences editor.
Syntax
No
TAPEPrompt
Yes
Parameters
No
You are not prompted for your choice. The server waits for the appropriate tape to mount. This is the
default.
Note: For API applications, this permits backup directly to tape.
Yes
You are prompted when a tape is required to back up, archive, restore, or retrieve data. At the prompt,
you can wait for the appropriate tape to be mounted, always wait for a tape to be mounted, skip a
particular object, skip all objects on a single tape, skip all objects on all tapes, or cancel the entire
operation.
Examples
Options file:
tapeprompt yes
Command line:
-tapep=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Tcpadminport
Use the tcpadminport option to specify a separate TCP/IP port number on which the server waits for
requests for administrative client sessions, allowing secure administrative sessions within a private
network.
The client tcpadminport setting depends on how the IBM Spectrum Protect server tcpadminport and
adminonclientport options are configured. The server has a tcpadminport setting that indicates on
which port the server listens for administrative sessions, and the adminonclientport setting, which
can be either yes or no.
If tcpadminport is not set on the server, then administrative sessions are allowed on the same port as
client sessions.
If tcpadminport is set on the server, then administrative sessions are allowed on the port specified by
that setting. In this case, if adminonclientport yes is in effect, then administrative sessions can
connect on either the regular client port or the port specified by tcpadminport. If
526 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
adminonclientport no is in effect, then administrative sessions can connect only on the port specified
by tcpadminport.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab, in
the Admin Port field in the Preferences editor.
Syntax
TCPADMINPort
admin_port_address
Parameters
admin_port_address
Specifies the port number of the server. The default value is the value of the tcpport option.
Examples
Options file:
tcpadminport 1502
Tcpbuffsize
The tcpbuffsize option specifies the size of the internal TCP/IP communication buffer used to transfer
data between the client node and server. Although it uses more memory, a larger buffer can improve
communication performance.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab, in
the Buffer Size field in the Preferences editor.
Syntax
TCPBuffsize size
Parameters
size
Specifies the size, in kilobytes, that you want to use for the internal TCP/IP communication buffer. The
range of values is 1 through 512; the default is 32.
Depending on the operating system communication settings, your system might not accept all values
in the range of 1 through 512.
Examples
Options file:
tcpb 32
-tcpbuffsize=32
This option is valid only on the initial command line. It is not valid in interactive mode.
Tcpcadaddress
The tcpcadaddress option specifies a TCP/IP address for dsmcad. Normally, this option is not needed.
Use this option only if your client node has more than one TCP/IP address, or if TCP/IP is not the default
communication method.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
TCPCADAddress cad_address
Parameters
cad_address
Specifies a TCP/IP Internet domain name or a numeric IP address. If you specify an IPv6 addresses,
you must specify the commmethod V6Tcpip option.
Examples
Options file:
tcpcada dsmclnt.example.com
Command line:
-tcpcadaddress=192.0.2.0
-tcpcadaddress=mycompany.example.com
-tcpcadaddress=2001:0DB8:0:0:0:0:0:0
This option is valid only on the initial command line of the dsmcad program. It is not valid with other dsm
modules.
Related information
See “Commmethod” on page 333 to determine if your client node has more than one TCP/IP address, or if
TCP/IP is not the default communication method.
Tcpclientaddress
The tcpclientaddress option specifies a TCP/IP address if your client node has more than one
address, and you want the server to contact an address other than the one that was used to make the first
server contact.
The server uses this address when it begins the server prompted scheduled operation.
Use this option only if you use the prompted parameter with the schedmode option.
If sessioninitiation is set to serveronly, the value for the tcpclientaddress client option
should be the same as the value for the HLAddress server setting.
528 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab, Your
TCP/IP address field of the Preferences editor.
Syntax
TCPCLIENTAddress client_address
Parameters
client_address
Specifies the TCP/IP address you want the server to use to contact your client node. Specify a TCP/IP
Internet domain name or a numeric IP address. The numeric IP address can be either a TCP/IPv4 or
TCP/IPv6 address. You can only use IPv6 addresses if you specified the commmethod V6Tcpip option.
Examples
Command line:
-tcpclientaddress=192.0.2.0
-tcpclientaddress=example.mycompany.mydomain.com
-tcpclientaddress=2001:0DB8:0:0:0:0:0:0
This option is valid only on the initial command line. It is not valid in interactive mode.
Tcpclientport
The tcpclientport option specifies a TCP/IP port number for the server to contact the client when the
server begins the server prompted scheduled operation.
Use this option only if you specify the prompted parameter with the schedmode option.
If sessioninitiation is set to serveronly, the value for the tcpclientport client option should
be the same as the value for the LLAddress server option.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Scheduler tab, in the
Your TCP/IP port field in the Preferences editor.
Syntax
TCPCLIENTPort client_port_address
Parameters
client_port_address
Specifies the TCP/IP port address you want the server to use to contact your client node. The range of
values is 1 through 32767; the default is 1501.
-tcpclientport=1492
This option is valid only on the initial command line. It is not valid in interactive mode.
Tcpnodelay
The tcpnodelay option specifies whether the client disables the delay of sending successive small
packets on the network, per transaction.
Change the value from the default of yes only under one of the following conditions:
• You are directed to change the option by IBM technical support.
• You fully understand the effects of the TCP Nagle algorithm on network transmissions. Setting the
option to no enables the Nagle algorithm, which delays sending small successive packets.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab in
the Preferences editor. Select Send transaction to the server immediately.
Syntax
Yes
TCPNodelay
No
Parameters
No
Specifies that the server does not allow successive small packets to be sent immediately over the
network. Setting this option to no can degrade performance.
Yes
Specifies that the server or client allows successive small packets to be sent immediately over the
network. The default is yes.
Examples
Options file:
tcpnodelay yes
Command line:
Does not apply.
Tcpport
The tcpport option specifies a TCP/IP port address for the IBM Spectrum Protect server. You can obtain
this address from your administrator.
Supported Clients
This option is valid for all clients.
530 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab, in
the Server Port field in the Preferences editor.
Syntax
TCPPort port_address
Parameters
port_address
Specifies the TCP/IP port address that is used to communicate with a server. The range of values is 1
through 32767; the default is 1500.
Examples
Options file:
tcpp 1501
Command line:
-tcpport=1501
This option is valid only on the initial command line. It is not valid in interactive mode.
Tcpserveraddress
The tcpserveraddress option specifies the TCP/IP address for the IBM Spectrum Protect server. You
can obtain this server address from your administrator.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab, in
the Server Address field in the Preferences editor.
If this option is not specified, the client attempts to contact a server running on the same computer as the
backup-archive client.
Syntax
TCPServeraddress server_address
Parameters
server_address
Specifies a 1 to 64 character TCP/IP address for a server. Specify a TCP/IP domain name or a numeric
IP address. The numeric IP address can be either a TCP/IP v4 or TCP/IP v6 address. You can only use
IPv6 addresses if you specified the commmethod V6Tcpip option.
Examples
Options file:
tcps dsmchost.example.com
Command line:
-tcpserveraddress=129.33.24.99
-tcpserveraddress=2002:92b:111:221:128:33:10:249
Tcpwindowsize
Use the tcpwindowsize option to specify, in kilobytes, the size you want to use for the TCP/IP sliding
window for your client node.
The sending host cannot send more data until it receives an acknowledgment and a TCP receive window
update. Each TCP packet contains the advertised TCP receive window on the connection. A larger window
allows the sender to continue sending data and can improve communication performance.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab,
Window Size field of the Preferences editor.
Syntax
TCPWindowsize window_size
Parameters
window_size
Specifies the size, in kilobytes, to use for your client node TCP/IP sliding window. The range of values
is 0 through 2048. A value of 0 allows the client to use the operating system default TCP window size.
Values from 1 to 2048 indicate that the window size is in the range of 1KB to 2MB. If you specify a
value less than 1, the TCP window size defaults to 1. If you specify a value greater than 2048, the TCP
window size defaults to 2048.
For backup-archive clients, the default value for this parameter is 63 KB.
For IBM Spectrum Protect for Virtual Environments: Data Protection for VMware, the default value for
this parameter is 512 KB.
Notes:
• The TCP window acts as a buffer on the network. It is not related to the tcpbuffsize option, or to
the send and receive buffers allocated in client or server memory.
• A window size larger than the buffer space on the network adapter might degrade throughput due to
resending packets that were lost on the adapter.
• Depending on the operating system communication settings, your system might not accept all
values in the range of values.
• The tcpwindowsize option overrides the operating system's default TCP/IP session send and
receive window sizes.
• Windows provides a larger TCP receive window size when communicating with hosts that also
provide this support, known as RFC1323. In these environments, a value greater than 63 can be
useful.
Examples
Options file:
tcpwindowsize 63
Command line:
-tcpw=63
This option is valid only on the initial command line. It is not valid in interactive mode.
532 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Timeformat
The timeformat option specifies the format in which you want to display and enter system time.
Use this option if you want to change the default time format for the language of the message repository
you are using.
By default, the backup-archive and administrative clients obtain format information from the locale
definition in effect at the time the client is called. Consult the documentation on your local system for
details about setting up your locale definition.
Note: The timeformat option does not affect the web client. The web client uses the time format for the
locale that the browser is running in. If the browser is not running in a locale that the client supports, the
web client uses the time format for US English.
You can use the timeformat option with the following commands:
• delete archive
• delete backup
• expire
• query archive
• query asr
• query backup
• query filespace
• query image
• query nas
• query systemstate
• restore
• restore image
• restore nas
• restore registry
• retrieve
• set event
When you include the timeformat option with a command, it must precede the fromtime, pittime,
and totime options.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Regional Settings tab,
Time Format field of the Preferences editor.
Syntax
TIMEformat format_number
Parameters
format_number
Displays time in one of the formats listed here. Select the format number that corresponds to the
format you want to use. When you include the timeformat option in a command, it must precede the
fromtime, pittime, and totime options.
Examples
Options file:
timeformat 4
Command line:
-time=3
This option is valid on the initial command line and in interactive mode. If you use this option in
interactive mode, it affects only the command with which it is specified. When that command completes,
the value reverts to the value at the beginning of the interactive session. This is the value from the
dsm.opt file unless overridden by the initial command line or by an option forced by the server.
Toc
Use the toc option with the backup nas command or the include.fs.nas option to specify whether
the backup-archive client saves table of contents (TOC) information for each file system backup.
You should consider the following when deciding whether you want to save TOC information:
• If you save TOC information, you can use the QUERY TOC server command to determine the contents of
a file system backup in conjunction with the RESTORE NODE server command to restore individual files
or directory trees.
• You can also use the Windows backup-archive client GUI to examine the entire file system tree and
select files and directories to restore.
• Creation of a TOC requires that you define the TOCDESTINATION attribute in the backup copy group for
the management class to which this backup image is bound. Note that TOC creation requires additional
processing, network resources, storage pool space, and possibly a mount point during the backup
operation.
• If you do not save TOC information, you can still restore individual files or directory trees using the
RESTORE NODE server command, provided that you know the fully qualified name of each file or
directory and the image in which that object was backed up.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
534 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place the include.fs.nas statement containing the toc value in the client options file (dsm.opt).
Syntax
Preferred
TOC
Yes
No
Parameters
Yes
Specifies that the client saves TOC information during a NAS file system image backup. However, the
backup fails if an error occurs during creation of the TOC.
No
Specifies that the client does not save TOC information during a NAS file system image backup.
Preferred
Specifies that the client saves TOC information during a NAS file system image backup. The backup
does not fail if an error occurs during creation of the TOC. This is the default.
Note: If the mode option is set to differential and you set the toc option to preferred or yes, but
the last full image does not have a TOC, the client performs a full image backup and creates a TOC.
Examples
Options file:
include.fs.nas netappsj/vol/vol0 homemgmtclass toc=yes
Command line:
backup nas -nasnodename=netappsj {/vol/vol0} -toc=yes
Todate
Use the todate option with the totime option to specify an ending date and time to which you want to
search for backups or archives during a restore, retrieve, or query operation
Use the todate and totime options with the fromtime and fromdate options to request a list of
backed up or archived files within a period of time. For example, you might request a list of files that were
backed up between 6:00 AM on July 1, 2002 and 11:59 PM on July 30, 2002.
Use the todate option with the following commands:
• delete backup
• query archive
• query backup
• restore
• restore group
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
TODate = date
Examples
Command line:
dsmc restore -todate=12/11/2003 c:\myfiles\
Totime
Use the totime option with the todate option to specify an ending date and time to which you want to
search for backups or archives during a restore, retrieve, or query operation. The backup-archive client
ignores this option if you do not specify the todate option.
Use the totime and todate options with the fromtime and fromdate options to request a list of files
that were backed up within a period of time. For example, you might request a list of files that were
backed up between 6:00 AM on July 1, 2003 and 11:59 PM on July 30, 2003.
Use the totime option with the following commands:
• delete backup
• query archive
• query backup
• restore
• restore group
• retrieve
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
TOTime = time
Parameters
time
Specifies an ending time. If you do not specify a time, the time defaults to 23:59:59. Specify the time
in the format you selected with the timeformat option.
When you include the timeformat option in a command, it must precede the fromtime, pittime,
and totime options.
Examples
Command line:
dsmc query backup -totime=23:59:00 -todate=06/30/2003 c:\mybackups\
Txnbytelimit
The txnbytelimit option specifies the number of kilobytes the client program buffers before it sends a
transaction to the server.
A transaction is the unit of work exchanged between the client and server. A transaction can contain more
than one file or directory, called a transaction group.
536 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can control the amount of data sent between the client and server, before the server commits the
data and changes to the server database, using the txnbytelimit option. Controlling the amount of
data sent changes the speed of the client to perform the transactions. The amount of data sent applies
when files are batched together during backup or when receiving files from the server during a restore
procedure.
After the txngroupmax number is reached, the client sends the files to the server, even if the transaction
byte limit is not reached.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the General tab, in the
Transaction Buffer Size field in the Preferences editor.
Syntax
TXNBytelimit number
Parameters
number
Specifies the number of kilobytes the client program sends to the server before committing the
transaction. The range of values is 300 through 34359738368 (32 GB). The default is 25600 KB. The
number can be specified as an integer or as an integer with one of the following unit qualifiers:
K or k (kilobytes)
M or m (megabytes)
G or g (gigabytes)
If no unit qualifier is specified, the integer is in kilobytes.
Restriction: The txnbytelimit option does not support decimal numbers, and only one-unit letters
are allowed. For example: K, M, or G.
Examples
Options file:
txnb 25600
txnb 2097152
txnb 2097152k
txnb 2048m
txnb 2g
txnb 32G
Command line:
-txnb=25600
-txnb=16G
This option is valid only on the initial command line. It is not valid in interactive mode.
Type
Use the type option with the query node command to specify the type of node to query. Use this option
with the set event command to activate, hold, or release.
This option is also valid for the set password command with the TSM or FILER type.
Syntax
any
TYpe =
nas
server
client
Parameters
nas
Specifies all NAS nodes registered at the server.
server
Specifies client nodes that are other IBM Spectrum Protect servers.
client
Specifies client nodes that are backup-archive clients.
Examples
Command line:
query node -type=nas
Usedirectory
The usedirectory option queries the Active Directory for the communication method and server with
which to connect.
This option overrides the commmethod parameters specified in the client options file (dsm.opt).
Optimally, the administrator enables only one server and one specific communication protocol for a given
client node. The specification of this information in Active Directory is done using the IBM Spectrum
Protect server on Windows, which has a wizard to assist with this configuration. If a node is registered to
more than one server published in Active Directory, the first server returned in the Active Directory query
is used. If the client cannot contact the server, the client session fails.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). You can set this option on the Communication tab of
the Preferences editor.
Syntax
No
USEDIRectory
Yes
Parameters
Yes
Specifies that the client ignores commmethod parameters set in the client options file and query the
Active Directory for the communication method and server with which to connect.
538 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
No
Specifies that the client uses the communication method specified in the option file. If there is no
communication method specified in the option file the default communication method and server are
used.
Examples
Options file:
usedirectory no
Command line:
-usedir=yes
This option is valid only on the initial command line. It is not valid in interactive mode.
Useexistingbase
The useexistingbase option is used when you back up snapshots that are on NetApp filer volumes.
The useexistingbase option indicates that the latest snapshot that exists on the volume being backed
up, is to be used as the base snapshot, during a snapshot differential backup operation.
If this option is not specified, a new snapshot is created on the volume that is being backed up. Because
target filer volumes are read only volumes, useexistingbase must be specified when performing
snapshot differential backups of target filer volumes. If useexistingbase is not specified, snapshot
differential backups of a target filer volume fail because the new snapshot cannot be created on the read
only volume.
When backing up target filer volumes, use both the useexistingbase option and the
diffsnapshot=latest option to ensure that the most recent base and most recent differential
snapshots are used during the volume backup
Supported Clients
This option can be used with supported Windows clients.
Options File
This option is only valid on the command line.
Syntax
USEEXISTINGBase
Parameters
This option has no parameters
Examples
Options file:
Does not apply.
Command line:
Related information
Basesnapshotname
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
USEREPLICATIONFailover
No
Parameters
Yes
Specifies that you want the client to automatically fail over to the secondary server if the primary
server is unavailable. The client uses the configuration that is provided by the primary server to
connect to the secondary server. This value is the default.
No
Specifies that the client does not automatically fail over to the secondary server.
Examples
Options file:
USEREPLICATIONFailover no
Command line:
Does not apply.
Related concepts
Automated client failover configuration and use
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
Configuring the client for automated failover
You can manually configure the client to automatically fail over to the secondary server.
V2archive
Use the v2archive option with the archive command to archive only files to the server.
The backup-archive client will not process directories that exist in the path of the source file specification.
This option differs from the filesonly option in that the filesonly option archives the directories that
exist in the path of the source file specification.
The v2archive and dirsonly options are mutually exclusive and an error message is displayed if you
use both options in the same archive command.
540 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you use this option, you might want to consider the following:
• You might experience performance problems when retrieving large amounts of data archived with this
option.
• You might want to use this option only if you are concerned about expiration performance on a server
that already contains extremely large amounts of archived data.
• If there are multiple files with the same name for the v2archive option, the files are archived multiple
times, with their directory structure. The v2archive option archives only the files.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Syntax
V2archive
Parameters
There are no parameters for this option.
Examples
This command:
dsmc archive c:\relx\dir1\ -v2archive -su=y
Archives these files:
c:\relx\dir1\file1
c:\relx\dir1\file2
c:\relx\dir1\file3
c:\relx\dir1\dir2\file4
c:\relx\dir1\dir2\file5
Verbose
The verbose option specifies that you want to display detailed processing information on your screen.
This is the default.
When you run the incremental, selective, or archive commands, information is displayed about
each file that is backed up. Use the quiet option if you do not want to display this information.
The following behavior applies when using the verbose and quiet options:
• If the server specifies either the quiet or verbose option in the server client option set, the server
settings override the client values, even if force is set to no on the server.
• If you specify quiet in your dsm.opt file, and you specify -verbose on the command line, -verbose
prevails.
• If you specify both -quiet and -verbose on the same command, the last option encountered during
options processing prevails. If you specify -quiet -verbose, -verbose prevails. If you specify -
verbose -quiet, -quiet prevails.
Supported Clients
This option is valid for all clients. The server can also define this option. The IBM Spectrum Protect API
does not support this option.
Syntax
VErbose
Parameters
There are no parameters for this option.
Examples
Options file:
verbose
Command line:
-verbose
This option is valid only on the initial command line. It is not valid in interactive mode.
Verifyimage
Use the verifyimage option with the restore image command to specify that you want to enable
detection of bad sectors on the destination target volume.
If bad sectors are detected on the target volume, the backup-archive client issues a warning message on
the console and in the error log.
Supported Clients
This option is valid for all Windows clients. The IBM Spectrum Protect API does not support this option.
Syntax
VERIFYImage
Parameters
There are no parameters for this option.
Examples
Command line:
dsmc restore image d: -verifyimage
Virtualfsname
Use the virtualfsname option with the backup group command to specify the name of the virtual file
space for the group on which you want to perform the operation. The virtualfsname cannot be the
same as an existing file space name.
Supported Clients
This option is valid for all Windows clients.
Syntax
VIRTUALFsname = fsname
542 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
fsname
Specifies the name of the container for the group on which you want to perform the operation.
Examples
Command line:
Virtualnodename
The virtualnodename option specifies the node name of your workstation when you want to restore or
retrieve files to a different workstation.
When you use the virtualnodename option in your client options file, or with a command:
• You must specify the name you specified with the nodename option in your client options file (dsm.opt).
This name should be different from the name returned by the hostname command on your workstation.
• The client prompts for the password assigned to the node that you specify, if a password is required
(even when the passwordaccess option is set to generate). If you enter the correct password, you
have access to all backups and archives that originated from the specified node.
When connecting to a server, the client must identity itself to the server. This login identification is
determined in the following ways:
• If the nodename and virtualnodename options are not specified, or a virtual node name is not
specified on the command line, the default login ID is the name returned by the hostname command.
• If the nodename option is specified, the name specified with the nodename option overrides the name
returned by the hostname command.
• If the virtualnodename option is specified, or a virtual node name is specified on a command line, it
cannot be the same name as the name returned by the hostname command.
Note: The client can use file space information when restoring files. The file space information can
contain the name of the computer from which the files were backed up. If you restore from another client
node and do not specify a destination for the restored files, the client uses the file space information to
restore the files. In such a case, the client attempts to restore the files to the file system on the original
computer. If the restoring computer has access to the file system of the original computer, you can
restore files to the original file system. If the restoring computer can not access the file system of the
original computer, the client can return a network error message. If you want to restore the original
directory structure but on a different computer, specify only the target file system when you restore. This
is true when restoring files from another node and when retrieving files from another node.
Supported Clients
This option is valid for all clients.
Options File
Place this option in the client options file (dsm.opt).
Syntax
VIRTUALNodename nodename
Examples
Options file:
virtualnodename cougar
Command line:
-virtualn=banshee
This option is valid only on the initial command line. It is not valid in interactive mode.
Vmautostartvm
Use the vmautostartvm option with the restore VM vmrestoretype=instantaccess command to
specify whether the VM created during instant access processing is automatically powered on.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This option can be used with supported Windows clients.
Options file
Place this option in the client options file (dsm.opt), or on the command line. This option is only valid
when used for an operation where vmrestoretype=instantaccess.
Syntax
NO
VMAUTOSTARTvm
YES
Parameters
NO
The VM created for instant access is not started automatically. The VM must be started manually. This
is the default setting. The default provides an opportunity to reconfigure the VM before you power it
on, to avoid potential conflicts with existing virtual machines.
YES
The VM created for instant access is started automatically.
Examples
Options file:
VMAUTOSTARTvm NO
Command line:
544 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Vmbackdir
The vmbackdir option specifies the temporary disk location where the client saves control files that are
created during full VM backup and restore operations of virtual machines.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
When a client on a data mover node starts a full VM backup of a virtual machine, the client creates
metadata in files that are associated with the backed up virtual machine and its data. The files that
contain the metadata are referred to as control files.
During full VM backup operations, the metadata is saved on a disk in the data mover node until the
backup completes and both the virtual machine data and the control files are saved to server storage.
During a full VM restore operation, the control files are copied from the server and are temporarily stored
on the data mover disk, where they are used to restore the virtual machine and its data. After a backup or
a restore operation completes, the control files are no longer needed and the client deletes them from
their temporary disk location.
The directory that is specified by this option must be on a drive that contains sufficient free space to
contain the control information from a full VM backup.
Options File
Set this option in the client options file, or specify it on the command line as an option for the backup vm
or restore vm commands.
Syntax
VMBACKDir directory
Parameters
directory
Specifies the path where the control files are stored on the backup server.
The default is c:\mnt\tsmvmbackup\fullvm\
Examples
Options file:
VMBACKD c:\mnt\tsmvmbackup\
Command line:
dsmc backup vm -VMBACKUPT=fullvm -VMBACKD=G:\virtual_machine\control_files\
dsmc restore vm -VMBACKUPT=fullvm -VMBACKD=G:\san_temp\
Vmbackuplocation
Use the vmbackuplocation option with the backup vm or restore vm commands to specify the
backup location for virtual machine backup and restore operations.
This option is only valid for VMware virtual machines. To use this option, you must have a license
agreement to use IBM Spectrum Protect for Virtual Environments: Data Protection for VMware.
For restore operations, this option is ignored if the vmrestoretype option is set to mountcleanup or
mountcleanupall.
Options file
This option must be specified on the command line of a backup vm or restore vm command. You
cannot set this option in the client options file.
Syntax
SERVER
-VMBACKUPLOCation LOCAL
BOTH
Parameters
SERVER
For backup operations, specifies that virtual machines are backed up to the IBM Spectrum Protect
server.
For restore operations, specifies that virtual machines are restored from the IBM Spectrum Protect
server.
This value is the default.
LOCAL
For backup operations, specifies that virtual machines are backed up on the hardware storage. The
backup is a full virtual machine image snapshot, even if an incremental backup is specified.
To create a local backup, the virtual machine must be stored in a VMware virtual volume (VVOL)
datastore. If any virtual disk of the virtual machine is not in a VVOL datastore, the local backup is not
allowed.
For restore operations, specifies that virtual machines are restored from persisted snapshots that are
on the hardware storage.
By restoring from a local snapshot, you can only revert an existing virtual machine. You cannot restore
a deleted virtual machine, and you cannot restore a virtual machine to a different name or location.
Local restore is not valid if the following parameters are used for the restore vm command:
• VMNAME
• DATACENTER
• HOST
• DATASTORE
• :vmdk
This value is also not valid if the vmrestoretype option is set to one of the following values. If these
values are set, an error message is displayed.
• instantaccess
• instantrestore
• mount
Because no network data movement is needed for local snapshots, backup and restore operations
can be faster than server backup and restore operations.
BOTH
For backup operations, specifies that virtual machines are backed up to the IBM Spectrum Protect
server and are also backed up locally. The local backup is always a full image snapshot of the VMs,
even if incremental backups are configured for the server.
546 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For restore operations, specifies that virtual machines are restored from the latest active version
regardless whether it is a local or a server backup. If both active backups have the same timestamp,
the local backup is used for the restore.
This value is not valid with the parameters and vmrestoretype option values that are listed above
for the LOCAL value.
Examples
Command line:
Perform a full server and local backup for virtual machine vm1:
Vmbackupmailboxhistory
The vmbackupmailboxhistory option specifies whether mailbox history is automatically uploaded
with the virtual machine (VM) backup if IBM Spectrum Protect for Mail: Data Protection for Microsoft
Exchange Server is detected on a VM.
Supported Clients
This option is valid on clients that act as a data mover for VMware guest backups.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options File
Place this option in the client options file (dsm.opt).
Syntax
Yes
VMBACKUPMAILBoxhistory
No
Parameters
Yes
The mailbox history is automatically uploaded with the VM backup if IBM Spectrum Protect for Mail:
Data Protection for Microsoft Exchange Server is detected on a VM.
No
The mailbox history is not automatically uploaded with the VM backup.
Examples
Options file:
vmbackupmailboxhistory yes
Vmbackuptype
Use the vmbackuptype option with the backup VM or restore VM command to specify to specify the
type of virtual machine backup or restore to complete. You can also use this option on query VM
commands to filter the query results to include only virtual machines that were backed up by a specific
backup type. For examples, see the query VM command description.
Supported Clients
This option is valid on Windows data movers that are installed on a vStorage backup server. The server
can also define this option.
Options File
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
FUllvm
VMBACKUPType
Parameters
FUllvm
Specify this value to run a traditional full VM backup of a VMware virtual machine. This is the default
backup type for Windows clients that run on Windows server systems, where the Hyper-V server role
is not enabled. Contrast with vmbackuptype=hypervfull.
Examples
Options file:
VMBACKUPT full
Command line:
dsmc backup vm vm1 -VMBACKUPT=full -vmchost=virtctr -vmcuser=virctr_admin -
vmcpw=xxxxx
Performs a full virtual-machine backup of vm1.example.com using the VMware VirtualCenter
machine virtctr.example.com, to the IBM Spectrum Protect server, using machine name vm1.
dsmc backup vm -VMBACKUPT=hypervfull -vmlist="VM 1,VM 2"
Performs a full virtual-machine backup of Hyper-V virtual machines named "VM 1" and "VM 2", to the
IBM Spectrum Protect server.
Vmchost
Use the vmchost option with the backup VM, restore VM, or query VM commands to specify the host
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
Use the VirtualCenter if it is available. If you cannot use a VirtualCenter server and you need to perform
backups of multiple systems on multiple ESX servers, do not specify this option, but instead specify the
option with the command so that it can be varied for each ESX server.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported Clients
This command is valid for clients that are configured to perform an off-host backup of a VMware virtual
machine. The server can also define this option.
This option is not supported for Hyper-V backups.
548 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options File
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
VMCHost hostname
Parameters
hostname
Specifies the host name of the VMware VirtualCenter or ESX server that you want to backup, restore,
or query.
Examples
Options file:
VMCH vcenter.storage.usca.example.com
Command line:
-VMCH=esx1.storage.usca.example.com
Vmcpw
Use the vmcpw option with the backup VM, restore VM, or query VM commands to specify the
password for the VMware VirtualCenter or the ESX user ID that is specified with the vmcuser option.
Use the VirtualCenter if it is available. If you cannot use a VirtualCenter server and you need to perform
backups of multiple systems on multiple ESX servers, do not specify this option, but instead specify the
option with the command so that it can be varied for each ESX server.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported Clients
This option is valid only on supported Windows clients that are installed on a vStorage backup server that
is used to backup a VMware virtual machine. This option is not valid for Hyper-V backups.
Options File
Place this option in the client options file (dsm.opt), or on the command line.
1. Click Edit > Client Preferences > VM Backup. In the Password field, type the password that you want
to have saved.
2. Click OK.
As an alternative to the preferences editor, you can store the password locally by using the set
password command. For example:
Syntax
VMCPw pwname
Examples
Options file:
VMCPw SECRET
Command line:
-VMCPw=SECRET
Related reference
“Set Password” on page 732
The set password command changes the IBM Spectrum Protect password for your workstation, or sets
the credentials that are used to access another server.
Vmctlmc
This option specifies the management class to use when backing up virtual machine control files.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
By default, virtual machine control files are bound to the default management class. The vmmc option can
be used to specify a different management class to which virtual machine data and virtual machine
control files are bound. The vmctlmc option overrides the default management class and the vmmc option
for the virtual machine control files.
Under certain conditions, it might be desirable or necessary to bind the control files to a different
management class than the data files.
The vmctlmc option is required if virtual machine data files are backed up to tape. Virtual machine
control files must be backed up to a disk-based storage pool that does not migrate to tape. The storage
pool can be composed of random access volumes and sequential file volumes; the storage pool can also
be a deduplicated pool. Use the vmctlmc option to specify a management class that stores data in such a
storage pool.
Restriction: The management class that is specified by the vmctlmc option determines only the
destination storage pool for virtual machine control files. Retention of the control files is determined by
the vmmc option, if specified, or by the default management class. The retention for the virtual machine
control files always matches the retention of the virtual machine data files.
Supported Clients
This option is valid for clients that act as data mover nodes that protect VMware virtual machines.
The option can only be used for virtual machine backups that use an incremental-forever backup mode.
This option is available only if you have a license to use either IBM Spectrum Protect for Virtual
Environments: Data Protection for VMware or IBM Spectrum Protect for Virtual Environments: Data
Protection for Microsoft Hyper-V.
Options File
Place this option in the client options file dsm.opt.
Syntax
VMCTLmc class_name
550 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
class_name
Specifies a management class that applies to backing up virtual machine control files. If you do not
set this option, the management class that is specified on the vmmc option is used. If you do not set
this option and the vmmc option is not set, the default management class of the node is used.
Examples
Options file:
vmctlmc diskonlymc
Command line:
Does not apply.
Vmcuser
Use the vmcuser option with the backup VM, restore VM, or query VM commands to specify the user
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
Use the VirtualCenter if it is available. If you cannot use a VirtualCenter server and you need to perform
backups of multiple systems on multiple ESX servers, do not specify this option, but instead specify the
option with the command so that it can be varied for each ESX server.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported Clients
This option is valid for clients that are configured as to perform an off-host backup of VMware virtual
machines. The server can also define this option.
This option is not valid for Hyper-V backups.
Options File
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
VMCUser username
Parameters
username
Specifies the user name of the VMware VirtualCenter or ESX server that you want to backup, restore,
or query.
When working with a virtual center, a user id with access to the Windows system hosting the virtual
center is required. This user id must either have administrator privileges, or the minimum privileges
that are identified in technote 1659544.
Examples
Options file:
VMCUser administrator
Command line:
backup vm -VMCUser=domainname\administrator
Command line:
Example of connecting to an ESX server:
Vmdatastorethreshold
Use the vmdatastorethreshold option to set the threshold percentage of space usage for each
VMware datastore of a virtual machine.
When you specify this option, space usage is checked before a virtual machine snapshot is created. If the
threshold is exceeded, the virtual machine is not backed up. By setting this option, you can prevent out-
of-space errors when you back up virtual machines.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
You can use this option with supported Windows 64-bit clients.
Options file
You can specify this option in the client options file (dsm.opt) or on the command line by using the
backup vm command. You can also include this option on the IBM Spectrum Protect Version 7.1.5 or
later server in a client option set. You cannot set this option in the Preferences Editor.
Syntax
VMDATASTORETHreshold percent
Parameters
percent
Specifies the threshold percentage of each VMware datastore of the virtual machine to be backed up.
You can specify an integer from 0 - 100. The default value is 100. If you do not set this option, the
client begins a virtual machine backup without first verifying the existing space usage.
Requirements:
• Ensure that the threshold is low enough so that the snapshot does not use up all the available space
in the VMware datastores. Otherwise, you will run out of space on the VMware datastores and the
snapshot will not be created.
• If you use multiple clients that act as data mover nodes, you must add this option to the options file
for each data mover.
• The client checks the data usage of the VMware datastore that contains the virtual machine disk
snapshots. By default, the snapshots are created in the same directory as that of the parent virtual
disk (.vmdk) file.
If you change the snapshot location to a new directory on the same datastore or on another
datastore with the workingDir option in the VM configuration file, ensure that the path of the
working directory is correct. If the path is incorrect, the client might validate the data usage of the
wrong datastore.
If you use the EXCLUDE.VMDISK option to exclude one or more disks from a backup, the threshold
check is still run on these disks. Even though these disks are not backed up, VMware still takes a
snapshot of these disks.
Independent disks are not checked during space verification processing because a snapshot of these
disks does not use any VMware datastore space.
552 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Example 1
Virtual machine vm1 spans datastore1 and datastore2. Set the vmdatastorethreshold option to
90 to ensure that both VMware datastores are at most 90% full before the virtual machine is backed up.
Options file:
vmdatastorethreshold 90
Command line:
dsmc backup vm vm1 -vmdatastorethreshold=90
Example 2
The datastore threshold of datastore2 is set to 85. The datastore threshold is exceeded during the
backup of virtual machine vm5. The following error message is displayed:
ANS14200E The virtual machine 'vm5' could not be backed up because the
data usage of datastore 'datastore2' exceeded the datastore threshold
of 85%.
Increase the value of the vmdatastorethreshold option to 95 and restart the backup.
Options file:
vmdatastorethreshold 95
Command line:
dsmc backup vm vm5 -vmdatastorethreshold=95
Related reference
“Backup VM” on page 622
Vmdefaultdvportgroup
Use this option to specify the port group for the NICs to use during restore vm operations for a virtual
machine that was connected to a distributed virtual port group when it was backed up, but the target host
for the restore operation does not contain a similar distributed virtual port group.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
This option does not apply to backup or restore operations for Microsoft Hyper-V virtual machines.
Supported clients
This option is valid for Windows clients that are installed on a vStorage backup server.
Options file
Place this option in the client options file (dsm.opt), or specify it as a command-line parameter on the
restore vm command.
Syntax
VMDEFAULTDVPORTGROUP portgroup_name
Parameters
portgroup name
Specifies the name of the port group to use. The port group name is case sensitive.
Examples
Option file:
Command line:
Related reference
“Vmdefaultnetwork” on page 555
Use this option to specify the network for NICs to use during a restore vm operation, for a virtual
machine that had been connected to a distributed virtual port group when it was backed up, but the target
host for the restore operation does not have any distributed switch port groups configured.
“Vmdefaultdvswitch” on page 554
Use this option to specify the distributed virtual switch (dvSwitch) that contains the port group that you
set on the vmdefaultdvportgroup option. The option has no effect unless you also specify the
vmdefaultdvportgroup option.
Vmdefaultdvswitch
Use this option to specify the distributed virtual switch (dvSwitch) that contains the port group that you
set on the vmdefaultdvportgroup option. The option has no effect unless you also specify the
vmdefaultdvportgroup option.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option is valid for Windows clients that are installed on a vStorage backup server.
Options file
Place this option in the client options file (dsm.opt), or specify it as a command-line parameter on the
restore vm command.
Syntax
VMDEFAULTDVSWITCH dvSwitch
Parameters
dvSwitch
Specifies the name of the virtual switch to use. The virtual switch name is case sensitive.
Examples
Option file:
VMDEFAULTDVSWITCH dvSwitch
Command line:
Related reference
“Vmdefaultdvportgroup” on page 553
554 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use this option to specify the port group for the NICs to use during restore vm operations for a virtual
machine that was connected to a distributed virtual port group when it was backed up, but the target host
for the restore operation does not contain a similar distributed virtual port group.
Vmdefaultnetwork
Use this option to specify the network for NICs to use during a restore vm operation, for a virtual
machine that had been connected to a distributed virtual port group when it was backed up, but the target
host for the restore operation does not have any distributed switch port groups configured.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option is valid for Windows clients that are installed on a vStorage backup server.
Options file
Place this option in the client options file (dsm.opt), or specify it as a command-line parameter on the
restore vm command.
Syntax
VMDEFAULTNETWORK vm_network_name
Parameters
vm_network_name
Specifies the name of the virtual machine network to use. The network name is case sensitive. If the
name contains space characters, enclose it in quotation marks.
Examples
Option file:
Command line:
Related reference
“Vmdefaultdvportgroup” on page 553
Use this option to specify the port group for the NICs to use during restore vm operations for a virtual
machine that was connected to a distributed virtual port group when it was backed up, but the target host
for the restore operation does not contain a similar distributed virtual port group.
“Vmdefaultdvswitch” on page 554
Vmdiskprovision
Use the vmdiskprovision option to specify a provisioning policy for the virtual disk file that is used to
restore VMware virtual machine data. This option is valid only for restore vm operations where
vmrestoretype=instantrestore is specified.
