Redp 5654
Redp 5654
IBM FlashSystem
Safeguarded Copy
Implementation Guide
Andrew Greenfield
Jackson Shea
Hemanand Gadgil
Vasfi Gucer
Redpaper
IBM Redbooks
March 2022
REDP-5654-00
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to Safeguarded Copy function that is available with IBM Spectrum Virtualize Version 8.4.2
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
FlashCopy® IBM Security™ Redbooks®
HyperSwap® IBM Spectrum® Redbooks (logo) ®
IBM® Passport Advantage® Storwize®
IBM FlashSystem® QRadar® XIV®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
Safeguarded Copy function that is available with IBM® Spectrum Virtualize software Version
8.4.2 supports the ability to create cyber-resilient point-in-time copies of volumes that cannot
be changed or deleted through user errors, malicious actions, or ransomware attacks. The
system integrates with IBM Copy Services Manager to provide automated backup copies and
data recovery.
This IBM Redpaper publication introduces the features and functions of Safeguarded Copy
function by using several examples.
This document is aimed at pre-sales and post-sales technical support and storage
administrators.
Authors
This paper was produced by a team of specialists from around the world.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Preface ix
x IBM FlashSystem Safeguarded Copy Implementation Guide
1
Next, the general concepts and components of LCP, as implemented in Spectrum Virtualize
Safeguarded Copy, are described. This involves a discussion of the general process of LCP
and a specific focus on how Copy Services Manager is used to implement the policies for the
Spectrum Virtualize snapshots that are housed in Safeguarded child pools.
More specific examples of cybersecurity guidelines are found in the US Federal Financial
Institutions Examination Council (FFIEC) revised publication, Business Continuity Planning
Booklet, which is part of the FFIEC’s Information Technology Examination Handbook for the
US financial industry.
In Appendix J, colloquially referred to as App-J, the FFIEC provides the following guidelines:
“The financial institution should take steps to ensure that replicated backup data cannot be
destroyed or corrupted in an attack on production data.”1
“...air-gapped data backup architecture limits exposure to a cyberattack and allows for
restoration of data to a point in time before the attack began.”1
1
https://www.ffiec.gov/press/pdf/ffiec_appendix_j.pdf
2
http://www.naic.org/documents/committees_ex_cybersecurity_tf_final_principles_for_cybersecurity_guid
ance.pdf
High Availability (HA) configurations mitigate against physical component failure and provide
small Recovery Point Objective (RPO) and Recover Time Objective (RTO). Continuous
protection and operation occur in the event of a component failure. Spectrum Virtualize HA
configurations such as HyperSwap® and Stretch Cluster provide such protection.
Disaster Recovery (DR) is designed to have a slightly higher RPO and RTO. Therefore, DR is
in a position to provide an airgap to protect against corruption to the data that would be
replicated immediately in a Spectrum Virtualize HA configuration like HyperSwap or Stretch
Cluster. However, since DR solutions at the storage layer are only replicating data, any logical
corruption would eventually get replicated to the DR site as well.
One way to provide adequate protection against logical data corruption is to take periodic
snapshots of the data and to have that data stored in a non-modifiable state that is
inaccessible to administrators, servers, and applications. These Safeguarded copies can then
serve as recovery points from which the data could be restored to a pre-corruption state,
whether that corruption occurred as a result of an errant batch job, a disgruntled employee, or
a ransomware attack.
The start time format is YYMMDDHHMM, and backupunit options are: minute, hour, day, week, or
month.
Moreover, many environments use traditional FlashCopies with the “backup” setting
(incremental FlashCopies with copy rate greater than zero) to decouple the heavy read-I/O
from the primary volume. It might be advantageous to create the Safeguarded copies against
these “backup” FlashCopies instead of the primary volume.
Another benefit of using these “backup” FlashCopies is that the Safeguarded copies would
then be stored in a Safeguarded child pool whose parent is the pool in which the “backup”
FlashCopies are created rather than the primary volume. This further insulates I/Os against
the primary volume.
