SG 248554
SG 248554
Redbooks
Draft Document for Review January 14, 2025 4:55 pm 8554edno.fm
IBM Redbooks
January 2025
SG24-8554-00
8554edno.fm Draft Document for Review January 14, 2025 4:55 pm
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to IBM Storage Defender Data Protect Version 7.1.1 and 7.1.2.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction to
IBM Storage Defender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.1 Overview of IBM Storage Defender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.2 Overview of IBM Defender Data Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3 Overview of IBM Defender Data Management Service. . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect . . . . 95
6.1 Data Protection Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
6.2 Deployment Exercise Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
6.3 Create an S3 Bucket on the IBM Storage Protect Server . . . . . . . . . . . . . . . . . . . . . . . 97
6.4 Capture Access Credentials on the SP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
6.5 Register the S3 Bucket as External Target on Data Protect Cluster. . . . . . . . . . . . . . 101
6.6 Create Polices to Archive Data to The S3 Bucket. . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
6.6.1 Create a Protection Policy for Archiving to the S3 Bucket . . . . . . . . . . . . . . . . . 104
6.6.2 Configure the Data Protection Group to use the Data Protection Policy. . . . . . . 106
6.7 Monitoring the Protection status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
6.8 Retrieve from the S3 External Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.8.1 Retrieve using Global Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.8.2 Retrieve using Recoveries Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.9 Additional Process Monitoring Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
iv IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554spec.fm
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at https://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM Cloud® Redbooks®
DB2® IBM FlashSystem® Redbooks (logo) ®
Enterprise Design Thinking® IBM Security® Storwize®
Guardium® IBM Spectrum® XIV®
IBM® QRadar®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Ceph, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and
other countries.
VMware, VMware vCenter Server, VMware vSphere, and the VMware logo are registered trademarks or
trademarks of VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
vi IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554pref.fm
Preface
This IBM Redbooks publication provides a look at the IBM Storage Defender Data
Management Service (DMS) and Data Protect. This includes information to better understand
how IBM Storage Defender is used to protect a number of different workloads as well as
integrate with IBM Storage Protect for offload and archival purposes. Configuration and usage
examples are provided to further explore defining and configuring protection policies. This
document is intended for use by System Administrators and anyone wanting to learn more
about implementing DMS and Defender Data Protect.
Authors
This book was produced by a team of specialists from around the world working with IBM
Redbooks.
Christian Burns is a Principal Worldwide Storage Data Resiliency Architect and IBM
Redbooks Platinum Author based in New Jersey. As a member of the Worldwide Storage
Technical Sales Team at IBM, he works with clients, IBM Business Partners, and IBMers
around the globe, designing and implementing solutions that address the rapidly evolving
cyber and data resiliency challenges facing enterprises today. He has decades of industry
experience in the areas of sales engineering, solution design, and software development.
Christian holds a BA degree in Physics and Computer Science from Rutgers College.
Paul Conway has over 36 years of industry experience in Storage Management and Data
Protection. As an IBM customer, Paul protected large Mainframe and Open Systems Storage
environments using IBM data protection software including DFSMS, DFDSS and Storage
Protect. Paul has been with IBM over 4 years and is currently responsible for working with and
guiding Storage Protect customers as an IBM Storage Protect/Defender Technical Advisor.
Phillip Gerrard is a a Project Leader for the International Technical Support Organization
working out of Beaverton, Oregon. As part of IBM for over 15 years he has authored and
contributed to hundreds of technical documents published to IBM.com and worked directly
with IBM's largest customers to resolve critical situations. As a team lead and Subject Matter
Expert for the IBM Spectrum® Protect support team, he is experienced in leading and
growing international teams of talented IBMers, developing and implementing team
processes, creating and delivering education. Phillip holds a degree in computer science and
business administration from Oregon State University.
Gary Graham is a Brand Technical Specialist covering IBM Defender Data Resilience
solutions for IBM customers in the Southeastern US. Gary has presented at the IBM Edge
conference, and worked on multiple IBM Professional Certification exam teams and currently
has a Distinguished Technical Specialist certification from The Open Group.
Richard Hurst is a cyber-resiliency and storage consultant with IBM’s Expert Labs team.
With 20+ years experience stretching across multiple disciplines, Richard has provided
installation and configuration services as well as providing support for many different name
brand products. As an invaluable member of the IBM’s Expert Labs team Richard has worked
with multiple IBM products including IBM Defender Data Protect, IBM Storage Ceph and IBM
Flashsystems, as well as consulting for IBM’s Cybervault Workshop. Richard Hurst continues
to broaden is skill set through Openshift/IBM Fusion as well as Cybersecurity training.
Juan Carlos Jimenez is IBM’s world-wide Data Resiliency Product Manager. He is focused
on defining roadmaps, initiatives, and strategy within the various data resiliency software
products that he manages alongside his team. Juan Carlos brings an end-to-end view to
cyber resilience leveraging his expertise in both storage and security. Juan Carlos developed
our Cyber Resiliency Assessment Tool which has been helping numerous enterprises identify
and close gaps in their IT environments.
James Morassutti is a Senior Storage Technical Specialist based out of Toronto, Canada.
His career in IT spans over 20 years in key areas such x86, Networking, Cyber Resiliency and
Storage solutions. James is the National Data Protection SME for Canada, focused on
helping clients design solutions to support their Operational Resiliency and protection their
critical data to support their Cyber Resiliency Practices. James is passionate about
automotive, technology and educated in Mechanical Engineering.
Jack Tedjai is an IBM Certified Expert IT Specialist and IBM Systems subject matter expert,
working in the Northern Europe Infrastructure Lab Expert Services organization. He joined
IBM in 1998, and has more than 25 years of experience in the delivery of Storage, Storage
Virtualize, Backup and Cyber Resilience services for Open Systems. He is mostly involved in
architecture and deployments world-wide for IBM Lab Expert Services, with a focus on IBM
Storage Protect, IBM Storage Protect Plus and IBM Cloud® Object Storage.
Daniel Thompson has been working in IT for more than 40 years. His specialty is data
protection (Backup and Restore, Disaster Recovery, Business Continuity and Cyber
Resiliency). He currently works in the Advanced Technology Group (ATG), IBM Technology,
Americas.
Christopher Vollmar Principal, World Wide Storage Data Resiliency Architect. Christopher is
an IBM Certified IT Specialist (Level 3 Thought Leader) and Storage Architect. He is focused
on helping customers design solutions to support Operational and Cyber Resiliency on
primary and backup data to complement their Cyber Security practices. He is an author of
several IBM Redbooks®, an Enterprise Design Thinking® Co-Creator, and a frequent
speaker at events like IBM THINK, and TechXchange.
Here’s an opportunity to spotlight your skills, grow your career, and become a published
author—all at the same time! Join an IBM Redbooks residency project and help write a book
in your area of expertise, while honing your experience using leading-edge technologies. Your
efforts will help to increase product acceptance and customer satisfaction, as you expand
your network of technical contacts and relationships. Residencies run from two to six weeks
in length, and you can participate either in person or as a remote resident working from your
home base.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
viii IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554pref.fm
ibm.com/redbooks
Send your comments in an email to:
redbooks@us.ibm.com
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface ix
8554pref.fm Draft Document for Review January 14, 2025 4:55 pm
x IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch01.fm
Chapter 1. Introduction to
IBM Storage Defender
Just a few decades ago, considerations for data resilience were a much simpler. If a company
lost or damaged an important file or folder, they’d simply load up the previous day’s backup
tape, retrieve a copy of the missing data, and return to operating normally from there.
Those days are long gone. Today, the volume of data and diverse range of workloads have
made backup and restore operations much more complex. Regardless of their size, industry,
or location, every organization must have an active security perimeter to keep out bad actors,
plus effective recovery mechanisms to get back up and running quickly when an attack gets
through.
Although the current world of IT may seem like a dangerous place with new and creative
attempts to exploit vulnerabilities, careful planning and execution of appropriate data security
and data resilience processes can enable organizations to gracefully recover from otherwise
dire situations. This Redbooks publication provides guidance on one of IBM's solutions
dedicated to these use cases, enabling customers to recover rapidly, and at scale.
In this chapter:
Flexible licensing
Licensing is based on resource units (RUs), providing a cloud-like, utility-based
consumption model for organizations to consume any service within IBM Storage
Defender.
IBM Storage Defender is designed to integrate with other IBM Storage and IBM Security®
solutions, including IBM QRadar®, IBM Guardium®, FlashSystem, IBM Storage Scale, IBM
Storage Ceph, and IBM Storage Fusion. It also includes copy data management tools to
manage and orchestrate application-integrated, hardware snapshots by making copies
available when and where users need them for instant data recovery, or data reuse,
automatically cataloging and managing copy data across hybrid cloud infrastructures.