This option is only valid for VMware virtual machines. The virtual machines must be hosted on VMware
ESXi 5.1 servers, or later versions. To use this option, you must have a license agreement to use IBM
Spectrum Protect for Virtual Environments: Data Protection for VMware.
Supported Clients
This option can be used with supported Windows clients.
Options file
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
THICK
VMDISKPROvision
THIN
Parameters
THICK
Creates a virtual disk in a default thick format; where the space that is required for the virtual disk is
allocated when the virtual disk is created. This setting is the default value.
THIN
Creates a virtual disk in a thin format.
Note: If you are restoring a virtual machine and you specify thin provisioning, the datastore that you
restore the VM to must have enough free space to accommodate the total capacity of the VM disk, and
not just the amount of disk that is used. For example, if a thin-provisioned VM has 300 GB total
capacity for its disk, you cannot restore that VM to a datastore that has less than 300 GB available,
even if only a portion of the total capacity is being used.
Examples
Options file:
VMDISKPROvision THIN
Command line:
Vmenabletemplatebackups
The vmenabletemplatebackups option specifies whether the client backs up VMware template virtual
machines when it protects virtual machines in a vCenter server. VMware templates virtual machines
cannot be backed up when they are in an ESXi host because ESXi does not support templates.
When this option is enabled, you can include VMware template machines in full VM backup operations.
You use the existing Backup VM command and the DOMAIN.VMFULL option to specify the virtual
machines to include in the backup operation.
556 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Incremental backups are not supported and snapshots are not taken, so you must use MODE=IFFULL.
Use MODE=IFFULL to force a new backup of VMware template virtual machines, even if they were not
changed since the last backup.
When vmenabletemplatebackups is enabled, any backup process that is initiated by using
MODE=IFINCREMENTAL is processed by using MODE=IFFULL. VMware template VMs are included in a
backup only if they were changed since the last backup occurred.
With this option enabled, make sure that the vmvstortransport options include NBDSSL or NBD. Using
only the SAN or HOTADD transport modes with this option enabled causes backups of the template
machines to fail.
Supported clients
This option can be used with supported Windows clients.
Options file
You can set this option on the command line, in the client options file (dsm.opt), or on the server in a
client options set.
You can also set it in the preferences editor on the VM Backup tab (select the Backup virtual machine
templates option).
Syntax
No
VMENABLETEMPlatebackups
Yes
Parameters
No
Specifies that template virtual machines are not included in full VM backup operations; this is the
default setting.
Yes
Specifies that template VMs are included in full VM backup operations.
Examples
Options file
vmenabletemplatebackups yes
Command line
Back up a VMware template VM
where vmname is the template machine name. "win7x64" is the new template VM name. The new
data center, host, and datastore are also included.
Related reference
“Backup VM” on page 622
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
Vmexpireprotect
Use this option to protect virtual machine snapshots so that they cannot be expired while an instant
restore or instant access operation of VMware VMs or while a file-level restore of a VMware VM is in
progress.
During a mount or restore operation, the snapshot on the IBM Spectrum Protect server is locked to
prevent it from expiring during the operation. Expiration might occur because another snapshot is added
to the snapshot sequence. This option specifies whether to prevent or allow snapshot expiration during a
mount or a restore operation.
Supported Clients
This option can be used with supported Windows clients that are configured to restore virtual machines.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Options File
For restoring VMware virtual machines, set this option in the client options file (dsm.opt) or on a
restore vm command where the vmrestoretype option is set to instantaccess or
instantrestore.
For restoring file-level backups for virtual machines, specify this option in the client options file, or on the
restore vm command. File-level backups were created with the version 7.1 or earlier backup-archive
clients.
Syntax
No
VMEXPIREPROTECT Yes
Parameters
Yes
Specify Yes to protect the snapshot from expiration. The snapshot on the IBM Spectrum Protect
server is locked and the snapshot is protected from expiration during a mount or a restore operation.
No
Specify No to disable expiration protection. This value is the default. The snapshot on the IBM
Spectrum Protect server is not locked and the snapshot is not protected from expiration. If the
snapshot that is being mounted or restored is expired, the result of the mount or restore operation is
unpredictable. For example, the mount point can become unusable or contain errors. However,
558 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
expiration does not affect the current active copy of the virtual machine. The active copy cannot
expire during an operation.
When the snapshot is on a target replication server, the snapshot cannot be locked because it is in
read-only mode. A lock attempt by the server causes the mount or restore operation to fail.
To avoid the lock attempt and prevent such a failure, disable expiration protection by specifying No, or
by allowing this option to default.
Examples
Client options file:
VMEXPIREPROTECT YES
Command line:
Run an instant access operation for a VMware virtual machine:
To restore files from a virtual machine backup, use the IBM Spectrum Protect recovery agent GUI.
For information about the IBM Spectrum Protect recovery agent, see the IBM Spectrum Protect for
Virtual Environments documentation.
Vmiscsiadapter
This option specifies which iSCSI adapter, on the ESX host, to use for instant restore and instant access
operations for VMware virtual machines.
Supported Clients
This option is valid for 64-bit Windows clients that are configured as data movers that backup VMware
virtual machines.
Options File
Set this option in the client options file (dsm.opt). You can also specify this option as a command-line
parameter on the restore vm command that initiates an instant restore or instant access operation. To
use this option, you must have a license agreement to use IBM Spectrum Protect for Virtual
Environments: Data Protection for VMware.
Syntax
VMISCSIAdapter= iSCSI_adapter_name
iSCSI_adapter_name
Specifies the name of the iSCSI adapter to connect to on the ESX host. If you do not specify this
option, the first iSCSI adapter that is found on the host is used.
Examples
Options file:
vmiscsiadapter "vmhba36"
Command line:
dsmc restore vm “Haifa” -VMRESToretype=INSTANTAccess -vmname=”Haifa_verify"
-VMISCSIAdapter="vmhba36"
Supported Clients
This option can be used with supported Windows clients.
Options file
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
VMISCSIServeraddress iSCSI serverhost name or IP address
Parameters
iSCSI serverhost name or IP address
Specify the host name or IP address of the iSCSI server that supplies the iSCSI target disks. This iSCSI
server must connect the data mover machine with all of the ESX hosts that are used for instant
restore operations. If vmiscsiserveraddress is not specified, the host name or IP address of the
data mover machine is used.
For instant restore operations, the IP address of the network card in the data mover machine that is
used for the iSCSI transfer should be in the same subnet as the iSCSI adapter on the ESX host.
For file restore mount operations, the Windows and Linux mount proxy systems must be in the same
network range.
Examples
Options file:
VMISCSIServeraddress 192.168.42.50
Command line:
Vmlimitperdatastore
The vmlimitperdatastore option specifies the number of virtual machines (VMs) and virtual disks in a
datastore that can be processed in parallel during an optimized backup operation.
An optimized backup operation is one in which parallel backup capability is enabled at the VM, virtual
disk, or subdisk level.
The vmlimitperdatastore option works with the vmmaxparallel, vmmaxbackupsessions, and
vmlimitperhost options to optimize backup operations and to help control the amount of resources
that the backup can create on a host in the vSphere infrastructure. Adjust the values of these options to
find the values that provide optimal performance for the backups that are in your environment.
560 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option can be used with supported Windows clients.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Backup VM. It can also
be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
0
VMLIMITPERDatastore
integer
Parameters
integer
Specifies the maximum number of VMs in any one datastore that are included during an optimized
backup operation. The maximum that you can specify is 50 VMs. The default is 0 (zero).
Specifying 0 means that you are not concerned about how many VMs can be backed up in parallel
from a datastore. Instead, you want to limit the maximum number of VMs to include in a backup by
using the value that you specify on the vmmaxparallel option. The vmlimitperdatastore option
is enforced even when VM data exists in two or more datastores.
Examples
Options file
VMLIMITPERD 5
Command line:
dsmc backup vm -VMLIMITPERD=5
Related reference
“Backup VM” on page 622
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Vmmaxbackupsessions” on page 563
The vmmaxbackupsessions option specifies the maximum number IBM Spectrum Protect server
sessions that move virtual machine (VM) data to the server that can be included in an optimized backup
operation.
“Vmmaxparallel” on page 565
The vmmaxparallel option is used to configure optimized backups of several virtual machines by using
a single instance of the backup-archive client. This option specifies the maximum number of virtual
machines that can be backed up to the IBM Spectrum Protect server at any one time.
“Vmlimitperhost” on page 562
The vmlimitperhost option specifies the number of virtual machines (VMs) and virtual disks in a host
that can be processed in parallel during an optimized backup operation.
Related information
Backing up multiple virtual machines in parallel
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option can be used with supported Windows clients. This option is not valid for Data Protection for
Microsoft Hyper-V backups.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Backup VM. It can also
be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
0
VMLIMITPERHost
integer
Parameters
integer
Specifies the maximum number of VMs in any one ESX server that can be included in an optimized
backup operation. The maximum that you can specify is 50 VMs. The default is 0 (zero).
Specifying 0 means that you are not concerned about how many VMs can be backed up in parallel
from an ESX server. Instead, you want to limit the maximum number of VMs to include in a backup by
using the limit that you specify on the vmmaxparallel option.
Examples
Options file
VMLIMITPERH 5
Command line:
dsmc backup vm -VMLIMITPERH=5
Related reference
“Backup VM” on page 622
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Vmmaxparallel” on page 565
The vmmaxparallel option is used to configure optimized backups of several virtual machines by using
a single instance of the backup-archive client. This option specifies the maximum number of virtual
machines that can be backed up to the IBM Spectrum Protect server at any one time.
“Vmlimitperhost” on page 562
562 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The vmlimitperhost option specifies the number of virtual machines (VMs) and virtual disks in a host
that can be processed in parallel during an optimized backup operation.
Related information
Backing up multiple virtual machines in parallel
Vmmaxbackupsessions
The vmmaxbackupsessions option specifies the maximum number IBM Spectrum Protect server
sessions that move virtual machine (VM) data to the server that can be included in an optimized backup
operation.
An optimized backup operation is one in which parallel backup capability is enabled at the VM, virtual
disk, or subdisk level.
For VMware VMs, the vmmaxbackupsessions option works with the vmmaxparallel,
vmlimitperdatastore, and vmlimitperhost options to optimize backup operations and to help
control the amount of resources that the backup can create on a host in the vSphere infrastructure. Adjust
the values of these options to find the values that provide optimal performance for the backups that are in
your environment.
Supported clients
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
For VMware VMs, this option can be used with supported Windows clients.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Backup VM. It can also
be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
4
VMMAXBACKUPSEssions
integer
Parameters
integer
Specifies the maximum number of IBM Spectrum Protect server sessions that can be created during
the backup operation.
The default is 4. The maximum is 100.
Review the following information for using the vmmaxbackupsessions option along with the
vmmaxparallel option or the maxnummp server parameter:
vmmaxparallel
The vmmaxparallel option specifies the maximum number of virtual machines that can be
backed up to the IBM Spectrum Protect server at any one time. The value of the
vmmaxbackupsessions option must be equal to or greater than the value of the
vmmaxparallel option.
If the value is less than the value of the vmmaxparallel option, the following message is
returned and the value is changed to the same value as the vmmaxparallel option:
ANS9995W The value of the VMMAXBACKUPSESSIONS option is number_value.
This value must be greater than or equal to the value of the
Examples
Options file
VMMAXBACKUPS 10
Command line:
dsmc backup vm -VMMAXBACKUPS=10
Related reference
“Backup VM” on page 622
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Vmmaxparallel” on page 565
The vmmaxparallel option is used to configure optimized backups of several virtual machines by using
a single instance of the backup-archive client. This option specifies the maximum number of virtual
machines that can be backed up to the IBM Spectrum Protect server at any one time.
“Vmlimitperdatastore” on page 560
The vmlimitperdatastore option specifies the number of virtual machines (VMs) and virtual disks in a
datastore that can be processed in parallel during an optimized backup operation.
“Vmlimitperhost” on page 562
The vmlimitperhost option specifies the number of virtual machines (VMs) and virtual disks in a host
that can be processed in parallel during an optimized backup operation.
Related information
Backing up multiple virtual machines in parallel
564 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Vmmaxparallel
The vmmaxparallel option is used to configure optimized backups of several virtual machines by using
a single instance of the backup-archive client. This option specifies the maximum number of virtual
machines that can be backed up to the IBM Spectrum Protect server at any one time.
An optimized backup operation is one in which parallel backup capability is enabled at the VM, virtual
disk, or subdisk level.
The vmmaxparallel option works with the vmmaxbackupsessions, vmlimitperhost, and
vmlimitperdatastore options to optimize backup operations and to help control the amount of
resources that the backup can create on a host in the vSphere infrastructure. Adjust the values of these
options to find the values that provide optimal performance for the backups that are in your environment.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported clients
This option can be used with supported Windows clients.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for the Backup VM
command. It can also be included on the server in a client options set. It cannot be set in the Preferences
Editor.
Syntax
4
VMMAXParallel
integer
Parameters
integer
Specifies the maximum number of virtual machines that can be backed up at any one time during an
optimized backup operation.
The default is 4. The maximum is 50.
Tip: When you use client-side data deduplication, a data deduplication session is started for each VM.
This data deduplication session is not counted as one of the vmmaxparallel sessions.
Review the following information for using the vmmaxparallel option in conjunction with the
vmmaxbackupsessions option or the maxnummp server parameter:
vmmaxbackupsessions
For Data Protection for VMware, the vmmaxbackupsessions specifies the maximum number of
sessions that move virtual machine data to the server that can be included in an optimized backup
operation. The value of the vmmaxbackupsessions option must be equal to or greater than the
value of the vmmaxparallel option.
maxnummp
The maxnummp server parameter specifies the maximum number of mount points a node is
allowed to use on the server when the copy destination of the storage pool is FILE or TAPE. The
maxnummp parameter must be equal to or greater than the vmmaxparallel and
vmmaxbackupsessions option settings. When multiple instances of the client are backing up
files, or when a single client performs parallel backup operations, more mount points might be
required.
Examples
Options file
VMMAXP 10
Command line:
dsmc backup vm -VMMAXP=10
Related reference
“Backup VM” on page 622
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Vmlimitperhost” on page 562
The vmlimitperhost option specifies the number of virtual machines (VMs) and virtual disks in a host
that can be processed in parallel during an optimized backup operation.
“Vmlimitperdatastore” on page 560
The vmlimitperdatastore option specifies the number of virtual machines (VMs) and virtual disks in a
datastore that can be processed in parallel during an optimized backup operation.
Related information
Backing up multiple virtual machines in parallel
Vmmaxrestoresessions
The vmmaxrestoresessions option defines the aggregate number of sessions which will be allocated
for the IBM Spectrum Protect server optimized restore operation.
A optimized restore operation is one in which parallel restore capability is enabled at the subdisk level of
a virtual disk.
Note: At least one session must be allocated for each disk that is being restored.
Note: If the value of vmmaxrestoresessions is less than the value of vmmaxrestoreparalleldisks
multiplied by vmmaxrestoreparallelvms, the value will automatically be adjusted to the value of
vmmaxrestoreparalleldisks multiplied by vmmaxrestoreparallelvms at runtime.
Supported clients
This option can be used with supported Windows clients.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
566 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Restore VM. It can
also be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
8
VMMAXRESTORESessions
integer
Parameters
integer
Specifies the number of IBM Spectrum Protect server sessions that are created during the restore
operation. The default is 8. The maximum is 100.
Examples
Options file
VMMAXRESTORES 5
Command line:
dsmc restore vm webserver1 -VMMAXRESTORES=5
Note: This command line example for this option is valid in both Windows and Linux supported clients.
Related reference
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
Vmmaxrestoreparalleldisks
The vmmaxrestoreparalleldisks option enables an IBM Spectrum Protect client to restore specific
multiple virtual disks at the same time per virtual machine.
You can specify the number of disk sessions to be opened, up to a maximum of 10. Sessions are allocated
per disk based on the transport type from the option vmvstortransport. Available sessions are
allocated across the number of disk sessions specified by vmmaxrestoreparalleldisks, by rounding
down the number of sessions per disk to the nearest whole number.
Supported clients
This option can be used with supported Windows clients. This option is not valid for Data Protection for
Microsoft Hyper-V backups.
Note:
You must ensure the total number of restore operations from all sources to the same ESXi host does not
exceed 26. Due to an ESXi host issue, exceeding this number of parallel restores may cause the operation
to fail. For example, if you have 3 different restore instances to the same ESXi host, each with
VMMAXRESTOREPARALLELDISKS 10, the restores may fail because the total number of connections is 30
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Restore VM. It can
also be included on the server in a client options set. It cannot be set in the Preferences Editor.
Parameters
integer
Specifies the number of virtual hard disks that can be restored simultaneously. The default is 2. The
maximum is 10.
Examples
Task
Set a maximum of 2 simultaneous restore operations for virtual disks in the restore operation of the
virtual machine vm1:
Vmmaxrestoreparallelvms
The vmmaxrestoreparallelvms option controls the number of virtual machines an IBM Spectrum
Protect client can restore at the same time.
Use this option to increase restore performance by increasing the number of virtual machines to restore
in parallel.
You can specify the number of virtual machines to be restored simultaneously, up to a maximum of 10.
The default value is 2.
Supported clients
This option can be used with supported Windows clients. This option is not valid for Data Protection for
Microsoft Hyper-V restores.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Restore VM. It can
also be included on the server in a client options set. It cannot be set in the Preferences Editor.
Syntax
2
VMMAXRESTOREPARALLELVms
integer
568 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
integer
Specifies the maximum number of virtual machines that can be restored simultaneously. The default
is 2. The maximum is 10.
Note: If you are using the Vmmaxrestoresessions option to limit the number of restore sessions, the
number of sessions has to be greater than or equal to the number of virtual machines. This ensures at
least one session is available per VM.
Note: If you are using the option Vmmaxparalleldisks to restore multiple virtual disks at same time,
the number of virtual disks must be less than or equal to the number of sessions.
Examples
Task
Set a maximum of 5 simultaneous virtual machine restores for machines vm1, vm2, vm3, vm4, and
vm5:
This will assign 5 simultaneous virtual machines restores that can restore up to 2 virtual disks in
parallel per virtual machine at a time and assign 2 sessions per virtual machine.
Task
Set a maximum of 2 simultaneous virtual machine restores for machines vm1 and vm2:
This will assign 2 simultaneous virtual machines restores with at least one disk per virtual machine at
a time and 5 sessions per virtual machine.
Task
Set a maximum of 2 simultaneous virtual machine restores for machines vm1, vm2, vm3, and vm4:
This will assign 2 simultaneous virtual machines restores with 2 disks per virtual machines at a time
and 8 sessions per virtual machine.
Related reference
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
“Vmmaxrestoresessions” on page 566
The vmmaxrestoresessions option defines the aggregate number of sessions which will be allocated
for the IBM Spectrum Protect server optimized restore operation.
“Vmmaxrestoreparalleldisks” on page 567
The vmmaxrestoreparalleldisks option enables an IBM Spectrum Protect client to restore specific
multiple virtual disks at the same time per virtual machine.
Vmmaxvirtualdisks
The vmmaxvirtualdisks option specifies the maximum size of VMware virtual machine disks (VMDK) to
include in a backup operation. The vmmaxvirtualdisks option specifies the maximum size of virtual
machine disks to include in a backup operation.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported clients
This option is valid for 64-bit Windows clients that are configured as data movers that back up VMware
virtual machines.
Options file
Set the vmmaxvirtualdisks option in the client options file (dsm.opt). You can also specify this option
as a command-line parameter on the backup vm command.
Syntax
2
VMMAXVIRTUALDisks size
2...8, 999
Parameters
size
Specifies the maximum size, in terabytes (TB), of the VM disks to include in a backup operation. The
range is an integer 2 - 8; the default is 2. The maximum is 8 TB (equivalent to 8192 GB).
To ensure that the VM disk size that is included in backup operations is always the maximum size,
specify 999. Use this value as the most effective method to ensure that the maximum value is always
set. This value prevents the need to continuously modify the option files.
When you also specify the vmskipmaxvirtualdisks yes option, VM disks that are the specified
maximum size or smaller are backed up and VM disks that are larger than the specified maximum size
are excluded.
When you also specify the vmskipmaxvirtualdisks no option, backup operations fail if a VM disk
is larger than the specified maximum size.
Examples
Options file:
vmmaxvirtualdisks 3
Command line:
Back up VM disks that are 5 TB or smaller and exclude VM disks that are larger than 5 TB:
Back up VM disks that are 3 TB or smaller and fail the backup operation if a VM disk is larger than 3
TB:
Back up VM disks that are 8 TB or smaller and exclude VM disks that are larger than 8 TB:
Or:
570 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Vmmc
Use the vmmc option to store virtual machine backups by using a management class other than the
default management class. For VMware VM backups, the vmmc option is valid only if the
vmbackuptype=fullvm option is set.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This option is valid for clients that are configured to back up VMware virtual machines. The server can also
define this option.
Options File
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
VMMC management_class_name
Parameters
management_class_name
Specifies a management class that applies to the backed up virtual machine data. If you do not set
this option, the default management class of the node is used.
Examples
Task:
Run a backup of the virtual machine that is named myVirtualMachine and save the backup
according to the management class that is named myManagmentClass.
dsmc backup vm "myVirtualMachine" -vmmc=myManagmentClass
Vmmountage
Use the vmmountage option with the restore VM "*" -vmrestoretype=mountcleanupall
command to specify the number of hours that a VM file level restore mount must be active to be cleaned
up.
Supported Clients
This option is only valid for Windows clients.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options File
None. You can specify this option only on the command line.
Syntax
VMMOUNTAge = hours
Examples
Command line:
Clean up all mount operations that are active longer than 24 hours:
or
Vmnocbtcontinue
Use the vmnocbtcontinue option to specify whether to back up a virtual machine (VM) without using
the change block tracking function when one or more snapshots already exist on the VM and change block
tracking must be enabled or reset.
If you run an incremental-forever backup on a VM and change block tracking needs to be enabled or re-
enabled, and one or more snapshots exist on the VM, change block tracking cannot be enabled. VMware
does not support enabling change block tracking when a snapshot exists for the VM.
Ensure that you remove any existing snapshots before you run an incremental-forever backup for the first
time so that change block tracking can be enabled. To proceed with the backup operation without
enabling change block tracking, the vmnocbtcontinue yes option can be specified. However, running a
backup operation with this option setting will cause each backup of the VM to be a full backup, which will
include both used and unused blocks for each disk of the VM. After the backup operation is completed,
when no snapshots exist on the VM, change block tracking is enabled and an incremental-forever backup
is taken.
If you want to reset change block tracking for a VM or group of VMs, use the include.vmresetcbt
vmname option. For more information, see “Include.vmresetcbt” on page 417.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported Clients
This option can be used with supported Windows and Linux clients.
Options file
Place this option in the client options file (dsm.opt).
Syntax
No
VMNOCBTcontinue
Yes
572 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
No
Fail the backup operation because change block tracking cannot be enabled. This value is the default.
Yes
Continue the backup operation without using change block tracking.
Specifying this value causes each backup of the VM to be a full backup that includes both used and
unused blocks for each disk of the VM.
Vmnoprdmdisks
This option enables the client to restore configuration information for the pRDM volumes that are
associated with a VMware virtual machine, even if the LUNs that were associated with the volumes cannot
be found. Because pRDM volumes are not included in virtual machine snapshot, only the configuration
information can be restored, and not the data that was on the volumes.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
This option does not apply to backups of Microsoft Hyper-V virtual machines.
Supported Clients
This option is valid for Windows and Linux clients that are installed on a vStorage backup server.
Options File
Place this option in the client options file (dsm.opt), or specify it as a command-line parameter on the
restore vm command.
Syntax
NO
VMNOPRDmdisks
YES
Parameters
YES
Specify this value if you must restore a virtual machine that you backed up with -
vmprocesswithprdm=yes, and the original LUNs that were mapped by the raw device mappings file
cannot be located. This setting causes the client to skip attempts to locate the missing LUNs used by
the pRDM volumes, and restore the configuration information (disk labels) that were associated with
them. The pRDM volumes are restored as thin-provisioned VMFS VMDKs. You can then use the
vSphere client to create the necessary pRDM mappings.
NO
Setting -vmnoprdmdisk=no causes restore operations for virtual machines that were backed up with
-processvmwithprdm=yes to fail if the original LUNs that were mapped to by the raw device
mappings file cannot be located. This value is the default value.
Examples
Option file:
VMNOPRDMDISKS YES
Command line:
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
This option does not apply to backups of Microsoft Hyper-V virtual machines.
Supported Clients
This option is valid for Windows and Linux clients that are installed on a vStorage backup server.
Options File
Place this option in the client options file (dsm.opt), or specify it as a command-line parameter on the
restore vm command.
Syntax
NO
VMNOVRDmdisks
YES
Parameters
YES
Specify this value if you must restore a virtual machine that you backed up, and the original LUNs that
were mapped by the raw device mappings file cannot be located. This setting causes the client to skip
attempts to locate the missing LUNs used by the vRDM volumes, and restore the configuration
information (disk labels) and the data that was backed up. The vRDM volumes are restored as thin-
provisioned VMFS VMDKs.
NO
Setting -vmnovrdmdisk=no causes restore operations for virtual machines that had vRDM volume to
fail, if the original LUNs that were mapped to by the raw device mappings file cannot be located. This
value is the default value.
Examples
Option file:
VMNOVRDMDISKS YES
Command line:
Vmpreferdagpassive
The vmpreferdagpassive option specifies whether to back up an active copy or passive copy of a
database that is part of a Microsoft Exchange Server Database Availability Group (DAG).
This option applies to Microsoft Exchange Server workloads that run inside virtual machine guests that
are protected by IBM Spectrum Protect for Virtual Environments.
Use the vmpreferdagpassive option with the backup vm command.
574 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid on clients that act as a data mover for VMware guest backups.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
VMPREFERDAGPassive
Yes
Parameters
No
Back up the Microsoft Exchange Server database in a DAG regardless of whether it is an active copy or
passive copy. This value is the default.
Yes
Skip the backup for an active database copy in a DAG if a valid passive copy is available on another
server. If no valid passive copy is available, the active database copy is backed up.
Examples
Options file:
vmpreferdagpassive yes
Vmprocessvmwithindependent
Use this option to specify whether VMware virtual machines (VMs) that are provisioned with one or more
independent disks are backed up. By default, VMs with independent disks are not backed up.
Independent disks cannot be backed up because they do not support snapshots. Therefore, review the
following considerations before setting the vmprocessvmswithindependent option to yes:
• Only normal disk volumes are backed up. The data on independent disks is not backed up.
• Configuration information for independent disks is not backed up. Independent disks must be manually
recreated on a restored machine.
• If a volume is striped across both normal and independent disks, then only the portions of the volume
data on the normal disks can be restored. Therefore, after the VM is restored, the volume is corrupted
because the stripes on the independent disks are missing.
• File level restore is supported for VMs that have normal and independent disks if no volume is striped
across both normal and independent disks. Only files on the normal disks can be restored.
• File level restore is not supported for VMs that have one or more volumes striped across both normal
and independent disks. Use full VM restore for such VMs.
If the virtual machine contains one or more raw device mapping (RDM) volumes that are provisioned in
physical compatibility mode (pRDM), use the vmprocessvmwithprdm option to specify whether the
client backs up the virtual machine if a pRDM disk is present.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
This option is only valid for VMware backups and does not pertain to Microsoft Hyper-V backups.
Options File
Place this option in the client options file (dsm.opt) or on the command-line
Syntax
No
VMPROCESSVMWITHINDependent
Yes
Parameters
No
The backup of the VM fails if one or more independent disk volumes are detected. No is the default.
Yes
The backup of the VM continues if one or more independent disk volumes are detected. Review the
preceding considerations before using Yes.
Examples
Option file:
VMPROCESSVMWITHINDEPENDENT Yes
Command line:
Vmprocessvmwithprdm
Use this option to control whether full VMware virtual machine backups are processed if the virtual
machine has one or more raw device mapping (RDM) volumes provisioned in physical-compatibility mode
(pRDM).
pRDM volumes do not support snapshots. Any pRDM volumes found on a virtual machine are not
processed as part of the backup operation. When the virtual machine is restored, the backup-archive
client recovers the virtual machine, and only the volumes that participated in snapshot operations are
restored. Configuration information and content of the pRDM volumes is not preserved in the information
stored on the IBM Spectrum Protect server. Users must re-create the pRDM volumes on the restored
machine.
This option does not apply to virtual machines that have one or more RDM volumes that are provisioned in
virtual-compatibility mode (vRDM). Because vRDM volumes do support snapshot operations, they are
included in a full VMware virtual machine backup.
If the virtual machine also contains one or more independent disks, use the
vmprocessvmwithindependent option to control whether the client backs up any files on the virtual
machine if an independent disk is present.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
This option is only valid for VMware backups and does not pertain to Microsoft Hyper-V backups.
576 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported Clients
This option is valid for Windows and Linux clients that are configured as a VMware backup server. The
server can also define this option.
Options File
Place this option in the client options file (dsm.opt) or on the command line
Syntax
NO
VMPROCESSVMWITHPRDM
YES
Parameters
No
The backup of the virtual machine fails if one or more pRDM volumes are detected. No is the default.
Yes
Virtual machines that contain one or more raw device mapping (RDM) volumes that are provisioned in
physical-compatibility mode (pRDM) are backed up. However, the pRDM volumes are not processed
as part of the virtual machine backup operation.
If the virtual machine also contains one or more independent disks, the
vmprocessvmwithindependentdisk option must also be specified.
Examples
Option file:
VMPROCESSVMWITHPRDM Yes
Command line:
Vmrestoretype
Use the vmrestoretype option with the query VM or restore VM commands to specify the type of
restore operation to perform or query.
The vmrestoretype option is valid for both VMware and Microsoft Hyper-V virtual machines (VMs).The
information for each hypervisor is presented in its own section. If you are specifying the type of restore
operation for Hyper-V virtual machines, you can skip over the Vmrestoretype for VMware virtual machines
text. If you are specifying the type of restore operation for VMware virtual machines, you do not need to
read the Vmrestoretype for Hyper-V virtual machines text.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This option can be used with supported Windows clients.
Syntax
NONinstant
VMRESToretype
INSTANTRestore
INSTANTAccess
VMCLeanup
VMFULLCLeanup
ALLtype
MOUNTCLEANUPAll
Parameters
noninstant
Specifies that classic full VM restore is performed. This is the default restore type.
instantrestore
Specifies that an instant restore is performed. During an instant restore operation, the VM is started
during the restore operation. When this restore type is specified on a query VM command, the
command returns a list of VMs running an instant restore operation.
Important: For instant restore operations, ensure that both the temporary datastore that you specify
with the vmtempdatastore option and the VMware datastore that is specified by the datastore
option on the restore VM command have enough free storage to save the virtual machine that you are
restoring, and the snapshot file that contains changes made to the data.
instantaccess
Specifies that a temporary restore of the backed-up VM is performed. Use this restore type when you
want to restore a VM temporarily, to test the integrity of a backup, before you run an instant restore.
Any changes that are made to the temporary VM are not saved.
When this restore type is specified on a query vm command, the command returns a list of VMs that
are running an instant access operation.
vmcleanup
Specifies that a cleanup of the selected VM and its components is performed.
For instant access operations, this option removes the temporary VM and all of its components.
For instant restore operations, this option removes only the components that are no longer needed
(for example the iSCSI mounts). The virtual machine is not removed. Cleanup operations are not
allowed when the VM is still running on the iSCSI disks. To force this behavior see vmfullcleanup.
vmfullcleanup
The VM and all its components are removed regardless of the current state. Do not start a full clean up
operation while vMotion is still migrating a virtual machine.
alltype
Queries all active instant access and instant restore sessions.
mountcleanupall
Cleans up active VM file level restore mount operations that are older than the period specified with
the vmmountage option. You must specify restore vm "*" to use the mountcleanupall option.
578 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples for VMware VMs
Command line:
Perform an instant access of the VM named Oslo. The original VM still exists. As a result, the -vmname
option is used to assign the new name Oslo_verify.
Perform a regular (full VM) restore of the virtual machine named San_Jose.
Alternatively, you can also use the following command: dsmc restore vm San_Jose -
vmrest=noni
Perform an instant restore of the VM named Oslo, with the -pick option to choose a specific backup
version.
Perform a cleanup of the VM and all its components. These components include iSCSI mounts,
devices, and temporary data that are associated with the VM name, on the ESX host.
Perform a query to find all active instant restore sessions and display an abbreviated status for each.
Perform a query to find all active instant restore mode and instant access mode virtual machines.
Perform a query to find all active instant restore mode virtual machines, and obtain detailed status for
each virtual machine.
Perform a mount cleanup of all mount operations that are active longer than 24 hours.
Related reference
“Scenarios for running full VM instant access and full VM instant restore from the backup-archive client
command line” on page 203
Full VM instant access and full VM instant restore operations require a license for IBM Spectrum Protect
for Virtual Environments. You can perform either of these operations from the backup-archive client
command line. Instant access and instant restore operations and options are supported only for VMware
virtual machines that are hosted on VMware ESXi 5.1 servers, or later versions.
compression yes
vmskipctlcompression yes
You must direct the data files to a storage pool that is enabled for client-side deduplication. You can
direct the control files to a storage pool that is not enabled for client-side deduplication
You must be licensed to use IBM Spectrum Protect for Virtual Environments to use this option.
Supported Clients
This option can be used with supported Windows and Linux clients.
Options file
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
Yes
VMSKIPCTLCOMPRESSION
No
Parameters
Yes
Do not compress control files (*.ctl) during VM backup. The option does not affect compression of
data files (*.dat).
No
Control files (*.ctl) can be compressed during VM backup. Whether control files are compressed
depends on the value of the compression option.
Vmskipmaxvirtualdisks
The vmskipmaxvirtualdisks option specifies how backup operations process virtual machine (VM)
disks that exceed the maximum disk size.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Use the vmskipmaxvirtualdisks option with the vmmaxvirtualdisks option to specify how the
data mover processes large VM disks during a backup operation:
• Set the vmskipmaxvirtualdisks option to back up the VM disks that do not exceed the maximum
size (and exclude any VM disks that exceed the size), or fail the operation.
• Set the vmmaxvirtualdisks option to specify the maximum size of the VM disks to include.
In Data Protection for VMware V7.1.3 and earlier, the vmskipmaxvirtualdisks option was named
vmskipmaxvmdks. In V7.1.4 and later, vmskipmaxvirtualdisks is the preferred option name.
However, the client still processes backup operations with the vmskipmaxvmdks name.
580 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported clients
This option is valid for 64-bit Windows clients that are configured as data movers that back up VMware
virtual machines.
Options file
Set the vmskipmaxvirtualdisks option in the client options file (dsm.opt). You can also specify this
option as a command-line parameter on the backup vm command.
Syntax
No
VMSKIPMAXVIRTUALDISKS
Yes
Parameters
No
Specifies that backup operations fail if a virtual machine has one or more VM disks that are larger than
the maximum size. This setting is the default value.
Yes
Specifies that backup operations include VM disks that are the maximum size (or smaller) and exclude
any VM disks that are larger than the maximum size.
Examples
Options file:
vmskipmaxvirtualdisks yes
Command line:
Fail a backup operation if a VM disk is larger than 2 TB:
Back up VM disks that are 8 TB or smaller and exclude VM disks that are larger than 8 TB:
Vmskipmaxvmdks
The vmskipmaxvmdks option specifies how the backup operation processes VMware virtual machine
disks (VMDKs) that exceed the maximum disk size.
In V7.1.4 and later, vmskipmaxvmdks is renamed vmskipmaxvirtualdisks. Although
vmskipmaxvirtualdisks is the preferred name, the client still processes backup operations with the
vmskipmaxvmdks name.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Vmstoragetype
Use the vmstoragetype option with the restore VM command to specify the storage device type from
which the snapshot is mounted with IBM Spectrum Protect recovery agent.
You can specify the vmstoragetype option with the restore VM -
VMRESToretype=INSTANTRestore or restore VM -VMRESToretype=INSTANTAccess commands.
Supported Clients
This option is valid on Windows only.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options File
Place this option in the client options file (dsm.opt) on the Windows mount proxy system, or on the
command line.
Syntax
DISK
VMSTORAGEType VTL
TAPE
Parameters
DISK
The snapshots to be mounted by the recovery agent are on Disk or File storage pools. This value is the
default.
VTL
The snapshots to be mounted by the recovery agent are on VTL storage pools.
TAPE
The snapshots to be mounted by the recovery agent are on Tape storage pools.
Examples
Options file:
VMSTORAGETYPE TAPE
Command line:
Restore a virtual machine that is named Orion by using the following command:
This command specifies the name of the virtual machine to restore, the host and data center to
restore it to, and the restore type (-VMRESToretype=INSTANTRestore). The -
VMSTORAGEType=VTL option identifies the snapshot (Orion) that is to be mounted by the recovery
agent is on VTL storage pools. The VMTEMPDAtastore option is a mandatory parameter for instant
restore operations.
Vmtagdatamover
Use the vmtagdatamover option to enable tagging support in the backup-archive client (data mover).
When this option is enabled, the client manages backups of virtual machines in VMware inventory objects
according to the data protection tags that are set by the IBM Spectrum Protect vSphere Client plug-in of
the vSphere Web Client, or set with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
582 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For more information about data protection tags, see "Data protection tagging overview" .
The data mover processes data protection tags when the vmtagdatamover option is set to yes. Ensure
that the following requirements are met.
Requirements:
• For the data mover:
– VMware vCenter Server must be at Version 6.0 Update 1 or later.
– Extra permissions are required for the account that is used for backup or restore operations. These
new vCenter permissions are required to perform category and tagging operations. Ensure that the
following user permissions are set on the root vCenter Server:
Inventory Service > vSphere Tagging > Assign or Unassign vSphere Tag
Inventory Service > vSphere Tagging > Create vSphere Tag
Inventory Service > vSphere Tagging > Create vSphere Tag Category
Inventory Service > vSphere Tagging > Delete vSphere Tag
Inventory Service > vSphere Tagging > Delete vSphere Tag Category
Inventory Service > vSphere Tagging > Modify UsedBy Field For Tag
Inventory Service > vSphere Tagging > Modify UsedBy Field For Category
Inventory Service > vSphere Tagging > Edit vSphere Tag
Inventory Service > vSphere Tagging > Edit vSphere Tag Category
For more information about setting vCenter permissions for backup and restore operations, see
technote 7047438.
• In order for the Data Protection for VMware vSphere GUI to function correctly with tagging support,
ensure that the following requirements are met during the installation of the GUI:
– At least one data mover and the Data Protection for VMware vSphere GUI must be installed on the
same server. This data mover node must be configured so that the vCenter server credentials are
saved. You can save the credentials by running the configuration wizard to save the data mover node
password, or by using the dsmc set password command in the data mover command line.