1.3.4 Monitoring
A key component of any cyber resiliency solution is intrusion detection. While this is mainly
implemented in the network or application layer, there are also tools associated with storage
that can provide early warning and direct integration into Spectrum Virtualize. One such tool
is Storage Insights (https://www.ibm.com/products/analytics-driven-data-management),
which has traditionally been used to provide performance and capacity reporting capabilities
to storage environments. The Storage Insights tool provides additional support enhancement
benefits such as reducing the amount of time needed to create tickets and uploading logs to
support.
Because these tools already have the capability to monitor the storage environment, they are
perfectly positioned to detect sudden changes in storage consumption and decreased
compressibility, which would be indicative of an application-level encryption-based
ransomware attack.
1.3.5 Validation
Another important part of a complete cyber resiliency solution is the ability to validate the
created copies. This can be accomplished through a range of methods.
Typically, if the volumes are part of a filesystem, you can map the recovery volume to a
validation host that will verify that it is operating as expected.
Further validation at the application level might be desired beyond simply mounting the
filesystem at the operating system level. Other strategies involve checkpoint files that might
be used. Regardless of the method used, and other than cyber resiliency, periodic validation
of backups is a sound IT practice.
1.3.6 Automation
The last consideration for a full range, end-to-end cyber resiliency solution is automation. As
implied by end-to-end, this starts with the provisioning of a new set of volumes for an
application that meets requirements for Safeguarded Copy protection. The automation is
incorporated into the provisioning process so that either the primary volume, or backup
FlashCopy or replication target volume is placed into an appropriate volume group with the
appropriate policy for the frequency and retention of Safeguarded copies.
There is also automation for periodic recovery and validation of the Safeguarded copies.
Another area for automation is the monitoring of suspicious activity, which might then trigger
the initiation of access lockdown.
If the primary volumes are corrupt and require restoration, there should be automation for the
selection of the most recent valid Safeguarded Copy of the data and the retrieval of that data
back to the original volumes.
The IBM resources that might be of assistance with some or all of these considerations are:
2.2.1, “Cyber Resiliency Assessment Tool” on page 15
2.2.2, “Cyber Vault Storage Assessment” on page 15
Rather than detail additional specifics from the regulatory guidance and requirements, it is
sufficient to know that they are frequently the driving force behind implementation decisions
and business requirements.
Therefore, Safeguarded Copy should not be implemented in a vacuum but rather together
with the other existing processes. This might help to determine or change frequency
requirements from what was initially determined.
If full-copy FlashCopies are already being taken to insulate the primary volumes from heavy
reads during backups, then those volumes might be better candidates for the Safeguarded
Copy source volume, assuming this meets the RPO and RTO requirements.
Finally, if the data is replicated to a secondary site, the replicated volume might be a better
place to serve as the source for Safeguarded Copies. The replicate volume would also
provide a physical air-gap from the primary volume. However, this affects the RTO because
recovery to the primary site requires replication back from the secondary site before the
application can be brought online unless compute and network resources are available for the
application to be brought up at the replication target site.
These are examples of scenarios that might affect how Safeguarded Copy is implemented in
a larger context and should be part of the planning process.
2.1.5 Capacity
Safeguarded Copy uses the Spectrum Virtualize point-in-time copy functionality, called
FlashCopy. FlashCopy is designed so that Spectrum Virtualize attempts to consume as little
space as possible by using Copy on Write (CoW) with traditional volumes and Redirect on
Write for deduplicated volumes in a Data Reduction Pool (DRP). For more information on
these topics, see Implementing the IBM FlashSystem® with IBM Spectrum Virtualize Version
8.4.2, SG24-8506.
The greatest capacity savings are achieved by using deduplicated volumes in a DRP, but
using deduplicated volumes must be balanced against the additional overhead of metadata
management. With non-deduplicated volumes that are using Copy on Write (CoW), further
Even with those efficiencies it is still necessary to consume space to preserve a series of
points in time. Therefore, considerations for the amount of space consumed by Safeguarded
Copies factor in the following items:
Policy parameters of frequency and retention: Copies-per-data times retention-in-days
gives the total number of FlashCopies
Change rate of data: This can be estimated by reviewing the write-activity of the volume.