12 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch01.fm
In this Redbook we will deep dive into how this solution protects the most critical workloads
for modern enterprises.
IBM Storage Defender Data Protect boasts a scale-out architecture comprised of clusters.
These clusters can be deployed virtually, in the cloud, or on promise through physical nodes.
These physical nodes include CPU, Memory, Storage, Network, Operating System, File
System, and the Backup Software. An example of these nodes is the IBM Defender Ready
Node. By leveraging this cluster and node architecture, Defender Data Protect can execute
data management operations like backups, cloning, and restores rapidly, at scale. This is
possible by equally spreading the workload or action among all nodes in a cluster. Lastly,
upgrades, and expansions can be done easily and non-disruptively by simply adding more
nodes to a cluster.
Some of the key capabilities of IBM Storage Defender Data Protect that will be covered in this
document are:
Integrated Cybersecurity:
The solution has been designed on zero-trust principles to prevent internal attacks, and
threats. It has ransomware, virus and vulnerability detection built in and can protect data
through its Immutable architecture, as well as protect data on immutable targets.
Encryption is available both at-rest and in-flight, as well as integration with SIEM solutions
like QRadar, Splunk and others.
Fast Cloning:
Extremely fast cloning of large databases for devOps, testing, and other development use
cases. For example cloning a 2 TB SAP Hana database in about 15 seconds.
Users can connect Defender Data Protect Clusters, IBM Storage Protect Servers, IBM
FlashSystems, and other assets into the service to drive end-to-end data resiliency
operations from a single pane of glass interface.
Security Advisor:
The security advisor enables users to view the security posture of your implementation
and provides actionable insights so that you can modify the security settings based on the
best practice and business needs.
Simulations:
This functionality offers predictive planning models that can make projections about
utilization and storage consumption. This capability is based on historical usage,
workloads, and user-defined what-if scenarios. This empowers users to proactively plan
for various situations, such as acquiring new nodes, integrating new workloads, optimizing
current workloads, and more. Simulations can be created with scenarios using specific
clusters and time periods to help better understand and plan environment changes.
14 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch01.fm
Reports:
This function allows users to create and view an overall summary of the data protection
jobs and storage systems. Additionally, users can analyze data at the granular level using
powerful filtering options. Filter, schedule, email, and download reports to ensure users
who needs detailed information on the environment and its status get what they need
when they need it.
16 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
This chapter will provide an overview of IBM Storage Defender Data Management Service.
In the summary dashboard users can easily view the following key functions of DMS:
The total number of healthy and unhealthy clusters, alert summary, and location of the
Data Protect Clusters
18 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
Summary of total objects that have been associated with a backup job
The Data Protection view provides a topology of the managed data protect clusters and their
archive and cloud tier targets as well as a summary of the recoveries made in the last 30
days.
The cloud view provides a summary of cloud activity including data archived\restored as well
as consumption by provider.
2.2.1 Security
The Security dashboard provides tools which assist administrators to quickly understand their
current security stance and provides actionable insights with recommendations related to any
potential vulnerabilities and help improve security in the environment.
The Security Advisor uses a scoring system, evaluating each individual cluster under
management to help users understand their current security stance. It then provides
recommendations to improve scores based on a number of key attributes. The scores, icons
and other information provided in this feature indicate how the organization’s deployment and
configuration compares with IBM’s minimum recommended practices. These practices are
designed to supplement (but are not a substitute for) a robust and comprehensive information
security program managed by an organization’s designated experts.
20 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
The Security view also summarizes threats detected across backed up objects and their
attributes. This is available under the Anit-ransomware header.
Users have the ability to customize the action thresholds, manage notifications, and block
recoveries that have been tagged as a security risk.
Quorum
As a part of the Security section from DMS in the left-hand navigation tab you can explore as
well as the Quorum function. In the nature of Two-Person Integrity (TPI), Quorum approvals is a
feature of DMS than ensures a pre-defined approver, or group of approvers must approve of
actions requested by users prior to those actions taking place. Quorum helps eliminate risk of
destructive operations being performed by administrators due to malicious or accidental
actions.
The quorum dashboard allows users to view all quorum requests that are pending approval as
well as the current user’s requests. From here, users with the appropriate level of access can
also configure quorum groups. Quorum groups are made up of members of the organization
that can be assigned as approvers for various operations against selected clusters.
22 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
select the users that need to approve the actions, how many of the group that need to apply,
for example 3 out of 5 or 2 of 4 etc. The timeline for approval is also a selectable option,
allowing the request a certain amount of to be approved or else it will decline automatically.
Members of the Quorum Group will be notified by email of a pending approval.
2.2.2 System
The System tab provides access to the various tools for users to manage the Data Protect
Deployment. By selecting the system tab users are presented with the following options:
Health Panel
The health panel (Figure 2-13 on page 24) provides administrators with a consolidated list of
alerts that have been generated by the various clusters in the Data Protect deployment.
Figure 2-13 IBM Storage Defender Health panel showing a list of Alerts
Alerts
Administrators can select an alert notification to gather more details (Figure 2-14) including
the time the alert was triggered, a detailed description of the severity, type, and the category
of the alert. Users can optionally mark alerts as resolved by either tying it to an existing
resolution or by creating a new resolution description.
The resolution summary tab provides administrators with a consolidated view of all the
previously generated resolutions
The silence tab allows users to create rules to suppress certain notifications based on the
cluster, severity of the alert, category, type and names
The notification tab allows users to customize notification delivery via email or webhooks,
which allows customization on the alerting and the type of alerts as depicted in Figure 2-15
on page 25 (below)
Users are able to create alerts specific to clusters, alert levels, preset alert types, alert
categories and alert names with deep granularity
24 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
Simulation
The Simulation tab (Figure 2-16 on page 25) provides administrators with the ability to
simulate new workloads against the existing deployment to help predict storage consumption
over time. This is a powerful tool to help administrator proactively plan, if and when additional
storage capacity may be required to support environment changes.
To create a new simulation, select the blue toggle on the upper right corner of the screen.
From here users can give the simulation a name as well as an end date for the simulation. It
will create the ability to model the effect on the IBM Defender Data Protect Cluster of a variety of
factors that include adding resources, adding new workloads (protection groups) or expanding
the protection groups or Storage domains.
2.2.3 Reporting
The built in reporting tool allows users to schedule or create ad-hoc reports organization wide
or narrowed down to specific clusters or workloads. Reports can be filtered, scheduled,
emailed or downloaded as desired.
DMS provides a comprehensive list of built-in reports to help users gather detailed
information about the environment. At the time of publication, DMS provides the following
built-in reports:
Data Protection
– Failures
– Protected/Unprotected Objects
– Protected Objects
– Protection Activities
– Protection Group Summary
– Protection Runs
– Recovery
– System Connection
– System Protection
Storage
– Data transferred to external targets
– Storage Consumption by System
– Storage Consumption by Objects
– Storage Consumption by Protection Groups
– Storage Consumption by Storage Domains
– Storage Consumption by Views
These reports provide a comprehensive view of the specific category for the environment.
Users can further customize the results be selecting from a number of filtered options
available within each report.
26 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch02.fm
Reports can be downloaded locally by selecting the download icon and choosing the desired
file format or scheduled for delivery in a variety of formats.
Figure 2-20 IBM Storage Defender Data Management Service Dashboard “System Board”
28 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
The sections below, we will introduce the new architecture and key components, then explore
several deployment options to build an IBM Defender Data Protect and Replica solution to
service Instant Mass Restore capabilities for hundreds of VMs at once.
30 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
SpanFS is an integrated part of Defender Data Protect and provides file services for the data
protection cluster, spreading the IO across the nodes in the cluster to maximize throughput
and performance. The solution offers industry leading global space efficiency technology
through variable length deduplication, compression, and erasure coding. This reduces the
capacity requirements and lowers software licensing costs. IBM Defender Data Protect
provides immutable storage, data encryption and multi-site replication to increase data
resiliency.
Immutability ensures that WORM protected data cannot be changed or modified by any
process or user including cluster administrators. Only the backup service running on the IBM
Storage Data Protect cluster can write to the file system through trusted APIs.
The in line deduplication process deduplicates data as it is written to the cluster and the
post-process deduplication deduplicates data after it is written to the cluster.