If you use other data movers, running on virtual machines or physical machines as additional data
movers, you can install them on other servers. For tagging support, all these data movers must also
be configured with the vmtagdatamover=yes option. These additional data movers do not require
the Data Protection for VMware vSphere GUI to be installed on the same server in order for them to
work correctly as tag-based data movers.
Supported clients
This option can be used with supported Windows 64-bit clients.
Options file
You can specify this option in the client options file (dsm.opt) or on the command line for the backup
vm command. You can also include this option on the IBM Spectrum Protect server in a client option set.
You cannot set this option in the Preferences Editor.
Syntax
No
VMTAGDATamover
Yes
Parameters
No
The client ignores any data protection settings or tags that are attributed to the VMware asset. This
value is the default.
DOMAIN.VMFULL VMHOSTCLUSTER=cluster01,cluster02;VM=Dept20*
If you use data protection settings or tags to exclude virtual machine Dept204, the Dept204 virtual
machine is not backed up.
• The retention policy setting in the IBM Spectrum Protect vSphere Client plug-in or the tag setting for
the Management Class (IBM Spectrum Protect) category overrides the include.vm and
vmmc client options, but does not override the vmctlmc option.
Tip: If you want to set up a data mover as the default data mover, use the Vmtagdefaultdatamover
option.
Examples
Options file:
vmtagdat yes
Command line:
-vmtagdat=yes
Related concepts
“Data protection tagging overview” on page 739
To manage data protection of virtual machines, you can assign IBM Spectrum Protect tags to VMware
inventory objects. You can assign tags to VMware objects by specifying data protection settings in the
IBM Spectrum Protect vSphere Client plug-in of the vSphere Web Client. If you do not use the IBM
Spectrum Protect vSphere Client plug-in, you can assign tags by using scripting tools such as VMware
Power CLI.
Related reference
“Supported data protection tags” on page 739
IBM Spectrum Protect data protection tags can be assigned to VMware inventory objects to control how
virtual machine backups are managed.
“Vmtagdefaultdatamover” on page 585
Use the vmtagdefaultdatamover option to protect virtual machines, defined in a schedule, that do not
have an assigned or inherited Data Mover category and tag.
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Include.vm” on page 413
For virtual machine operations, this option overrides the management class that is specified on the vmmc
option.
“Vmmc” on page 571
584 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Use the vmmc option to store virtual machine backups by using a management class other than the
default management class. For VMware VM backups, the vmmc option is valid only if the
vmbackuptype=fullvm option is set.
“Vmctlmc” on page 550
This option specifies the management class to use when backing up virtual machine control files.
“Set Vmtags” on page 737
The set vmtags command creates data protection tags and categories that can be added to VMware
inventory objects. You can manage IBM Spectrum Protect backups of virtual machines in these VMware
objects by specifying the tags with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
Related information
Enabling tagging support
Vmtagdefaultdatamover
Use the vmtagdefaultdatamover option to protect virtual machines, defined in a schedule, that do not
have an assigned or inherited Data Mover category and tag.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
When you specify a data mover node with the vmtagdefaultdatamover option and the
vmtagdatamover yes option, the data mover backs up any new virtual machines that are added to any
container in the datacenter, if the container is already in a protection set. A protection set consists of the
virtual machines in a container that is assigned the Schedule (IBM Spectrum Protect) category
and tag. The default data mover also backs up any virtual machines in the protection set that are not
assigned the Data Mover tag.
When more than one data mover is associated with a schedule, define one data mover as the default data
mover with the vmtagdefaultdatamover option. If only one data mover is associated with a schedule,
assign that data mover as the default.
Tip: For each schedule, specify only one data mover in its associated data mover list as the default.
Otherwise, any new virtual machines and virtual machines that are not assigned the Data Mover tag will
be backed up more than once.
Data protection tags can be assigned to the vSphere inventory to manage the protection of virtual
machines. For the list of supported categories and tags, see "Supported data protection tags".
Supported clients
This option can be used with supported Windows 64-bit data movers.
Options file
You can specify this option in the client options file (dsm.opt) or on the command line for the backup
vm command. You can also include this option on the IBM Spectrum Protect server in a client option set.
You cannot set this option in the Preferences Editor.
Syntax
No
VMTAGDEFAULTdatamover
Yes
dm_name
Example
Your Windows Data Protection for VMware configuration uses two data movers, VC1_DC1_DM1 and
VC1_DC1_DM2. To designate data mover VC1_DC1_DM1 as the default data mover, complete the
following steps:
1. In the options file for data mover VC1_DC1_DM1 (dsm.VC1_DC1_DM1.opt), add the following
statements:
vmtagdatamover yes
vmtagdefaultdatamover yes
or
vmtagdatamover yes
vmtagdefaultdatamover VC1_DC1_DM1
2. In the options file for data mover VC1_DC1_DM2 (dsm.VC1_DC1_DM2.opt), add the following
statements:
vmtagdatamover yes
vmtagdefaultdatamover VC1_DC1_DM1
The vmtagdefaultdatamover option can also be passed to a schedule definition or command to assign
the default data mover. If the default data mover is defined in the schedule definition, all data movers
that are associated with the schedule will be able to identify the default data mover for the protection set.
For example: dsmc backup vm -vmtagdefaultdatamover=VC1_DC1_DM1
Related reference
“Domain.vmfull” on page 362
The domain.vmfull option specifies the virtual machines (VMs) to include in your full virtual machine
image backup operations.
“Vmtagdatamover” on page 582
Use the vmtagdatamover option to enable tagging support in the backup-archive client (data mover).
When this option is enabled, the client manages backups of virtual machines in VMware inventory objects
according to the data protection tags that are set by the IBM Spectrum Protect vSphere Client plug-in of
the vSphere Web Client, or set with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
“Set Vmtags” on page 737
586 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The set vmtags command creates data protection tags and categories that can be added to VMware
inventory objects. You can manage IBM Spectrum Protect backups of virtual machines in these VMware
objects by specifying the tags with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
Related information
Enabling tagging support
Vmtempdatastore
Use the vmtempdatastore option with the restore VM command to define a temporary datastore on
the ESX host for an instant restore operation.
The datastore created with the vmtempdatastore option is used to temporarily store the configuration
of the VM created during restore processing. This option is required during instant restore operations (-
vmrestoretype=instantrestore).
This option is only valid for VMware virtual machines. The virtual machines must be hosted on VMware
ESXi 5.1 servers, or later versions. To use this option, you must have a license agreement to use IBM
Spectrum Protect for Virtual Environments: Data Protection for VMware.
Supported Clients
This option can be used with supported Windows clients.
Options file
Place this option in the client options file (dsm.opt), or on the command line.
Syntax
VMTEMPDAtastore datastore_name
Parameters
datastore_name
Specify the name of an existing datastore on the ESX host. The temporary datastore must be different
from the original datastore, or the datastore specified by the datastore option. The datastore that
you specify must be a VMFS datastore.
Examples
Options file:
VMTEMPDAtastore Verify_Datastore
Command line:
Vmverifyifaction
Use this option to specify the action to perform if the data mover detects integrity problems with the
latest CTL and bitmap files for a virtual machine.
This option affects backup processing for a VM guest only when all of the following conditions are true:
• The previous backup operation for the VM guest was an incremental-forever-incremental backup
(mode=ifincremental)
• The current backup operation for the VM guest is an incremental-forever-incremental backup
• The data mover detected an integrity problem with the CTL and bitmap data from the previous
incremental-forever-incremental backup operation
• The vmverifyiflatest option is set to yes
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option is valid for Windows clients that act as a data mover for VMware guest backups.
Options file
Set this option in the client options file (dsm.opt).
This option can also be included in a client options set, as a parameter on a backup vm command, or on
the options parameter in a schedule definition.
Syntax
FAILbackup
VMVERIFYIFAction
FORCEfull
PREview
Parameters
FAILbackup
This action fails the backup operation. The following messages are written to the data mover error log
file (dsmerror.log):
ANS9921E Virtual machine disk, vm_name (disk_label),
verification check failed (xxx/yyy).
The xxx/yyy in the message indicate the size of the bitmap (xxx) and CTL files (yyy).
ANS9919E Failed to find the expected control files for vm_name
Perform a full VM backup (set -mode=IFFull for the affected virtual machines at a time of your
choosing. An alternative is to use the -vmverifyifaction=forcefull on the next scheduled
incremental-forever-incremental operation to force a full backup of those VMs, if you determine that
your scheduled backup window can contain the full VM backups for these VMs. This value is the
default action value.
FORCEfull
This action changes the backup mode from -mode=ifincremental to -mode=iffull; the current
backup becomes a full VM backup. The full VM backup is initiated for you. The following messages are
written to the data mover error log file (dsmerror.log):
ANS9921E Virtual machine disk, vm_name (disk_label),
verification check failed (xxx/yyy)
The xxx/yyy in the message indicate the size of the bitmap (xxx) and CTL files (yyy).
ANS9919E Failed to find the expected control files for vm_name
Use this option if your current backup window can contain a full VM backup of the affected virtual
machines.
PREview
This action does not perform any backups. Instead, the CTL and bitmap data for each VM guest that is
processed by the backup vm command is restored to a temporary location, where it is checked for
588 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
integrity. If the integrity check fails, the following messages are written to the data mover error log file
(dsmerror.log):
ANS9921E Virtual machine disk, vm_name (disk_label),
verification check failed (xxx/yyy)
The xxx/yyy in the message indicate the size of the bitmap (xxx) and CTL files (yyy).
ANS9919E Failed to find the expected control files for vm_name
ANS9922I VMVERIFYIFlatest is enabled for vm_name (action: PREVIEW)
Vmverifyiflatest
This option applies only to VMware virtual machine (VM) backup operations that use the incremental-
forever-incremental backup mode (that is, a backup vm command with -mode=IFIncremental
specified). If this vmverifyiflatest option is enabled, the data mover runs an integrity check on the
CTL and bitmap files that were created on the server during the last backup, if the last backup was an
incremental-forever-incremental backup.
If the files pass the integrity tests, the virtual machine is restorable. The current backup proceeds and
adds another snapshot to the chain of snapshots for the virtual machine.
If the files fail the integrity tests, the virtual machine is not restorable. The data mover then performs
another action, which you specified on the vmverifyifaction option. You can set vmverifyifaction
to create a full VM backup immediately, or you can fail the backup completely, and run a full VM backup at
another time. A third parameter can be set to just verify the CTL and bitmap files for a virtual machine,
without creating a new backup snapshot.
Verification can be performed only if the previous backup operation for the VM used mode=IFIncr, and if
the current backup operation also uses mode=IFIncr. This option has no effect on the other virtual
machine backup modes.
Important:
If this option is set to no, VM backup processing continues without any verification tests. The processing
resources that are involved in performing the integrity checks is negligible. To ensure the continued
integrity of your incremental-forever-incremental backup chain, set or use the default value
(vmverifyiflatest yes). Do not set this option to no, unless you are directed to do so, by IBM
support.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Supported clients
This option is valid for Windows clients that act as a data mover for VMware guest backups.
Options file
Set this option in the client options file (dsm.opt).
This option can also be included in a client options set, as a parameter on a backup vm command, or on
the options parameter in a schedule definition.
Parameters
YES
This setting specifies that validation of the CTL and the bitmap data is performed for each VM that is
processed by the current incremental-forever-incremental (mode=IFIncr) backup operation, if the
previous backup operation for that VM was also an incremental-forever-incremental backup. This
value is the default value.
NO
This setting specifies that validation of CTL and bitmap data does not occur during incremental-
forever-incremental backup processing. Do not set this value unless directed to do so by IBM support.
Examples
Options file:
vmverifyiflatest yes
Command line:
dsmc backup vm vm1 -mode=ifincremental –vmverifyiflatest=yes
Vmvstorcompr
The vmvstorcompr option controls the use of compression by IBM Spectrum Protect client during
backup and restore operations.
Use this option to increase transport performance by using the NBD (Network Block Device) protocol.
Three types of compression are available: ZLIB, FASTLZ, and SKIPZ. To use compression, you must set
the transport option to NBDSSL with the Vmvstortransport option.
NBDSSL compression is available with vSphere 6.5 and above.
Supported clients
This option can be used with supported Windows clients. This option is not valid for Data Protection for
Microsoft Hyper-V.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Options file
This option is valid in the client options file (dsm.opt) or on the command line for Backup VM. It can also
be included on the server in a client option set. It cannot be set in the Preferences Editor.
Syntax
VMVSTORCOMPR
ZLIB
FASTLZ
SKIPZ
590 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
ZLIB
Sets the type of compression to ZLIB with NBDSSL transport.
FASTLZ
Sets the type of compression to FASTLZ with NBDSSL transport.
SKIPZ
Sets the type of compression to SKIPZ with NBDSSL transport.
Examples
Command line:
To set the type of compression and transport mode for VM backup and restore operations with
NBDSSL transport, issue the following command:
This example backs up the VM myVM using the SKIPZ compression protocol with the required
transport setting of NBDSSL.
Options file:
VMVSTORCOMPR SKIPZ
Related reference
“Backup VM” on page 622
“Vmvstortransport” on page 591
The vmvstortransport option specifies the preferred transports order (hierarchy) to use when backing
up or restoring VMware virtual machines. If you do not include a given transport using this option, that
transport is excluded and is not used to transfer data.
Vmvstortransport
The vmvstortransport option specifies the preferred transports order (hierarchy) to use when backing
up or restoring VMware virtual machines. If you do not include a given transport using this option, that
transport is excluded and is not used to transfer data.
The transport order that you specify determines how the VMware API for Data Protection (VADP)
accesses virtual disk data, but it does not influence the data path that is used between the backup-
archive client and the IBM Spectrum Protect server. Valid transports include any order or combination of
the following options:
nbd
Network based data transfer. Access virtual disk data using the LAN. This transport path is generally
available in all configurations.
nbdssl
Same as nbd, but the data is encrypted before being sent over the LAN. Encryption can decrease
performance.
san
Storage Area Network transfer: Access virtual disk data using the SAN.
hotadd
If you use the backup-archive client in a virtual machine, the hotadd transport allows the transport of
backed up data to dynamically added storage.
Separate each transport option from the others with a colon, for example, san:nbd:nbdssl:hotadd.
If you do not specify a transport hierarchy, the default transport selection order is
san:hotadd:nbdssl:nbd.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
Set this option in the client options file (dsm.opt).
Supported clients
This option is valid for Windows clients that are configured to back up or restore virtual machine files
using VADP.
Syntax
,
VMVSTORTransport ---
NBD
NBDSSL
SAN
HOTADD
Examples
If the SAN is available, do not transport backups or restores over the LAN
VMVSTORTRANSPORT san
The backup-archive client is running in a virtual machine, but do not use the hotadd transport
VMVSTORTRANSPORT nbdssl:nbd
Use the LAN transport, even if nbdssl is available, to obtain better performance
VMVSTORTRANSPORT nbd
The SAN transport is preferred, but use nbd when the SAN is not available, and do not use nbdssl or
hotadd
VMVSTORTRANSPORT san:nbd
Related reference
“Vmvstorcompr” on page 590
The vmvstorcompr option controls the use of compression by IBM Spectrum Protect client during
backup and restore operations.
Vmtimeout
VMTIMEOut specifies the maximum time, in seconds, to wait before abandoning a backup vm operation,
when the INCLUDE.VMTSMVSS option is used to provide application protection. To use this option, the
IBM Spectrum Protect for Virtual Environments license must be installed.
Each backup vm operation that is performed on a virtual machine that is protected by a
INCLUDE.VMTSMVSS option is subject to a timer. The timer value determines how many seconds the
client should wait for the application to quiesce activity and truncate its logs so the backup can be
performed. The default time out value is sufficient for most environments. However, if your application
data cannot be backed up because the application needs additional time to prepare for the snapshot, you
can increase the time out value. This timer applies only to backup vm operations when the
INCLUDE.VMTSMVSS option is set for a virtual machine.
592 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Supported clients
This option can be used with supported Windows clients.
Options file
Place this option in the client options file. It cannot be set on the command line or in the Preferences
editor.
Syntax
180
VMTIMEout
time_out
Parameters
time_out
Specifies the time to allow, in seconds, for backup operations to complete when a virtual machine is
protected by the application protection option, INCLUDE.VMTSMVSS. The value specified must be an
integer between 180 and 500. The default is 180 seconds.
Examples
Options file
VMTIMEout 500
Command line
Not applicable; this option cannot be set on the command line.
Related reference
“INCLUDE.VMTSMVSS” on page 421
The INCLUDE.VMTSMVSS option notifies virtual machine applications that a backup is about to occur.
This option allows the application to truncate transaction logs and commit transactions so that the
application can resume from a consistent state when the backup completes. An optional parameter can
be specified to suppress truncation of the transaction logs.
Vssaltstagingdir
The vssaltstagingdir option specifies the fully qualified path that contains the system exclude cache
and temporary data for VSS snapshot operation.
The backup-archive client determines the path for temporary VSS files from the following prioritized
choices:
1. The vssaltstagingdir option is defined in the dsm.opt file.
2. The c:\adsm.sys directory exists and is not empty.
3. If the vssaltstagingdir is not defined and the c:\adsm.sys directory does not exist, the client
gets the path from a registry key. The path for temporary VSS files is the DefaultVssStagingDir
value, and is generated from the Path value under the HKLM\SOFTWARE\IBM\ADSM
\CurrentVersion\BackupClient key. After the DefaultVssStagingDir value is created, the
value is not changed if the client is reinstalled to a new location.
Supported Clients
This option is valid for all Windows clients.
Options File
Place this option in the client options file (dsm.opt).
Parameters
filepath
Specify the fully qualified path for temporary files that are related to VSS snapshot operations. If any
part of the path does not exist, the backup-archive client attempts to create it. The default value is the
client installation directory.
In Uniform Naming Convention (UNC) format, the path must contain a drive letter. In the following
UNC format example, the path contains the drive letter D$: \\computer7\D$\temp\snapshot.
Examples
Options file:
Command line:
The option is valid only on the initial command line. It is not valid in interactive mode.
Vssusesystemprovider
The vssusesystemprovider option specifies whether to use the Windows system provider, or to let
Windows decide the most suitable provider to use.
Use the vssusesystemprovider option for Microsoft Windows Volume Shadow Copy Service (VSS)
operations, such as system state backup or IBM Spectrum Protect for Copy Services backups.
Supported Clients
This option is valid for all Windows clients. The server can also define this option. The IBM Spectrum
Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt).
Syntax
No
VSSUSESYSTEMProvider
Yes
Parameters
Yes
Specifies that the Microsoft Windows VSS system provider is used.
No
Specifies that the default system provider is used. This provider might or might not be the same as the
system provider, depending on what other providers are installed on the system. Use no if you want to
use the default system provider and the default system provider is not the Microsoft Windows VSS
provider. No is the default.
594 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Options file:
vssusesystemprovider yes
Command line:
Does not apply.
Webports
The webports option enables the use of the web client outside a firewall.
The webports option enables the use of the web client outside a firewall by specifying the TCP/IP port
number used by the IBM Spectrum Protect client acceptor service and web client agent service for
communications with the web client.
Values for both the client acceptor service and the web client agent service are required.
If you do not specify this option, the default value, zero (0), is used for both ports. This causes TCP/IP to
randomly assign a free port number for the client acceptor service and the web client agent service.
Supported Clients
This option is valid for all clients. The IBM Spectrum Protect API does not support this option.
Options File
Place this option in the client options file (dsm.opt). To set this option in the Client Preferences editor,
click Edit > Client Preferences > Web Client , and specify the ports in the Web Agent Port and Web
Client Acceptor Port fields.
Syntax
WEBPorts cadport agentport
Parameters
cadport
Specifies the required client acceptor service port number. The range of values is 1000 through
32767. If a value is not specified, the default, zero (0), causes TCP/IP to randomly assign a free port
number.
agentport
Specifies the required web client agent service port number. The range of values is 1000 through
32767. If a value is not specified, the default, zero (0), causes TCP/IP to randomly assign a free port
number.
Examples
Options file:
webports 2123 2124
Command line:
delete archive “Delete Archive” Deletes archived files from IBM Spectrum Protect server storage.
on page 631
598 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 61. Commands (continued)
Command Description
query node “Query Node” on Displays all the nodes for which an administrative user ID has
page 672 authority to perform operations.
query options “Query Options” Displays all or part of your options and their current settings.
on page 673
query restore “Query Restore” Displays a list of your restartable restore sessions in the server
on page 674 database.
query schedule “Query Displays information about scheduled events for your node.
Schedule” on page 675
query session “Query Session” Displays information about your session, including the current
on page 675 node name, when the session was established, server information,
and server connection information.
query systeminfo “Query Gathers IBM Spectrum Protect system information and outputs
Systeminfo” on page 676 this information to a file or the console.
query systemstate “Query Displays information about the backup of the system state on the
Systemstate” on page 678 IBM Spectrum Protect server. This command is valid for all
supported Windows clients.
query vm “Query VM” on page Verifies the successful backups of the virtual machines from the
679 vStorage backup server.
restart restore “Restart Displays a list of restartable restore sessions from which you can
Restore” on page 683 one to restart.
restore “Restore” on page 684 Restores copies of backup versions of your files from the IBM
Spectrum Protect server.
restore adobjects “Restore Restores individual Active Directory objects from the local Active
Adobjects” on page 691 Directory Deleted Objects container.
restore backupset “Restore Restores a backup set from the IBM Spectrum Protect server or a
Backupset” on page 693 local file. On those clients that support tape devices, this
command can restore a backup set from a tape device.
restore group “Restore Group” Restores specific members or all members of a group backup.
on page 699
restore image “Restore Image” Restores a file system or raw volume image backup.
on page 701
restore nas “Restore NAS” on Restores the image of a file system belonging to a Network
page 704 Attached Storage (NAS) file server.
restore systemstate “Restore Restores a backup of the system state. This command is
Systemstate” on page 706 deprecated for online system restore operations. For more
information, see “Restore Systemstate” on page 706.
restore vm “Restore VM” on Restores a full VM backup, and returns the full VM backup files to
page 706 the vmbackdir directory on the vStorage backup server.
retrieve “Retrieve” on page Retrieves copies of archived files from the IBM Spectrum Protect
718 server.
schedule “Schedule” on page Starts the client scheduler on the workstation.
722
set event “Set Event” on page Allows you to specify the circumstances for when archived data is
729 deleted.
set netappsvm Set Netappsvm Associates the login credentials for a cluster management server
with a NetApp storage virtual machine and the data SVM name
(data Vserver). This command must be entered before you can
create a snapshot difference incremental backup of a clustered
NetApp volume.
set password “Set Password” on Changes the IBM Spectrum Protect password for your workstation.
page 732
For proper operation, the was node must be restored to the same location and under the same name.
Important: To avoid problems, restore your data at the Network Deployment Manager node or
Application Server node level only.
Related reference
“Reading syntax diagrams” on page xxii
To read a syntax diagram for entering a command, follow the path of the line. Read from left to right and
from top to bottom.
600 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
When you enter a single command in batch mode, precede it with the executable program name, dsmc.
For example, to process the incremental command in batch mode, you would enter:
dsmc incremental
The backup-archive client prompts you each time you enter a command if the passwordaccess option is
set to prompt and authentication on the server is set to On. Type your password and press Enter.
You can also enter your password using the password option with a command, but your password
appears on the screen. For example, if your password is secret, enter:
If you set the passwordaccess option to generate in your dsm.opt file, you do not need to specify the
password with the command. The client only prompts you for your password if you are registering your
workstation with a server or manually changing your password.
Related concepts
“Processing options” on page 283
You can use defaults for processing client options or you can tailor the processing options to meet your
specific needs. Read about an overview of processing options and explore the options reference that
provides detailed information about each option.
Command name
The first part of a command is the command name. The command name consists of a single word, such as
help or schedule, or an action word and an object for that action, such as query archive.
Enter the full command name, or its minimum abbreviation.
For example, you can enter any of the following versions of the query schedule command:
query schedule
q sc
q sched
query sc
Parameters
Commands can have required parameters, optional parameters, or no parameters at all.
Required parameters provide information to perform a task. The most commonly required parameter is a
file specification.
For example, if you want to archive a file named budget.fin from the project directory, you would
enter the following:
Some commands have optional parameters. If you do not enter a value for an optional parameter, the
backup-archvie client uses the default value. For example, the restore command includes a required
parameter, sourcefilespec, that specifies the path and file name in storage that you want to restore.
The optional parameter, destinationfilespec, specifies the path where you want to place the
restored files. If you do not specify the destinationfilespec, by default, the client restores the files
to the original source path. If you want to restore the files to a different directory, enter a value for
destinationfilespec.
Example: Restore the file c:\project\budget.fin to the new path c:\newproj\newbudg.fin
602 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
File specification syntax
There are some syntax rules that you need to know about when entering file specification parameters
such as filespec, sourcefilespec, and destinationfilespec.
The following are the syntax rules:
• Do not use wildcards as part of the file space name or anywhere in the destinationfilespec. The
one exception to this rule is the set access command where wildcards are permitted in the two
lowest levels of the file spec.
Example: Allow access to all files in all directories in and subordinate to the d:\test directory:
The following example illustrates these two rules. Even though mydir and yourdir are directories, the
command will fail because \* is implied after mydir, and yourdir is considered a file.
• If a file specification does not begin with a directory delimiter, the file specification is assumed to be a
subdirectory of the current working directory. The client appends the file specification to the working
directory to build the complete path.
For example, if the current working directory is c:\home\me and the command is dsmc res c:\fs
\dir1\ mydir\, the complete restore path is this: c:\home\me\mydir
• When a file specification contains spaces, it must be enclosed in quotation marks. For example:
When a file specification ends with a backslash and is enclosed in quotation marks, an extra backslash
(\) must be added to the end of the file specification. If an extra backslash is not added, the filespec will
not be processed correctly, and the operation might cause unexpected results.
The following example is incorrect:
Here is an example of restoring the contents of one directory to another, when both directory names
contain spaces:
• Microsoft Dfs volumes are accessed using the standard UNC names. The following are examples of valid
syntax to access MS Dfs volumes:
\\Server_Name\Dfs_Root_Name\path
\\Fault_Tolerant_Name\Dfs_Root_Name\path
Related reference
“Filelist” on page 393
Use the filelist option to process a list of files.
Wildcard characters
Use wildcard characters when you want to specify multiple files with similar names in one command.
Without wildcard characters, you must repeat the command for each file.
In a command, you can use wildcard characters in the file name or file extension only. You cannot use
them to specify destination files, file systems, or server names. You cannot specify a directory whose
name contains an asterisk (*) or a question mark (?).
Valid wildcard characters that you can use include:
*
Asterisk. Matches zero or more characters.
?
Question mark. Matches any single character at the present position.
The following table shows examples of each wildcard.
Important: Use an asterisk (*) instead of a question mark (?) as a wildcard character when trying to
match a pattern on a multibyte code page, to avoid unexpected results.
604 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Client commands reference
The following sections contain detailed information about each of the backup-archive client commands.
Information for each command includes the following information:
• A description of the command.
• A syntax diagram of the command.
• Detailed descriptions of the command parameters. If the parameter is a constant (a value that does not
change), the minimum abbreviation appears in uppercase letters.
• Examples of using the command.
Archive
The archive command archives a single file, selected files, or all files in a directory and its
subdirectories on a server.
Archive files that you want to preserve in their current condition. To release storage space on your
workstation, delete files as you archive them using the deletefiles option. Retrieve the archived files
to your workstation whenever you need them again.
Use the snapshotroot option with the archive command along with an independent software vendor
application that provides a snapshot of a logical volume to associate the data on the local snapshot with
the real file space data that is stored on the IBM Spectrum Protect server. The snapshotroot option
does not provide any facilities to take a volume snapshot, only to manage data that is created by a volume
snapshot.
Supported Clients
This command is valid for all clients.
Syntax
Archive filespec
options
Parameters
filespec
Specifies the path and name of the file you want to archive. Use wildcard characters to include a
group of files or to include all files in a directory.
To include multiple file specifications, separate eachfilespec parameter with a space character. If
multiple file specifications are included, and two or more of the specifications have common parent
directories, then it is possible for the common directory objects to be archived more than once. The
conditions under which this behavior occurs are runtime-dependent, but the behavior itself has no
adverse effects.
For example, if the filespec is C:\proposals\drafts\ice.doc C:\proposals\drafts
\fire.doc, then C:\proposals and C:\proposals\drafts might be archived twice. The file
objects ice.doc and fire.doc are archived only once.
If you want to avoid including the shared parent directory more than once, use separate, non-
overlapping archive commands to archive each file specification.
If you archive a file system, include a trailing slash (C:\).
Examples
Task
Archive a single file that is named budget.jan in the c:\plan\proj1 directory.
Command: archive c:\plan\proj1\budget.jan
Task
Archive all files in the c:\plan\proj1 directory with a file extension of .txt.
Command: archive c:\plan\proj1\*.txt
Task
Archive all files in the c:\ drive.
Command: archive -subdir=yes c:\*.*
606 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Archive all files in the Microsoft Dfs volume, MyDfsVolume. You must specify subdir=yes to archive all
files in the volume.
Command: archive \\myserver\mydfsroot\mydfsvolume\*.* -subdir=yes
Task
Assuming that you initiated a snapshot of the C:\ drive and mounted the snapshot as \\florence\c
$\snapshots\snapshot.0, archive the c:\dir1\sub1 directory tree from the local snapshot and
manage it on the IBM Spectrum Protect server under the file space name C:.
Command: dsmc archive c:\dir1\sub1\* -subdir=yes -snapshotroot=\\florence\c$
\snapshots\snapshot.0
Related tasks
“Configuring Open File Support” on page 72
You configure Open File Support (OFS) after you install the Window client.
Related reference
“Include options” on page 407
The include options specify objects that you want to include for backup and archive services.
“Snapshotproviderfs” on page 506
Use the snapshotproviderfs option to enable snapshot-based file backup and archive operations, and
to specify a snapshot provider.
Archive FastBack
Use the archive fastback command to archive Tivoli Storage Manager FastBack volumes specified by
the fbpolicyname, fbclientname and fbvolumename options for long-term retention.
Before using this command, configure the client to back up and archive Tivoli Storage Manager FastBack
data. Also, before you issue this command, at least one snapshot should exist in the FastBack repository
for the FastBack policy being archived or backed up.
If a policy specification contains both Windows and Linux FastBack clients, only the Windows volumes
will be backed up or archived to the IBM Spectrum Protect server by the Windows backup-archvie client.
You can use Tivoli Storage Manager FastBack options to archive the latest snapshots of the following
volumes:
• All clients and volumes associated with a specific FastBack policy or a list of FastBack policies.
Supported Clients
This option is valid for all Windows clients that are configured as FastBack dedicated proxies. This
command is also valid for Windows clients that are installed on the FastBack server workstation, or the
FastBack Disaster Recovery Hub.
Syntax
,
FBClientname = name
FBVolumename = name
ARCHMc = name
Important:
1. At least one FBpolicyName is always required.
2. You can specify up to 10 values for FBPolicyName, if no values are specified for both FBClientName
and FBVolumeName.
3. When you specify a FBClientName value, there must be only one value for FBPolicyName.
4. You can specify up to 10 values for FBClientName if only one PolicyName is specified, and no values
for FBVolumeName are specified.
5. When you specify the FBVolumeName option, you can have only one FBPolicy, and only one
FBCLientName specified.
6. You can specify multiple FBVolumeNames if condition 5 is satisfied.
7. You must always specify the FBReposLocation option for Linux.
Parameters
608 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 64. Archive FastBack command: Related options (continued)
Option Where to use
fbclientname Command line and scheduler.
“Fbclientname” on page 387
fbvolumename Command line and scheduler.
“Fbvolumename” on page
392
fbreposlocation Command line and scheduler.
“Fbreposlocation” on page
389
fbbranch “Fbbranch” on Command line and scheduler.
page 386
archmc “Archmc” on page Command line and scheduler.
311
Examples
Command line:
The backup-archive client is installed on the FastBack server. Use this command to archive all
FastBack volumes for all Windows FastBack clients that are defined for FastBack policy1:
The repository location is not required. If you provide the repository location, it is ignored.
The FastBack server name, -myfbserver, is the short host name of the FastBack server where the
client is running.
Command line:
The backup-archive client is installed on the FastBack Disaster Recovery Hub. Use this command to
archive all FastBack volumes for all FastBack clients that are found in the policy named Policy 1:
The repository location is not required. If you provide the repository location, it is ignored.
The parameter myFbServer specifies the short host name of the FastBack Server whose FastBack
branch is specified using the FBBranch option
Command line:
The backup-archive client is installed on a dedicated proxy machine with Tivoli Storage Manager
FastBack administrative command line and FastBack mount. The client is connecting to the FastBack
server repository.
Use this command to archive all FastBack volumes for all FastBack clients that are found in the policy
named Policy 1:
Related concepts
Configuring the client to back up and archive Tivoli Storage Manager FastBack data
Before you can back up or archive Tivoli Storage Manager FastBack client data, you must complete
configuration tasks.
Backup FastBack
Use the backup fastback command to back up Tivoli Storage Manager FastBack volumes specified by
the fbpolicyname, fbclientname and fbvolumename options for long-term retention.
Before using this command, configure the client to back up and archive Tivoli Storage Manager FastBack
data. Also, before you issue this command, at least one snapshot should exist in the Tivoli Storage
Manager FastBack repository for the Tivoli Storage Manager FastBack policy being archived or backed up.
If a policy specification contains both Windows and Linux FastBack clients, only the Windows volumes
will be backed up or archived to the IBM Spectrum Protect server by the Windows backup-archive client.
Tivoli Storage Manager FastBack options are supported for the incremental backup of the latest
snapshots, depending on the option specified:
• All clients and volumes associated with the FastBack policy or a list of FastBack policies.
• All volumes associated with a specific FastBack client or a list of FastBack clients for a given FastBack
policy.
• A specific volume or volumes associated with a specific FastBack client for a given FastBack policy.
Supported Clients
This command is valid for all Windows clients that are configured as Tivoli Storage Manager FastBack
dedicated proxies. This command is also valid for Windows clients that are installed on the Tivoli Storage
Manager FastBack server workstation, or the Tivoli Storage Manager FastBack Disaster Recovery Hub.
610 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
,
FBClientname = name
FBVolumename = name
BACKMc = name
Important:
1. At least one FBpolicyName is always required.
2. You can specify up to 10 values for FBPolicyName, if no values are specified for both FBClientName
and FBVolumeName.
3. When you specify a FBClientName value, there must be only one value for FBPolicyName.
4. You can specify up to 10 values for FBClientName if only one PolicyName is specified, and no values
for FBVolumeName are specified.
5. When you specify the FBVolumeName option, you can have only one FBPolicy, and only one
FBCLientName specified.
6. You can specify multiple FBVolumeNames if condition 5 is satisfied.
The repository location is not required. If you provide the repository location, it is ignored.
The FastBack server name, -myfbserver, is the short host name of the FastBack server where the
client is running.
Command line:
The backup-archive client is installed on the FastBack disaster recovery hub. Use this command to
back up all FastBack volumes for all FastBack clients that are found in the policy named Policy 1:
The repository location is not required. If you provide the repository location, it is ignored.
The FastBack server name, myFbServer, is the short host name of the FastBack server whose
FastBack branch is specified using the FBBranch option
Command line:
The backup-archive client is installed on a dedicated proxy machine with FastBack administrative
command line and FastBack mount. The client is connecting to the FastBack server repository.
Use this command to back up all FastBack volumes for all FastBack clients that are found in the policy
named Policy 1:
612 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Related concepts
Configuring the client to back up and archive Tivoli Storage Manager FastBack data
Before you can back up or archive Tivoli Storage Manager FastBack client data, you must complete
configuration tasks.
Backup Group
Use the backup group command to create and back up a group containing a list of files from one or
more file space origins to a virtual file space on the IBM Spectrum Protect server.
A group backup allows you to create a consistent point-in-time backup of a group of files that is managed
as a single logical entity. Objects in the group are subject to the following processing rules:
• Management class rebinding for grouped objects:
– During full backups, all objects in a backup group are assigned to the same management class.
– During differential backups, if a new management class is specified on an include statement for an
existing backup group, the following behavior occurs:
- Any new and changed objects in the backup group are bound to the new management class.
- Any member objects of the group that are not changed appear as though they have not been bound
to the new management class. These unchanged objects are not included in the Total number of
objects rebound statistics that are displayed when the Backup Group command completes.
- The unchanged objects are reassigned to a newly created backup group, and the new backup group
is bound to the new management class. However, the original management class name is still
displayed for the unchanged group objects.
Even though the original management class name is still displayed for the unchanged objects, they
are effectively bound to the new management class of the backup group.
• Existing exclude statements for any files in the group are ignored.
• All objects in the group are exported together.
• All objects in the group are expired together as specified in the management class. No objects in a
group are expired until all other objects in the group are expired, even when another group they belong
to gets expired.
• If you are performing full and differential group backups to a sequential device, during a restore the
data is in no more than two locations. To optimize restore time, perform periodic full backups to back up
the data to one location on the sequential media.
• During a full group backup, all objects in the filelist are sent to the server. During a differential group
backup, only data that has changed since the last full backup is sent to the server. Objects in the filelist
that have not changed since the last full backups are assigned as members of the differential group
backup. This data is not resent to the server, reducing backup time.
The backup group command requires the following options:
filelist
Specifies a list of files to add to a new group.
groupname
Specifies the fully qualified name of the group containing a list of files.
virtualfsname
Specifies the name of the virtual file space for the group on which you want to perform the operation.
The virtualfsname option cannot be the same as an existing file space name.
mode
Specifies whether you want to back up all of the files in the filelist or only files that have changed
since the last full backup.
Note:
Supported Clients
This command is valid for all Windows clients.
Syntax
Backup GRoup options
Parameters
Examples
Task
Perform a full backup of all the files in the c:\dir1\filelist1 file to the virtual file space name
\virtfs containing the group leader group1 file.
Command:
Related information
“Include options” on page 407
“Query Group” on page 666
614 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
“Restore Group” on page 699
“Delete Group” on page 637
“Query Filespace” on page 664
Backup Image
The backup image command creates an image backup of one or more volumes on your system.
You can use the backup image command to back up NTFS or ReFS, or unformatted RAW volumes. If a
volume is NTFS-formatted, only those blocks that are used by the file system are backed up. On ReFS
volumes, all blocks are backed up.
Important: The last incremental backup time refers to the server time and the file modification time
refers to the client time. If the client and server time are not synchronized, or the client and server are in
different time zones, this affects incremental-by-date backup and image backup where
mode=incremental.
The client backs up the files that have modification dates and times (on the client) that are later than the
date and time of the last incremental backup of the file system on which the file is stored (on the server).