The most accurate estimation of the change rate is to create a FlashCopy and then keep it
for a reasonable period to capture sudden increases, like monthly batch jobs or database
loads. Then, divide the size of the FlashCopy by the number of days it was kept to get the
average daily change rate.
The above calculation provides a general idea of space consumption under normal
conditions. It is a fairly straightforward calculation of (A ÷ B) x C, where:
A = number of FlashCopies per day
B = average daily change rate
C = retention in number of days
However, a more accurate capacity-planning picture also accounts for the impacts of an
actual ransomware attack by factoring in:
Loss of compression: The most popular form of ransomware attack encrypts the data
with a key for which the victim must pay to unlock their data. Since encrypted data (done at
the Operating System through a nefarious application instead of at the storage level)
defeats compression, a comprehensive capacity plan accounts for this increase in
capacity.
Recovery Volume Space: It is highly recommended, if not required, that an
implementation of Safeguarded Copy include a periodic recovery validation. The recovery
volumes are full-copy clones of the original volumes from the point-in-time of the chosen
backup.
It is unlikely that all protected volumes will need to be recovered at the same time.
Therefore, IBM strongly recommends that all production volumes be periodically validated.
However, a sub-section of all protected volumes can be validated as a minimum starting
point.
Volumes can be validated by using various tools as outlined in the Cyber Vault blueprint at:
https://www.ibm.com/downloads/cas/ODKXBLR9
While the calculation is fairly straightforward, it is recommended that the resources discussed
in section 2.2, “IBM resources” on page 15 be considered, especially to assist with capacity
planning.
Normal Administrator
A normal Administrator level account can complete the following tasks:
Create and delete empty volume groups.
Create and delete unattached Safeguarded policies.
Assign volumes to a volume group.
Attach a Safeguarded policy to a volume group.
Remove a policy or change policy for a volume group. This does not affect retention of
existing Safeguarded copies.
Security Administrator
A Security Administrator level user is needed to complete the following tasks:
Disable and enable the superuser account.
Delete Safeguarded Copy backups before the end of their retention period.
2.1.7 Monitoring
Related to security and access control is the cornerstone of environment monitoring to detect
anomalous behavior that requires remediation. This behavior might be nefarious activity or
might be misconfiguration or unforeseen consequences of normal processes. Well-designed
monitoring and auditing also helps to offset more restrictive measures that might otherwise
render an environment unmanageable.
An example is storage administrator’s ability to change the Safeguarded policy for a volume
group. Legitimate reasons for this exist, such as a status change for an application and its
associated volumes. However, these reasons should be well-documented and verified in a
change-control process. To protect against an unauthorized or accidental change in
frequency or retention of Safeguarded copies, you should use a monitoring and reconciliation
process to detect when the level of protection of a set of volumes that are associated with an
application deviates from the expected policy.
“Based on the NIST Security Framework, the Storage Cyber Resiliency Assessment Tool
(CRAT) provides a bridge mechanism to evaluate the current data protection state of your
organization, identify gaps, strengths, weaknesses, and provides recommendations to build
an effective cyber resiliency plan.”1
For additional details and contact information, see the IBM Lab Services page:
(https://www.ibm.com/it-infrastructure/services/lab-services)
1 https://www.ibm.com/downloads/cas/W7VJLDPE
The second part of the chapter describes the management of a Safeguarded Copy
environment with an IBM Copy Services Manager Safeguarded Copy session. This includes
ongoing operations, such as expiring backups, recovering a backup, or expanding
Safeguarded Virtual Capacity.
Important: The detailed configuration steps covered in this chapter apply to the first (pre
volume group snapshot) version of Safeguarded Copy (Safeguarded Copy V1, code levels
8.4.2 through 8.5.1). For code 8.5.2 onwards, Safeguarded volume group snapshots are
configured at the volume group level and do not need a dedicated child pool.
You can refer to IBM Redpaper Data Resiliency Designs: A Deep Dive into IBM Storage
Safeguarded Snapshots, REDP-5737 for more information.
For more information about planning, see Chapter 1, “Spectrum Virtualize Safeguarded Copy
introduction and concepts” on page 1.