Compression is also default always on capability but can be turned off in selected Storage
Domains. IBM Defender Data Protect leverages in line ZSTD compression. Replication -
Organizations can achieve enterprise-level resiliency with site-to-site replication between IBM
Defender Data Protect clusters. All data on a single IBM Storage Defender Data Protect
cluster can be replicated to one or more clusters through the use of Protection Groups. The
Protection Group specifies the objects (like databases, physical servers, VMs, Views etc.) to
be backed up and replicated. Full and partial fail-over functions are fully automated IBM
Defender Data Protect at ether the cluster level or the DMS level for simple, seamless
recovery.
The table below shows multiple deployment options for Virtual and Physical nodes as well as
some general suggestions and deployment examples. In this table FETB = Front End TB or the
amount of data in a workload to be protected.
IBM Defender Data Protect Virtual Edition is used for a single node IBM Defender Data
Protect cluster or multi-node IBM Defender Data Protect cluster that is hosted on a Virtual
Machine on a VMware vCenter Server or Microsoft Hyper-V server or Nutanix AHV. You can
use a single node Virtual Edition if your environment has smaller offices with reduced
workloads that do not require the full computing power of a IBM Defender Data Protect cluster
running on multiple nodes. In addition, IBM Defender Data Protect Clustered Virtual Edition is
a multiple node IBM Defender Data Protect cluster that can support larger workflows and is
hosted on multiple Virtual Machines in a VMware vCenter Server.
Physical deployment options include the ROBO (Remote Office / Branch Office) single node
that offers more compute power than the single virtual node, and limited capacity. Since this is
a single node, there is no node redundancy and there is limited disk capacity. To protect the
ROBO node, set up replication to a Data Protect cluster to protect the backup data and
provide an additional copy of the backup data at a centrally managed site.
While IBM Defender Data Protect is designed with IBM Storage Ready Nodes in mind it does
not require the use of a particular vendor’s hardware offerings. Several different vendor
platforms have been tested and approved for use including Dell, Cisco, HP and others. For
more information on vendor platforms see the following link (requires login with IBM ID):
https://www.ibm.com/support/pages/node/6985577
Physical clusters are the best options for scaling performance and capacity to meet the needs
of Production backup windows and replication to the Disaster Recovery site. Also note the
cluster resources are available for Cyber Resiliency design considerations like Instant Mass
Restore capability and recovery assurance testing.
For the exercise in this Redbook, we will be summarizing the cluster setup process using IBM
Storage Ready Nodes
32 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
A pre-requisite to having the services team onsite would be to complete the following tasks:
Racking the cluster
Cabling the cluster
Verifying prerequisites for cluster setup
Configuring the BIOS on the IBM Storage Ready Nodes
Note: Encryption is either on or off. It cannot be modified after creation. IF encryption needs to be
disabled, you will have to delete the Storage Domain and recreate as needed or create another
storage domain with the same setting including encryption.
34 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
This feature proves invaluable in environments that grow over time. As the amount of physical
hardware within a Data Protect cluster grows to meet the increasing storage demands, or
changes are made to the protected workloads, the likelihood of a hardware change increases
too. Data Protect can adapt to provide increased resilience in such scenarios without
requiring end-user disruption.
Once the new settings are applied, all new writes to the system are protected according to the
newly-chosen resiliency model, while a background process handles re-protecting the
existing data in the storage domain according to the new model settings.
It’s also important to note that the available Erasure Coding options in step 18 in Figure 3-7
depend directly on the Fault Tolerance value selected in step 16.
36 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
2. Select Protection
3. Click on Protect
4. Choose Virtual machine
Figure 3-8 Data Protection Policy for virtual machines configuration steps 1-4
Figure 3-9 Virtual Machine Data Protection Policy configuration steps 5-8
Note: It is possible to view and select VM’s and objects by the folder, list of tag views however it is
suggested to always use VMware vSphere tags support when selecting objects to ensure consistent
data management practices. To use tags select the Tags icon (1) and expand the tags list (2) then
select the desired VMware tag (3).
Figure 3-10 Virtual Machine Data Protection Policy configuration, vSphere tags
Figure 3-11 Protection Policy for virtual machines configuration steps 8-12
Now the Protection Group is ready to run based on the Protection Policy schedule.
38 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
4. click on the Protection Group VMtags and select date and time to view which VMs are in
the Protection Group backup set.
Figure 3-13 Monitoring the list of protected VMs in a Protection Groups Backup set
The following steps are typically done by the Professional Services team following the
network requirements and data resiliency parameters used in the sizing.
Setting up nodes
Note: The ISO software installation has to be done on each node. Downloading the ISO
image is suggested as a time saver, and having multiple USB devices with the ISO image
can save additional time when there are a larger number of nodes to be installed
Defender. For detailed advice on designing the ideal solution for your enterprise data
resiliency needs, contact your IBM seller or business partner.
Together they will review the workload types, the size, retention, and change rate of your data
to suggest the necessary scale out cluster architecture needed to meet your enterprise data
resiliency goals.
As stated in the previous sections, a minimal cluster can be made using a quantity of four
nodes (8U total rack space).
Fore information on the latest IBM Storage Defender supported hardware see:
https://www.ibm.com/support/pages/node/6985577
Figure 3-15 IBM Storage Ready Nodes storage bays and USB port access via the front of the cabinet
40 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch03.fm
Figure 3-16 IBM Storage Ready Nodes management and network and optional FC adapter access via
the rear of the cabinet
IBM Storage Defender Data Protect v7.1.0 and beyond can be integrated with snapshots from
the following SAN storage arrays:
IBM FlashSystems (Includes immutable IBM Safeguarded copy snapshots)
Nimble Storage, HPE Alletra 5000, and/or HPE Alletra 6000
Pure Storage Array
Registering VM Hypervisors:
When creating a Protection Group, you can select an existing source, policy, or storage
domain. You can also create them while creating the Protection Group. However, you might
find it easier to create them prior to creating the Protection Group, as described in Chapter 6,
“Integrating IBM Defender Data Protection with IBM Storage Protect” on page 95 of this
document.
IBM Defender Data Protect can recover Protected Objects (such as VMs) from a Snapshot
created earlier by a Protection Group. You can recover VMs from a cluster or a currently
registered archive. You can recover VMs to their original location or a new location. The scale
out architecture of the IBM Defender Data Protect cluster provides the resources needed to
do large scale recovery of hundreds of VMs at a time. This greatly improves the RTO for
groups of servers and applications.
For further information see Chapter 6, “Integrating IBM Defender Data Protection with IBM
Storage Protect” on page 95 which will explore the VM backup process and the Instant Mass
Restore capability using a lab environment.
42 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
The next few sections will walk through configuring each feature, starting with registering
sources to configuring a complete protection policy, with the end goal of completing a
protection policy for VMWare environments, as well as configuring additional copies for
replication and/or archival.
The following example (Figure 4-1 on page 45) shows the steps used to Register new virtual
machines and configure a new source:
1. Expand the Data Protection section on the left side of the Defender GUI
2. Click on Sources, then select Register
3. Select Virtual Machines for registration then select the source type from the drop down
4. Select VMWare: vCenter or ESXi host
5. Fill out the IP/hostname, Username, password for the designated VMWare cluster/host
6. Enable any of the listed options that are desired for Defender to use with the VMware
environment this will be applied to
7. Click Register to complete the registration process
44 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
The following example shows the steps needed to configure a Data Protect policy for the
previously configured VMware backup.
1. Expand Data Protection
2. Click on Policies
3. Click on Create Policy
4. Give a policy name
5. Set the frequency of the backup (Backup)
6. Set the retention of each copy (Primary Copy)
7. Click on More options
Note: Replication, Archive or Cloudspin can only be applied to a policy which will be attached to a
data protection group. Replication, Archive and Cloudspin have their own frequency/retention when
configuring. This will be discussed later in chapter.
To help meet required legal obligations, the following additional backup options are available:
Quality of Services (QoS) - Policy determines the type of storage used and the latency
factor in writing data to the view.
Periodic Full backup - Periodic Full Backups are scheduled for: Day, Week, Month, Year.
Schedules can also be made for multiple periodic full backups with different frequencies
and dates.
46 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Continuous Data Protection - Continuous Data Protection defines the CDP schedule for
capturing logs from the VMs as opposed to restore the VM applications to a point-in-time
as instead of periodic snapshots available with regular backups.
Quiet Times - Quiet Times define time periods when new protection runs are not started.
Customize Retires - Customize Retries by default, Data Protect attempts to capture
Snapshots three times before the protection run fails. The default time between retries is
five minutes. Here you can customize the number of retries and how long to wait between
each attempt.
BMR (Bare Metal Recovery) Backup - BMR Backup provides a backup schedule and
retention period for Bare Machine Recovery (BMR) system data on a physical server.