If the server time is ahead of the client time, incremental-by-date backups, or image backup with
mode=incremental, skip the files, which had been created or modified after the last incremental or
image backup with a modification date earlier than the last incremental backup time stamp.
If the client time is ahead of the server time, all files that had been created or modified before the last
incremental or image backup and have a modification time stamp later than the last incremental backup
time stamp, are backed up again. Typically, these files would not get backed up because they had already
been backed up.
The backup date can be checked by the query filespace command.
Note:
1. The account that is running the backup-archive client must have administrator authority to
successfully perform any type of image backup.
2. The API must be installed to use the backup image command.
Use the include.image option to include a file system or logical volume for image backup, or to specify
volume-specific options for image backup.
The backup image command uses the compression option.
Supported Clients
This command is valid for all Windows platforms.
Syntax
Backup Image
options filespec
Parameters
filespec
Specifies the name of one or more logical volumes. If you want to back up more than one file system,
separate their names with spaces. Do not use pattern matching characters. If you do not specify a
volume name, the logical volumes that are specified with the domain.image option are processed. If
Examples
Task
Back up a volume that has no drive letter but is mounted as a mount point.
dsmc backup image m:\mnt\myntfs
Task
Back up the h drive by using an image incremental backup. An image incremental backup backs up
files that are new or changed since the last full image backup.
dsmc backup image h: -mode=incremental
Task
Perform an offline image backup of the f drive.
dsmc backup image f: -snapshotproviderimage=none
Task
Perform an online image backup of the f drive.
Task
Back up the f drive, which is mapped to a volume that has not been formatted with a file system.
dsmc backup image f:
616 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Related information
“Imagegapsize” on page 404
“Snapshotproviderimage” on page 507
“Configuring Open File Support” on page 72
“Image backup” on page 152
Backup NAS
The backup nas command creates an image backup of one or more file systems that belong to a
Network Attached Storage (NAS) file server, otherwise known as NDMP Backup. You are prompted for the
IBM Spectrum Protect administrator ID.
The NAS file server performs the outboard data movement. A server process starts in order to perform the
backup.
Use the nasnodename option to specify the node name for the NAS file server. The NAS node name
identifies the NAS file server to the IBM Spectrum Protect server; the NAS node name must be registered
618 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
at the server. Place the nasnodename option in your client options file (dsm.opt). The value in the client
options file is the default, but can be overridden on the command line.
Use the toc option with the backup nas command or the include.fs.nas option to specify whether
the IBM Spectrum Protect server saves Table of Contents (TOC) information for each file system backup.
If you save TOC information, you can use the QUERY TOC server command to determine the contents of a
file system backup with the RESTORE NODE server command to restore individual files or directory trees.
You can also use the IBM Spectrum Protect web client to examine the entire file system tree and select
files and directories to restore. Creation of a TOC requires that you define the tocdestination attribute
in the backup copy group for the management class to which this backup image is bound. TOC creation
requires more processing, network resources, storage pool space, and possibly a mount point during the
backup operation. If you do not save TOC information, you can still restore individual files or directory
trees using the RESTORE NODE server command, if you know the fully qualified name of each file or
directory and the image in which that object was backed up.
The toc option is only supported for images that are backed up by Version 5.2 or later client and server.
Specifying mode =differential on the BACKUP NODE server command or the backup nas command
where no full image exists, shows that a full backup was started. Using the QUERY PROCESS server
command shows that a full backup is in process.
Use the mode option to specify whether to perform a full or differential NAS image backup. A full image
backup backs up the entire file system. The default is a differential NAS image backup on files that change
after the last full image backup. If an eligible full image backup does not exist, a full image backup is
performed. If a full image exists, whether it is restorable, or expired and being maintained because of
dependent differential images, specifying mode =differential sends a differential image backup. If a full
image is sent during a differential backup, it is reflected as a full image using the QUERY NASBACKUP
server command. The QUERY NASBACKUP server command also displays NAS images that are restorable
and displays full image or differential image as the object type.
Use the monitor option to specify whether you want to monitor a NAS file system image backup and
display processing information on your screen.
Use the monitor process command to display a list of all processes for which an administrative user
ID has authority. The administrative user ID should have at least client owner authority over both the NAS
node and the client workstation node they are using either from command line or from the web.
Use the cancel process command to stop NAS backup processing.
Regardless of client platform, NAS file system specifications use the forward slash (/) separator, as in this
example: /vol/vol0.
NAS file system designations on the command line require brace delimiters {} around the file system
names, such as: {/vol/vol0}.
Supported Clients
This command is valid for all Windows clients.
Syntax
Parameters
filespec
Specifies the name of one or more file systems on the NAS file server. If you do not specify this
parameter, the backup-archive client processes all of the file systems that are defined by the
domain.nas option.
Examples
Task
Perform the NAS image backup of the entire file system.
Command: backup nas -mode=full -nasnodename=nas1 {/vol/vol0} {/vol/vol2}
Task
Perform the NAS image backup of the entire file server.
Command: backup nas -nasnodename=nas1
Task
Perform the NAS image backup of the entire file system and save Table of Contents (TOC) information
for the file system backup.
Command: backup nas -mode=full -nasnodename=netappsj {/vol/vol0} -toc=yes
Related information
“Nasnodename” on page 445
“Toc” on page 534
“Mode” on page 439
“Monitor” on page 441
“Cancel Process” on page 629
“Domain.nas” on page 361
Backup Systemstate
Use the backup systemstate command to back up all bootable system state and system services
components as a single object, to provide a consistent point-in-time snapshot of the system state.
Bootable system state components can include the following:
• Active Directory (domain controller only)
• System volume (domain controller only)
• Certificate Server Database
• COM+ database
• Windows Registry
• System and boot files
• ASR writer
620 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
System services components can include the following:
• Background Intelligent Transfer Service (BITS)
• Event logs
• Removable Storage Management Database (RSM)
• Cluster Database (cluster node only)
• Remote Storage Service
• Terminal Server Licensing
• Windows Management Instrumentation (WMI)
• Internet Information Services (IIS) metabase
• DHCP database
• Wins database
The list of bootable system state and system services components is dynamic and can change depending
on service pack and operating system features installed. The backup-archive client allows for the dynamic
discovery and backup of these components.
System state is represented by several VSS writers of type "bootable system state" and "system service".
Of these, the System Writer is the largest part of the system state in terms of number of files and size of
data. By default, the System Writer backup is incremental. You can use the
systemstatebackupmethod option to perform full backups of the System Writer. For more information,
about this option, see “Systemstatebackupmethod” on page 521. The client always backs up all other
writers in full.
This command also backs up ASR data for Windows clients; BIOS and UEFI boot architectures are
supported.
Note:
1. The system and boot files component of system state is backed up only if a member (file) of that
component has changed since the last backup. If a member changes, the entire group of files that
comprise that component are backed up.
2. The backup-archive client on Windows does not allow the backup of any individual component.
3. By default, system state backups are bound to the default management class. To bind them to a
different management class, use the include.systemstate option; specify all as the pattern, and
specify the name of the new management class.
For example: include.systemstate ALL BASVT2.
4. Use the query systemstate command to display information about a backup of the system state on
the IBM Spectrum Protect server.
5. You can no longer restore the system state on a system that is still online. Instead, use the ASR-based
recovery method to restore the system state in offline Windows PE mode. For more information, see
the following IBM Spectrum Protect wiki articles:
• Best Practices for Recovering Windows Server 2012 and Windows 8
• Best Practices for Recovering Windows Server 2012 R2 and Windows 8.1
If you try to restore the system state with the dsmc restore systemstate command, from the
backup-archive client GUI, or from the web client, the following message is displayed:
ANS5189E Online SystemState restore has been deprecated. Please use offline
WinPE method for performing system state restore.
Supported Clients
This command is valid for all supported Windows clients.
Parameters
There are no parameters for this command.
Examples
Task
Back up the system state.
Command: backup systemstate
Related information
“Preparation for Automated System Recovery” on page 150
“Query Systemstate” on page 678
“Restore Systemstate” on page 706
Backup VM
Use the backup vm command to start a full backup of a virtual machine.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
622 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
When the vmtagdatamover option is set to yes, all tags that are assigned to a virtual machine are backed
up during backup vm operations. The tags are restored when the restore vm command is run. Tags
that are assigned to other inventory objects are not backed up and cannot be restored.
For more information about data protection tags, see “Data protection tagging overview” on page 739.
A Full VM backup uses VMware Changed Block Tracking (CBT) to create content-aware (used-block only)
backups. The client enables changed block tracking (CBT) on an ESX or ESXi server when a backup
begins. VMware CBT requires an ESX 4.1 (or later) host, with virtual hardware 7 (or later). You cannot
perform incremental or full VM content-aware backups on virtual machines that do not support CBT.
When CBT is enabled, it tracks disk changes when I/O operations are processed by the ESX or ESXi server
storage stack on the following disks:
• A virtual disk that is stored on VMFS; the disk can be an iSCSI disk, a local disk, or a disk that is on a
SAN.
• A virtual disk that is stored on NFS.
• An RDM that is in virtual compatibility mode.
When I/O operations are not processed by the ESX or ESXi storage stack, changed block tracking cannot
be used to track disk changes. The following disks cannot use CBT:
• An RDM that is in physical compatibility mode.
• A disk that is accessed directly from inside a VM. For example, vSphere cannot track changes that are
made to an iSCSI LUN that is accessed by an iSCSI initiator in the virtual machine.
Complete information about changed block tracking requirements is described in the VMware Virtual Disk
API Programming Guide in the VMware product documentation. In the guide, search for "Low Level
Backup Procedures" and read the "Changed Block Tracking on Virtual Disks" section.
For VMware servers that do not support CBT, both the used and the unused areas of the disk are backed
up and an informational message is logged in the dsmerror.log file. Use the -preview option on the
backup vm command to view the current CBT status. CBT status has three values:
Off
Indicates the CBT configuration parameter (ctkEnabled) is not enabled in the virtual machine's
configuration parameters. Off is the default state.
Not Supported
Indicates that the virtual machine does not support CBT. Changed-block only backups are not
possible.
On
Indicates the virtual machine supports CBT and that CBT is enabled in the virtual machine's
configuration parameters (ctkEnabled=true).
The client turns on CBT (it sets ctkEnable=true) with each backup attempt. After the client turns
on CBT, it remains on, even if the virtual machine is deleted from the IBM Spectrum Protect server.
With CBT enabled, after the first full VM backup is performed, only the changed blocks on the disk are
backed up or restored.
If you are no longer performing IBM Spectrum Protect backups of a virtual machine, you can turn off
CBT. To turn off CBT, right-click the virtual machine that you want to turn off CBT for in the vSphere
client. Click Edit Settings > Options > General > Configuration Parameters. Then, set the
ctkEnabled configuration parameter to false.
Tip: You can use the compression option with backups only if the backup is being saved to a storage pool
that was enabled for client-side deduplication.
For more information about compression, see “Compression and encryption processing” on page 411.
You specify the -vmbackuptype and -mode options to indicate how the backups are to be performed.
For full VM backups, use -vmbackuptype=fullvm, and specify any of the following mode options:
Supported Clients
This command is valid on supported Windows clients that are installed on a vStorage backup server that
protects VMware virtual machines.
Syntax
,
vmname
Backup VM
,
Parameters
vmname
Specify the name of one or more virtual machines that you want to back up. The name is the virtual
machine display name. Separate multiple virtual machine names with commas. If you set the
vmenabletemplatebackups option to yes, vmname can specify the name of a template VM to back
up.
VMware vCenter allows for two or more virtual machines to have the same display name. However,
the backup-archive client requires that all virtual machine names in a vCenter server configuration be
unique. To prevent errors during processing, ensure that all virtual machines have a unique display
name.
Wildcard characters can be used in virtual machine names that are specified as this parameter.
However, wildcard processing differs, depending on which backup mode is used.
• For backups that use mode=iffull or mode=ifincremental, wildcards can be used to match VM
name patterns. For example:
– backup vm VM_TEST* includes all virtual machines that have names that begin with VM_TEST
– backup vm VM?? includes any virtual machine that has a name that begins with the letters
"VM", followed by 2 characters
Restriction: Do not use the word "aggregate" as a VM name. The word "aggregate" is reserved for the
VM name field in an IBM Spectrum Protect message. Messages that contain the word "aggregate" as
the VM name show statistics that represent the total value of all VM guests that are backed up per
data mover.
If you do not specify vmname, you can identify the virtual machine with the domain.vmfull option.
624 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
:vmdk=disk_label
This keyword is an extension to the vmname. It specifies the label (name) of the virtual machine disk
to include in the backup operation. You can exclude a disk by preceding the keyword with the
exclusion operator (-). For more ways to include or exclude disks from processing, see
Domain.vmfull, Exclude.vmdisk, Include.vmdisk.
-VMBACKUPUPDATEGUID
To use this option, you must have a license agreement to use IBM Spectrum Protect for Virtual
Environments: Data Protection for VMware.
This option updates the globally unique identifier (GUID) for the virtual machine that you are backing
up. This parameter is intended for use only in the following scenario:
You want to restore a previously backed up virtual machine named ORION. But, before you shut down
and replace the copy of ORION that is running in your production environment, you want to verify the
configuration of the restored virtual machine before you use it to replace the existing ORION.
1. You restore the ORION virtual machine and give it a new name: dsmc restore vm Orion -
vmname=Orion2
2. You update and verify the ORION2 virtual machine and determine that it is ready to replace the
existing virtual machine that is named ORION.
3. You power down and delete ORION.
4. You rename ORION2 so that it is now named ORION.
5. The next time that you backup ORION, by using either an incremental-forever full, or incremental-
forever-incremental backup, you add the -VMBACKUPUPDATEGUID parameter to the backup vm
command. This option updates the GUID, on the IBM Spectrum Protect server, so the new GUID is
associated with the stored backups for the ORION virtual machine. The chain of incremental
backups is preserved; there is no need to delete existing backups and replace them with new
backups.
-PREView
This option displays information about a virtual machine, including the labels of the hard disks in the
virtual machine, and the management class information for a virtual machine.
You can use the disk labels with the :vmdk= or :-vmdk= keywords to include or exclude disks from a
backup operation. The following text is sample output from the -preview parameter:
vmName:vm1
VMDK[1]Label: Hard disk 1
VMDK[1]Name: [ds5k_svt_1] tsmcetlnx14/tsmcetlnx14.vmdk
VMDK[1]Status: Included
VMDK[2]Label: Hard disk 2
VMDK[2]Name: [ds5k_svt_1] tsmcetlnx14/tsmcetlnx14_1.vmdk
VMDK[2]Status: Excluded - user,Independent,pRDM
This example output from -preview shows that VMDK 2 was excluded by the previous backup. Disks
that were included in a backup have a status of Included. Disks that were excluded from the backup
have a status of Excluded, followed by a reason code. The reason codes can be any of the following:
user
Indicates that the disk was skipped because it was excluded on a domain.vmfull statement, on
the command line, or in the client options file.
Independent
Indicates that the disk is an independent disk. Independent disks cannot be part of a snapshot, so
they are excluded from backup vm operations. Ensure that the
vmprocessvmwithindependent option is set to yes or the entire virtual machine is bypassed by
a backup operation if it contains one or more independent disks.
backup vm -preview
Full BACKUP VM of virtual machines specified in DOMAIN.VMFULL option.
1. vmName: tag_vm_2
DomainKeyword: all-vm
toolsRunningStatus: guestToolsNotRunning
toolsVersionStatus: guestToolsNotInstalled
consolidationNeeded: No
Change Block Tracking: On
managementClassName: STANDARD
managementClassLocation: Node Default
where:
managementClassName
Displays the name of the management class that the virtual machine is bound to.
If the "(invalid)" label is shown next to the management class name, either the name was
incorrectly specified, the management class was removed on the IBM Spectrum Protect server, or
no backup copy group was found in the management class on the server. When the management
class name is invalid, the virtual machine backup operation fails.
managementClassLocation
Displays where the management class was set. The following locations are possible:
Node Default
The management class is set on the default domain of the VMware datacenter node.
VMMC option
The management class is set with the vmmc option.
VMCTLMC option
The management class is set with the vmctlmc option.
INCLUDE.VM option
The management class is set with the include.vm option.
626 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
VM Tag Management Class (IBM Spectrum Protect)
The management class is set as a tag value of the Management Class (IBM Spectrum
Protect) tag category. Tag values can be set with data protection settings in the IBM
Spectrum Protect vSphere Client plug-in in the vSphere Web Client, or by using tools such as
VMware vSphere PowerCLI version 5.5 R2 or later.
Important: In order to display the management class information that is set by tags, you must set the
vmtagdatamover yes option in the client options file, or you must include the -
vmtagdatamover=yes parameter when you run the dsmc backup vm command. If you did not set
the vmtagdatamover option or if it is set to no, the client ignores any management class tag values,
and displays the management class definition that is set in the default domain of the datacenter node,
the vmmc option, or the include.vm option.
Tip about the final statistics: If you are running multiple backup sessions, the value that is displayed in
the Data transfer time field in the final statistics can be higher than the value in the Elapsed processing
time field. The data transfer time is the sum of the times that each backup takes to send data across the
network. This number does not include the time for the data mover to read the data from disk before
sending it, nor the time to wait for server transactions to complete. This number can be greater than the
elapsed processing time if the operation uses multiple concurrent sessions to move data, such as multi-
session backup operations. This value includes the time that it takes to send data more than once due to
retries, such as when a file changes during a backup operation.
Perform an IFFull VM backup of a VM named vm1, but include only Hard Disk 1 in the backup operation.
Perform an incremental-forever backup of a virtual machine that is named vm1, but exclude Hard Disk 1
and Hard Disk 4 from the backup operation.
Perform an incremental-forever-full backup of two virtual machines that are named vm1 and vm2. On
vm1, back up only Hard Disk 2 and Hard Disk 3. On vm2, back up all virtual disks.
Perform parallel incremental-forever-full backups of the VMware virtual machines that are selected for
backup by using the selection criteria (domain parameters) on the domain.vmfull statement. Set the
maximum number of parallel backups to 5 virtual machines and 10 sessions and limit the backups to 5
VMs per host and 5 VMs per datastore.
628 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• “Vmverifyifaction” on page 587
• “Vmverifyiflatest” on page 589
• “Vmvstortransport” on page 591
• “Vmvstorcompr” on page 590
• “Vmtimeout” on page 592
• “Vssaltstagingdir” on page 593
• “Vssusesystemprovider” on page 594
• “Set Vmtags” on page 737
• Virtual machine exclude options
• Virtual machine include options
Cancel Process
The cancel process command displays a list of current NAS (if NDMP support is enabled) image
backup and restore processes for which the administrative user has authority. You are prompted for the
IBM Spectrum Protect administrator ID.
From the list, the administrative user can select one process to cancel. Client owner privilege is sufficient
authority to cancel the selected NAS image backup or restore processes.
Supported Clients
This command is valid for all Windows clients.
Syntax
Cancel Process
Parameters
There are no parameters for this command.
Examples
Task
Cancel current NAS image backup or restore processes.
Command: cancel process
Cancel Restore
The cancel restore command displays a list of your restartable restore sessions in the server
database.
You can cancel only one restartable restore session at a time. Run the cancel restore command again
to cancel more restores. To restart restartable restore sessions, use the restart restore command.
Use the cancel restore command under the following circumstances:
• You cannot back up files that are affected by the restartable restore.
• You want to cancel restartable restore sessions.
• Restartable restore sessions lock the file space so that files cannot be moved off of the sequential
volumes of the server.
Syntax
Cancel Restore
Parameters
There are no parameters for this command.
Examples
Task
Cancel a restore operation.
cancel restore
Delete Access
The delete access command deletes authorization rules for files that are stored on the server.
When you delete an authorization rule, you revoke user access to any files or images that are specified by
that rule.
Supported Clients
This command is valid for all clients.
Syntax
Delete ACcess
Parameters
There are no parameters for this command.
Examples
Task
Display a list of current authorization rules and select the rules that you want to delete.
delete access
See the following screen example:
To delete the authorization rules that allow marm and susies to access your files, type 2 4 or 2,4,
then press Enter.
630 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Delete Archive
The delete archive command deletes archived files from IBM Spectrum Protect server storage. Your
administrator must give you the authority to delete archived files.
Important: When you delete archived files, you cannot retrieve them. Verify that the files are obsolete
before you delete them.
Supported Clients
This command is valid for all clients.
Syntax
Delete ARchive filespec
options { filespacename } filespec
Parameters
filespec
Specifies the path and file name that you want to delete from storage. Use wildcard characters to
specify a group of files or all files in a directory. You can also use the filelist option to process a
list of files. The backup-archive client opens the file that you specify with this option and processes
the list of files within according to the specific command.
Note: If you indicate filespacename, do not include a drive letter in the file specification.
{filespacename}
Specifies the file space (enclosed in braces) on the server that contains the file you want to delete.
This is the name on the workstation drive from which the file was archived.
Use the filespacename if the name was changed, or if you are deleting files that are archived from
another node with drive labels that are different from yours.
You can specify a UNC name; drive label names are only used for removable media.
You must specify a mixed or lowercase NTFS or ReFS file space name that is enclosed in quotation
marks and braces. For example, {"NTFSDrive"}. Single quotation marks are valid in loop mode. For
example, {"NTFSDrive"} and {'NTFSDrive'} are both valid. In batch mode, only single quotation
marks are valid. The single quotation mark requirement is a restriction of the operating system.
Examples
Task
Delete files from file space abc in the proj directory.
dsmc delete archive {"abc"}\proj\*
Task
Delete a file that is named budget.
dsmc delete archive c:\plan\proj1\budget.jan
Task
Delete all files that are archived from the c:\plan\proj1 directory with a file extension of .txt.
delete archive c:\plan\proj1\*.txt
Task
Delete files that are archived from the c:\project directory by using the pick option to display a
list of archive copies that match the file specification. From the list, you can select the versions to
process.
dsmc delete archive c:\project\* -pick
Task
Delete selected files from the group of files that are archived with the description "Monthly Budgets
2013" located in c:\projects and its subdirectories.
dsmc delete ar c:\projects\* -description="Monthly Budgets 2013" -pick -
subdir=yes
Related information
“Filelist” on page 393
Delete Backup
The delete backup command deletes files, images, and virtual machines that were backed up to IBM
Spectrum Protect server storage. Your administrator must give you authority to delete objects.
When you delete files, the IBM Spectrum Protect server takes all of the backed up files that meet the
filespec and deltype options that are specified and deactivates them. The server also assigns a
deactivation date of infinite-minus so that the files are no longer available for restore and are purged,
immediately on the subsequent run of file expiration. The file is not physically removed until the
expiration process runs.
Important: After you delete backup files, you cannot restore them; verify that the backup files are no
longer needed before you delete them. You are prompted to choose whether you want to continue with
the delete. If you specify yes, the specified backup files are scheduled for deletion and removed from
server storage.
632 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restriction: Files that are contained in a retention set are not deleted when you issue the delete
backup command. These files are retained in server storage to satisfy long-term data retention
requirements and expire according to the retention set's own expiration date after which they are eligible
for deletion. Therefore, they are still available for normal file processing operations, such as query or
restore operations, until the retention set expires.
Supported Clients
This command is valid for all clients.
Syntax
Delete BAckup
filespec
{ filespacename } filespec
objtype=FILE
objtype=IMAGE
objtype=VM vmname
BOTH
-FROM SERVER
LOCAL
deltype=ACTIVE
options
deltype=INACTIVE
deltype=ALL
Parameters
filespace/filespec
filespec
Specifies the path and file name that you want to delete from storage. To specify a file in another file
space, precede the file name with the file space name. Use wildcard characters to specify a group of
files or all files in a directory. Separate file specifications with a space. You can also use the
filelist option to process a list of files. The backup-archive client opens the file that is specified
with this option and processes the list of files within according to the specific command.
Note: If you indicate filespacename, do not include a drive letter in the file specification.
When you use -deltype=inactive or -deltype=active, use wildcard characters to specify a
group of files or all files in a directory.
When you use -deltype=all, specify a fully wildcarded directory.
objtype
Specifies the type of object that you want to delete. You can specify either of the following values:
FILE
Specifies that you want to delete directories and files. This value is the default object type.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect
for Virtual Environments.
When objtype=VM is specified, the filelist option cannot be used. Specifying objtype=VM
changes the behavior of the -deltype option. When objtype=vm is specified, you can use either
-deltype=active or -deltype=inactive. You cannot use -deltype=all. Specifying -
deltype=inactive displays a list of both inactive and active backups. You can use this list to
specify which virtual machine backups that you want to delete. To delete only active virtual
machine backups, use -deltype=active.
When you specify -objtype=VM, this command deletes only virtual machine backups that were
created with any of the following modes: IFINCR, and IFFULL.
For backups that were created with the version 7.1 or earlier clients: Individual incremental
backups (backups that were created by using MODE=INCR) that were created after a full backup
was run cannot be deleted with this command. However, if you delete a full virtual machine image
backup (created by using MODE=FULL), and if the server has any incremental backups
(MODE=INCR) that were created for this VM after the full backup, then deleting the full VM backup
also deletes the files that were created by a MODE=INCR backup.
If you delete an active backup for a virtual machine, the most recent inactive copy becomes the
active backup. If you specify the -pick or -inactive option, only the backup that you specify is
deleted. If you select a backup that is created by MODE=IFINCR, only the selected incremental
backup is deleted; other incremental backups for the virtual machine are not deleted.
-FROM
Specify the backup location or locations where virtual machine backups are deleted. You can
specify one of the following values:
SERVER
Backups of virtual machines are deleted from the IBM Spectrum Protect server.
LOCAL
Persisted snapshots of virtual machines are deleted from the hardware storage.
BOTH
Backups of virtual machines that are on the IBM Spectrum Protect server and snapshots
that are on the hardware storage are deleted. This value is the default.
Specifying this value displays a list of backup locations. From the list, you can select the
location from which to delete virtual machine backups.
deltype
Specifies the deletion type. Specify one of the following values:
ACTIVE
Delete only active file objects. Directory objects are not deleted. This value is the default deletion
type.
Note: If there are any inactive objects, then after the active object is deleted, the most current
inactive object is changed from inactive to active.
To delete all versions of a file, first issue the delete backup command with -
deltype=inactive, then enter the command again with -deltype=active.
INACTIVE
Delete only inactive file objects. Directory objects are not deleted.
634 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
ALL
Delete all active and inactive objects below a particular directory, including all subdirectories and
their files.
Note: The parent directory of the deleted files and subdirectories is not deleted. If you specify
deltype=ALL, you cannot use the pick option because deltype=ALL and the pick option are
mutually exclusive.
Examples
Task
Delete all active file objects from file space abc in the proj directory.
Command: delete backup {abc}\proj\*
Task
Delete all inactive files with a name that ends with .txt that were backed up from the c:\plan
\proj1 directory, and its subdirectories.
Command: delete backup c:\plan\proj1\*.txt -deltype=inactive -subdir=yes
Delete Filespace
The delete filespace command deletes file spaces in IBM Spectrum Protect server storage. A file
space is a logical space on the server that contains files you backed up or archived.
IBM Spectrum Protect assigns a separate file space on the server for each workstation file system from
which you back up or archive files. The file space name is the same as the UNC name.
When you enter the delete filespace command, a list of your file spaces is displayed. From this list,
select the file space that you want to delete.
Your IBM Spectrum Protect administrator must give you authority to delete a file space. You need
BACKDEL authority if the file space you want to delete contains backup versions, or ARCHDEL authority if
the file space contains archive copies. If the file space contains both backup versions and archive copies,
you need both types of authority.
Important: When you delete a file space, you delete all backup versions and archive copies within that
file space. When you delete a file space, you cannot restore the files. Verify that the files are obsolete
before you delete them.
You can use the delete filespace command to interactively delete NAS file spaces from server
storage. Use the nasnodename option to identify the NAS file server. Use the class option to specify the
class of the file space to delete.
Supported Clients
This command is valid for all clients.
636 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
Delete Filespace
options
Parameters
Examples
Task
Delete a file space.
Command: delete filespace
Task
Delete NAS file spaces from the dagordon NAS file server stored on the server.
Command: delete filespace -nasnodename=dagordon -class=nas
Related information
“Nasnodename” on page 445
“Class” on page 327
Delete Group
Use the delete group command to delete a group backup on the IBM Spectrum Protect server.
After you delete a group, the group leader (virtualfsname) remains on the IBM Spectrum Protect server. It
contains no members (file or directories) but is reported in a subsequent query filespace command.
No files are listed if the showmembers option is added. Deleting a group does not remove the file space
that it resides in because there might be other groups in it. Use delete filespace if you want to
remove the file space and all the data it contains.
Note:
1. Use the inactive option to display both active and inactive group backup versions. By default, the
client displays active versions.
2. Use the pick option to select a specific group to delete from the IBM Spectrum Protect server.
3. Use the noprompt option if you want to suppress the confirmation prompt that normally appears
before you delete a group backup version. By default, the client prompts you for confirmation before
you delete the group backup. Using this option can speed up the delete procedure. However, it also
increases the danger of accidentally deleting a group backup version that you want to save. Use this
option with caution.
4. Use the query filespace command to display virtual file space names for your node that are stored
on the server.
Syntax
Delete GRoup filespec
options
Parameters
filespec
Specifies the virtual file space name and the group name that you want to delete from the server
storage.
Examples
Task
Delete the current active version of the virtfs\group1 group.
Command:
Task
Delete a backup version of the virtfs\group1 group from a list of active and inactive versions.
Command:
Related information
“Inactive” on page 405
“Pick” on page 454
“Noprompt” on page 447
“Query Filespace” on page 664
638 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Expire
The expire command deactivates the backup objects that you specify in the file specification or with the
filelist option. You can specify an individual file to expire, or a file that contains a list of files to expire.
If OBJTYPE=VM, this command deactivates the current backup for a virtual machine.
When you are working in interactive mode, a prompt notifies you before files are expired.
The expire command does not remove workstation files. If you expire a file or directory that still exists
on your workstation, the file or directory is backed up again during the next incremental backup, unless
you exclude the object from backup processing.
If you expire a directory that contains active files, those files are not displayed in a subsequent query from
the GUI. However, these files are displayed on the command line, if you specify the correct query with a
wildcard character for the directory.
Note: Because the expire command changes the server picture of the client file system without
changing the client file system, the expire command is not allowed on files that are on a file system that
is monitored by the IBM Spectrum Protect journal service.
Supported Clients
This command is valid for all clients.
Syntax
OBJTYPE=FILE filespec
EXPire
Parameters
OBJTYPE=FILE filespec
Specifies a path and a file name that you want to expire. You can enter only one file specification on
this command. However, you can use wildcards to select a group of files or all the files in a directory.
If you specify the filelist option, the filespec designation is ignored.
OBJTYPE=VM vmname
vmname specifies the name of a virtual machine. The active backup for the specified virtual machine is
expired. The virtual machine name cannot contain wildcard characters.
When objtype=VM is specified, the expire command expires only full virtual machine backups
(MODE=IFFULL) for the virtual machine that is specified on the vmname parameter.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Examples
Task
Deactivate the letter1.txt file in the home directory.
Command: expire c:\home\letter1.txt
Task
Deactivate all files in the admin\mydir directory.
Command: expire c:\admin\mydir\*
Task
Deactivate all files that are named in the c:\avi\filelist.txt file.
Command: expire -filelist=c:\avi\filelist.txt
Task
Deactivate the current backup of the virtual machine that is named vm_test.
Command: expire –objtype=VM vm_test
Help
Use the help command to display information about commands, options, and messages.
Tip: If you use the help command on the initial command line, no server contact is made and no
password is needed.
Supported Clients
This command is valid for all clients.
Syntax
Help
command-name [subcommand-name]
option-name
TOC-section-number
[ANS]message-number
Entering the help command with no arguments causes help to display the complete table of contents.
Either with the initial command or when HELP displays a prompt, you can enter the following parameters.
640 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
command-name [subcommand-name]
Specifies a command name and, optionally, a subcommand name or their abbreviation, for example:
backup image, or b i. In that case, the combination must be unique. Non-unique abbreviations
result in the display of the first section of the entire help file that matches the abbreviation. This
parameter is optional.
option-name
Specifies the name of an option, for example: domain or do. This parameter is optional.
TOC-section-number
Specifies a table of contents section number, for example: 1.5.3. This parameter is optional.
[ANS]message-number
Specifies a message number with or without its prefix, for example: ans1036 or 1036. This parameter
is optional. The severity code is never necessary. Entering ans1036E results in a not-found response.
Important: If you enter arguments that do not fit these descriptions, you may get unexpected results (or
no results) to be displayed. If you enter more than two arguments, your help request is rejected. Where a
command name and an option name are the same, for example: incremental (command) and
incremental (option), you can get help on the option by entering its table-of-contents section number.
The requested help text is displayed in one or more sections, depending on the number of display lines
that are available in your command window. When enough lines are displayed to fill the display space, or
when the end of the requested help text is displayed, you see a prompt along with instructions for what
can be entered at that prompt. To continue displaying text for your current selection, press enter or type
the 'd' key to scroll down. To scroll up in the current selection, press the 'u' key and press Enter. Other
choices might be presented, so read the prompt instructions.
Proper display of the help text requires a usable display width of 72 characters. A display width fewer
than 72 characters causes sentences that are 72 characters wide to wrap to the next line. This can cause
the displayed help text to begin somewhere within the section rather than at the beginning. The
undisplayed lines can be viewed by using the scrolling function of the terminal to move up.
Examples
Task
Display the table of contents of the help topics.
Command: dsmc help
Task
Display the information in help topic 2.1.2
Command: dsmc help 2.1.2
Task
Display help information on the archive command.
Command: dsmc help archive
Task
Display help information on message ANS1036.
Command: dsmc help 1036
Command: dsmc help ANS1036
Incremental
The incremental command backs up all new or changed data in the locations that you specify, unless
you exclude them from backup services.
You can back up all new or changed files or directories in the default client domain or from file systems,
directories, or files.
Supported Clients
This command is valid for all clients.
642 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
Incremental
options
filespec
Parameters
filespec
Specifies the path and file name that you want to back up. Use wildcards to select a group of files or
all the files in a directory. You can specify as many file specifications as available resources or other
operating system limits permit. Separate file specifications with a space. You can also use the
filelist option to process a list of files. The backup-archive client opens the file that you specify
with this option and processes the list of files within according to the specific command. If you do not
specify a file specification, the domain option determines what to backup.
If you specify a file system, all new and changed files are backed up. In addition, the last incremental
date for the file space is updated on the server. If you specify a file or directory, the last incremental
date is not updated. This means that the file or directory might be backed up again if a later backup is
performed by using the incrbydate option. If you specify a file system, specify the file system
without a trailing slash.
Examples
Task
Run an incremental backup of the default client domain that is specified in your client options file
(dsm.opt).
Incremental
Run an incremental backup of the domain that is specified in your client user options file. Adding the -
absolute option forces a backup of all files in the domain, even if they were not changed since the
last incremental backup.
Incremental -absolute
Task
Run an incremental backup of the C, D, and E drives.
incremental c: d: e:
Task
Run an incremental backup of the \home\ngai directory and its contents on the current drive.
i \home\ngai\
644 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Assuming that you initiated a snapshot of the C drive and mounted the snapshot as \\florence\c$
\snapshots\snapshot.0, run an incremental backup of all files and directories under the local
snapshot and manage them on the IBM Spectrum Protect server under the C:\ drive file space name.
Task
Run a snapdiff incremental backup from a snapshot taken of a network share //
homestore.example.com/vol1 mounted on drive H, where homestore.example.com is a file
server.
incremental -snapdiff H:
Task
Run a snapdiff incremental backup from a snapshot taken of a network share //
homestore.example.com/vol1 mounted on drive H, where homestore.example.com is a file
server. The -diffsnapshot option value of LATEST means that the operation uses the latest
snapshot (the active snapshot) for volume H.
Related information
“Absolute” on page 310
“Journal-based backup” on page 645
“Selective” on page 724
“Include options” on page 407
“Incrthreshold” on page 424
Journal-based backup
If the journal engine service is installed and running, then by default the incremental command
performs a journal-based backup on file systems that are being monitored by the journal engine service.
The backup-archive client does not use the journaling facility inherent in Windows NTFS or ReFS file
systems or any other journaled file system.
The journal engine service records changes to an object or its attributes in a journal database. During a
journal-based backup, the client obtains a list of files that are eligible for backup from the journal
database. Performing backups regularly maintains the size of the journal.
646 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Backing up NTFS or ReFS volume mount points
If you perform an incremental backup of a file system on which a volume mount point exists, IBM
Spectrum Protect backs up the directory (junction) where the volume is mounted, but it does not traverse
or back up the data on the mounted volume.
For example, if C:\mount is a mount point, then an incremental backup of the C:\ drive backs up only
the junction (C:\mount), and not the data under C:\mount.
Related concepts
“Restoring NTFS or ReFS volume mount points” on page 689
When restoring a file system that contains a volume mount point, only the mount point (directory) is
restored. The data on the volume mounted on that directory is not restored.
“Restoring data on NTFS mounted volumes” on page 689
The mount point must exist before the data on the mounted volume can be restored to its original
location.
“Backing up data on NTFS or ReFS mounted volumes” on page 647
Backing up a volume from the mount point is especially useful for volumes that have no drive letter
assignment. If the volume mounted on the mount point can also be referenced by drive letter, then the
volume does not have to be backed up over the mount point.
You can also add C:\mount to the DOMAIN option to back up the data on the mount point as part of a
domain incremental backup operation. For example, to back up the system state, the C:\ drive, and the
data on the volume that is mounted on C:\mount as part of a scheduled incremental backup, configure a
DOMAIN statement as follows:
Incremental-by-Date
An incremental-by-date backup backs up new and changed files with a modification date later than the
date of the last incremental backup stored at the server, unless the files are excluded from backup by an
exclude statement.
If an incremental-by-date is performed on only part of a file system, the date of the last full incremental is
not updated, and the next incremental-by-date will back up these files again. Use the query filespace
command to determine the date and time of the last incremental backup of the entire file system.
To perform an incremental-by-date backup, use the incrbydate option with the incremental
command.
Unlike a full incremental, an incremental-by-date does not maintain current server storage of all your
workstation files for the following reasons:
• It does not expire backup versions of files that are deleted from the workstation.
• It does not rebind backup versions to a new management class if the management class has changed.
• It does not back up files with attributes that have changed, unless the modification dates and times
have also changed.
• It ignores the copy group frequency attribute of management classes.
For these reasons, if you have limited time during the week to perform backups, but extra time on the
weekends, you can perform an incremental-by-date backup on weekdays and a full incremental backup
on weekends to maintain current server storage of your workstation files.