Figure 3-1 shows the configuration that we use as an example to set up a Safeguarded Copy
environment.
The Safeguarded Copy environment requires a set of Safeguarded Copy source volumes and
an equal number of recovery volumes. The recovery volumes are necessary to recover data
from a Safeguarded Copy backup. For more information about this requirement, see
Chapter 2, “Safeguarded Copy planning considerations” on page 9.
A Safeguarded Copy backup location can be created by using both the CLI and the GUI, as
follows:
Using the CLI:
mkdiskgrp -parentmdiskgrp safeguarded_backup_pool -size 100 - unit gb -safeguarded
Using the GUI:
1. In the management GUI, select Pools → Pools. Right-click a parent-pool and select
Create Child Pool. On the Create Child Pool page, enter a name of the child pool.
2. If the parent pool is a standard pool, enter the amount of capacity that is dedicated to the
child pool. If the parent pool is a DRP, the child pool shares capacity with the parent pool.
See Figure 3-2.
3. Select Safeguard to indicate that the child pool is used as the Safeguarded backup
location for immutable backup copies of source volumes.
4. Click Create. Child pools that are used as Safeguarded backup locations are marked with
a shield icon on the Pools page as shown in Figure 3-3.
In this example, safeguarded_backup_pool is configured in the parent “SVPC Pool”, as
shown in Figure 3-3.
A Safeguarded pool can be created through the CLI, by using the following command:
mkmdiskgrp -parentmdiskgrp SVPC Pool -size 100 -unit gb -safeguarded
Not all volumes in a Safeguarded volume group must belong to the same parent pool.
However, all volumes in the Safeguarded volume group must have a Safeguarded backup
location. This condition must also be met when a volume is added to a Safeguarded volume
group. Otherwise, adding the volume will fail.
A vdisk volume can be designated as Safeguarded source volume only if its volume group is
associated with a Safeguarded policy. A Safeguarded source is automatically associated with
a Safeguarded backup location, which is a child pool in the Safeguarded source's parent pool.
For a mirrored Safeguarded source, each volume copy is associated with a Safeguarded
backup location.
The volume group object itself does not guarantee that consistent FlashCopy operations will
be performed. The Spectrum Virtualize Administrator user, or more commonly External Copy
Management software, must create FlashCopy consistency groups and operate on the
mappings such that they are backed up consistently.
Note that a volume group can be considered Safeguarded, but not have any volumes in it nor
any Safeguarded backups created yet.
Note: If you select volumes in a parent pool that do not contain a child pool to use as
the Safeguarded backup location, select Navigate to Pools. For each parent pool with
source volumes, you must configure a child pool as the Safeguarded backup location.
The volume group is created with the name safeguarded_demo, as shown in Figure 3-4 on
page 23.
After the volume group is created, you can add source volumes to the same volume group.
In this example, two source volumes are added to the volume group, which are presented to
the Windows production server, as shown in Figure 3-5.
Safeguarded_DataDB_vol, which includes SQL database data tables
Safeguarded_LogDB_vol, which includes the database log files
This command creates the volume group and assigns the policy to the volume group.
2. Create new volumes or change existing volumes and assign them to the volume group
that you created in Step 1.
As of this writing, the management GUI does not support the creation of user-defined
Safeguarded backup policies. However, you can use the CLI mksafeguardedpolicy command
to create user-defined policies. The system contains three predefined policies, as shown in
Figure 3-6 on page 25.
Note: These predefined policies cannot be changed or deleted. However, you can use
the CLI mksafeguardedpolicy command to create user-defined Safeguarded backup
policies. For user-defined policies, the policy IDs start after the first three predefined
policy IDs. The system supports a maximum of 32 Safeguarded backup policies with
three predefined policies and 29 user-defined policies. If you create user-defined
Safeguarded backup policies in the CLI, you can view and select these policies within
the management GUI.
At this time, neither interface supports changes to the factory predefined Safeguarded
backup policies.
4. Select a date and time when you want IBM Copy Services Manager to start creating
Safeguarded backups that use the policy. IBM Copy Services Manager queries the system
every five minutes to process existing Safeguarded policies. The start time that is defined
in the Safeguarded policy must factor in the possible five-minute delay.