Log Backup - Log Backup adds a database logs schedule if there are plans on restoring
databases to a specific point in time between two full database server backups.
Instant Recovery:
Instant recovery enables the recovery of, and access to VMs within minutes, with access to
the VMs available while the restore is ongoing. Once the recovery is initiated the VMs will be
instantly available after the recovery to the target location begins. Upon completion of the
recovery, the VM data will be moved to the target storage location. The VM can be accessed
when the data is copied to the VM from the IBM Defender Data Protect cluster. In these
cases, the VM's performance may be slow while the Storage vMotion is still in progress. To
perform instant recovery, specify a recovery point (by selecting a backup or backup copy) and
a target location where the recovered VM will reside.
Copy Recovery:
The VMs will be available in the target location only after all data is copied to the target
storage from the source location (IBM Storage Defender Data Protect cluster or cloud). Once
the restore is complete, the VM will be available to use.
Note: If you chose to keep the VM in a powered-off state when initiating instant recovery, wait for
the Storage vMotion to complete before powering the VM on. As a best practice, IBM Storage
Defender Data Protect recommends for better performance, to choose Copy Recovery for
powered-off VMs.
To perform a VM recovery:
1. Expand Data Protection
2. Select Recoveries
3. Click on Recover
4. Select Virtual Machines
5. Select VMs
8. Select the VM to recover and Next for the recovery method (Instant Recovery)
9. Select the Existing VM Handling
48 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
10.None:
Recover will fail if there is an existing VM: Recovers the VM as a new VM and retains the
original VM. In the Rename field available in the Recovery Options, specify the name of
the recovered VM by adding prefix and/or suffix strings to the name of the original VM. By
default, the recovered VM is named as copy-<original_VM_name>.
11.Overwrite Existing VM:
Recovers the VM by deleting the original VM. The recovered VM will have the original VM
name. When choosing this option, the original VM is deleted prior to the recovery taking
place. A recovery failure will result in the loss of the original VM.
Note: ‘Attempt Differential Recovery’: Attempts to recover the VM by overwriting only the difference
between the original VM and the snapshot selected for recovery. Any newly added data in the
original VM is deleted. If you want to reclaim free space for thin-provisioned disks, then IBM Storage
Defender Data Protect recommends not to attempt differential recovery and only perform a recovery
using Overwrite Existing VM. Differential recovery reduces the amount of data transfered during the
recovery process. In the pulse log, you can view the amount of data transfer saved by selecting
differential recovery.
12.Keep Existing VM: Recover the VM as a new VM with the original VM name. The original
VM is retained powered off. The original VM will be renamed to
obsolete_<time_stamp><Orginal_VM_Name>.
13.Finish the recover task and monitor the workflow. If needed review the recovery activity log
associated with the recovery process.
Figure 4-7 Data Protect Instance Recovery vMotion from NFS to Production
50 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Figure 4-9 Instant Volume Mount recovery from Data Protect, steps 4-5
Figure 4-10 Instant Volume Mount recovery from Data Protect, steps 6-7
Figure 4-11 Instant Volume Mount recovery from Data Protect, steps 8-9
Figure 4-13 Instant Volume Mount recovery from Data Protect activity log
The volume will be available in Windows disk manager and can be brought online via Windows
disk management.
Figure 4-14 Instant Volume Mount recovery from Protect Windows volume status
When access to the volume is no longer needed, use the “Teardown” option on the mounted
volume in the Data Protect GUI to remove the volume from the target. The actions that occur
during a teardown are described in the following procedure:
52 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
1. The Data Protect cluster deletes the compute instances of the cloned VM object in the
ESXi host.
2. The VM files (such as VMDK and VMX) are deleted on the view acting as a datastore.
3. If no VMs are using the view (datastore), the view is umounted from all ESXi hosts.
This technology works in conjunction with global data deduplication to greatly reduce storage
requirements when data is spread across several sites. This also allows for a reduction in the
network bandwidth required for replication of data for DR purposes.
The DR cluster in DC2 can be failed over to the VMware vCenter Cluster to continuity backup
and restore the production workload. After a successful failover, the option exists to fail back
to DC1 and continue using it as the primary cluster.
The IBM Data Protect Cluster performs source-side data deduplication and sends only
changed data in increments to the other site. The Cluster also continues to scan and
auto-heal on the other site.
Note: The recommend best practice is to use one virtual IP for each cluster node
After connecting the clusters, it is possible to enable Remote Access [1] and Replication [2].
Replication is done by Storage Domain pairing. Map the storage domains in the source
cluster to storage domains in the remote cluster, Figure 4-17.
Figure 4-17 Remote Cluster setup with Paired Storage Domains for Replication
Enable any additional features to apply to the cluster pairing configuration. Once the pairing is
set up on between clusters, configure the pairing on the other cluster to point back to this
primary cluster.
54 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
After the replication setup is finished, update the existing backup policies.
From Data Protection select ‘Policies’ then to configure:
1. In the replication field selected “replicate to”: Remote Cluster
2. Select the desired host name as the remote “Replication Target”
Note: The following options may be toggled on/off as desired for the cluster
Outbound Compression
Distribute Load
Encryption In-flight
Throttle
Quiet time and Throttle Overrides
After modifying the policies, double check the policies details view to ensure the configuration
is correct.
Figure 4-19 Reviewing the backup policy to confirm replication feature is enabled
Under Data Protection select ‘Protection’ and Click on the protection group. For this example
the group name is “DP01-P-VMs-Replication”.
Selecting the Protection Group will then display a list of the replication tasks associated with
the group.
Once the list of jobs for the group is displayed, click on the desired job you wish to monitor, in
this example the job list of “Nov 25, 2023 6:30pm” by clicking on it and selecting the tab
“Replication” the details of the jobs replication process and reviewed.
In this example, the replication job did finish successfully with 16 GiB Logical Data backed up
and 1 GiB of data transferred to the target replication group.
56 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
After creating a Protection Group on a cluster with a replication schedule, once the first
snapshot is replicated, the Protection Group is mark as ‘Failover Ready’ and the Protection
Group become inactive. The Objects (VMs) and Policy are no longer associated with the
inactive Protection Group.
When an active Protection Group is deactivated, the Protection Group becomes Failover
Ready. The selected VMs and Policy are still associated with the Protection Group on the
source cluster. Snapshots will no longer be captured by the original Protection Group on the
original capturing cluster. However, the existing snapshots captured by the Protection Group
are not deleted, they remain stored in the associated storage domain.
In the following example, the active Protection Group on the source cluster is
DP01-P-VMs-Replication. The following actions can be taken on this Protection Group: Run
Now, Pause Future Runs, Deactivate, Edit and Delete.
On the replicated cluster the Protection Group is marked as inactive and Failover Ready. This
Protection Group will only have the options: Failover and Delete.
When activating the Failover feature specify the source vCenter server where recovered VMs
will be placed. The example below shows vcenter8 specified as the new source.
Note the following message: On Failover this Protection Group will be activated on this
Cluster. If this Inactive Protection Group was created by replication, this Failover causes the
rejection of the incoming replicated Snapshots created by the associated Protection Group on
the Primary Cluster. As part of the Failover, you can recover VMs from Snapshots located on
this Cluster. Specify a Source to place the recovered VMs.
Figure 4-26 Protection Group configured for failover allowing continuous protection
After the Failover feature is activated the Protection Group DP01-P-VMs-Replication now has
the following options available: Run Now, Pause Future Runs, Deactivate, Edit and Delete.
The Protection Group is now ready to continue protecting the VMs on the replicated cluster
and, there is now the ability to Edit the objects which require protection, Figure 4-28.
58 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Figure 4-28 Failover Protection Group for continuous protection, Editing a workload
Note: If a failover back to the original cluster is required, choose “Deactivate” on the
Protection Group for the source cluster.
Figure 4-29 Fallback Protection Group for continuous protection, replication error.
In this example, the backup finished successfully with 287.2 MB of incremental data written
(Figure 4-30 on page 59).
Figure 4-30 Fallback Protection Group for continuous protection, local backup status
If the original source cluster is up and running, then “Deactivate Only” can be selected to
make the Protection Group Failover Ready, Figure 4-31.
Once ‘Deactivate’ is selected, the following options are presented for the Fallback cluster
(Figure 4-32).
Figure 4-32 Fallback Protection Group for continuous protection, Deactivate Only confirmation
Figure 4-33 Note: The Deactivate and power off VMs options are only valid if there is an
Active/Passive Datacenter or each vCenter on each Datacenter.