If the incremental command is retried because of a communication failure or session loss, the transfer
statistics will display the number of bytes that the client attempted to transfer during all command
attempts. Therefore, the statistics for bytes transferred might not match the file statistics, such as those
for file size.
648 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Loop
The loop command starts an interactive command line session that is maintained until you enter quit.
If you are required to enter a password, you are prompted for it before the loop mode prompt appears.
Note: It is not possible to enter loop mode without a valid server contact. One of the consequences is that
certain commands, such as restore backupset -location=file, are only accepted on the initial
command line when a valid server is not available.
In an interactive command line session, it is unnecessary to precede each command name with dsmc and
your password, if one is required.
In interactive mode, options that you enter on the initial command line override the value that you
specified in your client options file (dsm.opt). This value remains in effect for the entire interactive session
unless overridden by a different value on a given interactive command. For example, if you set the
subdir option to yes in your client options file (dsm.opt), and you specify subdir=no on the initial
command line, the subdir=no setting remains in effect for the entire interactive session unless
overridden by the subdir=yes value on a given interactive command. However, the subdir=yes value
only affects the command it is entered on. When that command completes, the value reverts back to
subdir=no, the value at the beginning of the interactive session.
You can enter all valid commands in interactive mode except the schedule and loop commands.
There are some options that you cannot use in the interactive session created by the loop command and
are identified in the option description by this statement: This option is valid only on the initial command
line. It is not valid in interactive mode.
Supported Clients
This command is valid for all clients.
Syntax
LOOP
Parameters
There are no parameters for this command.
Examples
Task
Start an interactive command line session.
Command: dsmc
At the Protect> prompt, enter a command.
To end an interactive session, enter quit
Note: To interrupt a dsmc command before the client has finished processing, enter QQ on the IBM
Spectrum Protect console. In many cases, but not all, this interrupts the command.
Related information
Chapter 11, “Processing options,” on page 283 for options that you cannot use in interactive mode.
Macro
The macro command runs a series of commands that you specify in a macro file.
By including the macro command within a macro file, you can nest as many as 10 levels of commands.
Supported Clients
This command is valid for all clients.
Syntax
MAcro macroname
Parameters
macroname
Specifies the fully qualified name of the file that contains the commands.
Examples
The following is an example of how to use the macro command.
Task
Selectively back up files in the following directories:
• c:\devel\project\proja
• c:\devel\project\projb
• c:\devel\project\projc
Command: macro backabc.mac
Where backabc.mac contains the following statements:
selective c:\devel\project\proja\*.*
selective c:\devel\project\projb\*.*
selective c:\devel\project\projc\*.*
Monitor Process
The monitor process command displays a list of current NAS (if NDMP support is enabled) image
backup and restore processes for which the administrative user has authority. You are prompted for the
IBM Spectrum Protect administrator ID.
The administrative user can then select one process to monitor. Client owner privilege is sufficient
authority to monitor the selected NAS image backup or restore processes.
Supported Clients
This command is valid for all Windows clients.
Syntax
MONitor Process
Parameters
There are no parameters for this command.
Examples
Task
Monitor current NAS image backup or restore processes.
Command: monitor process
650 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Preview Archive
The preview archive command simulates an archive command without sending data to the server.
The preview archive command generates a tab-delineated text file that can be imported into a
spreadsheet program. The preview contains information such as whether the file is excluded or included.
If the file is excluded, the pattern, or reason, that the file is excluded is listed, along with the source for
the pattern.
Supported Clients
This command is valid for all clients.
Syntax
-filter=ALL
-TRAverse=Yes
-CONsole -TRAverse=No
Parameters
filespec
Specifies the path and file name that you want to archive. Use wildcard characters to select a group of
files or all the files in a directory.
-filter
Specifies the output to display. You can display included objects, excluded objects, or both.
ALL
Display output for included and excluded objects. This is the default.
INCLuded
Display output for included objects only.
EXCLuded
Display output for excluded objects only.
-FILEName=
Specifies the filename in which to write the tab-delineated output. The default is dsmprev.txt.
-CONsole
Output is written to the console, and the file.
-TRAverse
Preview the current directory and subdirectories.
Yes
Preview the current directories and subdirectories. This is the default.
No
Preview only the current directory, not subdirectories.
Important: Specifying -traverse does not preview directories excluded using the exclude.dir
option.
Supported Clients
This command is valid for all clients.
Syntax
-filter=ALL
-TRAverse=Yes
-CONsole -TRAverse=No
Parameters
filespec
Specifies the path and file name that you want to back up. Use wildcard characters to select a group
of files or all the files in a directory.
-filter
Specifies the output to display. You can display included objects, excluded objects, or both.
ALL
Display output for included and excluded objects. This is the default.
INCLuded
Display output for included objects only.
EXCLuded
Display output for excluded objects only.
-FILEName=
Specifies the filename in which to write the tab-delineated output. The default is dsmprev.txt.
-CONsole
Output is written to the console, and the file.
-TRAverse
Preview the current directory and subdirectories.
Yes
Preview the current directories and subdirectories. This is the default.
No
Preview only the current directory, not subdirectories.
Important: Specifying -traverse does not preview directories excluded using the exclude.dir
option.
652 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Query Access
The query access command shows who was given access to backup versions or archive copies of
specific files.
The backup-archive client displays a list of authorization rules that you defined with the set access
command or with the Utilities > Node Access List menu in the backup-archive client graphical user
interface (GUI).
The following information is included.
• Authority that you gave a user to restore backup versions or retrieve archive copies.
• The node name of the user to whom you gave authorization.
• The files to which the user has access.
Supported Clients
This command is valid for all clients.
Syntax
Query ACcess
Parameters
There are no parameters for this command.
Examples
Task
Display a list of users who have access to your files.
Command: query access
Query Adobjects
Use the query adobjects command to display information about the deleted objects that are located
on the local Active Directory domain.
On Windows Server operating system clients, Active Directory object information can also be displayed
from full system-state backups on the server.
Supported Clients
This command is valid for Windows Server OS clients only.
Syntax
Query ADOBJects
sourcepathspec options
Parameters
sourcepathspec
Specifies the Active Directory object or container to query. You can specify an asterisk (*) as a
wildcard character. You can specify either the full distinguished name of an object or a container, or
just the name attribute (cn or ou), where the wildcard might be used. You can also specify object
Examples
Task
Query all local deleted objects.
Command: query adobjects
Task
Query all local deleted objects for a user with the name starting with Fred.
Command: query adobjects "cn=Fred*" -detail
Task
Query all objects that are located in the Users container of the bryan.test.example.com domain
from the server.
Command: query adobjects "cn=Users,DC=bryan,DC=test,DC=ibm,DC=com" -
adloc=server
654 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Query all local deleted objects for organizational unit testou.
Command: query adobjects "ou=testou"
Task
Query the local deleted object with a GUID of E079130D-3451-4C69-8349-31747E26C75B.
Command: query adobjects {E079130D-3451-4C69-8349-31747E26C75B}
Query Archive
The query archive command displays a list of your archived files and the following information about
each file: file size, archive date, file specification, expiration date, and archive description.
If you use the detail option with the query archive command, the client displays the following
additional information:
• Last modification date
• Creation date
• Compression type
• Encryption type
• Client-side data deduplication
• Retention initiation
• Whether the file is on hold
The following example shows sample output when the query archive command is issued with the
detail option:.
For more information about the compression type, see “Compression” on page 336.
Supported Clients
This command is valid for all clients.
Syntax
Query ARchive filespec
options { filespacename } filespec
Parameters
filespec
Specifies the path and file name that you want to query. Use wildcard characters to specify a group of
files or all the files in a directory.
If you include filespacename, do not include a drive letter in the file specification. Drive label names
are only used for removable media.
656 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 76. Query Archive command: Related options (continued)
Option Where to use
totime “Totime” on page Command line only.
536
Examples
Task
Display a list of all your archived files in the c:\proj directory.
Command: q ar c:\proj\*
Task
Display a list of archived files from your c: drive with the description "January Ledgers".
Command: query archive c:\ -su=y -descr="January Ledgers"
Task
Display a list of all your archived files in the c:\proj directory. Use the dateformat and
timeformat options to reformat the dates and times.
Command: q ar –date=5 –time=4 c:\proj\*
Task
Display a list of all your archived files in the c:\dir1 directory. Use the detail option to display the
last modification date and the creation date of each file.
Command: q ar -detail c:\dir1\*
Task
Display a list of archived files in the c:\proj directory that contains a file extension of .dev. Use the
dateformat and timeformat options.
Command: q ar –date=5 –time=4 c:\proj\*.dev
Task
Recently you changed the label of your c:\ drive to store and archive some files. Then, yesterday
the label was changed to dev and some more files were archived. Display a list of all the files you
archived in the c:\proj directory when the label was store.
Command: q ar {store}\proj\*
Task
Recently you archived files from a diskette labeled docs. Display a list of all the files you archived.
Command: q ar {docs}\*
Query Backup
The query backup command displays a list of backup versions of your files that are stored on the IBM
Spectrum Protect server, or that are inside a backup set from the server when the backupsetname
option is specified.
The command displays the following file information:
• File specification
• File size
• Backup date
• Whether the file is active or inactive
• The management class that is assigned to the file. Only the first 10 characters of the management class
name are displayed.
For more information about the compression type, see “Compression” on page 336.
Supported Clients
This command is valid for all clients.
Syntax
Query Backup filespec
options { filespacename } filespec
Parameters
filespec
Specifies the path and file name that you want to query. Use wildcard characters to specify a group of
files or all the files in a directory. Do not use wildcard characters when you query NAS file system
images with -class=nas option setting.
If you include filespacename, do not include a drive letter in the file specification. Drive label names
are only used for removable media.
You can also use the following value for filespec:
systemstate
Displays the list of backup versions of Windows system state.
{filespacename}
Specifies the file space, enclosed in braces, on the server that contains the file you want to query. This
is the drive label or UNC name on the workstation drive from which the file was backed up. The
following example shows how to specify a UNC name: {'\\machine\C$'}.
Use the filespacename if the name has changed, or if you want to query files backed up from another
node with drive label names that are different from yours.
You must specify a mixed or lowercase NTFS or ReFS file space name that is enclosed in quotation
marks and braces. For example, {"NTFSDrive"}. Single quotation marks or double quotation marks
are valid in loop mode. For example: {"NTFSDrive"} and {'NTFSDrive'} are both valid. In batch
mode, only single quotation marks are valid.
658 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 77. Query Backup command: Related options
Option Where to use
backupsetname Command line only.
“Backupsetname” on page
322
class “Class” on page 327 Command line only.
dateformat “Dateformat” Client options file (dsm.opt) or command line.
on page 344
detail “Detail” on page 350 Command line only.
dirsonly “Dirsonly” on Command line only.
page 354
filelist “Filelist” on page Command line only.
393
filesonly “Filesonly” on Command line only.
page 396
fromdate “Fromdate” on Command line only.
page 398
fromowner “Fromnode” on Command line only.
page 398
fromtime “Fromtime” on Command line only.
page 399
inactive “Inactive” on Command line only.
page 405
nasnodename Client options file (dsm.opt) or command line.
“Nasnodename” on page 445
numberformat Client options file (dsm.opt) or command line.
“Numberformat” on page
449
pitdate “Pitdate” on page Command line only.
455
pittime “Pittime” on page Command line only.
456
querysummary Command line only.
“Querysummary” on page
466
scrolllines “Scrolllines” Client options file (dsm.opt) or command line.
on page 490
scrollprompt Client options file (dsm.opt) or command line.
“Scrollprompt” on page 491
subdir “Subdir” on page Client options file (dsm.opt) or command line.
519
timeformat “Timeformat” Client options file (dsm.opt) or command line.
on page 533
Examples
dsmc query backup c:\* -subdir=yes -querysummary
dsmc query archive c:\* -subdir=yes -querysummary
Task
Query files from the abc file space proj directory.
dsmc query backup {"abc"}\proj\*.*
Task
Display a list of all active and inactive backup versions that were backed up from the c:\proj
directory.
dsmc q backup –ina c:\proj\*
Task
Display a list of all your backups in the c:\dir1 directory. Use the detail option to display the last
modification date and the creation date of each file.
dsmc q backup -detail c:\dir1\*
Task
Display a list of all active and inactive backup versions that were backed up from the c:\proj
directory. Use the dateformat and timeformat options to reformat the dates and times.
dsmc q b –date=5 –time=4 –ina c:\proj\*
Task
Last week you backed up files from a diskette labeled docs. Display a list of those files.
dsmc q b {docs}\*
Task
Query file system images from the nas2 NAS file server.
dsmc query backup -nasnodename=nas2 -class=nas
Task
Display a list of all files from your c drive that are contained in the backup set
weekly_accounting_data.32145678.
dsmc query backup c:\* -subdir=yes -
backupsetname=weekly_accounting_data.32145678
Task
Display information about all the active and inactive backup versions of the system state on the
server.
dsmc query backup -ina systemstate
Related information
“Restore data from a backup set” on page 192
660 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Query NAS file system images
You can use the query backup command to display information about file system images backed up for
a NAS file server. The client prompts you for an administrator ID.
Where supported, use the nasnodename option to identify the NAS file server to query. Place the
nasnodename option in your client options file (dsm.opt). The value in the client options file is the
default, but this value can be overridden on the command line.
Use the class option to specify the class of the file space to query. To display a list of images belonging
to a NAS node, use the -class=nas option.
Related reference
“Class” on page 327
The class option specifies whether to display a list of NAS or client objects when using the delete
filespace, query backup, and query filespace commands.
“Nasnodename” on page 445
The nasnodename option specifies the node name for the NAS file server when processing NAS file
systems. The client prompts you for an administrator ID.
Query Backupset
The query backupset command queries a backup set from a local file, tape device (if applicable), or
the IBM Spectrum Protect server.
This command displays the backup set name, generation date, retention (for a backup set on the IBM
Spectrum Protect server), and user-supplied description.
Supported Clients
This command is valid for all clients.
Syntax
Query BACKUPSET BACKUPSETName= backupsetname
options localfilename
tapedevice
LOCation= server
file
tape
Parameters
BACKUPSETName=
Specifies the name of a backup set you want to query. You can use wildcards to specify the backup
set name. If you use wildcards or do not specify a backup set name, all backup sets that you own are
displayed. This parameter is required.
The value of backupsetname depends on the location of the backup set, and corresponds to one of
these three choices:
backupsetname
Specifies the name of the backup set from the server. If the location parameter is specified, you
must set -location=server.
localfilename
Specifies the file name of the first backup set volume. You must set -location=file.
Examples
Task
Query all backup sets from the IBM Spectrum Protect server.
Command: query backupset -backupsetname=*
Task
Query a backup set that is called monthy_financial_data from the IBM Spectrum Protect server.
Command: query backupset -backupsetname=monthly_financial_data.12345678
Task
Query the backup set in the filec:\budget\weekly_budget_data.ost.
Command: query backupset -backupsetname=c:\budget\weekly_budget_data.ost
loc=file
Task
Query the backup set from the \\.\tape0 tape device.
Command: dsmc query backupset -backupsetname=\\.\tape0 -loc=tape
Related information
“Restore data from a backup set” on page 192
The preferred syntax for query backupset command requires the backupsetname parameter. Prior to
the introduction of the backupsetname parameter, the baxkup-archive client queried backup sets with a
different syntax.
662 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
While you can use syntax from previous releases for this command, do not do so unless you have a
specific need and cannot replace the old syntax with the syntax in Tivoli Storage Manager Version 6.1. For
best results, use the backupsetname parameter.
Supported Clients
This command is valid for all clients.
Syntax
Query BACKUPSET backupsetname
options localfilename
tapedevice
LOCation= server
file
tape
Parameters
backupsetname
Specifies the name of the backup set from the IBM Spectrum Protect server. If the location
parameter is specified, you must set -location=server.
localfilename
Specifies the file name of the first backup set volume. You must set -location=file.
tapedevice
Specifies the name of the tape device containing the backup set volume. You must use a Windows
native device driver, not the device driver provided by IBM. You must set -location=tape.
LOCation=
Specifies where the client searches for the backup set. If you do not specify the location parameter,
the client searches for backup sets on the IBM Spectrum Protect server.
server
Specifies that the client searches for the backup set from the server. This is the default.
file
Specifies that the client searches for the backup set from a local file.
tape
Specifies that the client searches for the backup set from a local tape device.
Examples
Task
Query all backup sets from the IBM Spectrum Protect server.
Query Filespace
The query filespace command displays a list of file spaces for a node. The file spaces are stored on
the IBM Spectrum Protect server, or inside a backup set from the server when the backupsetname
option is specified. You can also specify a single file space name to query.
A file space is a logical space on the server that contains files you backed up or archived. A separate file
space is assigned on the server for each node at your workstation from which you back up or archive files.
A separate file space is assigned on the server for each file system at your workstation from which you
back up or archive files. The file space name is the same as the file system name.
A Unicode file space name might not display correctly if the server is unable to display the Unicode name.
In this case, use the file space identifier (fsID) to identify these file spaces on the server. Use the query
filespace command with the detail option to determine the fsID of a file space.
Supported Clients
This command is valid for all clients.
Syntax
Query Filespace
filespacename options
Parameters
filespacename
Specifies an optional character string that can include wildcards. Use this argument to specify a
subset of file spaces. The default is to display all file spaces.
664 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 80. Query Filespace command: Related options (continued)
Option Where to use
detail “Detail” on page 350 Command line only.
fromnode “Fromnode” on Command line only.
page 398
nasnodename Client options file (dsm.opt) or command line.
“Nasnodename” on page 445
scrolllines “Scrolllines” Client options file (dsm.opt) or command line.
on page 490
scrollprompt Client options file (dsm.opt) or command line.
“Scrollprompt” on page 491
timeformat “Timeformat” Client options file (dsm.opt) or command line.
on page 533
Examples
Display your file spaces. Use the dateformat and timeformat options to reformat the dates and times.
Display all of the file space names on the server with a file space name that ends in '$' belonging to
system named florence.
Display detailed file space information that shows the replication status during a failover.
Command:
query filespace -detail
Output:
# Last Incr Date Type fsID Unicode Replication File Space Name
--- -------------- ------ ---- ------- ----------- --------------
1 00/00/0000 00:00:00 HFS 3 Yes Current /
Related concepts
“Restore data from a backup set” on page 192
Query Group
Use the query group command to display information about a group backup and its members.
Note:
1. Use the showmembers option to display and select individual group members that you want to query.
The showmembers option is not valid with the inactive option. If you want to display members of a
group that are not currently active, use the pitdate and pittime options to specify the backup date
and time of the member you want to query.
2. Use the query filespace command to display virtual file space names for your node that are stored
on the IBM Spectrum Protect server.
3. If you perform a full and differential group backup, a query of this group using the -inactive option
displays two active backups of the same name, one of type FULL and one of type DIFF.
These backups inactivate any previous full and differential backups:
666 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you query a group backup without the -inactive option, the query displays only the latest group
backup, whether it is type FULL or type DIFF:
Supported Clients
This command is valid for all clients.
Syntax
Query GRoup filespec
options
Parameters
filespec
Specifies the virtual file space name (enclosed in braces) and the group name on the server that you
want to query.
Examples
Task
Display all the groups in the virtfs file space.
Command:
Task
Display active and inactive versions of the virtfs\group1 file space.
Command:
Related information
“Query Filespace” on page 664
Query Image
The query image command displays information about file system images that are stored on the IBM
Spectrum Protect server, or that are inside a backup set from the IBM Spectrum Protect server, when the
backupsetname option is specified.
The following information about file system images is displayed:
• Image Size - The volume size which was backed up.
• Stored Size - The actual image size that is stored on the server. Because image backup allows you to
back up only used blocks in a file system, the stored image size on the IBM Spectrum Protect server
could be smaller than the volume size. For online image backups, the stored image can be larger than
the file system based on the size of the cache files.
• File system type
• Backup date and time
• Management class that is assigned to image backup
• Whether the image backup is an active or inactive copy
• The image name
Note: The IBM Spectrum Protect API must be installed to use the query image command.
Supported Clients
This command is valid for all Windows clients.
Syntax
Query IMage logicalvolumename
options filespacename
Parameters
logicalvolumename
The name of a logical volume you want to query. You must specify the exact name of the image. You
cannot use wildcards. The default is all active images (unless restricted by one or more options).
filespacename
Specifies the file system name that you want to query.
Omitting logicalvolumename and filespacename causes all images to be displayed.
668 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 82. Query Image command: Related options
Option Where to use
backupsetname Command line only.
“Backupsetname” on page
322
dateformat “Dateformat” Client option file (dsm.opt) or command line.
on page 344
fromnode “Fromnode” on Command line only.
page 398
inactive “Inactive” on Command line only.
page 405
numberformat Client option file (dsm.opt) or command line.
“Numberformat” on page
449
pitdate “Pitdate” on page Command line only.
455
pittime “Pittime” on page Command line only.
456
scrolllines “Scrolllines” Client options file (dsm.opt) or command line.
on page 490
scrollprompt Client options file (dsm.opt) or command line.
“Scrollprompt” on page 491
timeformat “Timeformat” Client option file (dsm.opt) or command line.
on page 533
Examples
Task
Display all backed up images.
Command: q image
Task
Display active and inactive version of the h: image.
Command: q im h: -inactive
Task
Display all images that are contained within the backup set weekly_backup_data.32145678.
Command: query image -backupsetname=weekly_backup_data.32145678
Related information
“Restore data from a backup set” on page 192
Supported Clients
This command is valid for all clients.
Syntax
Query INCLexcl
test pattern -DETail
basic
-DISPLAY= vssexcl
all
Parameters
test pattern
Use for testing the validity of patterns you want to use in your include-exclude list. When you use a
test pattern with this command, the following occurs:
• The internal include-exclude list is not displayed
• The pattern is processed as if it came from an include-exclude statement, including all the usual
error checking
• The pattern is displayed as it would appear in the include-exclude list
If the test pattern has no errors, the compiled pattern result is the same as the test pattern.
-DETail
Displays the management class that is associated with the include-exclude statement.
-DISPLAY=basic | vssexcl | all
-DISPLAY=basic displays the files and directories that have been included or excluded by one of the
following methods:
• The objects were included or excluded in the client options file.
• The objects were included or excluded in a server-side client option set.
• The objects were excluded by the operating system because they are contained in the
HKEY_LOCAL_MACHINES\SYSTEM\CurrentControlSet\BackupRestore
\FilesNotToBackup registry key.
• The objects were explicitly excluded by the client.
670 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This is the default if a display value is not specified.
-DISPLAY=vssexcl displays a list of files that are excluded from a file system backup, because they
are included when a system state backup is performed. Files that are backed up by a backup
systemstate operation are protected by the VSS writer; you cannot include these files in a file
system backup by adding them to an include statement in the dsm.opt file, or client option set.
-DISPLAY=all displays all files that are included or excluded during a file system backup.
Examples
Task
Exclude a file from deduplication by excluding it in the client options file:
Task
Display a basic list of include-exclude statements. Command:
query inclexcl
Task
Display a list of files that are excluded from file system backups because the VSS writer includes them
in system state backups.
Task
Display a list of include-exclude statements. Display the management class that is associated with
each statement.
Task
Test the validity of this pattern: ..\?x?\*.log
Query Mgmtclass
The query mgmtclass command displays information about the management classes available in your
active policy set.
Your administrator defines management classes that contain attributes which control whether a file is
eligible for backup or archive services. Management classes also determine how backups and archives
are managed on the server.
Your active policy set contains a default management class; it can contain any number of extra
management classes. You can assign specific management classes to files using include options that
are located in the client options file (dsm.opt). If you do not assign a management class to a file, the
default management class is used.
When you archive files, you can override the assigned management class by using the archmc option.
Supported Clients
This command is valid for all clients.
Parameters
Examples
Task
Display default and available management classes.
Command: query mgmtclass
Query Node
The query node command displays all the nodes for which an administrative user ID has authority to
perform operations. You are prompted for the IBM Spectrum Protect administrator ID.
Ideally, the administrative user ID has at least client owner authority over the client workstation node
they are using either from the command line or from the web.
Use the type option to specify the type of node to filter for. The following are the valid values:
• nas
• client
• server
• any
The default is any.
Note: When the IBM Spectrum Protect for Virtual Environments: Data Protection for VMware license file is
installed on a vStorage backup server, the platform string that is stored on the IBM Spectrum Protect
server is set to "TDP VMware" for every nodename that is used on that machine. The platform string can
be used in the context of PVU calculations. If a nodename is being used to back up the machine with
standard Backup-Archive client functions (for example, file-level or image backup), then this platform
string would be interpreted as a "client" for the purposes of PVU calculations.
For more information about processor value units, see Estimating processor value units in the IBM
Spectrum Protect server documentation.
Supported Clients
This command is valid for all clients.
Syntax
Query Node
options
672 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
Examples
Task
Display all NAS nodes.
Command: query node -type=nas
Related information
“Type” on page 537
Query Options
Use the query options command to display all or part of your options and their current settings that
are relevant to the command-line client.
Supported Clients
This command is valid for all clients.
Syntax
Query Options pattern
options
Parameters
pattern
An optional character string that can include wildcards. Use this argument to specify a subset of
options. The default is to display all options.
Examples
Task
Display all options and their values.
query options
Task
Display the value of the replace option.
Task
Issue the command to display all options and their values. The failover status information is
displayed.
query options
Output:
MYPRIMARYSERVERNAME: SERVER1
MYREPLICATIONSERVER: TARGET
REPLSERVERNAME: TARGET
Address: 192.0.2.9
Port: 1501
SSLPort: 1502
GUID: 39.5a.da.d1.ae.92.11.e2.82.d3.00.0c.29.2f.07.d3
Used: yes
Related concepts
“Automated client failover configuration and use” on page 52
The backup-archive client can automatically fail over to a secondary server for data recovery when the
IBM Spectrum Protect server is unavailable. You can configure the client for automated failover or prevent
the client from failing over. You can also determine the replication status of your data on the secondary
server before you restore or retrieve the replicated data.
Related tasks
“Determining the status of replicated client data” on page 57
You can verify whether the most recent backup of the client was replicated to the secondary server before
you restore or retrieve client data from the secondary server.
Query Restore
The query restore command displays a list of your restartable restore sessions in the server database.
The list contains these fields: owner, replace, subdir, preservepath, source, and destination.
A restartable restore session is created when a wildcard restore command fails because of network
outage, client failure, server outage, or a similar problem. When such a failure occurs, the file space is
locked on the server and its files cannot be moved off the sequential volumes of the server. To unlock the
file space, either restart the restore and allow it to complete (query restore command), or cancel the
restore (cancel restore command). Use query restore to determine if you have any restartable
restore sessions and which file spaces are affected.
Supported Clients
This command is valid for all clients.
Syntax
Query Restore
674 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
There are no parameters for this command.
Examples
Task
The following example displays the output when you use query restore:
Restartable Session: 2
Start date/time: 10/17/2001 15:20:01
Source: {"\\ers\c$"}\data\spreadsheets\*
Destination: - not specified by user -
Query Schedule
The query schedule command displays the events that are scheduled for your node. Your
administrator can set up schedules to perform automatic backups and archives for you. To plan your
work, use this command to determine when the next scheduled events occur.
Supported Clients
This command is valid for all clients.
Syntax
Query SChedule
Parameters
There are no parameters for this command.
Examples
Task
Display your scheduled events.
Command: query schedule
Query Session
The query session command displays information about your session, including the current node
name, when the session was established, server information, and server connection information.
Supported Clients
This command is valid for all clients.
Syntax
Query SEssion
Examples
Task
Display your session information.
Command: query session
A sample query session display follows:
Query Systeminfo
Use the query systeminfo command to gather information and output this information to a file or the
console.
This command is intended primarily as an aid for IBM support to help diagnosing problems. However,
users who are familiar with the concepts addressed by this information might also find it useful.
If you use the console option, no special formatting of the output is performed to accommodate screen
height or width. Therefore, the console output can be difficult to read due to length and line-wrapping. If
the console output is difficult to read, use the filename option with the query systeminfo command.
This combination allows the output to be written to a file that can be submitted to IBM support.
Supported Clients
This command is valid for all clients.
Syntax
Parameters
item
Specifies one or more items from which you want to gather information and output the information to
the file name that you specify with the filename option or to the console. The default is to gather all
items.
676 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
You can gather information on one or more of the following items:
• DSMOPTFILE - The contents of dsm.opt file.
• ENV - Environment variables.
• ERRORLOG - The client error log file.
• FILE - Attributes for the file name that you specify.
• FILESNOTTOBACKUP - Enumeration of Windows Registry key:
HKEY_LOCAL_MACHINE\
SYSTEM\
CurrentControlSet\
BackupRestore\
FilesNotToBackup
This key specifies those files that are not to be backed up. The query inclexcl command indicates
that these files are excluded per the operating system.
• INCLEXCL - Compiles a list of include-exclude in the order in which they are processed during backup
and archive operations.
• KEYSNOTTORESTORE - Enumeration of Windows Registry key:
HKEY_LOCAL_MACHINE\
SYSTEM\
ControlSet001\
BackupRestore\
KeysNotToRestore
This key specifies those Windows Registry keys that are not to be restored.
• MSINFO - Windows system information (output from MSINFO32.EXE).
• OPTIONS - Compiled options.
• OSINFO - Name and version of the client operating system
• POLICY - Policy set dump.
• REGISTRY - IBM Spectrum Protect-related Windows Registry entries.
• SCHEDLOG - The contents of the schedule log (usually dsmsched.log).
• SFP - The list of files that are protected by Windows System File Protection, and for each file, indicates
whether that file exists. These files are backed up as part of the SYSFILES system object.
• SFP=<filename> - Indicates whether the specified file (filename) is protected by Windows System File
Protection. For example:
SFP=C:\WINNT\SYSTEM32\MSVCRT.DLL
Examples
Task
Gather and store the contents of the dsm.opt file and the IBM Spectrum Protect error log file in the
tsminfo.txt file.
Command: query systeminfo dsmoptfile errorlog -filename=tsminfo.txt
Related information
“Filename” on page 395
“Console” on page 337
Query Systemstate
Use the query systemstate command to display information about a backup of the system state on
the IBM Spectrum Protect server, or system state inside a backup set from the IBM Spectrum Protect
server, when the backupsetname option is specified.
The output indicates whether the object is active ("A") or inactive ("I"). Only active objects are listed
unless the inactive option is specified with the command. The backup-archive client on Windows
supports standard and detailed format.
Supported Clients
This command is valid for supported Windows clients only.
Syntax
Query SYSTEMSTate
options
Parameters
678 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 87. Query Systemstate command: Related options (continued)
Option Where to use
pittime “Pittime” on page Command line only.
456
showmembers Command line only.
“Showmembers” on page
494
timeformat “Timeformat” Client option file (dsm.opt) or command line.
on page 533
detail “Detail” on page 350 Command line only.
Examples
Task
Display information about the active backup of the system state on the IBM Spectrum Protect server.
Command: query systemstate
Task
Display information about the active backup of the system state on the IBM Spectrum Protect server.
Command: query systemstate -detail
Task
Display information about the active backup of the system state that is contained within the backup
set daily_backup_data.12345678.
Command: query systemstate -backupsetname=daily_backup_data.12345678
Task
To display information about Active Directory, enter the following command: query systemstate
-detail.
Locate information that is related to Active Directory in the output.
Query VM
Use the query VM command to list and verify the successful backups of virtual machines (VMs).
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
Supported Clients
This command is valid on Windows clients that are installed on a vStorage backup server.
Syntax
Query VM vmname
BOTH options
-FROM SERVER
LOCAL
Table 88. Query VM command: Related options for VMware virtual machine queries.
Option Where to use
detail “Detail” on page 350 Command line.
Valid for vmbackuptype=fullvm
Valid for -vmrestoretype
680 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Full VM
q vm devesx04-24 -ina
Query Virtual Machine for Full VM backup
682 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
4 02/01/2017 08:59:52 DDMGMT 47.85 GB SNAPSHOT A LOCAL
devesx04-24
The size of this incremental backup: n/a
The number of incremental backups since last full: 0
The amount of extra data: 0
The IBM Spectrum Protect objects fragmentation: 0
Backup is represented by: 0 TSM objects
Application protection type: VMware
Snapshot type: VMware Tools
-----------------------------------------------------------------------------
All averages are calculated only for incremental forever backups displayed
above.
The average size of incremental backup: 186.43 MB
The average number of incremental backups since last full: 1
The average overhead of extra data: 0
The average objects fragmentation: 0
The average number of objects per backup: 49
ANS1900I Return code is 0.
The following command returns a list of VMs that are running an instant restore operation.
q vm * -vmrestoretype=instantrestore
Query all VMware virtual machines that were backed up using -vmbacktype=fullvm:
q vm * -vmbackuptype=fullvm
Related tasks
“Preparing the environment for full backups of VMware virtual machines” on page 165
Complete the following steps to prepare the VMware environment for backing up full VMware virtual
machines. The vStorage backup server can run either a Windows or Linux client.
Restart Restore
The restart restore command displays a list of your restartable restore sessions in the server
database.
You can restart only one restartable restore session at a time. Run the restart restore command
again to restart further restores.
The restarted restore uses the same options that you used in the failed restore. The restarted restore
continues from the point at which the restore previously failed.
To cancel restartable restore sessions, use the cancel restore command. Use the restart restore
command when:
• Restartable restore sessions lock the file space at the server so that files cannot be moved off the
sequential volumes of the server.
• You cannot back up files that are affected by the restartable restore.
Options from the failed session supersede new or changed options for the restarted session.
Supported Clients
This command is valid for all clients.
Syntax
RESTArt Restore
Examples
Task
Restart a restore.
Command: restart restore
Restore
The restore command obtains copies of backup versions of your files from the IBM Spectrum Protect
server, or inside a backup set.
To restore files, specify the directories or selected files, or select the files from a list. Restore files to the
directory from which you backed them up or to a different directory. The backup-archive client uses the
preservepath option with the subtree value as the default for restoring files.
Note:
1. When you restore directory, its modification date and time is set to the date and time of the restore,
not to the date and time the directory had when it was backed up. This is because the client restores
the directories first, then adds the files to the directories.
2. An error occurs if you attempt to restore a file whose name is the same the short name of an existing
file. For example, if you attempt to restore a file that you specifically named ABCDEF~1.DOC into the
same directory where a file named abcdefghijk.doc exists, the restore fails because the Windows
operating system equates the file named abcdefghijk.doc to a short name of ABCDEF~1.DOC. The
restore function treats this as a duplicate file.
If this error occurs, perform any of the following actions to correct it:
• Restore the file with the short file name to a different location.
• Stop the restore and change the name of the existing file.
• Disable the short file name support on Windows.
• Do not use file names that would conflict with the short file naming convention; for example, do not
use ABCDEF~1.DOC.
If you set the subdir option to yes when you restore a specific path and file, the client recursively
restores all subdirectories under that path, and any instances of the specified file that exist under any of
those subdirectories.
For more information, see the Microsoft Knowledge Base article Q121007, entitled How to Disable the 8.3
Name Creation on NTFS Partitions, for more information.
If the restore command is tried again because of a communication failure or session loss, the transfer
statistics display the bytes that the client attempted to transfer across all command attempts. Therefore,
the statistics for bytes transferred might not match file statistics, such as those for file size.
Supported Clients
This command is valid for all clients.
684 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Syntax
FILE
REStore
options
sourcefilespec
{ filespacename } sourcefilespec
destinationfilespec
BACKUPSETName= backupsetname
localfilename
tapedevice
LOCation= server
file
tape
Parameters
file
This parameter specifies that the source file specification is an explicit file name. This parameter is
required when you restore a file name from the current path, when you do not specify a relative or
absolute path, and when the file name conflicts with one of the reserved restore command
keywords, such as restore backupset.
sourcefilespec
Specifies the path and file name in storage that you want to restore. Use wildcard characters to
specify a group of files or all the files in a directory.
Note: If you include filespacename, do not include a drive letter in the file specification.
{filespacename}
Specifies the file space (enclosed in braces) on the server that contains the files you want to restore.
This is the name on the workstation drive from which the files were backed up.
Specify the file space name if the drive label name has changed or if you are restoring files that were
backed up from another node that had drive labels that are different from yours.
Note: You must specify a mixed or lowercase NTFS or ReFS file space name that is enclosed in
quotation marks and braces. For example, {"NTFSDrive"}. Single quotation marks or double quotation
marks are valid in loop mode. For example: {"NTFSDrive"} and {'NTFSDrive'} are both valid. In batch
mode, only single quotation marks are valid. The single quotation marks requirement is a restriction of
the operating system.
destinationfilespec
Specifies the path and file name where you want to place the restored files. If you do not specify a
destination, the client restores the files to the original source path.
When you enter the destinationfilespec, consider the following points:
• If the sourcefilespec names a single file, the destinationfilespec can be a file or a directory. If you are
restoring a single file, you can optionally end the specification with a file name if you want to give
the restored file a new name.
686 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 89. Restore command: Related options (continued)
Option Where to use
inactive “Inactive” on Command line only.
page 405
latest “Latest” on page Command line only.
432
numberformat Client options file (dsm.opt) or command line.
“Numberformat” on page
449
pick Command line only.
Note: If you specify the
backupsetname parameter
with the restore command,
you cannot use the pick
option.
“Pick” on page 454
pitdate “Pitdate” on page Command line only.
455
pittime “Pittime” on page Command line only.
456
preservepath Command line only.
“Preservepath” on page 462
replace “Replace” on page Client options file (dsm.opt) or command line.
468
skipntpermissions Client options file (dsm.opt) or command line.
“Skipntpermissions” on page
496
skipntsecuritycrc Client options file (dsm.opt) or command line.
“Skipntsecuritycrc” on page
497
subdir “Subdir” on page Client options file (dsm.opt) or command line.
519
tapeprompt “Tapeprompt” Client options file (dsm.opt) or command line.
on page 525
timeformat “Timeformat” Client options file (dsm.opt) or command line.
on page 533
todate “Todate” on page Command line only.
535
totime “Totime” on page Command line only.
536
Examples
Task
Restore a single file named budget.fin.
restore c:\devel\projecta\budget.fin
688 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restoring NTFS or ReFS volume mount points
When restoring a file system that contains a volume mount point, only the mount point (directory) is
restored. The data on the volume mounted on that directory is not restored.
A mount point can also be restored individually. For example, C:\mount is a mount point and has been
backed up as part of the C:\ drive on the system named STORMAN. The following command can be used
to restore this mount point:
The braces ({ and }) are required if you also backed up the data on the mounted volume from the mount
point. Without the braces, the client restores data from the file space with the longest name that matches
the file specification. If you backed up the data through the mount point, the backups are stored in a file
space named \\storman\c$\mount. The braces are used to specify that the data be restored from the
\\storman\c$ file space.