When IBM Copy Services Manager detects a new Safeguarded policy for a volume group,
it creates the session and scheduled task to create and manage the Safeguarded
backups. IBM Copy Services Manager starts Safeguarded backup copies based on the
start time and the copy interval that is defined in the Safeguarded backup policy. If the
start time occurs before IBM Copy Services Manager detects the policy, the Safeguarded
backup is initiated based on the copy interval set in the Safeguarded policy and not at the
start time.
5. Click Assign.
After the Safeguarded backup policy is assigned to the volume group, the status of the
volume group displays as Safeguarded scheduled. See Figure 3-7.
This status indicates that the policy is assigned, but the Safeguarded backup copies are
not started. When Safeguarded backup copies are stored on the Safeguarded backup
location, the status of volume group displays as Safeguarded.
After Safeguarded backup copies are added to the Safeguarded backup location, users
with the Administrator role or lower cannot delete a parent pool with a Safeguarded
backup location.
Before you configure the Safeguarded Copy function on your system, ensure that you meet
the prerequisites as described in “IBM Copy Services Manager requirements” on page 27.
Note: If you are using an existing license, ensure that the licensed capacity is adequate for
use of the Safeguarded Copy function. If you need more capacity for Safeguarded Copy
function, contact you IBM sales representative to update your licensed capacity for IBM
Copy Services Manager.
After you download IBM Copy Services Manager, complete the instructions for your
installation. IBM Copy Services Manager supports several installation options on different
environments. For more information, see:
https://www.ibm.com/docs/en/csm/6.3.0?topic=overview-installing-copy-services-mana
ger.
IBM Copy Services Manager uses a Safeguarded policy to configure FlashCopy mapping and
consistency groups automatically to create backup copies. When Safeguarded backups are
created, IBM Copy Services Manager uses the retention time for the Safeguarded backups
based on the settings in the Safeguarded policy. After copies expire, the IBM Spectrum
Virtualize software deletes the expired copies from the Safeguarded backup location.
After the IBM Copy Services Manager is installed and before you can establish the system as
a connection endpoint in IBM Copy Services Manager, you must configure a user with the
Administrator role on the IBM Spectrum Virtualize system. For auditing, it is recommended
that you create a new Administrator user to configure the Safeguarded Copy function. Users
with this role are limited in how they can manage and interact with Safeguarded Copy
operations. IBM Copy Services Manager uses this role to create FlashCopy mappings
between the source volumes and the Safeguarded backups on the system.
To create a connection to the system in IBM Copy Services Manager, complete these steps:
1. Log in to IBM Copy Services Manager at https://<IP address or domain
name>:9559/CSM where <IP address or domain name> is the IP address or domain name
of IBM Copy Services Manager instance in your network.
2. Select Storage → Storage Systems.
3. On the Storage Systems page, select Add Storage Connection.
4. Click one of the following options based on your product:
– FlashSystem Spectrum Virtualize
– SAN Volume Controller
– Storwize® Family
5. On the Connections page, enter the following information for your system:
– Cluster IP / Domain Name
Enter the management IP address or domain name for your system.
– Username
Enter the username for the Administrator user for the system.
– Password
Enter the password that is associated with the Administrator user for the system.
6. Click Next.
7. Click Finish.
8. On the Storage Systems page, verify that Local Status for the connection is Connected, as
shown in Figure 3-9 on page 30.
Figure 3-10 Safeguarded Copy session automatically visible in IBM Copy Services Manager
This session includes the two volumes that are part of the volume group that was defined
earlier. See Figure 3-11.
The IBM Copy Services Manager session details show more information about the
Safeguarded policy that is set on the volumes for the backup and retention. See
Figure 3-12.
It is critical to note that using either the recovery or the restoration features of SGC, does not
change the immutable source snapshots on the original FlashSystem. Equally critical is the
important difference in terminology:
Recovery uses the Safeguarded Copy to make a new volume in the original FlashSystem
pool. It also allows for mapping and testing through other hosts that are defined on that
FlashSystem array. This is the safest way to preserve the existing volume for analysis.