Figure 4-34 Fallback Protection Group for continuous protection, Re-Sync after Deactivate Only
In this example, once the replication task finishes the Re-sync is completed. The run details
show the replication task completed within 4m57s and replicated 1.7GB of data.
60 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Figure 4-35 Fallback Protection Group for continuous protection, Re-Sync incremental Data Written
Now that replication is complete showing the full 1.7 GiB as Replicated Data.
CloudArchive Direct (CAD) is a policy-driven archival feature in IBM Storage Defender Data
Protect that was built specifically to address these challenges by streaming data directly to
lower-cost storage on an External Target without storing local backups. And While IBM
Storage Defender Data Protect does not store the data, it indexes it and stores the metadata
locally for fast search and recovery while offering options to compress and encrypt the data.
IBM Data Protect CloudArchive Direct can help to reliably archive this dataset securely to a
supported S3 object store, one of which includes on premise IBM Cloud Object Storage.
From the Infrastructure tab, select ‘External Targets’ then ‘Add external target’. When
presented with the External Target fields, this example was configured using the following
settings:
select “Purpose”: Archival
select “Storage Type”: S3Compatible
select “Storage Class”: Regular
fill-in “Bucket Name”: iCOSbucket
fill-in “Access Key ID”: iCOSkeyID
fill-in “Secret Access Key”: xxxxxxxxxxxxxx
fill-in “Endpoint”: 10.0.2.x
fill-in “AWS Signature Version”: Ver 4
fill-in “External Target Name”: AnyName
fill-in “Archival Format”: Incremental with Periodic Full
62 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Select Register to complete the registration process and finish creating the external target.
An Incremental Archive contains only data that is different between its reference’s snapshot
and the snapshot being archived. Once initiated, the changed blocks are identified and any
changed data blocks are compared to the reference snapshot. Only the necessary data is
sent to the external target. If deduplication is enabled and data blocks have not changed, only
metadata is transferred.
To reconstruct this snapshot of an incremental archive, both the incremental and the
reference full must be processed. Then, the next Incremental Archive constitutes an
increment on top of the previous incremental archive, i.e. it designates the previous
Incremental Archive as its reference. In this way, incremental archives form an “archival chain”
that starts at the selected archive and ends with the Reference Full.
In order to limit the number of archives that must be processed to restore a snapshot, the
chain is “broken” every 90 days. When the threshold is reached, the next archive will not be
an Incremental Archive, but rather a Periodic Full Archive. A regular, non-reference Full
Archive is full in the sense that it covers all previous increments since the Reference Full
Archive. However, the Periodic Full still refers to the Reference Full archive as its base, similar
to the initial Incremental Archive.
The next Incremental Archive after a Full Archive will use the Full Archive as its a reference.
The threshold is not configurable through the web interface and is always 90 days regardless
of how many archives have been performed.
Figure 4-38 Incremental Archives reference workflow - using Reference Full Archive
During incremental archives, if the use of the current Reference Full Archive becomes too
inefficient, mainly if its utilization as a reference drops below 50%, the Reference Full Archive
is retired. At this point a new Reference Full Archive will be created.
Figure 4-39 Reference Full Archive workflow - new base Reference Full Archive
Retiring a Reference Full Archive means that the next time a Full Archive needs to be
created, it is created as a Reference Full Archive, rather than a regular non-reference Full
Archive. The next Incremental then uses the new Reference Full Archive as its reference
base.
This option is enabled by default when registering a new external target. To enable this option
for an existing registered external target, edit the registered target to enable this option. The
migration from Incremental Archival to Incremental Forever Archival will take place during the
next reference archive creation.
Note: IBM recommends using Incremental Forever and turning on Source Side
Deduplication. This increases cloud performance and reduces the amount of data that the
Data Protect cluster transfers to the external target.
64 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
Select the desired VM from the list to restore, then click on the pencil icon as shown in
Figure 4-41 on page 65 to specify the location of the cloud and the recovery point.
Once the archive is chosen and selected, the “Recovery Method” prompt will allow a choice of
recovery methods and options. For this example the ‘Instance Recovery’ was selected and
“Existing VM Handling”: Keep Existing VM option was used. Note that this option will power
off and rename the existing VM as “_obsolete_xxx”. (Figure 4-43)
In the activity log for the recovery process we can see the recovery is from the iCOS location
(indicated by the kListVaultFSfiles task, Figure 4-44 on page 66).
66 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch04.fm
The recovery snapshot is exported and can be seen in the NFS view for the vCenter
DataCenter. The VM is then relocated to the original datastore. After the VM is successful
cloned the NFS view is removed (Figure 4-45).
From the vCenter tasks, the VM creation and VMotion processes can be monitored for the
recovered VM. Once the tasks are complete the recovery process is finished.
68 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
5.1 VM Recovery
Defender Data Protect allows for the recovery of one or more protected virtual machines from
snapshots created previously by a Defender Data Protect Protection Group. See chapter 4 for
more details on protecting VMware workloads. VMs can be recovered directly from a Data
Protect cluster, or alternatively, from a currently registered archival external target, and the
destination can be the original location or a new location.
2. Then use the Recover menu on the top right of the Recoveries page to select Recover >
Virtual Machines > VMs, as shown in Figure 5-2:
70 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
3. In the New Recovery window, enter a wildcard search term to search for individual VMs or
protection groups, as shown in Figure 5-3:
Note: For each virtual machine selected, Data Protect will automatically select the most
recent snapshot. To select an earlier snapshot for any of the selected VMs, click the pencil
icon for that VM in the right-hand column, then use the pop-up window to select the desired
snapshot, as shown in Figure 5-4.
Note:
Selecting a Protection Group (In our example, "Daily VM Backups" or "DRS Sensor
Backups") will restore all the VMs present in that protection group at the time of the
selected backup.
In a single restore job, only VMs or Protection Groups with snapshots in the same
storage domain and data protection source can be selected.
In this example, there are only local (on-cluster) snapshots available for recovery. If the
example Data Protect cluster had created archive copies on external targets like cloud
storage or Spectrum Protect, those snapshots would be indicated by cloud icons under
the Location column. Simply click on the cloud icon to recover from an archival
snapshot.
4. Once you have selected the desired snapshot(s), click the blue Next: Recover Options
button to proceed.
5. On the next screen, note the summary of the selected VMs at the top of page, as show, in
Figure 5-5. If necessary, click the pencil icon to edit your selection.
Also note that the Recover To value is set to Original Location. In our example, the two
selected VMs will be restored to their original location. To recover the selected VMs to an
alternate location, click New Location, then use the Registered Source drop-down menu to
either select from and existing registered ESX host or vCenter, or to register a new one, as
shown in Figure 5-6:
72 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
When performing a VM restore and Original Location is selected, Data Protect offers
multiple options for how to handle existing VMs in the original location:
None: VM recovery will fail if there is an existing VM in the recovery location.
Overwrite Existing VM:
– For an Instant Recovery, the existing VM will first be deleted from the target system
prior to the restoration
– For a Copy Recovery, Data Protect will attempt a differential restore, where only the
blocks that differ between the existing VM and the backup copy are restored from the
backup. This can result in a faster overall restore time. An example use case for
differential restore is recovering from a large-scale operating system patching error.
Keep Existing VM: The existing VM will be powered off and renamed prior to the
restoration.
6. Finally, make note of the available Recovery Options shown in Figure 5-7:
Network:
For recovery to the Original Location, default value is Detached - all VMs will be
powered on detached from any network. If Attached is selected, all VMs will be powered
on attached to their original virtual network. Additionally, selecting Attached unlocks the
Start Connected option. If Start Connected is selected, the VMs will connect to the
original network(s) when the VMs reboot. If unselected, the VMS will not be connected to
any virtual networks up reboots.
Note: When recovering to the Original Location, Data Protect will recover the original
MAC address for VMs that had manual MAC addresses at the time of the backup. If the
VMs were set to have automatically generated MAC addresses at the time of the backup,
the recovered VMs will have the same setting.
For recovery to a New Location, default value is Detached - all VMs will be powered on
detached from any network. If Attached is selected, a drop-down menu is displayed,
allowing you to select the destination virtual network to attach the VMs to. This network
will be attached to all the VMs in the recovery job. To override this, you can click the Add
Network Override link and select separate network settings for each VM in the recovery
job.
Additionally, selecting Attached unlocks the Start Connected and Preserve MAC
Address options. If Start Connected is selected, the VMs will be connect to the selected
network when the VMs reboot. If unselected, the VMs will not be connected to any virtual
networks up reboots. If Preserve MAC Address is selected, VMs that were set to have
manual MAC addresses will be restored with their original MAC addresses.