The mount point cannot be restored if any of the following conditions is true:
• The mount point already exists.
• A non-empty directory matching the mount point name exists.
• A file matching the mount point name exists.
Related concepts
“Restoring data on NTFS mounted volumes” on page 689
The mount point must exist before the data on the mounted volume can be restored to its original
location.
“Backing up NTFS or ReFS volume mount points” on page 647
If you perform an incremental backup of a file system on which a volume mount point exists, IBM
Spectrum Protect backs up the directory (junction) where the volume is mounted, but it does not traverse
or back up the data on the mounted volume.
“Backing up data on NTFS or ReFS mounted volumes” on page 647
Backing up a volume from the mount point is especially useful for volumes that have no drive letter
assignment. If the volume mounted on the mount point can also be referenced by drive letter, then the
volume does not have to be backed up over the mount point.
Important: If the mount point does not exist, then the data will instead be restored to the root of the
mount point's file system. For example, the following objects exists on C:\mount:
• C:\mount\projects\2009plan.doc
• C:\mount\projects\2010plan.doc
• C:\mount\master_list.xls
If the restore command (shown previously) is issued, but the mount point does not exist, then these
objects are restored to the root of the C:\ drive as follows:
• C:\projects\2009plan.doc
• C:\projects\2010plan.doc
When you restore files on a system with a different name, then you must use the UNC name to refer to the
file. This is true even if you are restoring to the same physical system, but the system name has changed
since the backup occurred.
For example, if you back up c:\doc\h2.doc on system STAR and you want to restore it to system METEOR
then you must use the UNC name to refer to the file. You must also specify a destination restore location.
This is because the default behavior is to restore the file to its original location, which would be on system
STAR. To restore the file to system METEOR, you can run either of the following on METEOR:
690 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Restore from file spaces that are not Unicode-enabled
If you want to restore from file spaces that are not Unicode-enabled, you must specify the source on the
server and a destination on the client, prior to installing the Unicode-enabled client.
If you want to restore from file spaces that are not Unicode-enabled, you must specify the source on the
server and a destination on the client. For example, you backed up your H disk named \\your-node\h$
prior to installing the Unicode-enabled client. After the installation, you issue the following command for a
selective backup:
sel h:\logs\*.log
Before the backup takes place, the server renames the file space to \\your-node\h$_OLD. The backup
continues placing the data specified in the current operation into the Unicode-enabled file space named \
\your-node\h$. That file space now contains only the \logs directory and the *.log files. If you want
to restore a file from the (old) renamed file space to its original location, you must enter both the source
and destination as follows:
Restore Adobjects
Use the restore adobjects command to restore individual Active Directory objects from the local
Deleted Objects container.
Backup-archive clients that run on Windows Server platforms can restore individual Active Directory
objects from full system-state backups stored on the IBM Spectrum Protect server.
Supported Clients
This command is valid for Windows Server OS clients.
Syntax
Restore ADOBJects
sourcepathspec options
Examples
Task
Restore a specific deleted Active Directory object.
Command: restore adobj
"CN=Administrator,CN=Users,DC=bryan,DC=test,DC=ibm,DC=com"
Task
Restore all deleted objects that were originally located in the Users container.
Command: restore adobj "CN=Users,DC=bryan,DC=test,DC=ibm,DC=com"
692 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Restore individual Active Directory objects from the IBM Spectrum Protect server. Use the pitdate
and pittime options to select from a list of more recent and less recent backup versions.
Command: restore adobj "cn=guest" -adloc=server -pitdate=03/17/2008 -
pittime=11:11:11
Task
Restore all deleted users with the name starting with Fred.
Command: restore adobjects "cn=Fred*"
Task
Restore all deleted organizational units with the name testou.
Command: restore adobjects "ou=testou"
Restore Backupset
The restore backupset command restores a backup set from the IBM Spectrum Protect server, a
local file, or a local tape device. You can restore the entire backup set, or, in some cases, specific files
within the backup set.
Supported Clients
This command is valid for all clients.
Syntax
REStore Backupset
sourcefilespec
{filespacename}
-BACKUPSETName=
destinationfilespec options
backupsetname
tapedevice file
tape
Parameters
{filespacename}
Specifies the file space (enclosed in braces) on the server that contains the files you want to restore.
This is the name on the workstation drive from which the files were backed up, or the virtual file space
name for a group.
Specify a file space name when you restore a backup set containing a group.
Specify a file space name when the sourcefilespec does not exist on the target computer. This can
occur if the drive label name has changed or if you are restoring files that were backed up from
another node that had drive labels that are different from yours.
Note: You must specify a mixed or lowercase NTFS or ReFS file space name that is enclosed in
quotation marks and braces. For example, {"NTFSDrive"}. Single quotation marks are valid in loop
mode. For example: {"NTFSDrive"} and {'NTFSDrive'} are both valid. In batch mode, only single
694 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 91. Restore Backupset command: Related options (continued)
Option Where to use
replace “Replace” on page Client options file (dsm.opt) or command line.
468
skipntpermissions Client options file (dsm.opt) or command line.
“Skipntpermissions” on page
496
subdir “Subdir” on page Client options file (dsm.opt) or command line.
519
Examples
Task
Restore the entire backup set called monthly_financial_data.87654321 from the server.
Task
Restore groups from the backup set mybackupset.12345678 on the IBM Spectrum Protect server
to the c:\newdevel\projectn directory. The groups' virtual file space is accounting.
Task
Restore the entire backup set contained in the file: c:\budget\weekly_budget_data.ost.
Task
Restore the \budget\ directory and subdirectories from the backup set contained in the file:
c:\budget\weekly_budget_data.ost.
Task
Restore the file \budget\salary.xls from the backup set contained in the file: c:\budget
\weekly_budget_data.ost.
Related information
696 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The restore backupset command restores a backup set from the IBM Spectrum Protect server, a
local file, or a local tape device. You can restore the entire backup set, or, in some cases, specific files
within the backup set.
Supported Clients
This command is valid for all clients.
Syntax
REStore Backupset
sourcefilespec
{filespacename}
backupsetname
destinationfilespec options localfilename
tapedevice
LOCation= server
file
tape
Parameters
options
All options that are valid with the preferred syntax of restore backupset are valid with the
previous syntax of restore backupset.
{filespacename}
Specifies the file space (enclosed in braces) on the server that contains the files you want to restore.
This is the name on the workstation drive from which the files were backed up, or the virtual file space
name for a group.
Specify a file space name when you restore a backup set containing a group.
Examples
Task
Restore the entire backup set called monthly_financial_data.87654321 from the server.
dsmc restore backupset monthly_financial_data.87654321 -loc=server
Task
Restore the entire backup set from the \\.\tape0 device.
dsmc restore backupset \\.\tape0 -loc=tape
Task
Restore groups from the backup set mybackupset.12345678 on the IBM Spectrum Protect server
to the c:\newdevel\projectn directory. The groups' virtual file space is accounting.
dsmc restore backupset mybackupset.12345678 {accounting}\* c:\newdevel
\projectn\ -loc=server -subdir=yes
698 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
Restore the entire backup set contained in the file: c:\budget\weekly_budget_data.ost.
dsmc restore backupset c:\budget\weekly_budget_data.ost -loc=file
Task
Restore the \budget\ directory and subdirectories from the backup set contained in the file:
c:\budget\weekly_budget_data.ost.
dsmc restore backupset c:\budget\weekly_budget_data.ost m:\budget\* -
loc=file -subdir=yes
Task
Restore the file \budget\salary.xls from the backup set contained in the file: c:\budget
\weekly_budget_data.ost.
dsmc restore backupset c:\budget\weekly_budget_data.ost m:\budget\salary.xls
-loc=file -subdir=yes
Related information
“Restore data from a backup set” on page 192
Restore Group
Use the restore group command to restore specific members or all members of a group backup.
Note:
1. Use the pick option to display a list of groups from which you can select one group to restore.
2. Use the showmembers option with the pick option to display and restore one or more members of a
group. In this case, you first select the group from which you want to restore specific members, then
you select one or more group members to restore.
3. You can restore a group from a backup set.
Supported Clients
This command is valid for all clients.
Syntax
REStore GRoup source
options destination
Parameters
source
Specifies the virtual file space name (enclosed in braces) and the group name on the server that you
want to restore.
destination
Specifies the path where you want to place the group or one or more group members. If you do not
specify a destination, the client restores the files to their original location.
Examples
Task
Restore all members in the virtfs\group1 group backup to their original location on the client
system.
Command:
Task
Display all groups within the virtfs virtual file space. Use the showmembers option to display a list
of group members from which you can select one or more to restore.
700 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Command:
Task
Display a list of groups within the virtfs virtual file space from which you can select one or more
groups to restore.
Command:
Related information
“Restore Backupset” on page 693
Restore Image
The restore image command restores a file system or raw volume image that was backed up using the
backup image command.
The restore obtains the backup image from the IBM Spectrum Protect server, or inside a backup set from
the IBM Spectrum Protect server, when the backupsetname option is specified. This command can
restore an active base image, or a point-in-time base image, with associated incremental updates.
Note:
1. The account that runs the backup-archive client must have administrator authority to successfully
perform any type of image restore.
2. If you use IBM Spectrum Protect HSM for Windows or IBM Spectrum Protect for Space Management,
and you restore a file system image backup and plan to run reconciliation, you must restore the files
that were backed up after the image backup. Otherwise, migrated files that were created after the
image backup expire from the HSM archive storage on the IBM Spectrum Protect server.
You can use the verifyimage option with the restore image command to specify that you want to
enable detection of bad sectors on the destination target volume. If bad sectors are detected on the
target volume, teh client issues a warning message on the console and in the error log.
If bad sectors are present on the target volume, you can use the imagetofile option with the restore
image command to specify that you want to restore the source image to a file. Later, you can use a data
copy utility of your choice to transfer the image from the file to a disk volume.
Considerations:
• The IBM Spectrum Protect API must be installed to use the restore image command.
• You can restore an NTFS or ReFS file system to a FAT32 volume or vice versa.
• The destination volume to which you restore must exist and be the same size or larger than the source
volume.
• The physical layout of the target volume (striped, mirrored) can differ.
• The target volume is overwritten with data contained in the image backup.
• You do not have to format a target volume before you restore an image backup that contains a file
system.
• The client requires an exclusive lock to destination volume you are restoring. The client locks, restores,
unlocks, unmounts, and mounts the volume during a restore operation. During the restore process, the
destination volume is not available to other applications.
• If you use the pick option, the following information is displayed for file system images that are backed
up by the client:
– Image Size
Supported Clients
This command is valid for all Windows clients.
Syntax
REStore Image sourcefilespec
options "sourcefilespec"
destinationfilespec
Parameters
sourcefilespec
Specifies the name of a source image file system to be restored. Only a single source image can be
specified; you cannot use wildcard characters.
destinationfilespec
Specifies the name of an existing mounted file system or the path and file name to which the source
file system is restored. The default is the original location of the file system. You can restore an NTFS
or ReFS file system to a FAT32 volume or vice versa.
702 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 93. Restore Image command: Related options (continued)
Option Where to use
incremental “Incremental” Command line only.
on page 423
noprompt “Noprompt” on Command line only.
page 447
pick “Pick” on page 454 Command line only.
pitdate “Pitdate” on page Command line only.
455
pittime “Pittime” on page Command line only.
456
timeformat “Timeformat” Client option file (dsm.opt) or command line.
on page 533
verifyimage “Verifyimage” Command line only.
on page 542
The restore image command does not define or mount the destination file space. The destination
volume must exist, must be large enough to hold the source, and if it contains a file system, must be
mounted. The destination volume must be mapped to a drive letter. If an image backup contains a file
system, and you restore them to a different location, be aware of the following points:
• If the destination volume is smaller than the source volume, the operation fails.
• If the destination volume is larger than the source, after the restore operation you lose the difference
between the sizes. If the destination volume is on a dynamic disk, the lost space can be recovered by
increasing the size of the volume. Increasing the size of the volume also increases the size of the
restored volume.
Examples
Task
Restore the e: drive to its original location.
Command: dsmc rest image e:
Task
Restore the h: drive to its original location and apply the changes from the last incremental backup of
the original image that is recorded on the server. The changes include deletion of files.
Command: dsmc restore image h: -incremental -deletefiles
Task
Restore the d: drive to its original location. Use the verifyimage option to enable detection of bad
sectors on the target volume.
Command: dsmc restore image d: -verifyimage
Task
If bad sectors present on the target volume, use the imagetofile option to restore the d: drive to
the e:\diskD.img file to avoid data corruption.
Command: dsmc restore image d: e:\diskD.img -imagetofile
Task
Restore the e: drive from the backup set weekly_backup_data.12345678 to its original location.
Command: restore image e: -backupsetname=weekly_backup_data.12345678
Related information
Restore NAS
The restore nas command restores the image of a file system that belongs to a Network Attached
Storage (NAS) file server. When you are using an interactive command-line session with a non-
administrative ID, you are prompted for an administrator ID.
The NAS file server performs the outboard data movement. A server process performs the restore.
If you used the toc option with the backup nas command or the include.fs.nas option to save
Table of Contents (TOC) information for each file system backup, you can use the QUERY TOC server
command to determine the contents of a file system backup with the RESTORE NODE server command to
restore individual files or directory trees. You can also use the web client to examine the entire file system
tree and select files and directories to restore. If you do not save TOC information, you can still restore
individual files or directory trees with the RESTORE NODE server command, if you know the fully qualified
name of each file or directory and the image in which that object was backed up.
Use the nasnodename option to specify the node name for the NAS file server. The NAS node name
identifies the NAS file server to the IBM Spectrum Protect server. You must register the NAS node name
at the server. Place the nasnodename option in your client options file (dsm.opt). The value in the client
options file is the default, but this value can be overridden on the command line.
You can use the pick option to display a list of NAS images that are owned by the NAS node you specify.
From this list, you can select one or more images to restore. If you select multiple images to restore with
the pick option, do not use the monitor option or you serialize the restores. To start multiple restore
processes simultaneously when you are restoring multiple images, do not specify monitor=yes.
Use the monitor option to specify whether you want to monitor a NAS file system image restore and
display processing information on your screen.
Use the monitor process command to display a list of current restore processes for all NAS nodes for
which your administrative user ID has authority. The administrative user ID should have at least client
owner authority over both the NAS node and the client workstation node they are using either from
command line or from the web.
Use the cancel process command to stop NAS restore processing.
A NAS file system specification uses the following conventions:
• Regardless of client platform, NAS file system specifications use the forward slash (/) separator, as in
this example: /vol/vol0.
• NAS file system designations on the command line require brace delimiters {} around the file system
names, such as: {/vol/vol0}.
Supported Clients
This command is valid for all Windows clients.
Syntax
REStore NAS sourcefilespec
options
destinationfilespec
704 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Parameters
sourcefilespec
Specifies the name of the NAS file system image you want to restore. This parameter is required
unless you use the pick option to display a list of NAS images from which to choose. You cannot use
wildcard characters when you specify the sourcefilespec.
destinationfilespec
Specifies the name of an existing mounted file system on the NAS device over which you want to
restore the image. This parameter is optional. The default is the original location of the file system on
the NAS device.
Examples
Task
Restore the NAS file system image /vol/vol1 to the /vol/vol2 file system on the NAS file server called
nas1.
Command: restore nas -nasnodename=nas1 {/vol/vol1} {/vol/vol2}
Task
Restore inactive NAS images.
Command: restore nas -nasnodename=nas2 -pick -inactive
Related information
“Nasnodename” on page 445
“Monitor” on page 441
“Cancel Process” on page 629
ANS5189E Online SystemState restore has been deprecated. Please use offline
WinPE method for performing system state restore.
Related concepts
“Recovering a computer when the Windows OS is not working ” on page 188
If the computer has a catastrophic hardware or software failure, you can recover a Windows operating
system with Automated System Recovery (ASR).
Restore VM
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments.
706 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Data protection tags that were backed up with the run backup vm command are restored with the virtual
machine. Data protection tags are used to exclude virtual machines from backups and to specify the
retention policy of backups.
Full virtual machine backups that were previously created by using VMware Consolidated Backup (VCB)
can still be restored by using the original VCB restore steps. To restore full virtual machine backups that
were created by VCB, see “Restoring full VM backups that were created with VMware Consolidated
Backup” on page 210. If you use VCB to restore a virtual machine, use the VMware converter program on
the client to move the restored files to a running state on a VMware server. If the backup-archive client is
running in a virtual machine, and if you performed a file-level backup of the virtual machine's files with the
version 7.1 or earlier client, you can restore the backup versions to the virtual machine by using the
command-line interface or the Java GUI.
Supported Clients
This command is valid on supported Windows clients that are installed on a vStorage backup server for a
VMware virtual machine.
Syntax
;
vmname1,vmname2
REStore VM
VM=vmname1,vmname2
-VM=vmname1,vmname2
vmname:vmdk=all-vmdk
vmname:vmdk=cnfg
vmname:vmdk=disk_label
vmname:-vmdk=disk_label
VMHost=host1,host2
*
<timestamp>
<date>
<time>
DATACENTER="myDatacenter"
HOST="myHost"
DATASTORE="myDatastore"
destinationfilespec
Parameters
Any parameter that contains spaces must be enclosed in quotation marks (" ").
vmname
Specify the name of one or more virtual machines that you want to restore. The name is the virtual
machine display name. Separate multiple VM names with commas (for example, vm1,vm2,vm5). If
restore vm vm=my_vm1,my_vm2
-vm=vmname
You can exclude a virtual machine from a restore operation by specifying the exclude operator (-)
before the vm= keyword.
Use the -vm= keyword to exclude a list of virtual machines from a larger group of VM backups, such as
a group of VMs that begin with a VM name pattern. For example, if you need to restore all the VMs that
start with Dept99_ but prevent vm2 from being restored, issue the following command:
restore vm vm=Dept99_*;-vm=vm2
Wildcard characters can be used with the -vm= keyword to exclude VM names that match a pattern.
For example:
• Exclude all files that have test in the host name:
-vm=*test*
• Include all virtual machines with names such as: test20, test25, test29, test2A:
vm=test2?
Note: You cannot use the exclude operator (-) to exclude a VM host domain. The exclude operator
works only at the virtual machine name level.
vmname:vmdk=all-vmdk
This option specifies that all virtual disks (*.vmdk files) are included when the virtual machine is
restored. This parameter is the default for vmdk specifications.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
vmname:vmdk=cnfg
This option specifies that the virtual machine configuration information is restored. The configuration
information is always restored when a new virtual machine is created. However, by default the
configuration is not restored when you update an existing virtual machine with selected virtual disks.
Ordinarily, restoring configuration information to an existing virtual machine fails because the
restored configuration information conflicts with the existing virtual machine configuration
information. Use this option if the existing configuration file for a virtual machine on the ESXi server
has been deleted, and you want to use the backed-up configuration to re-create it.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
708 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
vmname:vmdk=disk_label
This option is used to specify the disk label of a virtual disk to include in the restore operation. Specify
this option only if you want to restore one or more specific disks, but not all disks. Repeat this option
for each disk you want to restore.
The following considerations apply to each disk that you want to restore:
• The disk must exist on the VM before you initiate the restore operation. If the disk does not exist,
you must create it. You can use the -preview parameter to identify the original disk label, capacity,
and datastore. The -preview output does not include provisioning information.
• The existing disk must be at least as large as the disk you want to restore.
• The existing disk label must be the same as the disk you want to restore.
• Any data on the existing disk is overwritten.
Only the specified disks are restored. Other disks on the VM are not altered.
The VM that you are restoring the disk to must be powered off before you initiate the restore
operation.
Required: On the restore vm command, the label names of the vmdk files that you want to include
(with the vmname:vmdk=disk_label parameter) in a restore VM operation must be specified as the
English-language label name. The label name must be as it is displayed in the output of the -preview
parameter. Examples of the English vmdk labels are "Hard Disk 1", "Hard Disk 2", and so on.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
vmname:-vmdk=disk_label
This option is used to specify the disk label of one or more virtual disks to exclude from the restore
operation.
Required: On the restore vm command, the label names of the vmdk files that you want to include
(with the vmname:vmdk=disk_label parameter) in a restore VM operation must be specified as the
English-language label name. The label name must be as it is displayed in the output of the -preview
parameter. Examples of the English vmdk labels are "Hard Disk 1", "Hard Disk 2", and so on.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
vmhost=hostname
This option restores all virtual machines that are defined to the Virtual Center or to the ESX server that
is specified on the vmchost option. The host name that you specify must match the fully qualified
host name or IP address, as it is specified in the vCenter server Hosts and Clusters view.
Separate multiple host names with commas (for example, host1,host2,host5).
This parameter can include multiple ESX servers that are separated by commas.
When you connect directly to an ESXi or ESX host, the vmchost option applies only if the vmhost is
the server that you connect to. If it is not, a warning level message is sent to the console and is
recorded in the dsmerror.log file; it is also recorded as a server event message.
If you backed up VM templates, they are included in the restore operation.
VMName=
Specifies the new name for the virtual machine after it is restored, if you do not want to use the name
specified by the VM= parameter.
newVMname
Specify a new VM name to use for the restored VM.
The following characters are not supported in names of restored VMs:
A restore command that includes unsupported characters will fail with error message ANS9117E.
A restore command that includes unsupported characters will fail with error message ANS9117E.
VMware does not support VM names of greater than 80 characters in length.
You can use the * symbol in the following manner:
• Use the original VM name for the restored VM name by specifying vmname=*.
• Append a suffix to the original VM name for the restored VM. For example, if the original VM
name is VM1, you can append the suffix "_restored" to VM1 by specifying the following
command:
710 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
determined by the TIMEFORMAT option in the dsm.opt file. A dash is used as a delimiter for the
time that is returned by the <time> parameter.
For example, to append the suffix "_today_" after the VM named VM8, and add the restore time to
the restored VM name, issue the following command:
-datacenter=folder_name/datacenter_name
When you restore a virtual machine by using the GUI, you must restore the virtual machine to a
different location. If you restore to the original location, you cannot specify the folder name of the
data center. Without a folder name to help locate the original data center, the restore operation fails.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
HOST
Specifies the domain name of the ESX host server to restore to as it is defined in the vSphere vCenter.
This parameter is case-sensitive and must be the same value as the host name that is shown in the
VMware vSphere Web Client. To confirm the host name in the vSphere Web client, select a host and
click Manage > Networking > TCP/IP configuration > DNS.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
DATASTORE
Specifies the VMware datastore to restore the virtual machine to. The datastore can be on a SAN,
NAS, iSCSI device, or VMware virtual volume (VVOL). You can specify only one datastore when you
restore a virtual machine. If you do not specify a datastore parameter, the virtual machine's VMDK
file is restored to the datastore it was on when the backup was created.
Note: This parameter is not valid for restoring VMware virtual machines that were backed up using
VCB.
-PREView
Use this parameter to verify the results of a restore operation without restoring any VMs. The -
preview parameter provides a list of VMs that will be restored and information about the VMs, such
as labels of the hard disks in the VM, and the management class for a VM.
When you issue the -preview parameter with the restore vm command, the restore operation
does not start. The restore operation starts only if the -preview parameter is removed from the
command.
For more information, see “Preview virtual machine restore operations” on page 716.
destinationfilespec
This parameter applies only to VMware VCB restore operations. It specifies the location where VCB
full virtual machine image files are restored. If this option is not specified, the vmbackdir option is
used.
712 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 95. Restore VM command: Related options used for restoring VMware virtual machines (continued)
Option Where to use
vmiscsiadapter Command line or client options file.
This parameter is only valid when either
instantaccess or instantrestore is specified
for the vmrestoretype value.
Tip about the final statistics: If you are running multiple restore sessions, the value that is displayed in
the Data transfer time field in the final statistics can be higher than the value in the Elapsed processing
time field. The data transfer time is the sum of the times that each restore operation takes to send data
across the network. This number does not include the time for the data mover to read the data from disk
before sending it, nor the time to wait for server transactions to complete. This number can be greater
than the elapsed processing time if the operation uses multiple concurrent sessions to move data, such
as multi-session restore operations. This value includes the time that it takes to send data more than
once due to retry operations.
Examples
Task
To perform an instant restore or instant access operation from the command line, see Scenarios for
running instant access and instant restore from the backup-archive client command line.
Task
Restore the most recent backup version of myvm to a new virtual machine that is created with the
name "Test Machine", and with the restore target for the data center, ESX host, and datastore all
specified on the command.
Task
Restore the most recent backup version of myvm with the new name myvm_restored.
Task
Restore the most recent backup version of myvm with a new name, showing date and time, similar to
myvm_03-22-2017_14-41-24.
Task
Restore the most recent backup version of myvm. Restore to a data center named mydatacenter. The
data center is within the vCenter; the relative path within the vCenter is dirA/datacenters/.
Task
Restore a virtual machine template back to the same location and name.
Task
Restore a virtual machine template to a new location.
Task
Restore only Hard Disk 2 and Hard Disk 3 to the existing virtual machine that is named vm1.
Task
Restore all disks to the existing virtual machine named vm1, but do not restore the data from Hard
Disk 4.
Task
Restore only the data from Hard Disk 1 to the existing virtual machine vm1; do not update any
configuration information.
714 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Note: When you restore an existing virtual machine, the default behavior is to not update the
configuration information.
Task
Restore all disks to the existing virtual machine named vm1.
This command updates all virtual disks on an existing virtual machine, named vm1. Note that this
action is different from the action that is performed by dsmc restore vm vm1, which creates a new
virtual machine named vm1 (vm1 must not exist in order for dsmc restore vm vm1 to succeed).
Task
Set a maximum of three sessions to be used for restore operations for virtual disks in the VM vm1:
Task
Restore the VM named Accounts and all VMs that begin with Dept99:
Task
Restore all VMs that begin with the word "Payroll" but exclude any VMs that contain the word "temp"
in the name:
Task
Restore the virtual machines VM1, VM2, and VM3 with new VM names that are based on the original
VM names. Append the suffix "_restored_" and the date and time of the restore operation to the VM
name:
Task
Restore all virtual machines on ESXi hosts named brovar, doomzoo, and kepler:
dsmc restore vm
vmhost=brovar.example.com,doomzoo.example.com,kepler.example.com
Task
Verify that the VM named Dept99_VM1 is restored correctly without restoring the VM:
Important: For Windows virtual machines: If you attempt to run a full VM restore of an application
protection backup that was created with 2 or more snapshot attempts, the system provider snapshot is
present on the restored VM. As the application writes to the disk, the shadow storage space grows until it
runs out of disk space.
VMNAME
DATACENTER
DATASTORE
HOST
716 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
• The following options are displayed when they are set in the client options file:
VMDEFAULTDVPORTGROUP
VMDEFAULTDVSWITCH
VMDEFAULTNETWORK
• The following option is always displayed only during previews of non-instant restore operations:
VMBACKDIR
The value that is returned for this option is the directory CTL files that are cached for both backup and
restore operations.
• The following options are displayed when set during previews of instant access restore operations:
VMDISKPROVISION
VMAUTOSTARTVM
When you issue the -preview parameter with the restore vm command, the restore operation does
not start. The restore operation starts only if the -preview parameter is removed from the command.
Examples
Task
Preview the operation to restore the VM named VM8, and exclude the disk Hard Disk 1. The VM is
restored to the ESXi host server esx03 with a new VM name that ends with -restore.
The command also displays the port group for the NICs to use, the distributed virtual switch
(dvSwitch) that contains the port group, and the network for the NICs to use during the restore
operation.
Command output:
1. VM Name: 'VM8'
Mode: 'Incremental Forever - Full'
Backup Time: IFFULL 05/22/2017 11:08:33
Task
Preview the instant restore operation of the VM named VM8, which also excludes the disk Hard Disk
1. The VM is restored to the ESXi host server esx03 with a new VM name that ends with -restore.
Command output:
1. VM Name: 'VM8'
Mode: 'Incremental Forever - Full'
Backup Time: IFFULL 05/22/2017 11:08:33
Related reference
“Restore VM” on page 706
Use the restore vm command to restore a virtual machine (VM) that was previously backed up.
Retrieve
The retrieve command obtains copies of archived files from the IBM Spectrum Protect server. You can
retrieve specific files or entire directories.
Use the description option to specify the descriptions that are assigned to the files you want to
retrieve.
Use the pick option to display a list of your archives from which you can select an archive to retrieve.
Retrieve the files to the same directory from which they were archived, or to a different directory. he
backup-archive client uses the preservepath option with the subtree value as the default for restoring
files.
Note:
1. When a directory is retrieved, its modification date and time is set to the date and time of the retrieve,
not to the date and time the directory had when it was archived. This is because the backup-archive
client retrieves the directories first, then adds the files to the directories.
2. An error occurs if you attempt to retrieve a file whose name is the same as the short name of an
existing file. For example, if you attempt to retrieve a file you specifically named ABCDEF~1.DOC into
the same directory where a file named abcdefghijk.doc exists, the retrieve fails because the
718 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Windows operating system equates the file named abcdefghijk.doc to a short name of
ABCDEF~1.DOC. The retrieve function treats this as a duplicate file.
If this error occurs, perform any of the following actions to correct it:
• Retrieve the file with the short file name you specified to a different location.
• Stop the retrieval, and change the name of the existing file.
• Disable the short file name support on Windows.
• Do not use file names that conflict with the short file naming convention. For example, do not use
ABCDEF~1.DOC.
The workstation name is part of the file name. Therefore, if you archive files on one workstation and you
want to retrieve them to another workstation, you must specify a destination. This is true even if you are
retrieving to the same physical workstation, but the workstation has a new name. For example, to retrieve
the c:\doc\h2.doc file to its original directory on the workstation, named star, you would enter:
The workstation named star has been renamed and the new name is meteor. To retrieve the c:\doc
\h2.doc file to meteor, you would enter:
You can enter the command in either of the preceding ways because if the workstation name is not
included in the specification, the local workstation is assumed (meteor, in this case).
Supported Clients
This command is valid for all clients.
Syntax
RETrieve sourcefilespec
options { filespacename } sourcefilespec
destinationfilespec
Parameters
sourcefilespec
Specifies the path and file name that you want to retrieve. Use wildcard characters to specify a group
of files or all the files in a directory.
Note: If you include filespacename, do not include a drive letter in the file specification.
{filespacename}
Specifies the file space (enclosed in braces) on the server that contains the files you want to retrieve.
This name is the drive label on the workstation drive from which the files were archived.
Use the file space name if the drive label name has changed, or if you are retrieving files that were
archived from another node that had drive label names that are different from yours.
Note: You must specify a mixed or lowercase NTFS or ReFS file space name that is enclosed in
quotation marks and braces. For example, {"NTFSDrive"}. Single quotation marks or quotation marks
are valid in loop mode. For example: {"NTFSDrive"} and {'NTFSDrive'} are both valid. In batch mode,
720 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Table 96. Retrieve command: Related options (continued)
Option Where to use
tapeprompt “Tapeprompt” Client options file (dsm.opt) or command line.
on page 525
timeformat “Timeformat” Client options file (dsm.opt) or command line.
on page 533
todate “Todate” on page Command line only.
535
totime “Totime” on page Command line only.
536
Examples
Task
Retrieve a single file named budget.fin.
ret c:\devel\projecta\budget.fin
Task
Retrieve all files with an extension of .c from the c:\devel\projecta directory.
ret c:\devel\projecta\*.c
Task
Retrieve all files with a file extension of .c from the \devel\projecta directory on the winnt file
space.
ret {winnt}\devel\projecta\*.c
Task
Retrieve all files in the c:\devel directory.
ret c:\devel\*
Task
Retrieve files from the abc file space proj directory.
ret {abc}\proj\*.*
Task
Retrieve all files with a file extension of .c from the c:\devel\projecta directory to the
c:\newdevel\projectn\projecta directory. If the \projectn or the \projectn\projecta
directory does not exist, it is created.
ret c:\devel\projecta\*.c c:\newdevel\projectn\
Task
Retrieve files in the c:\project directory. Use the pick option.
ret c:\project\* -pick
Task
Retrieve a file from the renamed file space \\your-node\h$_OLD to its original location. Enter both
the source and destination as follows:
ret \\your-node\h$_OLD\docs\myresume.doc h:\docs\
Related information
“Client options reference” on page 309
arc h:\logs\*.log
Before the archive takes place, the server renames the file space to \\your-node\h$_OLD. The archive
continues placing the data specified in the current operation into the Unicode-enabled file space named \
\your-node\h$. That file space now contains only the \logs directory and the *.log files. If you want
to retrieve a file from the (old) renamed file space to its original location, you must enter both the source
and destination as follows:
Schedule
The schedule command starts the client scheduler on your workstation. The client scheduler must be
running before scheduled work can start.
Note:
1. The schedule command cannot be used if the managedservices option is set to schedule.
2. This command is valid only on the initial command line. It is not valid in interactive mode or in a macro
file.
If the schedmode option is set to polling, the client scheduler contacts the server for scheduled events at
the hourly interval you specified with the queryschedperiod option in your client options file (dsm.opt).
If your administrator sets the queryschedperiod option for all nodes, that setting overrides the client
setting.
If you are using TCP/IP communications, the server can prompt your workstation when it is time to run a
scheduled event. To do so, set the schedmode option to prompted in the client options file (dsm.opt) or
on the schedule command.
722 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
After you start the client scheduler, it continues to run and to start scheduled events until you pressCtrl
+Break , restart the workstation, or turn off the workstation to end it.
Note: You cannot enter this command in interactive mode.
Supported Clients
This command is valid for all clients.
Syntax
SCHedule
options
Parameters
Examples
Task
Start the client scheduler.
Command: dsmc sch –password=notell
When you run the schedule command, all messages that regard scheduled work are sent to the
dsmsched.log file or to the file you specify with the schedlogname option in your client options file
(dsm.opt). If you do not specify a directory path with the file name in the schedlogname option, the
dsmsched.log resides in the current working directory.
Important: To prevent log write failures and process termination in certain cases, set the DSM_LOG
environment variable to name a directory where default permissions allow the required access.
Selective
The selective command backs up files that you specify. If you damage or mislay these files, you can
replace them with backup versions from the server.
When you run a selective backup, all the files are candidates for backup unless you exclude them from
backup, or they do not meet management class requirements for serialization.
During a selective backup, copies of the files are sent to the server even if they did not change since the
last backup - which can result in more than one copy of the same file on the server. If this occurs, you
might not have as many different down-level versions of the file on the server as you intended. Your
version limit might consist of identical files. To avoid this, use the incremental command to back up
only new and changed files.
You can selectively back up single files or directories. You can also use wildcard characters to back up
groups of related files.
If you set the subdir option to yes when you back up a specific path and file, the client recursively backs
up all subdirectories under that path, and any instances of the specified file that exist under any of those
subdirectories.
During a selective backup, a directory path might be backed up, even if the specific file that was targeted
for backup is not found. For example, the following command still backs up dir1 and dir2 even if the file
bogus.txt does not exist.
selective c:\dir1\dir2\bogus.txt
If the selective command is retried because of a communication failure or session loss, the transfer
statistics displays the number of bytes that the client attempts to transfer during all command attempts.
Therefore, the statistics for bytes transferred might not match the file statistics, such as those for file size.
Supported Clients
This command is valid for all clients.
Syntax
Selective filespec
options
Parameters
filespec
Specifies the path and name of the file you want to back up. Use wildcard characters to include a
group of files or to include all files in a directory.
To include multiple file specifications, separate each filespec with a space character. If multiple file
specifications are included, and two or more of the specifications have common parent directories,
then it is possible for the common directory objects to be backed up more than once. The conditions
under which this behavior occurs are runtime-dependent, but the behavior itself has no adverse
effects.
For example if the filespec is C:\proposals\drafts\ice.doc C:\proposals\drafts
\fire.doc, then C:\proposals and C:\proposals\drafts might be backed up twice. The file
objects ice.doc and fire.doc are backed up only once.
724 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
If you want to avoid including the shared parent directory more than once, use separate, non-
overlapping selective commands to back up each file specification.
If you back up a file system, include a trailing slash (C:\).
You can specify as many file specifications as available resources or other operating system limits
allow.
You can use the filelist option, instead of file specifications, to identify which files to include in
this operation. However, these two methods are mutually exclusive. You cannot include file
specification parameters and use the filelist option. If the filelist option is specified, any file
specifications that are included are ignored.
Examples
Task
Back up the proja.dev file in the c:\devel directory.
Command: sel c:\devel\proja.dev
Task
Back up all files in the c:\devel directory whose file names begin with proj.
Command: sel c:\devel\proj*.*
Task
Back up all files in the c:\devel directory whose file names begin with proj. Back up all files with a
file extension of .fin in the c:\planning directory.
Command: sel c:\devel\proj* c:\planning\*.fin
Task
Assuming that you initiated a snapshot of the C:\ drive and mounted the snapshot as \\florence\c
$\snapshots\snapshot.0, run a selective backup of the c:\dir1\sub1 directory tree from the
local snapshot and manage it on the IBM Spectrum Protect server under the file space name C:\.
Command: dsmc sel c:\dir1\sub1\* -subdir=yes -snapshotroot=\\florence\c$
\snapshots\snapshot.0
Related information
“Autofsrename” on page 320
“Include options” on page 407
726 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Set Access
The set access command gives users at other nodes access to your backup versions or archived
copies.
You can also use the set access command to give users at other nodes access to your backup images.
You can give another user access to a specific file or image, multiple files or images, or all files in a
directory. When you give access to another user, that user can restore or retrieve your objects. Specify in
the command whether you are giving access to archives or backups.
For VMware virtual machines, you can give a user at another node access to the backups of a specific
virtual machine.
When a node is exported to another IBM Spectrum Protect server, the access rules can change on the
importing server. If an access rule is applied to all file spaces on the exporting server, the access rule on
the importing server is restricted to only those file spaces that are imported. The file spaces are restricted
in the access rule on the importing server for security reasons. Additionally, the access rules do not
recognize the first occurrence of a wildcard character in the file specification when you restore or retrieve.
This means that if you restore or retrieve with a wildcard character in the file specification, subdirectories
are ignored.
Tip: If you export a node to another IBM Spectrum Protect server, do not use a single wildcard character
as the file specification in the access rule. Instead, create an access rule for each filespace.
Note: You cannot give access to both archives and backups using a single command.
When an existing file space is renamed during Unicode conversion, any access rules that are defined for
the file space remain applicable to the original file space. However, new access rules must be defined to
apply to the new Unicode file space.
Supported Clients
This command is valid for all clients.
Syntax
SET Access Archive filespec
image-fs
TYPE=VM vmname
node
Parameters
Archive
Permits access to archived files or images.
Backup
Permits access to backup versions of files or images.
filespec
Specifies the path, file, image, or directory to which your are giving access to another node or user.