Restore Backup to Production immediately overwrites the current existing (live-mapped)
source volume from the immutable Safeguarded Copy snapshot.
Important: Ensure that you regularly test your configuration to ensure that Safeguarded
backups can be recovered and restored, if necessary.
IBM Copy Services Manager provides automation for both recovery and testing with the
Recover Backup action. The Recover Backup action creates recovered versions of
Safeguarded backup copies that you can map to a test alternative host and verify that the
applications run properly. This command is shown in the Copy Service Manager Session
Details window. See Figure 4-1.
2. From the top menu bar on the Overview page, select Sessions. See Figure 4-3.
3.From the Sessions overview page, select the volume group that contains the Safeguarded
backup copies that you want to recover. See Figure 4.
3. Select the generation of the backup that you want to recover. A snapshot is then recovered
to a new volume; the existing volume is not overwritten. See Figure 4-6.
Figure 4-6 Select the specific Safeguarded snapshot to recover to a new host
When the recovery has completed, the new volumes are created in the parent pool where
the source volume is a member. The newly-recovered volumes can now be mapped to a
host to check for data integrity and consistency.
The steps are shown below in a series of screenshots from both IBM Copy Services
Manager and the FlashSystem array.
a. In Figure 4-7, the user can see that the job has completed.
b. In Figure 4-8, the user can click the Recover Backup Info sub-tab to see the overview
of the recovery.
c. For more details, the user can click the highlighted line to view more details of the
Recovery including the name of the volume that is restored to the same pool as the
source volume. See Figure 4-9.
Figure 4-9 Recovery detail information confirming the restore with specific name of volume
d. As a further validation, by going to the FlashSystem the user can navigate to the pool
that contains the source volume and see the newly restored volume, which matches
the name from IBM Copy Services Manager. See Figure 4-10
Figure 4-10 Newly created restore volume shown inside FlashArray, same pool as source
4. Using the above series of screenshots, you can verify the original source volume (H1
column) and the recovered volume (R1 column). The new recovery volume is not currently
mapped to any host.
Each recovery volume is named with the original source volume name and appended with
the timestamp when the backup was created. You can use the management GUI on the
system to view and filter these recovery volumes. In the management GUI, select
Volumes → Volumes and filter the volume list on the timestamp to show all the recovery
volumes.
5. To test the recovered version (R1 volume) of the Safeguarded backup, assign the
recovered volume to an alternative host or host cluster that you use for testing.
a. Select Assign R1 to host.
6. Proceed to map the host, and validate that the application runs as expected to the
recovered Safeguarded backup.
7. After you complete testing, the Terminate H1R1 command can be used to delete the
recovery relationship and recovery volume.
Select Session Actions → Command → Terminate H1R1.
8. You can also select Terminate H1 Keep R1 to delete the relationship between the source
volume (H1) and recovered volume, but keep the recovered volume (R1). Figure 4-12
shows the Session Actions submenu.
Before you can restore data to the source volume with a Safeguarded backup copy, ensure
that you fully test the Safeguarded backup copies that are associated with the compromised
source volume. Multiple versions of Safeguarded backup copies can exist, and some versions
can include malware or damaged data. The restore operation is similar to the recovery steps
described in “Recovery of Safeguarded volumes to a new host” on page 34. Both recovery
A best practice is to configure Safeguarded Copy function on the master site in the
HyperSwap configuration. Configuring Safeguarded Copy function on the master site of a
HyperSwap configuration simplifies the restore process to the same source volumes.
Similarly, you can create Safeguarded backup on the auxiliary site and not the master site, but
this use case has more considerations and steps. Use the following instructions before you
restore a HyperSwap source volume:
3. To remove the volume copy that was identified in above step, enter the following
command:
svctask rmvolumecopy -copy <copy_id> -pool <pool_id_or_name> -removefcmaps <name_id>
where:
– <copy_id> is the copy identifier for the copy on the auxiliary site.
– <pool_id_or_name> is the name or identifier of the pool.
– <name_id> is the name or ID of the volume that is associated with the copy.