Note: When recovering to a New Location, VMs that were set to have automatically
generated MAC addresses at the time of the backup, the recovered VMs will have manual
MAC addresses.
Rename:
Allows you to enter a prefix and/or suffix to the names of the recovered VMs.
Power State:
Default value is Power On - VMs will be powered on upon restoration.
Note: SAN transport over FC requires that FC is configured and zoned between the Data
Protect cluster and the target ESX host(s).
Continue on Error:
Default value is No - the recovery job will fail upon the first error recovering a VM. If Yes is
selected, the protection job will continue to run even if errors are encountered.
Cluster Interface:
Only available for Instant Recoveries. Default value is Auto Select - the Data Protect
cluster will automatically select the correct interface group to use for the recovery. To
manually select the desired Interface Group, click the Cluster Interface row, disable the
Auto Select slider and use the Interface Group drop-down menu to select the desired
Interface Group to use for the recovery job.
74 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
Task Name:
Optionally, change the default name of the recovery job.
7. Click Recover to initiate the restore job. You will be presented with a Recovery Summary
screen, as shown in Figure 5-8:
8. If the details look correct, click the Start Recovery button to initiate the restore. You will be
redirected to the Data Protection > Recoveries page, where you will see the restore job
running, as shown in Figure 5-9:
9. Click on the recovery job to load its details, as shown in Figure 5-10:
10.Click the Show Subtasks button to view the log of the recovery job. An example of the log
is shown in Figure 5-11:
11.The figure Figure 5-12 on page 76 shows the successful completion status of the recovery
job:
12.Further, as shown in Figure 5-13, we can confirm in vCenter that our VMs have been
successfully restored:
Now that we have explored the fundamental capabilities of VMware virtual machine
restoration, we will examine how Data Protect leverages these capabilities, along with its
scale-out architecture, to support large scale, raid restore of virtual machines.
Before you can recover Protected Objects (VMs), a Snapshot must exist.
Key to recovery from a large-scale data corruption incident or other major intrusion is the
ability to respond to the need to bring the business services back online quickly. The ability to
select multiple VMs in a recovery task, and to recover them leveraging the Instant Recovery
method discussed above in <link to Recovery Method description above>, is called Instant
Mass Restore (IMR). In an Instant Mass Restore, the IBM Defender Data Protect cluster
performing the recovery follows the same process as described above, but allows for Instant
Recovery at scale. IMR facilitates the rapid recovery of hundreds or even thousands of VMs
that is often required in cyber incidents.
The chart below details the use cases tested during a Data Protect Proof of Concept. It
illustrates a variety of different recovery scenarios, including multiple types of large-scale
restoration in a VMware environment. This set of use cases highlight the power of IBM
Storage Defender Data Protect to drive workload restoration at scale and speed.
76 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
The example depicted here highlights the recovery of 200 virtual machines.
Note: Data protect supports recovering files and/or folders from Windows VMs to Windows
VMs, and from Linux VMs to Linux VMs only.
File recovery and instant volume mount from a Data Protect backup of a Windows VM with
Windows deduplication enabled for one or more volumes is only supported when the target
Windows machines had deduplication installed. (Deduplication does not need to be
enabled on the target machined volume(s), only installed.)
2. Then use the Recover menu on the top right of the Recoveries page to select Recover >
Virtual Machines > Files or Folders, as shown in Figure 5-17:
78 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
3. In the New Recovery window, enter a wildcard search term to search for individual files or
folders, as shown in Figure 5-18:
Note: The Files and Folders search feature allows you to search across all Protection
Groups within a DMS instance. In our example, the search term Redbooks returns three
file results from three separate Protection Groups.
A single File/Folder Recovery job can restore multiple files and/or folders that were
backed up as part of the same Protection Group. Use separate File/Folder Recovery
jobs to recover files and/or folders backed up in separate Protection Groups.
4. Check the box for your desired file(s) or folder(s), to add the item(s) to the Recovery Cart.
Note that selecting an item the search results will immediately filter the search results to
only show items from the same Protection Group and Recovery Point, as shown in
Figure 5-19 on page 80:
5. Optionally, click the pencil icon to select an earlier version. (Again, Data Protect defaults
to the latest backup copy.)
Note: The option to select an earlier recovery point is only available when a single file is
selected for recovery.
6. Optionally, click the link to the source VM, in our example sts-pok-w2k3-01. Figure 5-20
shows how to browse the index of backed up files from this VM and select additional files
and/or folders for recovery:
Note the Browse on Indexed Data slider at the top of the page. By default, Data Protect
presents an indexed (cached) representation of the filesystem of this VM at the date and time
of the selected Recovery Point shown at the top right. Browsing on indexed data allows for
better search performance, only displaying files and folders that are indexed. Hidden paths,
as well as manually excluded paths are not shown in this mode.
Flipping the slider off will trigger Data Protect empty the Recovery Cart, mount the selected
backup internally, and refresh the file browser to show all the files that are available in the
selected Recovery Point.
80 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
Clicking the Recovery Point timestamp allows you to select an alternate Recovery Point, as
shown in Figure 5-21:
7. In our example, we click the Cancel button on the Recovery Point selection pop-up
window, then click Cancel again to exit the file browser and return to the original
Recovery Cart, as shown in Figure 5-22:
or
Download Files to download a zip archive of the selected items directly through the
browser
9. In our example, we choose Next: Recover Options. The New Recovery page now
displays a summary of the selected items at the top of the page (Again, click the pencil
icon to edit the items selected for recovery) followed by additional recovery parameters
and options, as show in Figure 5-23 on page 82:
The Recover To field allows you select either the Original Server or a New Server as the
target for the file/folder restore. When the default selection, Original Server, is selected, the
Recover to Original Path slider is set to On, as shown in Figure 5-24:
To recover the item(s) to an alternate path on the Original Server, flip the slider Off and enter
the desired path for restoration.
To recover the item(s) to a New Server, select the New Server radio button, then use the
Source and Target drop-down menus to select the destination ESX host or vCenter server
and Target VM. Optionally, the Source drop-down menu allows for the registration of a new
Source server "on the fly." In our example, we select the already-registered vCenter server
sts-pok-vcenter-1.ww.pbm.ihost.com as our Source, then select virtual machine
sts-pok-rhel8-10-8 as the Target for restore, as shown in Figure 5-25 on page 83:
82 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
Note: The use of the term Server on this panel, whether Original or New, can be a bit
misleading. Here Server denotes the Virtual Server (VM) to which you want to recover the
item(s).
The use of the term Server here, whether Original or New, can be a bit misleading. Here
Server denotes the Virtual Server (VM) to which you want to recover the item(s).
Additionally, Source is used here in the context of registered Data Protect protection
sources. When New Server is selected, the Source drop-down menu loads the registered
VMware data protection sources in this DMS instance (vCenter Servers and/or ESX hosts)
and the Target drop-down menu dynamically loads based on the selected Source,
allowing you to select the target VM to which you want to recover the item(s).
Regardless of whether the item(s) are recovered to the Original Server or a New Server, we
must select the Restore Method. The available methods are:
Auto Deploy Cohesity Agent: Data Protect will deploy the Cohesity agent using the
supplied credentials, then recover the item(s) to the Target VM leveraging the agent.
Use Existing Cohesity Agent: Data Protect will leverage the existing Cohesity agent on
the Target VM to restore the items.
Note: Recovering VMware files and/or folders with the IBM Storage Defender Data Protect
agent requires that VMware tools be installed and running on the Target VM.
Use VMware Tools: Data Protect will leverage VMware Tools to perform the recovery of
the item(s). VMware Tools must be installed and running on the Target VM.
10.In our example, we know that VMware Tools are already installed on the original, source
VM, so in Figure 5-26 on page 84 we select Original Server, Use VMware Tools, enter
user credential to access the Target VM, and select Recover to Original Path:
Data Protect offers the following additional Recovery Options for VMware file and folder
recovery:
Overwrite Existing File/Folder: Default value, No; If Yes, existing files may be
overwritten as part of the recovery job.
Preserve File/Folder Attributes: Default value, Yes; By default, Data Protect will
preserve the ACLs, permissions, and timestamps for all recovered item(s). If No, the ACLs
and permissions are not preserved.
Note: When recovering both folders and files, folders will receive new timestamps, while
files will be restored with their timestamps from the time of the backup. For file-only
recovery, the files will receive new timestamps.
Continue on Error: Default value, Yes; The recovery job will upon the first error
encountered. If set to No, the recovery will continue when errors are encountered.