Use wildcard characters to specify a group of files or images, or all files in a directory; all objects in a
directory branch; or all objects in a drive. However, you cannot use a wildcard to specify all drives. Use
a single asterisk "*" for the file spec to give access to all files or images owned by you and backed up
on the server. When the command set access backup "*" node is entered, no check is made
with the server; it is assumed you have at least one object backed up.
To allow access to all files in all directories in and below the d:\test directory, enter:
{filespacename}
Specifies the file space name (enclosed in braces) on the server that contains the files to which you
are giving access. This name is the drive label name on the workstation drive from which the file was
backed up or archived. Use the file space name if the drive label name has changed.
image-fs
The name of the image file system to be shared. This can be specified as an asterisk (*) to allow
access to all images owned by the user granting access.
-TYPE=VM vmname
This parameter is required if you are using this command to provide another user with access to
VMware virtual machine backups. The vmname option can be specified only if -TYPE=VM is specified;
vmname is the name of the VMware virtual machine that you are permitting access to.
node
Specifies the client node of the user to whom you are giving access. Use wildcards to give access to
more than one node with similar node names. Use an asterisk (*) to give access to all nodes.
728 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Examples
Task
Give the user at node_2 authority to restore all files with an extension of .c from the c:\devel
\proja directory.
set access backup c:\devel\proja\*.c node_2
Task
Give the user at node_3 authority to retrieve all files in the c:\devel directory, but do not permit
access to files in subdirectories of c:\devel, such as c:\devel\proj.
set access archive c:\devel\* node_3
Task
Give all nodes whose names end with bldgb the authority to restore all backup versions from all
directories on the d: drive. The d: drive has the file space name of project.
set ac b {project}\*\* *bldgb
Task
Give the node named myOtherNode the authority to restore files backed up by the VMware virtual
machine named myTestVM.
set access backup -TYPE=VM myTestVM myOtherNode
Set Event
Using the set event command, you can specify the circumstances for when archived data is deleted.
You can use the set event command in the following ways:
• Prevent the deletion of data at the end of its assigned retention period (Deletion hold)
• Allow the expiration to take place, as defined by the archive copy group (Release a deletion hold)
• Start the expiration clock to run when a particular event occurs (Notify the server that an event
occurred)
Objects that are affected can be specified with a standard file specification (including wildcards), a list of
files whose names are in the file that is specified using the filelist option, or a group of archived files
with the description specified with the description option.
Note: When only a <filespec> is used, all archived copies of files or folders that match the filespec are
affected. If you want to affect certain versions of a file, use the -pick option and select from the
displayed list.
Supported Clients
This command is valid for all clients.
Release
Activateretention
Parameters
TYPE=
Specifies the event type setting. This parameter must be specified.
hold
Prevents the object from being deleted regardless of expiration policy.
release
Allows normal event-controlled expiration to take place.
activateretention
Signals the server that the controlling event occurred and starts to run the expiration clock.
-pick
Provides a list of objects from which the user can select to apply the event.
The following options can also be used and serve their usual purpose:
• Dateformat
• Numberformat
• Noprompt
• Subdir
• Timeformat
Examples
Task
The following example displays the verbose and statistics output from the set event command set
event type=hold \\user\c$\tsm521\debug\bin\winnt_unicode\dsm.opt, with objects
rebound (as opposed to archived or some other notation).
730 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Task
The -pick option used with the set event command set event type=activate \user\c$
\tsm521\common\winnt shows the event type instead of the command name:
Related information
“Dateformat” on page 344
“Numberformat” on page 449
“Noprompt” on page 447
“Subdir” on page 519
“Timeformat” on page 533
Set Netappsvm
The set netappsvm command associates the logon credentials for a cluster management server, which
are specified on the set password command, with a NetApp storage virtual machine, and the data
storage virtual machine (SVM) name (data Vserver). You must enter this command before you can create
a snapshot difference incremental backup of a clustered NetApp volume.
This command is typically entered only once. The parameters are stored and are reused the next time
that you backup a clustered volume that is managed by the storage virtual machine. If you move an
storage virtual machine to another cluster management server, you must reenter this command and
specify the new cluster management server. If necessary, change the login credentials by using the set
password command.
Supported clients
This command is valid for Windows clients that perform snapshot difference backups of clustered-data
ONTAP-c-mode file-server volumes.
Syntax
SET NETAPPSVM svm_hostname cms_hostname svm_name
-remove svm_hostname
Parameters
svm_hostname
Specifies the host name or IP address of the storage virtual machine that manages the volumes and
logical interfaces (LIFs), for the volumes that you want to protect.
cms_hostname
Specifies the host name or IP address of the cluster management server. Specify the same host name
that you specified for this cluster management server when you used the set password command
to establish the login credentials.
Examples
Configure the credentials and access to a storage virtual machine:
Remove the associations that were created for the storage virtual machine:
Related tasks
“Protecting clustered-data ONTAP NetApp file server volumes” on page 75
You can create a snapshot differential incremental backup of a volume on a NetApp file server that is part
of a clustered-data ONTAP configuration (c-mode file server).
Set Password
The set password command changes the IBM Spectrum Protect password for your workstation, or sets
the credentials that are used to access another server.
If you omit the old and new passwords when you enter the set password command, you are prompted
once for the old password and twice for the new password.
Passwords can be up to 63 character in length. Password constraints vary, depending on where the
passwords are stored and managed, and depending on the version of the IBM Spectrum Protect server
that your client connects to.
If your IBM Spectrum Protect server is at version 6.3.3 or later, and if you use an LDAP directory
server to authenticate passwords
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are case-sensitive and are subject to more restrictions that can be imposed by LDAP
policies.
If your IBM Spectrum Protect server is at version 6.3.3 or later, and if you do not use an LDAP
directory server to authenticate passwords
Use any of the following characters to create a password:
a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 . ! @ # $ % ^ & * _ - + = ` ( )
| { } [ ] : ; < > , ? / ~
Passwords are stored in the IBM Spectrum Protect server database and are not case-sensitive.
Remember:
732 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
On the command line, enclose all parameters that contain one or more special characters in quotation
marks. Without quotation marks, the special characters can be interpreted as shell escape characters, file
redirection characters, or other characters that have significance to the operating system.
On Windows systems:
Enclose the command parameters in quotation marks (").
Command line example:
dsmc set password "t67@#$%^&" "pass2><w0rd"
Quotation marks are not required when you type a password with special characters in an options file.
Supported Clients
This command is valid for all clients.
The following parameters apply to VMware operations, which are available only if you are using the client
as a data mover for IBM Spectrum Protect for Virtual Environments: Data Protection for VMware.
• TYPE=DOMAIN
• TYPE=VM
• TYPE=VMGUEST
Syntax
SET Password
oldpw newpw
TYPE=TSM
TYPE=DOMAIN
TYPE=FASTBack
TYPE=FILER
TYPE=VM
TYPE=VMGUEST ALLVM
Parameters
oldpw
Specifies the current password for your workstation.
newpw
Specifies the new password for your workstation.
other_server other_user_id other_password
These three parameters specify the attributes that the client uses to access another server, such as a
filer or an ESXi host.
other_server
Specifies the host name or IP address of the server that the client can access to protect files.
other_user_id
The user ID of an account on the server that the client uses to log on to the other server. The
account must have the privileges that are necessary to perform the operations that are run after
the user is logged on to the other server.
other_password
The password that is associated with the user ID on the other server.
where:
VALidate
Validates the Windows domain administrator credentials before the credentials are stored. If the
validation fails, the credentials are not stored, and users are not able to log in to the file restore
interface. The validate parameter is valid only with the TYPE=DOMAIN parameter.
administrator_name
Specifies the account name of a domain administrator. The account name must contain the
Windows domain name and the administrator ID. The account name must be in the following
format:
domain_name\administrator_ID
password
Specifies the password that is associated with the specified domain administrator account.
For more information about configuration requirements for remote mount proxy nodes, see the IBM
Spectrum Protect for Virtual Environments: Data Protection for VMware documentation.
Use TYPE=FastBack, on Linux and Windows clients, to store the Tivoli Storage Manager FastBack
credentials that are required for mounting and dismounting the FastBack volumes on the Windows
FastBack Disaster Recovery Hub server.
The password file on the vStorage backup server must have either the Windows administrator ID for
the VMware virtual center system, or the UNIX user ID for a specific ESX server. For a proxy backup
for FastBack, the password file must contain the FastBack administrator ID and password. Here are
some examples:
Important: You must define the user credentials that are required to mount and unmount FastBack
volumes from a repository to the backup-archive client before you enter the backup-archive FastBack
subcommand. Use the fbserver option to define the credentials.
Here is a brief description of the various configurations and credentials that you need:
• The backup-archive client is installed on a dedicated vStorage backup server. The client on the
vStorage backup server must connect to multiple network share repositories.
Follow these steps for each of the network share repositories where the client is connected:
1. Configure the repository for remote network access from FastBack Manager. Refer to the Tivoli
Storage Manager FastBack product documentation on IBM Knowledge Center at http://
www.ibm.com/support/knowledgecenter/SS9NU9/welcome.
This step establishes a domain name, a network share user ID, and a network share password to
connect remotely to the repository.
734 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
2. On the backup-archive client workstation, manually enter the following command:
The fbserver option specifies the short host name of the FastBack server workstation. For the
FastBack DR Hub, the fbserver option specifies the short name of the workstation where the DR
Hub is installed.
Networkaccessuserid is either the Windows administrator ID or the FastBack administration
password.
Domain is the domain name of the user ID.
Networkaccesspassword is either the Windows administrator ID or the FastBack administration
password.
3. These credentials are retrieved based on the short host name that you specify with the fbserver
option.
Use TYPE=FILER, on Linux and Windows systems to specify that this password is for snapshot
difference operations on a file server.
For TYPE=FILER, you must specify a file server name, and the user ID and the password that is used
to access the file server. For example: dsmc set password -type=filer myfiler filerid
filerpasswd.
When you specify TYPE=FILER, the password is stored in the password (TSM.sth) file without
validating that the password is valid. Passwords that are stored with TYPE=FILER can be shared
between client nodes. For example, a password that is stored by NODE_A can be used by NODE_B.
Only one set of credentials is stored per file server.
Use TYPE=VM to set the password that is used to log on to an ESX or vCenter server.
where:
hostname
Specifies the VMware VirtualCenter or ESX server that you want to back up, restore, or query. This
host name must match the host name syntax that is used in the vmchost option. That is, if
vmchost uses an IP address instead of a host name, this command must provide the IP address,
and not a short host name or a fully qualified host name.
administrator
Specifies the account that is needed to log on to the vCenter or ESXi host.
password
Specifies the password that is associated with the login account that you specified for the vCenter
or ESXi administrator.
Use the Preferences editor to set the vmchost, vmcuser, and vmcpw options.
You can also set the vmchost option in the client options file and then use the set password
command to associate that host name with the administrator account and the administrative
account password that is used to log on to that host. For example, set password TYPE=VM
myvmchost.example.com administrator_name administrator_password.
Use TYPE=VMGUEST, on Linux and Windows clients, if you use the INCLUDE.VMTSMVSS option to
protect a virtual machine. Use the following format for the set password command:
where:
guest_VM_name
Specifies the name of the virtual machine guest that you want to protect.
You can also set a combination of shared and individual credentials. For example, if most virtual
machines in your environment use the same credentials, but a few virtual machines use different
credentials, you can use multiple set password commands to specify the credentials. For example,
assume that most virtual machines use "Administrator1" as the login name and "Password1" as the
password. Assume also that one virtual machine, named VM2, uses "Administrator2" as the login
name and "Password2" as the password. The following commands are used to set the credentials for
this scenario:
set password -type=vmguest ALLVM Administrator1 Password1 (sets credentials for
most of the VMs).
set password -type=vmguest VM2 Administrator2 Password2 (sets unique credentials
for VM2).
Examples
The following examples use the set password command.
Task
Change your password from osecret to nsecret.
set password osecret nsecret
Task
Set up a user ID and password for the root user on the file server myFiler.example.com.
dsmc set password -type=filer myFiler.example.com root
Please enter password for user id "[email protected]": ******** Re-
enter the password for verification:******** ANS0302I Successfully done.
Task
Set up a user ID and password for the root user on the file server myFiler.example.com.
dsmc set password -type=filer myFiler.example.com root secret
Task
Set up a user ID and password for the FastBack server myFastBackServer. Use the -fbserver
option in the archive fastback and backup fastback commands for the server name.
dsmc set password -type=FASTBack myFastBackServer myUserId "pa$sword"
Important:
1. The dsmc set password -type=fastback command must be repeated on a dedicated client
proxy workstation once for each FastBack repository where the backup-archive client is expected
to connect.
2. For network share repositories, issue the dsmc set password -type=fastback command in
this format: dsmc set password -type=fastback myFBServer domainName:userId
password.
736 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The server name that is specified, which is myFBServer in this example, must match the name
that you specify on the -fbserver option on a backup fastback or archive fastback
command.
3. For the FastBack server or the FastBack Disaster Recovery Hub, the user ID and password that are
specified must have FastBack administrator privileges.
You must issue the dsmc set password -type=fastback command once for each FastBack
Server branch repository on the FastBack DR Hub that the backup-archive client is expected to
connect to.
Task
Set up the Windows domain administrator credentials that are necessary for users to log in to the file
restore interface and save the Windows domain credentials. In this example, the Windows domain in
which all user accounts are registered is called example_domain. Kev_the_admin is the Windows
domain administrator ID and pas$word! is the corresponding password for the administrator.
dsmc set password -type=domain -val "example_domain\Kev_the_admin" "pas
$word!"
Related reference
“Snapdiff” on page 498
Using the snapdiff (snapshot difference) option with the incremental command streamlines the
incremental backup process. The command runs an incremental backup of the files that were reported as
changed by NetApp instead of scanning all of the volume for changed files.
Set Vmtags
The set vmtags command creates data protection tags and categories that can be added to VMware
inventory objects. You can manage IBM Spectrum Protect backups of virtual machines in these VMware
objects by specifying the tags with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
If you are using the IBM Spectrum Protect vSphere Client plug-in to manage backups, you do not need to
run the set vmtags command first. The tags and categories are created for you.
If you are writing scripts to apply these tags to VMware inventory objects, you need only to issue the set
vmtags command once so that data protection tags are created before they are added to the VMware
inventory.
You can manage virtual machine backups at the following VMware inventory object levels:
• Datacenter
• Folder (Host and Cluster folders and VM and Template folders)
• Host
• Host cluster
• Resource pool
• Virtual machine
For the list of supported tags, see "Supported data protection tags."
For tags that are related to schedules, the virtual machines must be in a protection set that is protected
by a schedule. A protection set consists of the virtual machines in a container that is assigned the
Schedule (IBM Spectrum Protect) tag.
After running the set vmtags command, you can assign the tags to VMware objects to manage the
protection of virtual machines. For example, you can exclude or include virtual machines in scheduled
backup services, specify the retention policy for backups, set the data consistency of snapshots, or select
the virtual machine disks to protect.
Supported clients
This command is valid on supported Windows 64-bit clients that are installed on a vStorage backup
server that protects VMware assets.
Syntax
SET VMTAGS
Parameters
No parameters are required for this command.
Examples
Task
Create data protection tags and categories that can be added to VMware inventory objects:
Related concepts
“Management classes and copy groups” on page 255
A management class is a collection of backup and archive copy groups that establishes and contains
specific storage management requirements for backing up and archiving data.
Related reference
“Supported data protection tags” on page 739
IBM Spectrum Protect data protection tags can be assigned to VMware inventory objects to control how
virtual machine backups are managed.
“Vmchost” on page 548
Use the vmchost option with the backup VM, restore VM, or query VM commands to specify the host
name of the VMware VirtualCenter or ESX server that you want to backup, restore, or query.
“Vmtagdatamover” on page 582
Use the vmtagdatamover option to enable tagging support in the backup-archive client (data mover).
When this option is enabled, the client manages backups of virtual machines in VMware inventory objects
according to the data protection tags that are set by the IBM Spectrum Protect vSphere Client plug-in of
the vSphere Web Client, or set with tools such as VMware vSphere PowerCLI Version 5.5 R2 or later.
“Set Password” on page 732
738 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
The set password command changes the IBM Spectrum Protect password for your workstation, or sets
the credentials that are used to access another server.
This feature is available only if the client operates as a data mover for IBM Spectrum Protect for
Virtual Environments: Data Protection for VMware.
If you use the IBM Spectrum Protect vSphere Client plug-in to configure backup policy, you do not need to
manually assign the tags and categories to inventory objects. You can use the IBM Spectrum Protect
window to specify data protection settings for inventory objects in the vSphere Web Client. This action is
equivalent to assigning tags to an inventory object.
If you use scripting tools for tagging, you can use the set vmtags command on the data mover
command line to create the tags and categories in the vSphere inventory.
740 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Category Tag Tag description
Schedule (IBM Spectrum Schedule_name The schedule to use for
Protect) backups by IBM Spectrum
Protect
Schedule (IBM Spectrum Schedule_group The schedule group to use
Protect) for backups by IBM
Spectrum Protect
Snapshot Attempts (IBM quiesce,nonquiesce The number of quiesced
Spectrum Protect) and nonquiesced snapshots
to attempt by IBM
Spectrum Protect before
the backup fails
1 This category and tag apply only to virtual machines that are stored in a VVOL datastore.
IBM Spectrum Protect category and tag names are case sensitive. The category and tag combinations are
defined as follows:
Application Protection (IBM Spectrum Protect)
Enabled
Notifies virtual machine applications that a backup is about to occur. This category and tag
combination allows an application to truncate logs and commit transactions so that the
application can resume from a consistent state when the backup is completed.
When a virtual machine is assigned this category and tag, application protection is provided by
IBM Spectrum Protect. The data mover freezes and thaws VSS writers and truncates application
logs. If a virtual machine is not assigned this tag, application protection is provided by VMware,
which freezes and thaws the VSS writers, but does not truncate application logs.
You can assign this tag and category only to virtual machines.
When you assign this category and tag to a virtual machine, you must complete an additional
configuration step. On each data mover that you are using to back up virtual machines, store the
guest virtual machine credentials to Data Protection for VMware by running the following
command from the data mover command line:
Where vm_guest_display_name specifies the name of the guest virtual machine as shown in the
VMware vSphere Web Client.
This command stores the guest virtual machine credentials, which are encrypted on the system
that hosts the data mover. The following minimum permissions are required for guest_admin_ID
guest_admin_pw:
Backup rights: Microsoft Exchange Server 2013 and 2016: Organization Management
permissions (membership in the management role group, Organization Management)
Backup rights: Microsoft SQL Server 2014 and 2016: Organization Management permissions
(membership in the management role group, Organization Management)
If you use the same credentials to log on to multiple virtual machines that are enabled for
application protection, you can set the password for the all of the virtual machines by specifying
the allvm parameter in the following command:
If you need to enable truncation of the SQL server logs after a backup is completed, remove the
EnabledKeepSqlLog tag and assign the Application Protection (IBM Spectrum
Protect) Enabled category and tag to the virtual machine. In this case, the data mover does
not back up the SQL log files.
If you do not set this tag, Microsoft SQL Server logs are not retained during application protection
enabled backup. This tag cannot be inherited.
This tag overrides the keepsqllog parameter in the include.vmtsmvss option.
Backup Management (IBM Spectrum Protect)
Excluded
Excludes the virtual machines in an inventory object from scheduled backup services.
Included
Includes the virtual machines in an inventory object in scheduled backup services. This tag is the
default for the Backup Management (IBM Spectrum Protect) category and typically does
not need to be set.
Use this tag when a parent object is assigned the Excluded tag, or if you want to make sure that
virtual machines in an object are always included in scheduled backups, regardless of any
inheritance settings.
If you do not assign these tags, and no inherited setting exists, virtual machines are included in
scheduled backups.
These tags override the domain.vmfull data mover option.
Data Mover (IBM Spectrum Protect)
Datamover_name
Assigns a data mover to run backups of virtual machines.
If you use the IBM Spectrum Protect vSphere Client plug-in, data movers are automatically
assigned to virtual machines if you apply the Schedule category and tag to a container. However,
you can also manually update data movers for individual virtual machines.
If you do not use the IBM Spectrum Protect vSphere Client plug-in to apply the Schedule tag to a
container, you must manually assign data mover tags to those virtual machines, or their parent
containers, that are in that schedule.
If you do not assign a data mover to a virtual machine, the data mover is inherited from the parent
object. If no inherited setting exists, or the Default Data Mover tag is set or inherited, the
virtual machines are backed up by the default data mover that is assigned to a schedule, if any.
Otherwise, the virtual machines are not backed up and are identified in the IBM Spectrum Protect
vSphere Client plug-in with the At Risk status until a data mover is assigned to the virtual
machines.
742 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This tag overrides the nodename data mover option.
Default Data Mover
Assigns the default data mover for a schedule, if any, to run backups of virtual machines. If the
schedule does not have a default data mover, the virtual machines are not backed up and are
identified in the IBM Spectrum Protect vSphere Client plug-in with the At Risk status until a data
mover is assigned to the virtual machines or the schedule is assigned a default data mover.
Disk Backup List (IBM Spectrum Protect)
Include | Exclude:disk number,disk number,...
Includes or excludes a set of virtual machine hard disks in backup operations. Virtual machine
hard disks are identified by the disk number in the virtual machine. For example, in most cases,
disk 1 is the system disk. If you do not assign this tag to a virtual machine, all hard disks in the
virtual machine are backed up.
For ease of use, the Disk Backup List (IBM Spectrum Protect) category is prepopulated
with several commonly used tags:
Include:all
Includes all disks in a backup.
Include:1
Includes only disk 1 in a backup, and explicitly excludes all other disks.
Exclude:1
Includes all disks except for disk 1 in a backup.
You can modify the disk numbers to suit your needs. You can specify a disk number in the range 1
- 999. The disk numbers must be listed as comma-separated values, with no spaces between the
commas and numbers.
For example, to include only disks 1, 3, and 5 in backups, assign the Disk Backup List (IBM
Spectrum Protect) category and Include:1,3,5 tag to a virtual machine.
To back up all disks except for 1, 2, and 4, assign the Disk Backup List (IBM Spectrum
Protect) category and Exclude:1,2,4 tag to a virtual machine.
If you do not specify the disks to include or exclude and no inherited setting exists, all virtual
machine disks are backed up.
These tags override the include.vmdisk and exclude.vmdisk data mover options.
Local Backup Management (IBM Spectrum Protect)
LocalExcluded
Excludes snapshots for virtual machines in an inventory object from the scheduled backup
services.
LocalIncluded
Includes snapshots for virtual machines in an inventory object in the scheduled backup services.
This tag is the default for the Local Backup Management (IBM Spectrum Protect)
category and typically does not need to be set.
Use this tag when a parent object is assigned the LocalExcluded tag, or if you want to make
sure that snapshots for virtual machines in an object are always included in scheduled backups,
regardless of any inheritance settings.
If you do not assign these tags, and no inherited setting exists, virtual machines are included in
scheduled backups.
These tags override the domain.vmfull data mover option.
Local Management Class (IBM Spectrum Protect)
Management_class_name
Specifies the name of the retention policy that defines how long snapshot versions are kept on the
hardware storage or how many snapshot versions can exist on the storage before they are
expired.
The server administrator must also associate a data mover with the schedule by using the
following server command:
744 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
This category and tag can be assigned to datacenters, folders, hosts, host clusters, resource
pools, and virtual machines.
Tip: If you assign the Schedule tag to a container without using the IBM Spectrum Protect
vSphere Client plug-in, the Data Mover category and tag are not automatically assigned to the
virtual machines in the container. You must manually assign the Data Mover tag to each virtual
machine. Alternatively, if a schedule is associated with only one data mover, you can assign the
data mover directly to the container that is protected by the schedule.
If you do not set this tag on an object, the Schedule tag is inherited from the parent object. If no
inherited setting exists, virtual machines are not included in any scheduled backups.
Any domain-level parameters in the domain.vmfull data mover option are ignored for a
schedule that is compatible with tagging.
Schedule_group
Specifies the name of the schedule group that is used for virtual machine backups. A schedule
group contains multiple schedules. You can use the IBM Spectrum Protect vSphere Client plug-in
to assign the schedule group to an object in the VMware vSphere Web client rather than an
individual schedule. An example of the use of this option is to group multiple daily local backup
schedules with a single IBM Spectrum Protect server backup schedule.
Snapshot Attempts (IBM Spectrum Protect)
quiesce,nonquiesce
This category and tag combination specifies the total number of snapshot attempts for a virtual
machine backup operation that fails due to snapshot failure. The tag value consists of a pair of
positional parameters, which describe the number of times to attempt a snapshot and the data
consistency to achieve during the attempt.
quiesce
A positional parameter that specifies the number of times to attempt the snapshot with
quiescing, which creates an application-consistent snapshot.
• For Windows virtual machines assigned with the Application Protection tag, the
quiesce parameter specifies the number of times to attempt the snapshot with IBM
Spectrum Protect VSS quiescing and Microsoft Windows system provider VSS quiescing.
Depending on the number that you specify, the first snapshot attempt is always made with
IBM Spectrum Protect VSS quiescing. Subsequent snapshot attempts are made with
Windows system provider VSS quiescing.
• For Windows virtual machines without the Application Protection tag or for Linux
virtual machines, the quiesce parameter specifies the number of times to attempt the
snapshot with VMware Tools file system quiescing.
You can specify a value in the range 0 - 10. The default value is 2.
nonquiesce
A positional parameter that specifies the number of times to attempt the snapshot without
quiescing, after the snapshot attempts with quiescing (as specified by the quiesce parameter)
are completed. Without snapshot quiescing, crash-consistent snapshots are created. With
crash-consistent snapshots, operating system, file system, and application consistency are
not guaranteed.
You can specify a value in the range 0 - 10. The default value is 0.
Restriction: The 0,0 entry is not valid. Backup operations require at least one snapshot.
The following snapshot attempts are common choices to use for data consistency:
2,0 - Always application consistent
Attempts two quiesced snapshots before failing the backup. This combination is the default.
2,1 - Attempt application consistent
Attempts two quiesced snapshots and, as a final attempt, a nonquiesced, crash-consistent
snapshot.
746 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
For example, if you assign the Excluded tag to a host cluster, the child objects of the host cluster object
(host, host folder, and virtual machine) all inherit the Excluded tag. In this example, all virtual machines
that are within the host cluster are excluded from scheduled backups.
If a child object is assigned a tag and inherits tags in the same category, the assigned tag of the child
object overrides the inherited tag. If a child object inherits tags in the same category from multiple
ancestor objects, the tag that is inherited from the nearest ancestor overrides tags from other ancestors.
If no data protection tags are assigned in the vSphere inventory hierarchy, the system default tag settings
are applied. For information about the supported tags and any default tag settings, see "Supported data
protection tags." .
If the target object is a virtual machine, the virtual machine itself, and any combinations of its ancestors
(including VM folders, resource pools, host, host cluster, host folders, datacenter) can be assigned tags
from the same category. During processing, each object type is checked in the order of precedence, and
processing stops when a tag in the same category is found or the end of the list is reached.
For example, to determine whether the Excluded or Included tag Backup Management (IBM
Spectrum Protect) is applied to virtual machines, IBM Spectrum Protect searches for the Excluded
and Included tags in the inventory in a datacenter. According to the order of precedence for the virtual
machine target object, the search for the Excluded and Included tags starts from the target object
(virtual machine) itself, followed by the list of potential ancestors. If a tag is found before the end of the
list is reached, this tag is applied to the target object. Otherwise, no tag from the Backup Management
(IBM Spectrum Protect) category is applied to the target virtual machine.
Related concepts
“Tips for data protection tagging” on page 748
Backup policies are determined by the data protection tag assignments on vSphere inventory objects. The
performance for processing data protection tags can also be affected by the number of tags that are
applied to the vSphere inventory and where the tags are applied.
Related reference
“Supported data protection tags” on page 739
748 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Appendix A. Accessibility features for the IBM
Spectrum Protect product family
Accessibility features assist users who have a disability, such as restricted mobility or limited vision, to
use information technology content successfully.
Overview
The IBM Spectrum Protect family of products includes the following major accessibility features:
• Keyboard-only operation
• Operations that use a screen reader
The IBM Spectrum Protect family of products uses the latest W3C Standard, WAI-ARIA 1.0
(www.w3.org/TR/wai-aria/), to ensure compliance with US Section 508 (www.access-board.gov/
guidelines-and-standards/communications-and-it/about-the-section-508-standards/section-508-
standards) and Web Content Accessibility Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take
advantage of accessibility features, use the latest release of your screen reader and the latest web
browser that is supported by the product.
The product documentation in IBM Knowledge Center is enabled for accessibility. The accessibility
features of IBM Knowledge Center are described in the Accessibility section of the IBM Knowledge Center
help (www.ibm.com/support/knowledgecenter/about/releasenotes.html?view=kc#accessibility).
Keyboard navigation
This product uses standard navigation keys.
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and to provide a usable
experience. The application provides an equivalent way for low-vision users to use system display
settings, including high-contrast mode. You can control font size by using the device or web browser
settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to quickly navigate to
functional areas in the application.
Vendor software
The IBM Spectrum Protect product family includes certain vendor software that is not covered under the
IBM license agreement. IBM makes no representation about the accessibility features of these products.
Contact the vendor for accessibility information about its products.
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM Accessibility
(www.ibm.com/able).
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs
in any form without payment to IBM, for the purposes of developing, using, marketing or distributing
application programs conforming to the application programming interface for the operating platform for
which the sample programs are written. These examples have not been thoroughly tested under all
conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these
programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work must include a copyright notice
as follows: © (your company name) (year). Portions of this code are derived from IBM Corp. Sample
Programs. © Copyright IBM Corp. _enter the year or years_.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/or other
countries.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the
United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of
VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
752 Notices
Terms and conditions for product documentation
Permissions for the use of these publications are granted subject to the following terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all
proprietary notices are preserved. You may not distribute, display or make derivative work of these
publications, or any portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided
that all proprietary notices are preserved. You may not make derivative works of these publications,
or reproduce, distribute or display these publications or any portion thereof outside your enterprise,
without the express consent of IBM.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted,
either express or implied, to the publications or any information, data, software or other intellectual
property contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use
of the publications is detrimental to its interest or, as determined by IBM, the above instructions are
not being properly followed.
You may not download, export or re-export this information except in full compliance with all
applicable laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS
ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Notices 753
754 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
Glossary
A glossary is available with terms and definitions for the IBM Spectrum Protect family of products.
See the IBM Spectrum Protect glossary.