This command removes the volume copy at the auxiliary site, its associated FlashCopy
mappings, and the change volumes that are created when HyperSwap volume is created.
This action makes the volume copy at the master site an independent volume that can be
recovered with IBM Copy Services Manager.
3. To remove the volume copy that was identified in above step, enter the following
command:
svctask rmvolumecopy -copy <copy_id> -pool <pool_id_or_name> -removefcmaps <name_id>
where:
– <copy_id> is the copy identifier for the copy on the auxiliary site.
– <pool_id_or_name> is the name or identifier of the pool.
– <name_id> indicates is name or ID of the volume that is associated with the copy.
This command removes the volume copy at the auxiliary site, its associated FlashCopy
mappings, and change volumes that were created when HyperSwap volume was created.
This action makes the volume copy at the master site an independent volume that can be
recovered with IBM Copy Services Manager.
3.From the Sessions overview page, select the volume group that contains the volumes you
want to restore and overwrite to production. See Figure 4-18.
3. Select the generation of the backup that you want to recover. See Figure 4-20.
The snapshot is restored and it overwrites the existing mapped volumes. To ensure data
integrity, the graphic and information will be emphasized on the pop-up window.
Figure 4-20 Select the specific Safeguarded Snapshot to restore to existing host
When the restore is complete, the immediate results are displayed in the main window and
in the event log on IBM Copy Services Manager. See Figure 4-21.
4. Restart your existing mapped hosts to ensure they pick up the restored changes to the
volumes.
5. If you restored a HyperSwap source volume, you must return the recovered source volume
to a HyperSwap volume.
Enter the following command to create a copy of the restored volume on the other site:
addvolumecopy -pool <storage_pool_id or storage_pool_name> <volume_name or volume_id>
Attention: A detailed manual of all IBM Copy Services Manager CLI commands and their
syntax can be found at the following location:
A detailed manual of all commands and their syntax can be found at the following location:
https://www.ibm.com/support/pages/ibm-copy-services-manager-command-line-interf
ace-users-guide
1. To access the IBM Copy Services Manager CLI, you must SSH into the IBM Copy
Services Manager host and then run the CLI shell. An example is shown in Figure 4-22 for
Linux, where the default directory is /opt/IBM/CSM/CLI.
Figure 4-22 Using SSH to access host and launch CSMCLI shell
2. To show the all the IBM Copy Services Manager sessions and their status, use the lssess
command.
3. To show the details of a session inside IBM Copy Services Manager, use the showsess
command with the specific name of that session:
showsess <session name>
4. To see the available actions for a given specific session, use the lssessactions command:
lssessactions <name of session>
5. To take one of those actions on a particular session inside IBM Copy Services Manager,
use the cmdsess command:
cmdsess -action <action> -retentiondays <number of days to keep> <name of
session>
6. To list all the Safeguarded volumes with recovery relationships, enter the following
command:
lsrecoveredbackupscommand
The publications listed in this section are considered particularly suitable for a more detailed
discussion of the topics covered in this paper.
IBM Redbooks
The following IBM Redbooks publications provide additional information about the topic in this
document. Note that some publications referenced in this list might be available in softcopy
only.
Implementing the IBM FlashSystem with IBM Spectrum Virtualize Version 8.4.2,
SG24-8506
You can search for, view, download or order these documents and other Redbooks,
Redpapers, Web Docs, draft and additional materials, at: ibm.com/redbooks
Other publications
These publications are also relevant as further information sources:
https://www.ffiec.gov/press/pdf/ffiec_appendix_j.pdf
http://www.naic.org/documents/committees_ex_cybersecurity_tf_final_principles_for
_cybersecurity_guidance.pdf
Online resources
These websites are also relevant as further information sources:
IBM Security QRadar XCD:
https://www.ibm.com/security/security-intelligence/qradar
IBM Storage Insights:
https://www.ibm.com/products/analytics-driven-data-management
IBM Spectrum Protect:
https://www.ibm.com/products/data-protection-and-recovery
REDP-5654-00
ISBN 0738460303
Printed in U.S.A.
®
ibm.com/redbooks