Cluster Interface: Default value is Auto Select - the Data Protect cluster will
automatically select the correct interface group to use for the recovery. To manually select
the desired Interface Group, click the Cluster Interface row, disable the Auto Select
slider and use the Interface Group drop-down menu to select the desired Interface
Group to use for the recovery job.
Task Name: Optionally, change the default name of the recovery job.
11.To initiate the recovery job, click the Recover button. You will be redirected to the Data
Protection > Recoveries page, where you will see the restore job running, as shown in
Figure 5-27:
12.Click on the recovery job to load its details, as shown, in Figure 5-28 on page 85:
84 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
13.Click the Show Subtasks button to view the log of the recovery job:
14.While the recovery process is running, you can monitor the Recoveries panel to see the
status of the job. Figure 5-30 shows the successful completion status of the recovery job:
1. Data Protect creates a writable clone of the selected VMDK file from the selected
Recovery Point and mounts it to the target ESX host(s) as a temporary NFS datastore
from the Data Protect cluster.
2. Data Protect attaches the new VMDK virtual disk(s) to the target VM and initiates a
storage vMotion of the new VMDK from the temporary datastore to the target datastore.
3. The temporary datastore is automatically removed upon vMotion completion.
Note: After virtual disk recovery competes, it may be necessary to perform additional,
operating system-level actions to make the recovered disks online and available.
2. Then use the Recover menu on the top right of the Recoveries page to select Recover >
Virtual Machines > Virtual Disks as shown in Figure 5-32:
3. In the New Recovery window, as shown in Figure 5-33, enter a wildcard search term to
search for the virtual machine whose disks you want to recover, then select the desired
86 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
VM. Note that Data Protect defaults to the most recent Recovery Point. Again, optionally
use the pencil icon to select an earlier Recovery Point. In our example, we leave the
default Recovery Point selected and click the Next: Recover Options button:
The New Recovery screen (Figure 5-34) will now show a summary of the selected source
virtual machine and associated Recovery Point. The Recover To option defaults to Original
Location. Select New Location to restore the virtual disk(s) to a different VM:
4. Next, check the box(es) for the disk(s) that you want to recover (Figure 5-35 on page 88),
and for each disk, select the recovery type:
If Recover as a new Disk is selected, you must select a target datastore for the new disk with
the Datastore drop-down menu, as show in Figure 5-36:
Figure 5-36 Virtual disk recovery panel ‘Recovery as a new disk option’ panel
Note: If recovery fails with Overwrite Original Disk selected, the original disk will not be
available. If this occurs, retry the recovery to restore the disk(s).
For recoveries where one or more disks will be overwritten, Data Protect will automatically
powered off the target VM prior to recovery. Optionally, the target VM can be powered on
automatically after successful recovery.
5. In our example (Figure 5-37 on page 89), we select Original Location and choose
Recover as a new Disk, then select sts-pok-ds-01-general as the target datastore:
88 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
7. Flip the Power off VMs before Restore slider on (Figure 5-39). Note that there is now an
option to Power on VMs after Restore:
Note: The Power State options can be helpful when recovering virtual disks to VMs that do
not support "Hot Add" disk operations.
8. In our example (Figure 5-40 on page 90), we revert to the default Power State options and
click Recover. The browser redirects to the Data Protection > Recoveries page, and we
can see our virtual disk restore job running:
9. Click the Show Subtasks button (Figure 5-41) to view the recovery job logs (Figure 5-42):
10.Figure 5-43 shows our virtual disk recovery job has completed successfully:
90 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
Note: Instant Volume Mount is only available for backup volumes stored locally on the
Data Protect cluster. In other words, Instant Volume Mount is not available from
cloud/archive backup copies.
Follow these steps to recover VMware virtual disk with Defender Data Protect:
1. Navigate to Data Protection > Recoveries, as shown in Figure 5-44:
2. Then use the Recover menu on the top right of the Recoveries page to select Recover >
Virtual Machines > Instant Volume Mount as shown in Figure 5-45:
3. In the New Recovery window, as shown in Figure 5-46, enter a wildcard search term to
search for the virtual machine whose disks you want to instantly mount, then select the
desired VM. Note that Data Protect defaults to the most recent Recovery Point. Again,
optionally use the pencil icon to select an earlier Recovery Point. In our example, we
leave the default Recovery Point selected and click the Next: Recover Options button:
4. The New Recovery screen will now show a summary of the selected source virtual
machine and associated Recovery Point, as shown in Figure 5-47. The Select Volumes
slider defaults to Off, allowing the selection of one or more specific volumes for instant
mounting in the drop-down menu. Optionally, flip the slider to select all of the volumes that
were backed up with this VM at the time of the selected Recovery Point:
5. The Recover To option defaults to Original Location. Select New Location to instantly
mount the selected virtual disk(s) to a different VM.
92 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch05.fm
6. In our example (Figure 5-48), we choose to recover the F drive to a New Location:
7. The Figure 5-49 below shows our Instant Volume Mount job has been successfully
initiated:
Once the mount job completes the volume will be mounted and accessible on the target VM
Then click to Teardown to confirm that you want to unmount the volume:
94 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Note: DP archive to Storage Protect (SP) tape currently is intended for weekly or
monthly archives. Each archive is a full copy of the protection group from DP to
SP. Incremental functionality for archives is not yet available.
96 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Compatibility Details
A complete list of S3 storage compatibility for DP is available in the DP Support pages. At the
writing of this book, the current release of DP is v7.1 and SP is 8.1.20. To find the latest
information on IBM Storage Defender Data Protect see the following link:
https://www.ibm.com/docs/en/storage-defender/base?topic=storage-defender-data-prot
ect
Figure 6-2 Leverage S3 compatible storage with IBM Storage Defender Data Protect
This diagram (Figure 6-2) shows S3 Storage options on the top left, with the IBM Data
Management Server (DMS) at the bottom. In the middle is a timeline which shows the steps
required to complete this integration.
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 97
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
Note: When creating a cache, ensure that it is big enough for the largest retrieve that may
need to be done, as well as additional space for any additional incoming archives which
may need to be processed.
This Storage pool is used as a temporary cache location for the Data Protect (DP) archives
before migrating them to the tape pool.
For recovery, the IBM DP Protection Group is brought back from this tape storage and
placed in the cold-data-cache storage pool where it is held for 7 days. Because of this, the
size of DP groups and size of the VM’s protected will need to be taken into consideration
when determining the amount storage pool space required for successful archive and
retrieve operations.
Example 6-2 Define the Storage Agent which will connect to the S3 enabled storage
TSMSRC> def server s3-dp hla=<ip-address-of-SP-server> lla=9000 objecta=yes
ANR4601I A configuration file for the object agent was created in the instance
directory and is ready to set up. To configure and start a service for object
agent S3-DP, run the following command: "/opt/tivoli/tsm/server/bin/spObjectAgent"
service install "/sp-src/sp_home/S3-DP/spObjectAgent_S3-DP_1500.config"
ANR1660I Server S3-DP defined successfully.
After running the define server command, run the command in the resulting ANR4601I
message as root from the host command line.
From the SP Operations Center you can see the results of this of this command execution, as
well as view/copy the certificate information from the Servers/Object Agent drill down.
(Figure 6-3 on page 99)
98 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Figure 6-3 Operations Center GUI showing Object Agent Configuration details
From the Storage Protect command line, define the object domain.
In the example below, the standard pool ‘s3-fusion’ is a container storage pool used for
Fusion backups and the coldcache pool is the name of the pool we created in the first
Example 6-1 on page 98. The archives from Data Protect will first land in this coldcache pool
then auto migrate to the nextstgpool which is set to ‘coldtapestg’.
ANR1530I Backup copy group STANDARD defined in policy domain S3-DP-FUSION, set
STANDARD, management class STANDARD.
ANR1530I Backup copy group STANDARD defined in policy domain S3-DP-FUSION, set
STANDARD, management class COLD.
ANR1538I Default management class set to STANDARD for policy domain S3-DP-FUSION,
set STANDARD.
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 99
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
ANR2470I The new authentication credentials for object client node SPTA-POK-DP-03
are: Access Key ID: ********************, Secret Access Key:
****************************************.
Create the S3 bucket used by Data Protect to send archives to Storage Protect.
On the IBM Storage Protect server, download and installed the MinIO client utility from link
below. The rpm name used in this example is mcli-20231115224558.0.0.x86_64.rpm. This is
the minimum version of the RPM that should be used, later versions that are available can be
found at the following link:
https://dl.min.io/client/mc/release/
As root, from the directory where the .rpm file is located, run the ‘mcli alias set
command:
alias-name end-point access-key secret-key --insecure’
100 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Have the following items available to continue with the next configuration steps:
Bucket Name
Access Key ID
Secret Access Key
Endpoint: the IP address of your SP server
Port number: the LLA used on the define server in Example 6-2 on page 98
In DP, select AWS Signature version v4. For the External Target Name, the SP Node
registered in step Example 6-5 on page 100 will be used. This will be the SP node under
which the archives will be stored.