Index 757
automated client failover (continued) backup (continued)
testing the connection 59 selective (continued)
Automated System Recovery (ASR) associating local snapshot with server file space
back up 149 726
automating backup services back up list of files 126
displaying scheduled work 243, 245 client command line 126
options for 248 command line 126
process commands after backup 456 shared data on multiple clients under a single node
process commands before backup 459 name 312
starting client scheduler 31 starting a web client session 111
starting a web user interface session 112
subdirectories 126
B summary of options 285
back up system state, assigning management class 148
configuring support for client node proxy backups 144 backup and restore
include-exclude list 134 NAS file servers using CIFS 162
Microsoft Dfs trees and files 177 backup chain integrity checks 587, 589
network-attached storage (NAS) 618 backup comparison: incremental, journal-based,
new or changed files 136 incremental-by-date 140
NTFS file spaces 176 backup copy group
number of attempts to back up open files 326 attributes 257
parallel 560, 562, 563, 565 backup fastback command 610
ReFS file spaces 176 backup files
removable media using drive label 175 assigning management class 261
VM templates 556 backup group command 613
backing up backup image command 615
in parallel sessions 169 backup maximum file size 135
Backing up cluster groups 62 backup nas command 618
backing up data 165 Backup NTFS or ReFS data on mounted volumes 647
backing up network shares 105 backup operators group
backing up virtual machines on a Hyper-V system 169 required user security rights for backup and restore 101
backing up volume mount points backup planning 121
NTFS 647 backup set
ReFS 647 enabling GUI for local restore 192
backmc option 322 restore 181, 192
backup restore systemstate from 697
automating using Client Service Configuration Utility 266 restoring in a SAN environment 697
case sensitive file name conflicts 325 backup sets
copy mode 259 restore considerations 194, 696
displaying processing status 170 backup systemstate command 620
excluding domains 126 backup vm command 622
excluding system state object from 148 backup with client node proxy
grace period retention 255 agent node 144
image overview 144
client domain 360 target node 144
with incremental backup 617 backup-archive client
image, offline and online 152 GUI 159
improving speed using share memory 285 NAS
incremental file systems backup 159
associating local snapshot with server file space overview 1
648 backup-archive client GUI
client command line 126 establishing communications through firewall 31
command line 126 backup-archive scheduler service
incremental-by-date install 265
client command line 126 backupset
command line 126 enabling GUI for local restore of 433
multi-session, send files contiguously to the server 332 backupsetname option 322
Net Appliance CIFS share definitions 170 basesnapshotname option 323
one server session per file specification 332 batch mode
overview 121 starting a session 108
primary tasks 121 bottom-up processing
process directories only (not files) 354 include-exclude list 92
query user access 653 bypass processing of Windows file system security
selective information 496
758 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
C client scheduler (continued)
run at startup 242
c-mode 75 starting 31, 722
C++ redistributable files starting automatically 115
forced reboot 6 Client Service Configuration Utility
cadlistenonport option 324 commands for installing client services 269
cancel process command 629 configure client acceptor to manage existing scheduler
cancel restore command 629 service 268
casesensitiveaware option 325 create new scheduler and associate client acceptor to
central scheduling manage scheduler 268
summary of options 297 options for installing client services 279
Certificate Authorities using to automate backups 266
root certificates client services
Certificate Authorities 38 considerations 101
changingretries option 326 client user-options
class option 327 creating multiple files 23
classic (standard) restore 186 client user-options file
client overriding using commands 301
automatic update 2 client-node proxy support 144, 232
client TCP/IP address other than the one for first server client-server communication
contact 528 client TCP/IP address other than the one for first server
client TCP/IP port number other than the one for first contact 528
server contact 529 client TCP/IP port number other than the one for first
registering with server 80 server contact 529
setting password 81 establishing 21
size for the TCP/IP sliding window for client node 532 identify your workstation to the server 446
client acceptor daemon maximum disk I/O buffer size client uses when reading
manage scheduler, web client, or both 434 or writing files 356
client acceptor service method 333
configuring to manage scheduler 29 name of a named pipe 444
client command options query Active Directory for communication method and
overview 602 server with which to connect 538
client components reconnection attempts after failure 334
Windows client 3 reconnection interval after failure 334
client management service 18 size for the TCP/IP sliding window for client node 532
client node proxy archive size of internal TCP/IP communication buffer 527
overview 232 specifying number of kilobytes client buffers before
client node proxy backup sending transaction to server 536
scheduling 146 TCP/IP address for dsmcad 528
client options TCP/IP address of IBM Spectrum Protect server 531
display current settings 673 TCP/IP port address of IBM Spectrum Protect server
exclude 530
exclude.archive 82 TCP/IP port address on which to establish shared
exclude.backup 82 memory connection 494
exclude.compression 82 whether to send small transactions to server without
exclude.dir 82 buffering them first 530
exclude.file 82 clientview option 327
exclude.file.backup 82 closed registration
exclude.image 82 permissions 81
exclude.systemobject 82 using 81
order of processing (precedence) 301 Cluster configuration wizard 62
overriding using command line 301 cluster drives
overview 602 enabling management of 331
using with commands 301 Cluster groups
client options file backing up 62
creating and modifying 21 cluster resources
generating in shared directory 22 permissions 104
overview 19 clusterdisksonly option 328
required options for 21 clustered data ONTAP 75
specifying include-exclude options 81 clusternode option 331
client options reference 309 clustersharedfolder option 330
client scheduler collecting diagnostic information 18
displaying scheduled work 243, 245 collocatebyfilespec option 332
options for 248 command line
Index 759
command line (continued) commands (continued)
assigning description to archive 232 query access 653
display current settings for client options 673 query adobjects 653
displaying query archive 655
Euro characters in prompt 109 query backup 657
processing status 170 query backupset 661, 662
enabling 8.3 short names 368 query filespace 664
ending a session 118 query group 666
entering commands 601 query image 668
general rules when entering options with commands query inclexcl 670
302 query mgmtclass 671
NAS file systems backup 160 query node 672
overriding management class during archive 262 query options 673
overview of parameters 602 query restore 674
performing image backup 157 query schedule 675
performing point-in-time restore 221 query session 675
restoring files and directories 183 query systeminfo 676
restoring retention set data 222 query systemstate 678
restrictions for NAS file systems 157 query VM 679
return codes for operations 253 restart restore 683
specifying file specification 603 restore 684
specifying options file during session 451 restore adobjects 691
starting a session 107 restore backupset 693, 697
using wildcard characters 604 restore backupset considerations 194, 696
command parameters restore group 699
overview 602 restore image 701
command processing, summary of options 298 restore NAS 704
command session restore systemstate 706
ending 600 restore vm 706
starting 600 retrieve 718
command-line prompt schedule 722
displaying scheduled, enabling or disabling 249
Euro characters 109 selective backup 724
commands set access 727
archive 605 set event 729
archive fastback 607 set netappsvm 731
backup fastback 610 set password 732
backup group 613 set vmtags 737
backup image 615 specifying file specification 603
backup nas 618 using 597
backup systemstate 620 using in executables 253
backup vm 622 using options with 301
batch mode 600 using wildcard characters 604
cancel process 629 commmethod option 333
cancel restore 629 commrestartduration option 334
delete access 630 commrestartinterval option 334
delete archive 631 communication methods
delete backup 632 installable software 3
delete filespace 636 Shared Memory
delete group 637 Windows client 3
entering 601 summary 284
entering on command line 601 TCP/IP
expire 639 Windowss client 3
general rules when entering options with 302 communications
help 640 establishing through firewall 31
incremental 641 establishing with Secure Sockets Layer (SSL) 34
interactive (loop) mode 601 compressalways option 335
loop 649 compression
macro 649 disabling processing 411
maximum file specifications permitted 603 enabling processing 411
monitor process 650 include-exclude statements 411
overview of parameters 602 compression and encryption processing
preview archive 651 back up 411
preview backup 652 exclude from backup 411
760 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
compression and encryption processing (continued) deduplication option 347
exclude options 411 default data mover 585
compression option 336 default domain
compression processing excluding domains from backup 126, 357
exclude from backup 411 default management class 255
exclude options 411 default policy domain 255
include files for 407 delete
concurrent backups 169 file space 220
configure NAS or client objects 327
file restore delete access command 630
options 114 delete archive command 631
language for backup-archive client GUI 25 delete backup command 632
configure the client for data deduplication 49 delete group command 637
configuring delete individual backups from server file space 129
client acceptor-managed scheduler 29 deleted file systems 175
journal engine service 39 deletefiles option 348
open file support 72 deleting
optional tasks 19 authorizations 217
required tasks 19 individual archives from server file space 234, 631
the client scheduler 28 individual backups from server file space 632
Configuring cluster protection 62 deleting file spaces 220
configuring the web client 26 description option 349
console option 337 detail option 350
console window diagnostics
displaying options 301
Euro characters 109 diffsnapshot option 351
containing quotation marks 110 diffsnapshotname option 353
control files 545 directories
copy destination attribute 260 assigning management class for 354
copy frequency attribute 257 excluding 83
copy group name attribute 257 excluding from backup processing 380
copy groups incremental backup processing overview 136
archive 255 processing during incremental-by-date 140
backup 255 restoring from command line 183
copy mode parameter restoring from GUI 183
absolute 259 specifying on command line 603
modified 259 directory
copy serialization attribute 258 archiving 230
copy type attribute 257 dirmc option 354
createnewbase 339 dirsonly option 354
createnewbase option 339 disability 749
csv option 340 disablenqr option 355
discretionary access control list (permissions)
back up 176
D disk space requirements
data deduplication 45 client 2
data deduplication client configuration 49 Windows client 3
data deduplication files diskbuffsize option 356
exclude 51 diskcachelocation option 356
data protection settings displaying
inheritance 746 archive information 655
represented as tags 739 online help 118
tips for configuring backup policies 748 restartable restore sessions 674
data protection tagging scheduled events 675
inheritance of tags 746 session information 675
overview 739 domain
supported list 739 back up using the GUI 126
datacenter option 343 include for full vm backups 362
datastore option 343 include for image backup 360
date format include for incremental backup 357
specifying 344 include for NAS image backup 361
dateformat option 344 specifying drives in the default 126
dedupcachepath option 346 domain list
dedupcachesize option 347 using universal naming convention to specify 176
Index 761
domain option 357 error recovery
domain.image option 360 VMware virtual machines 207
domain.nas option 361 errorlogmax option 376
domain.vmfull option 362 errorlogname option 378
download system logs errorlogretention option 376, 378
by using a web user interface session 113 event logging
downloading maintenance updates 18 scheduler 245
drive label event-based policy retention protection
using to backup removable media 175 archive 264
DSM_CONFIG environment variable 24 backup 264
DSM_DIR environment variable 24 exclude
DSM_LOG environment variable 24 EXCLUDE.VMDISK 384
dsm.opt file EXCLUDE.VMLOCALSNAPSHOT 385
creating and modifying 21 exclude data deduplication files 51
required options for 21 exclude options
specifying a drive specification using wildcards 88 exclude.archive 82
dsm.smp file exclude.backup 82
copying to dsm.opt 21 exclude.compression 82
location 21 exclude.dir 82
dsmc command exclude.file 82
using options 109 exclude.file.backup 82
dsmcutil utility exclude.image 82
commands for installing client services 269 exclude.systemobject 82
options for installing client services 279 preview 91
overview 269 processing 92
dsmerlog.pru file 376 wildcard characters 88, 89
dsmerror.log file 376 exclude.image option 82
dsmsched.log 484, 486 EXCLUDE.VMDISK 384
dsmwebcl.log 484, 486 EXCLUDE.VMLOCALSNAPSHOT 385
duplicate file names excluding files
avoiding 181 remotely accessed 87
dynamic and shared serialization 258 system files 86
using wildcard characters 89
wildcard characters 88
E excluding system objects 147
enable8dot3namesupport option 368 executable file
enablearchiveretentionprotection option 369 return codes from 253
enablededupcache option 370 expire command 639
enableinstrumentation option 371
enablelanfree option 373 F
encrypting data during archive 134
encrypting data during backup 134 failover
encryption client 52
multiple clients under a single node name 312 configuration and use 52
of file data 134 configuring the client 55
saving encryption key password 375 determining the replication status 57
encryption processing disabling 58
determine encryption cipher used in current session other components 55
134 requirements 53
excluding files from 380 restore 216
include files for 407 restrictions 54
query systeminfo command 676 retrieve 216
encryptiontype option 374 fbbranch option 386
encryptkey option fbclient option 387
encryptkey=generate 375 fbpolicyname option 388
encryptkey=prompt fbreposlocation option 389
encryptkey=save 375 fbserver option 391
enhanced query schedule 243 fbvolumename option 392
enhanced query schedule command 675 features
environment variables 24 Windows client 3
error log file
pruning 378 restoring active and inactive versions 690
specifying path and file name 378 file names
error processing, summary of options 299 avoiding duplicate 181
762 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
file restore firewall (continued)
configuring options 114 whether server or client initiates sessions through 492
options 115 fixed drives
file space backing up 176
delete 220, 636 force incremental backup 310
determining fsID 350 forcefailover option 397
excluding 83 format and language
NAS or client objects 327 summary of options 298
performing an image backup 615 fromdate option 398
file specification fromnode option 398
maximum allowed on commands 603 fromtime option 399
file systems full backups, creating 167
deleted 175 full incremental
excluding from backup processing 380 comparing with journal-based, incremental-by-date 140
image backup of 152 description 136
file-level VM backup when to use 140
restore 207 full VM backup
filelist option 393 restore
filename option 395 full VM backup 199
files fuzzy backup 258
archive
directory tree 230
archive a list of 232, 393
G
archived, overriding management class 262 getting started
archiving 605 changing your password 95
archiving more than one file specification 232 client scheduler 95
assigning management classes 174 command-line session 95
backing up Microsoft Dfs 177 displaying online help 95
backing up open 173 ending a session 95
binding management classes to 262 GUI session 95
compressing during archive or backup 336 sorting file lists 95
definition of changed 136 web client session 95
delete after archive 348 graphical user interface
delete individual archives from server file space 234, changing password 115
631 delete individual files or images from server file space
delete individual backups from server file space 632 632
encryption 134 displaying active and inactive backup versions 117, 182
excluding groups 88, 89 displaying online help 118
include-exclude displaying processing status 170
creating in Unicode format 406 enabling for local backupset restore 433
including groups 88, 89 enabling local backup set 192
managing growth during compression 335 ending a session 118
maximum file size for operations 135 performing image backup 156
processing include-exclude 92 restore files and directories 183
query archive information 655 starting a session 106
query backup information 657 to back up objects 125
query user access 653 group backup
renaming file spaces that are not Unicode to Unicode- display active and inactive objects 405
enabled 320, 641, 724 display all members of 494
reset Windows archive attribute after backup 476 overview 143
restoring files belonging to another node 218 specify name of group 400
restoring from command line 183 specify virtual file space name for 542
restoring from GUI 183 specifying full or differential 439
restoring to another workstation 219 groupname option 400
retrieving GUI
archives using command line 235 ending a session 118
files belonging to another node 218 overriding management class during archive 262
to another workstation 219 performing point-in-time restore 221
sorting list of 117 starting a session 106
filesonly option 396
firewall
establishing communications through 31, 401, 530 H
specifying TCP/IP ports for the web client 595
hardware requirements
using web client through 595
Index 763
hardware requirements (continued) imagetofile option 405
Windows client 3 inactive backup versions
help displaying 117, 182, 657
displaying online 118 restoring 182
Internet resources 118 inactive option 405
online forum 118 inclexcl option 406
service and technical support 118 include
help command 640 INCLUDE.VMDISK 414
host option 400 INCLUDE.VMLOCALSNAPSHOT 416
httpport option 401 include option
Hyper-V management class 261
backing up virtual machines 169 processing 92
wildcard characters 88, 89
include VM templates in back ups 556
I include-exclude list
IBM Knowledge Center xxi creating 81
IBM Spectrum Protect preview 91
client components query order of processing 670
Windows client 3 size restriction 92
communication methods to control processing 134
Windows client 3 include-exclude options file
environment prerequisites 3 specifying path and file name of 406
FAQs 70 Unicode-enabled file spaces 406
hardware, disk space, memory requirements include-exclude processing
Windows client 3 options for 82
installation requirements 3 overview 82
installing on Microsoft Cluster Server cluster nodes 62, include.vm option 413
70 INCLUDE.VMDISK 414
installing on Veritas Cluster Server cluster nodes 62 INCLUDE.VMLOCALSNAPSHOT 416
online forum 119 include.vmresetcbt option 417
password 107 include.vmsnapshotattempts option 419
upgrading from earlier versions of the product 1 include.vmtsmvss option 421
IBM Spectrum Protect client incrbydate option 423
authentication 104 incremental and selective commands with snapshotroot
IBM Spectrum Protect password option 147
using 107 incremental backup
ieobjtype option 402 associating local snapshot with server file space 508
ifnewer option 403 back up new and changed files with modification date
image later than last backup 423
restoring 190 by date 126
using chkdsk to repair 190 client command line 126
using chkdsk tool to repair 701 client domain 357
using fsck to repair 190, 701 client Java GUI 125
image backup command line 126
configuring online image backup 72 description 136
considerations 153 directories, processing overview 136
deleting 632 memory-conserving algorithm 437
excluding files from 380 new and changed files 136
file systems or logical volumes 615 new and changed files with modification date later than
include files for; assign management class to 407 last backup 423
include.dedup 407 of directories
incremental-by-date image backup 155 processing overview 136
offline and online 152 process a list of files 393
perform 152 with image backup 154, 617
point-in-time restore 617 incremental command
revoke access 630 journal-based backup 645
specifying selective or incremental 439 incremental option 423
using command line 157 incremental-by-date
using the GUI 156 command line 126
using with file system incremental 155 comparing with incremental, journal-based 140
using with incremental-by-date 155 description 140
with incremental backup 154, 617 of directories
image backup, considerations 153 processing overview 140
imagegapsize option 404 when to use 140
764 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
incremental-by-date backup K
client command line 126
client Java GUI 125 keyboard 749
using with image backup 155 Knowledge Center xxi
incrthreshold option 424
input strings
containing blanks 110
L
install LAN-based image backup
backup-archive scheduler service 265 online and offline image backup 615
installation requirements LAN-free data movement
client 2 enabling communications for 130, 427, 429
installation types for the Windows client 6 options 131
installing prerequisites 131
overview 1 shared memory port for 429
installing IBM Spectrum Protect lanfreecommmethod option 427
silent installation 12 lanfreeshmport option 429
installing the client management service 18 lanfreessl option 430
installing the Windows client 5 lanfreetcpport option 429
instant access scenario 203 lanfreetcpserveraddress option 431
instant restore scenario 203 language for backup-archive client GUI
instrlogmax option 425 configure 25
instrlogname option 426 language option 431
instrumentation log last access date
collecting performance information 371 specifying whether to update during backup or archive
controlling the size 425 136, 461
specifying path and file name to store performance latest option 432
information 426 local backup set
interactive mode 601 enabling GUI for local restore 192
interactive session local snapshot
ending 649 associating local snapshot with server file space 147
starting 108, 649 localbackupset option 433
using 649 log
controlling the size 425
J DSM_LOG environment variable 378, 426, 485
error log, pruning 376
Java GUI errorlogname option 378
configuration restrictions 107 errorlogretention option 378
journal based backup instrlogmax option 425
restoring 139 intrlogname option 426
journal based backups schedlogname option 485, 722
restoring 139 schedlogretention option 485, 722
journal database files specifying path and file name 378, 426, 485, 722
errorlog 40 web client 484
journaldir 40 See also schedule log
NlsRepos 40 logical volume
journal engine service image backup of 152
configuring 39 restoring 190
journal-based backup logs
comparing with incremental, incremental-by-date 140 dsmsched.log 486
excluding directories 85 dsmsched.pru 486
excluding files 85 dsmwebcl.log 486
include-exclude options dsmwebcl.pru 486
journal-based backup 85 truncating application logs 421
performing traditional full incremental, instead of 447, loop command 649
645
specifying how to respond to unsuccessful expire of
object 424
M
when to use 140 macro command 649
journaled file space maintenance
specifying directories with active files to expire 424 auto-update 2
journalpipe 40 managedservices option 434
journalpipe option 427 management class
JournalSettings stanza 40 assigning 174
Index 765
management classes NAS file systems backup (continued)
assigning to directories 262, 354 backup-archive client (continued)
assigning to files 261 GUI 159
binding archive files to 232 command line 160
binding to files 262 nasnodename option 445
default 255 Net Appliance
displaying 257 backing up CIFS share definitions 170
displaying information about 671 netapp file server 75
overriding during archive processing 262 Network Attached Storage (NAS)
overriding the default 261 backup file systems 157
processing 261 Network Data Management Protocol (NDMP) 4
questions to consider 260 Network File System (NFS)
selecting for files 260 backup file systems 170
specifying with include option 261 network shares
using management class, example 261 backing up 105
maxcmdretries option 435 making shares visible to the client 105
mbobjrefreshthresh 436 shares
mbpctrefreshthresh 437 making shares visible to client 105
memory requirements network-attached storage (NAS
Windows client 3 display nodes for which admin ID has authority 672
memoryefficientbackup option 437 network-attached storage (NAS)
messages backup file systems 618
displaying on screen 541 cancel backup and restore processes 629, 650
specifying language type 431 deleting file spaces 220, 636
stop displaying 468 display file spaces on server 664
Microsoft Cluster Server cluster nodes excluding files from backup 380
FAQs 70 monitoring backup or restore operations 441
installing IBM Spectrum Protect 62, 70 querying file system images belonging to 657
installing scheduler service 62 restore file systems 223, 704
Microsoft Dfs junction specifying for query 537
restore 690 specifying node name for operations 445
Microsoft Dfs trees and files specifying whether to save table of contents for each file
back up 177 system backup 534
migrating backup-archive clients 1 networked file systems
migration include-exclude statements
web client 1 networked file systems 85
web client language files 1 new for backup-archive client V8.1.9 xxv
mobile dial-up support 115 no query restore 186
mode option 439 node
modes specifying type to query 537
batch 600 node name 21
interactive (loop) 601 node name, setting 21
monitor option 441 nodename option 219, 446
monitor process command 650 nojournal option 447
myprimaryserver option 442 non-standard error conditions 207
myreplicationserver option 443 noprompt option 447
nrtablepath option 448
NTFS
N Restoring volume mount points 689
Named Pipe communication method NTFS file spaces
options 285 back up 176
namedpipename option 444 NTFS/ReFS
NAS backing up volume mount points 647
assigning management class to file systems 407 NTFS/ReFS mounted volumes
backing up file systems 157 Backing up data on 647
deleting file spaces 220, 636 numberformat
query node command 672 specifying 449
restore file systems 223, 704 numberformat option 449
restore NAS command 704
specifying full or differential backup 439 O
NAS file servers using CIFS
backup and restore 162 offline image backup 152
NAS file systems backup online help
backup-archive client displaying 118
766 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
online help (continued) options (continued)
online forum 118 description 349
service and technical support 118 detail 350
online image backup diagnostics 301
specifying gap size of striped volumes 404 diffsnapshot 351
open file support diffsnapshotname 353
for backup operations 123 dirmc 354
include files for 407 dirsonly 354
installing and configuring 72 disablenqr 355
overview 123 diskbuffsize 356
snapshot 230 diskcachelocation 356
open registration domain 357
permissions 81 domain.image 360
using 81 domain.nas 361
operating system re-installation domain.vmfull 362
Windows 188 enable8dot3namesupport 368
operating system requirements enablearchiveretentionprotection 369
clients 2 enablededupcache 370
optfile option 451 enableinstrumentation 371
options enablelanfree 373
absolute 310 encryptiontype 374
adlocation 311 encryptkey
archive, summary 285 encryptkey=generate 375
archmc 311 encryptkey=prompt 375
asnodename 312 encryptkey=save 375
asrmode 314, 594 errorlogmax 376
auditlogging 315 errorlogname 378
auditlogname 317 errorlogretention 378
authorization options 299 exclude
autodeploy 319 exclude.archive 82, 380
autofsrename 320 exclude.backup 82, 380
backmc 322 exclude.compression 82, 380
backup exclude.dir 82, 380
excluding system state 380 exclude.encrypt 380
backup, summary 285 exclude.file 82, 380
backupsetname 322 exclude.file.backup 82, 380
basesnapshotname 323 exclude.fs.nas 380
cadlistenonport 324 exclude.image 82, 380
casesensitiveaware 325 exclude.systemobject 82
central scheduling, summary 297 wildcard characters 88, 89
changingretries 326 exclude.dedup 380
class 327 EXCLUDE.VMDISK 384
clientview 327 EXCLUDE.VMLOCALSNAPSHOT 385
clusterdisksonly 328 fbbranch 386
clusternode 331 fbclient 387
clustersharedfolder 330 fbpolicyname 388
collocatebyfilespec 332 fbreposlocation 389
command processing, summary 298 fbserver 391
commmethod 333 fbvolumename 392
commrestartduration 334 filelist 393
commrestartinterval 334 filename 395
communication, summary 284 filesonly 396
compressalways 335 forcefailover 397
compression 336 format and language, summary 298
console 337 fromdate 398
createnewbase 339 fromnode 398
csv file 340 fromtime 399
datacenter 343 general rules when entering with commands 302
datastore 343 groupname 400
dateformat 344 host 400
dedupcachepath 346 httpport 401
dedupcachesize 347 ieobjtype 402
deduplication 347 ifnewer 403
deletefiles 348 imagegapsize 404
Index 767
options (continued) options (continued)
imagetofile 405 preservepath 462
inactive 405 presnapshotcmd 464
inclexcl 406 queryschedperiod 465
include querysummary 466
wildcard characters 88, 89 quiet 468
include.archive 407 replace 468
include.backup 407 replserverguid 470
include.compression 407 replservername 471
include.encrypt 407 replsslport 472
include.file 407 repltcpport 473
include.fs 407 repltcpserveraddress 475
include.fs.nas 407 resetarchiveattribute 476
include.image 407 resourceutilization 477
include.systemstate 407 restore and retrieve, summary 294
include.vm 413 retryperiod 479
INCLUDE.VMDISK 414 revokeremoteaccess 480
INCLUDE.VMLOCALSNAPSHOT 416 runasservice 481
include.vmresetcbt 417 schedcmddisabled 481, 482
include.vmsnapshotattempts 419 schedgroup 483
include.vmtsmvss 421 schedlogmax 484
incrbydate 423 schedlogname 485
incremental 423 schedlogretention 486
incrthreshold 424 schedmode 488
instrlogmax 425 schedrestretrdisabled 489
instrlogname 426 scrolllines 490
journalpipe 427 scrollprompt 491
lanfreecommmethod 427 sessioninitiation 492
lanfreeshmport 285, 429 setwindowtitle 493
lanfreessl 430 shmport 494
lanfreetcpport 429 showmembers 494
lanfreetcpserveraddress 431 skipmissingsyswfiles 495
language 431 skipntpermissions 496
latest 432 skipntsecuritycrc 497
localbackupset 433 skipsystemexclude 498
managedservices 434 snapdiff 73, 498
maxcmdretries 435 snapdiffchangelogdir 503
mbobjrefreshthresh 436 snapdiffhttps 504
mbpctrefreshthresh 437 snapshotproviderfs 506
memoryefficientbackup 437 snapshotproviderimage 507
mode 439 snapshotroot 508
monitor 441 specifying in commands 301
myprimaryserver 442 srvoptsetencryptiondisabled 510
myreplicationserver 443 srvprepostscheddisabled 511
namedpipename 444 srvprepostsnapdisabled 512
nasnodename 445 ssl 512
nodename 446 sslacceptcertfromserv 513
nojournal 447 sslrequired 516
noprompt 447 stagingdirectory 518
nrtablepath 448 subdir 519
numberformat 449 system state
optfile 451 exclude from backup processing 380
order of processing (precedence) 301 systemstatebackupmethod 521
password 451 tagsched 522, 523
passwordaccess 453 tapeprompt 525
pick 454 tcpadminport 526
pitdate 455 tcpbuffsize 527
pittime 456 tcpcadaddress 528
postnschedulecmd 456 tcpclientaddress 528
postschedulecmd 456 tcpclientport 529
postsnapshotcmd 458 tcpnodelay 530
prenschedulecmd 459 tcpport 530
preschedulecmd 459 tcpserveraddress 531
preservelastaccessdate 461 tcpwindowsize 532
768 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
options (continued) options (continued)
timeformat 533 web client, summary 301
toc 534 webports 595
todate 535 options file
totime 536 ASR recovery
transaction processing, summary 300 Windows 150
txnbytelimit 536 owner security information (SID)
type 537 back up 176
usedirectory 538
useexistingbase 539
usereplicationfailover 540
P
v2archive 540 parallel backups 169, 560, 562, 563, 565
verbose 541 parameters
verifyimage 542 yes and no, alternatives 309
virtual machine exclude options 383 partial incremental
virtual machine include options 412 incremental by date, running 126
virtualfsname 542 password
virtualnodename 543 changing 115, 732
vmautostartvm 544 number of characters 115
vmbackdir 545 setting 451
vmbackuplocation 545 setting for client 81
vmbackupmailboxhistory 547 specifying whether to generate automatically or set as
vmbackuptype 547 user prompt 453
vmchost 548 using 107
vmcpw 549 valid characters 115
vmcuser 551 password location 100
vmdatastorethreshold 552 password option 451
vmdefaultdvportgroup 553 password store 100
vmdefaultdvswitch 554 passwordaccess option 453
vmdefaultnetwork 555 performance
vmdiskprovision 556 improving speed of backups, restores, archives,
vmenabletemplatebackups 556 retrieves 285
vmexpireprotect 558 restore operations 185
vmiscsiadapter 559 transaction options 300
vmiscsiserveraddress 560 transaction processing 536
vmlimitperdatastore 560 performing traditional full incremental backup 645
vmlimitperhost 562 Persistent Storage Manager
vmmaxbackupsessions 563 back up 163
vmmaxparallel 565 pick option 454
vmmaxparallelrestoresessions 567 pitdate 455
vmmaxparallelrestorevms 568 pittime option 456
vmmaxrestoresessions 566 point-in-time restore
vmmc 571 image backup 617
vmmountage 571 policies, storage management 255
vmnocbtcontinue 572 policy domains
vmnoprdmdisks 573 default policy domain 255
vmnovrdmdisks 574 standard policy domain 255
vmpreferdagpassive 574 policy sets
vmprocessvmwithprdm 576 active policy set 255
vmprocesswithindependent 575 portable media
vmrestoretype 577 restoring backup sets 192
vmskipctlcompression 580 postnschedulecmd option 456
vmskipmaxvirtualdisks 580 postsnapshotcmd option 458
vmskipmaxvmdks 581 preferences editor
vmstoragetype 581 excluding domains from backup 126
vmtagdatamover 582 prenschedulecmd option 459
vmtagdefaultdatamover 585 preschedulecmd option 459
vmtempdatastore 587 preservelastaccessdate option 461
vmtimeout 592 preservepath option 462
vmverifyifaction 587 Presnapshotcmd option 464
vmverifyiflatest 589 preview
vmvstorcompr 590 include-exclude list 91
vmvstortransport 591 restore vm 706, 716
vssaltstagingdir 593 preview archive command 651
Index 769
preview backup command 652 query VM command 679
primary group SID queryschedperiod option 465
back up 176 querysummary option 466
processing options quiesce applications 421
authorization 299 quiet option 468
backup and archive 285
central scheduling 297
communication 284
R
diagnostics 301 raw logical volume
error processing 299 image backup of 152
format and language 298 restoring 190
overview 283 reanimate
restore and retrieve 294 tombstone objects 212
specifying in commands 301 rebinding files to a different management class 263
transaction processing 300 ReFS
using 95, 98, 283 backing up volume mount points 647
web client 301 Restoring volume mount points 689
processing time 125 ReFS file spaces
Protecting cluster disks 62 back up 176
proxied session restrictions 144, 145, 232 registering
publications xxi client with server 80
using closed registration 81
Q using open registration 81
remote network connection
query establishing 115
amount of information that displays on screen 490 remotely accessed files
backups, establish point-in-time 455, 456 excluding 87
based on date and time of backup, archive 398, 399 UNC names 87
description for 349 removable media
display active and inactive objects 405 back up 175
files for another node 398 replace option 468
group replserverguid option 470
command 666 replservername option 471
display members of 494 replsslport option 472
include-exclude list 670 repltcpport option 473
NAS or client objects 327 repltcpserveraddress option 475
nodes to which client has proxy authority 232 resetarchiveattribute option 476
nodes to which client has proxy node authority 144 resourceutilization option 477
process directories only (not files) 354 restart restore command 683
scrolling preferences after displaying information on restartable restore 186
screen 491 restartable restore sessions, display 674
system information 676 restore
system state 678 active and inactive file versions 690
query access command 653 active directory objects 212–215
query adobjects command 653 active version 182
query archive command 655 ASR (Automated System Recovery) files 188
query backup command 657 ASR recovery mode 314, 594
query backupset command 661, 662 authorizing another user 217
query filespace command 664 backup set
query group command 666 supported tape devices 693, 697
query image command 668 backup sets
query inclexcl command 670 overview 192
query mgmtclass command 671 backups, establish point-in-time 455, 456
query node command 672 based on date and time of backup 398, 399
query options command 673 classic (also known as standard) 186
query restore command 674 configuring options 114
query schedule create list of backup versions to 454
enhanced 243 directories 183
query schedule command 675 display active and inactive objects 405
query schedule command, enhanced 675 during failover 216
query session command 675 estimating processing time 125
query systeminfo command file 114, 115
encryption processing 676 files 183
query systemstate command 678 files and directories 183
770 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
restore (continued) restore command (continued)
files belonging to another node 218 using multiple 185
files for another node 398 restore full VM backup
from file spaces that are not Unicode-enabled 691 VCB backups 210
from portable media restore group command 699
overview 192 restore image command 701
from system state backup 212 restore maximum file size 135
group restore NAS command 704
command 699 restore procedure
GUI, displaying active and inactive versions 117 ASR 189
image Windows 189
considerations 701 restore systemstate command 706
enable detection of bad sectors on target volume restore vm command
542 preview 706, 716
to a file 405 restoring data from retention set
using chkdsk tool to repair 190 using command line 222
using fsck tool to repair 190 using GUI 222
image, suppress confirmation prompt 447 Restoring data on mounted volumes
improving speed using share memory 285 NTFS 689
inactive version 182 Restoring data on NTFS mounted volumes 689
large number of files 185 Restoring NTFS or ReFS volume mount points 689
list of files 393 restoring point-in-time
local backup set using the GUI 192 using command line 221
logical volume 190 using GUI 221
Microsoft Dfs junction 690 restoring retained data 222
Microsoft Dfs trees and files 189 restoring your system
modify client acceptor and agent services 215 ASR recovery mode
most recent backup version 432 Windows 188
NAS file systems restrictions
backup-archive client GUI 224 asnodename option 312
command line 226 asnodename session settings 314
NAS files and directories using web client 225 runasservice and encryptkey 481
Net Appliance CIFS shares 198 runasservice and passwordaccess 481
no query 186 runasservice and replace 481
options 115 within a proxied session 144, 145, 232
overview 181 retain extra versions attribute 258
primary tasks 181 retain only versions attribute 258
process directories only (not files) 354 retain versions attribute 260
raw logical volume 190 retention grace period
replace existing file with latest backup 403 archive 255, 263
restartable 186 backup 255, 263
restrictions and limitations 214 retrieve
sorting file list 117 archive copies 234
sparse files 691 archive files by name 235
sparse files to a non-NTFS or non-ReFS file system 691 authorizing another user 217
sparse files, size restriction for 691 based on date and time of archive 398, 399
standard (also known as classic) 186 description for 349
starting a web client session 111 during failover 216
starting a web user interface session 112 files belonging to another node 218
summary of options 294 files for another node 398
system state 706 improving speed using share memory 285
to different workstation 543 list of files 393
using commands 183 primary tasks 229
using fsck tool to repair 701 process directories only (not files) 354
using GUI and command line 213 replace existing file with latest archive if existing file is
using the GUI 183 newer 403
using universal naming convention names 182 sorting file list 117
VMware Consolidated Backup 198 starting a web client session 111
whether to prompt before overwriting existing files 468 starting a web user interface session 112
workstation, to another 219 summary of options 294
restore adobjects command 691 to different workstation 543
restore backupset command 693, 697 whether to prompt before overwriting existing files 468
restore backupset command considerations 194, 696 workstation, to another 219
restore command retrieve command 718
Index 771
retrieve maximum file size 135 scheduler service
retrieving installing on Microsoft Cluster Server cluster nodes 62
archives using command line 235 installing on Veritas Cluster Server cluster nodes 62
retryperiod option 479 Scheduler Service Configuration Utility 29
return codes for operations 253 scheduler wizard 29
revokeremoteaccess option 480 scheduling
runasservice option 481 client node proxy backup 144, 146
running a snapshot difference backup scrolllines option 490
with HTTPS 142 scrollprompt option 491
running a snapshot differential backup Secure Sockets Layer (SSL)
with HTTPS 142 establishing communications with 34
security information
bypass processing of 496
S selective backup
SAN client command line 126
restoring backup sets using 697 client Java GUI 125
scenarios command line 126
instant access, from the command line 203 overview 126, 143
instant restore, from command line 203 selective command 724
schedcmddisabled option 481, 482 self-contained application protection 421
schedgroup option 483 serialization
schedlogmax option 484 copy serialization
schedlogname option 485 dynamic 258
schedlogretention option 486 shared static 258
schedmode option 488 static 258
schedrestretrdisabled option 489 server
schedule command 722 communicating with 21
schedule log establishing communications through firewall 31
controlling the size 484 establishing communications with 21
specifying number of days to keep entries and whether establishing communications with Secure Sockets Layer
to save pruned entries 486 (SSL) 34
specifying path and file name to store schedule log query Active Directory for communication method and
information 485 server with which to connect 538
scheduled (automated) backups TCP/IP address of IBM Spectrum Protect server 531
closing files before backup 173 TCP/IP port address for 530
displaying scheduled work 243, 245 server options
options for 248 Sslfipsmode 515
process commands after backup 456 service and technical support 118
process commands before backup 459 service recovery settings 242
restart applications after backup 173 session information, displaying 675
starting 31 sessioninitiation option 492
scheduled commands set access command
enabling-disabling 249 restore-retrieve authorization 217
scheduled events, displaying 675 set event command 729
scheduled services set netappsvm 75
disabling scheduled commands 481, 482 set password command 732
restrictions for NAS file systems 157 set vmtags command 737
scheduler setting
configuring 28 environment variables
displaying scheduled work 243, 245 DSM_CONFIG 24
event logging 245 DSM_DIR 24
number of hours between contacts to server for DSM_LOG 24
scheduled work 465 user privileges 112
number of minutes between attempts to process setwindowtitle 493
scheduled commands 479 shared dynamic serialization 258, 326
options for 248 shared memory communication method
polling mode or prompted mode 488 options 285
starting 31 shared static serialization 258, 326
whether server or client initiates sessions through shmport option 494
firewall 492 showmembers option 494
whether to disable execution of restore or retrieve silent installation 12
operations 489 skipmissingsyswfiles option 495
scheduler comparison skipntpermissions option 496
client acceptor versus traditional scheduler 28 skipntsecuritycrc option 497
772 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
skipsystemexclude 498 Storage Agent (continued)
snapdiff option 73, 498 for LAN-free data movement 130
snapdiffchangelogdir option 503 using for LAN-free data movement 373
snapdiffhttps option 504 storage area network
snapshot for LAN-free data movement 130
open file support 230 restoring backup sets using 373, 697
snapshot difference using for LAN-free data movement 373
with HTTPS 141 storage management policies
snapshot differential backup assigning management classes to files 174
with HTTPS 141 copy groups 255
snapshot differential backup with HTTPS connection 504 default management class 255
snapshot-differential-incremental backup 498 display on backup-archive client or web client GUI 174
snapshotproviderfs option 506 include-exclude list 255
snapshotproviderimage option 507 management classes 255
snapshotroot option 508 policy domains
snapshotroot option with incremental and selective default 255
commands 147 standard 255
Software updates 18 policy sets
sparse files active policy set 255
restore size restriction 691 subdir option 519
restoring 691 subdirectories
restoring to a non-NTFS or non-ReFS file system 691 archive 232
specifying whether to update last access date 461 include in backup 126
srvoptsetencryptiondisabled option 510 support
srvprepostscheddisabled option 511 gathering system information for 337, 395, 676
srvprepostsnapdisabled option 512 swing-enabled browser
SSL (Secure Socket Layer) necessary to run web client 111, 112
establishing communications with 34, 36 syntax diagram
ssl option 512 reading xxii
sslacceptcertfromserv option 513 repeating values xxii
Sslfipsmode option 515 required choices xxii
sslrequired option 516 system access control list (auditing information)
stagingdirectory option 518 back up 176
standard (classic) restore 186 system files
standard management class excluding 86
copy destination 260 system information
copy frequency 257 gathering 337, 395
copy group name 257 system recovery
copy mode Windows 188
absolute 259 system restore 188
modified 259 system state
copy serialization 258 assigning management class 85, 148, 407
copy type 257 back up 148, 620
deduplicate data attribute 260 display active and inactive objects 405
default values 257 exclude from backup processing 85, 380
retain extra versions 258 query 678
retain only version 258 restore 706
retain versions 260 restore from backup set 697
versions data deleted restoring 187
active versions 258 systemstatebackupmethod option 521
inactive versions 258
versions data exists 258
standard policy domain 255
T
start the client scheduler at startup 242 tagsched option 522, 523
starting tapeprompt option 525
automatically tasks
overview 1 closed registration 80
starting a session open registration 80
batch mode 108 TCP/IP communication method
interactive mode 108 options 284
static serialization 258 tcpadminport option 526
storage tcpbuffsize option 527
displaying restartable restore sessions 674 tcpcadaddress option 528
Storage Agent tcpclientaddress option 528
Index 773
tcpclientport option 529 V
tcpnodelay option 530
tcpserveraddress option 531 v2archive option 540
tcpwindowsize option 532 verbose option 541
time format verifyimage option 542
specifying 533 Veritas Cluster Server cluster nodes
timeformat option 533 FAQs 70
Tivoli Storage Manager FastBack configuration 59 installing IBM Spectrum Protect 62, 70
Tivoli Storage Manager FastBack configuration wizard 5, 60 installing scheduler service 62
Tivoli Storage Manager FastBack data backup 169 versions data
Tivoli Storage Manager FastBack data restore 169 deleted attribute 258
Tivoli Storage Manager FastBack installation requirements 4 exists attribute 258
toc option 534 virtual machine
todate option 535 exclude options 383
tombstone objects include options 412
preserving attributes 215 virtualfsname option 542
reanimate 212 virtualnodename option 543
totime option 536 VM 163
traditional full incremental backup 138 vmautostartvm 544
transaction processing vmbackdir option 545
summary of options 300 vmbackuplocation option 545
txnbytelimit option 536 vmbackupmailboxhistory 547
troubleshooting vmbackuptype option 547, 571
troubleshooting Windows client installations 18 vmchost option 548
Windows client installations 18 vmcpw option 549
txnbytelimit option 536 vmctlmc option
type option 537 options
vmctlmc 550
vmcuser option 551
U vmdatastorethreshold
UAC 105 option 552
UNC vmdefaultdvportgroup option 553
back up shared files and directories using 176 vmdefaultdvswitch option 554
set domain list using 176 See also vmdefaultdvportgroup
UNC names vmdefaultnetwork option 555
excluding files 87 vmdiskprovision 556
remotely accessed files 87 vmenabletemplatebackups option 556
restore files 182 vmexpireprotect option 558
Unicode vmiscsiadapter 559
pre-backup considerations 130, 132 vmiscsiserveraddress option 560
renaming file spaces that are not Unicode to Unicode- vmlimitperdatastore option 560
enabled 320, 641, 724 vmlimitperhost option 562
restore from file spaces that are not Unicode-enabled vmmaxbackupsessions option 563
691 vmmaxparallel option 565
universal naming convention vmmaxparallelrestoresessions option 567
restore 182 vmmaxparallelrestorevms option 568
using to specify domain list 176 vmmaxrestoresessions option 566
updates_622_client 620 vmmountage option 571
updating the client automatically 2 vmnocbtcontinue option 572
upgrading backup-archive clients 1 vmnoprdmdisks 573
upgrading the backup-archive client from earlier versions of vmnovrdmdisks 574
the product 1 vmpreferdagpassive option 574
usedirectory option 538 vmprocessvmwithprdm 576
useexistingbase option 539 vmprocesswithindependent 575
user account control vmrestoretype option 577
effects on network shares 105 vmskipctlcompression option 580
user privileges vmskipmaxvirtualdisks 580
setting 112 vmskipmaxvmdks 581
usereplicationfailover option 540 vmstoragetype option 581
using multiple sessions 170 vmtagdatamover
option 582
vmtagdefaultdatamover
option 585
vmtempdatastore option 587
774 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
vmtimeout option 592 Windows client (continued)
vmverifyifaction 587 initial installation 7
vmverifyiflatest 589 installation prerequisites 6
vmvstorcompr option 590 installation types
vmvstortransport option 591 initial installation 6
VMware Consolidated Backup modify an installed client 6, 16
restoring data 198 reinstallation 6, 16
VMware tagging silent installation 6
inheritance 746 uninstalling 6, 16
overview 739 upgrade installation 6
represented as data protection settings 739 installing 5
supported data protection tags 739 memory requirements 3
tips for configuring backup policies 748 reinstallation 12
VMware tagging support upgrade installation 9
enable 582 Windows components
VMware virtual machine backups installable 3
types 163 Windows security information
Volume Shadowcopy Service (VSS) whether to compute CRC for comparison of 497
configuring for online image backup 72 Windows supported file systems 4
configuring for open file support 72 WinPE CD
VSS (see Volume Shadowcopy Service) 72 Windows 189
vssaltstagingdir option 593
vStorage backup server
off-host backup 165
W
web client
configuration overview 25
configuring 26
configuring in cluster environment 62
enable to run in a swing-enabled browser 111
establishing communications through firewall 401
restrict administrator from accessing client running web
client 480
restrictions for NAS file systems 157
specifying TCP/IP port address for 401
starting 111
summary of options 301
supported browsers 111
unsupported functions 121
using through a firewall 595
web client configuration overview 25
web user interface
enable to run in a swing-enabled browser 112
starting 112
supported browsers 112
webports option 595
whether to compute CRC for comparison of Windows
security information 497
wildcard characters
guidelines 604
include or exclude files 87
include or exclude groups of files 88
specifying a drive specification in dsm.opt 88
to include or exclude groups of files 89
Windows archive attribute
reset after backup 476
Windows client
client components 3
communication methods 3
disk space requirements 3
forced reboot 6
hardware requirements 3
Index 775
776 IBM Spectrum Protect Windows Backup-Archive Clients: Installation and User's Guide
IBM®