To register an External Target with your cluster, log in to the IBM Defender Dashboard and
perform the following actions:
1. Select the Data Management to launch the Data Management Service
2. Select the Administrator level access to do configuration tasks on the cluster (Figure 6-5
on page 102)
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 101
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
3. Select the cluster resource, in the drop down for the cluster select:
a. Expand the Infrastructure option
b. Select External Targets
c. Click on the Add External Target button
Figure 6-6 Register an S3 External Target in Defender Data Protect, steps 1-3
102 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
11.Enter the port number then, scroll down for additional options to continue the External
Target Registration, do not click register at this time.
Figure 6-7 Register an S3 External Target in Defender Data Protect, steps 4-11
Secure Connection (HTTPS): Is enabled by default. If your S3 bucket is exposed via HTTP
and not HTTPS (that is, without SSL security), disable this option.
Important: With this option enabled, a cluster must have the correct key to access data
from the archive. You can download the key file (only once) after you register your bucket.
This key is required when you use CloudRetrieve. If you do not have it, you will still be able
to recover data to its original cluster, but you will not be able to retrieve it onto a new
cluster (for example, in a disaster-recovery scenario).
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 103
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
Figure 6-8 Register an S3 External Target in Defender Data Protect, steps 12-17
The S3 bucket is now registered and available as an External Target in IBM Storage Defender
Data Protect. This target now can be selected when you create a Protection Policy for a Data
Protection Job.
104 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Figure 6-9 Create a Data Protection Policy for Archive to the S3 External target, steps 1-3
Figure 6-10 Create a Data Protection Policy for Archive to the S3 External target, step 4
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 105
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
Figure 6-11 Data Protection Policy for Archive to the S3 External target, steps 5-7
Note: The recommended frequency is weekly or monthly as this will be a full copy.
Figure 6-12 Create a Data Protection Policy for Archive to the S3 External target, steps 8-10
6.6.2 Configure the Data Protection Group to use the Data Protection Policy
The Data Protection group will include the definition of the workloads to be protected (VMs in
this example) and the Data Protection Policy will then be applied to that group.
To configure the Data Protection Group select the following items in the GUI:
1. Expand Data Protection
2. Select the Protection section
106 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
3. In the top right of the GUI, select the Protect drop down
4. Select the workload type you want to protect (in this example Virtual Machines)
Figure 6-13 Create a new Data Protection Policy using the S3 External target, steps 1-4
Note: Be aware of the number and size of VM’s in this Protection Group.
The selected VMs will be managed in the Protection Group for backup and recovery
operations. The sizing for the Storage Protect cold cache pool will be based on the ingest
and the restore pattern.
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 107
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
108 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Once this is completed, the Data Protection Group will be successfully associated with the
Data Protection Policy to protect the VMs in the group.
Note: The Archive to S3 is processed like a full backup job, not an incremental. The
current recommendation is to limit the frequency to a weekly or monthly archive to meet
retention needs.
The Data Protection Group Detail (Figure 6-18 on page 110) shows the daily VM backup
statistics as well as:
1. The SLA policy
2. The job status
3. A weekly archive to cloud – in this case, our S3 External Target.
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 109
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
In this example configuration, the daily backup with a weekly archive to S3 has been running
for a couple of weeks. In the example below a new VM was added to the Protection Group for
both the daily backup and weekly Archive job on 12/13/23.
The full VM backup was taken and we allowed the archive to S3 to be pushed after adding a
new Virtual Machine to the Protection Group.
Figure 6-19 Reviewing the activity of the S3 Agent node on the Storage Protect server
Using the Operations Center GUI, we can monitor the weekly activity of the S3 Agent node on
the Storage Protect server. A seen in Figure 6-19, there was an increase in the data being
stored as a new VM was added to the Data Protection group which uses the S3 archive
coldcache pool today. Additional details about coldcahce migration and volume status can be
seen using the operations center to run queries on the Storage Protect server as shown in
Figure 6-20 and Figure 6-21 on page 111.
110 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Figure 6-20 Screen shot from Storage Protect server showing migration from cold cache to cold tape
Figure 6-21 Screen shot from Storage Protect server showing volume status after migration
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 111
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
3. Use the Pencil icon to open the ‘Edit Recovery Point’ panel for the VM. The Edit Recovery
Points table will display the selection of the Snapshots available by timestamp and the
Location of the snapshot image.
4. Use the radio button to select the snapshot and click on the cloud to select the S3 location.
5. Click the Select Recovery Point button.
112 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
At this point the recovery of the selected backup data will proceed, and the VM data will be
pulled back from the S3 target to the cache storage pool on the SP server. The backup data is
then sent to the DP cluster and then recovered to the vCenter.
To retrieve data using the recoveries panel use the following steps:
1. In the left had side of the GUI, select Data Protection
2. Then select Recoveries
3. Once selected, click the Recover button to expand the menu details
4. From the Recovery button menu, pick Virtual Machines
5. Finally select the VMs option
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 113
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
6. Use the search bar in the panel to type the name of the desired VM
7. Select the VM using the check box
8. Use the pencil icon to select the Recovery Point and Location
9. Recovery point
10.Location – click on the cloud to select the External S3 target
11.Click the Select Recovery Point button
12.In the Virtual Machine panel, select the Recovery method for Copy Recovery
13.Scroll down and click on Recover
114 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Once complete the recovery will begin to retrieve the archive data.
On the Storage Protect server, the Q Process command is used to monitor the retrieve from
the cold tape pool to the cold cache pool. (Figure 6-30 on page 116)
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 115
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
Figure 6-30 Query process output from the SP server showing the data copy to coldcache
The query volume command shows the Archived snapshot restored to the S3 cold cache
pool. The query session command shows the data has been sent from the Storage Protect
server to the Data Protect cluster. Figure 6-31
Figure 6-31 Storage Protect command line query volume and query session outputs for recovery
related coldcache data movement
The screenshots Figure 6-32 on page 117 and Figure 6-33 show examples of the DP
recovery log details for the recovery task.
116 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
Draft Document for Review January 14, 2025 4:55 pm 8554ch06.fm
Figure 6-32 In Data Protect, click the Recovery job name to get the current status of the job
with Recovery Activity details and completion status
Figure 6-33 Use the vCenter Client to show the VM has been copied and powered on
Chapter 6. Integrating IBM Defender Data Protection with IBM Storage Protect 117
8554ch06.fm Draft Document for Review January 14, 2025 4:55 pm
118 IBM Storage Defender: IBM Data Management Service and IBM Data Protect
To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50# smooth which has a PPI of 526. Divided
250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for the book and hide the others: Special>Conditional
Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your book by opening the book file with the spine.fm still open and File>Import>Formats the
Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review January 14, 2025 4:55 pm 8554spine.fm 119
IBM Storage Defender: IBM Data SG24-8554-00
Management Service and IBM ISBN DocISBN
(1.5” spine)
1.5”<-> 1.998”
789 <->1051 pages
IBM Storage Defender: IBM Data SG24-8554-00
Management Service and IBM Data ISBN DocISBN
(1.0” spine)
0.875”<->1.498”
460 <-> 788 pages
SG24-8554-00
IBM Storage Defender: IBM Data Management Service and IBM ISBN DocISBN
(0.5” spine)
0.475”<->0.873”
250 <-> 459 pages
IBM Storage Defender: IBM Data Management Service and IBM Data Protect
(0.2”spine)
0.17”<->0.473”
90<->249 pages
(0.1”spine)
0.1”<->0.169”
53<->89 pages
To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50# smooth which has a PPI of 526. Divided
250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for the book and hide the others: Special>Conditional
Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your book by opening the book file with the spine.fm still open and File>Import>Formats the
Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review January 14, 2025 4:55 pm 8554spine.fm 120
IBM Storage Defender: SG24-8554-00
IBM Data Management ISBN DocISBN
(2.5” spine)
2.5”<->nnn.n”
1315<-> nnnn pages
IBM Storage Defender: IBM Data SG24-8554-00
Management Service and IBM ISBN DocISBN
Data Protect
(2.0” spine)
2.0” <-> 2.498”
1052 <-> 1314 pages
Back cover
Draft Document for Review January 14, 2025 4:55 pm
SG24-8554-00
ISBN DocISBN
Printed in U.S.A.
®
ibm.com/redbooks