IBM Tivoli Storage Manager For Mail 5.1

1y ago
11 Views
2 Downloads
528.67 KB
169 Pages
Last View : Today
Last Download : 3m ago
Upload by : Bria Koontz
Transcription

IBM Tivoli Storage Manager for Mail 5.1.5 Data Protection for Lotus Dominofor WindowsInstallation and User’s GuideSC32-9057-00

IBM Tivoli Storage Manager for Mail 5.1.5 Data Protection for Lotus Dominofor WindowsInstallation and User’s GuideSC32-9057-00

NoteBefore using this information and the product it supports, read the general information under “Notices” on page 143.First Edition (September 2002)This edition applies to Version 5 Release 1.5 of IBM Tivoli Storage Manager for Mail 5.1.5 Data Protection for LotusDomino for Windows NT or Windows 2000, 5698–APE, and to any subsequent releases until otherwise indicated innew editions or technical newsletters. Make sure you are using the correct edition for the level of the product.Order publications through your IBM representative or the IBM branch office serving your locality.IBM welcomes your comments. You can send your comments to the following address:International Business Machines CorporationRCF Processing DepartmentM86/0505600 Cottle RoadSan Jose, CA 95193-0001U.S.A.You can send us comments about this book electronically:v Internet: starpubs@us.ibm.comv Fax (US): 1-800-426-6209When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in anyway it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1999, 2002. All rights reserved.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

ContentsSummary of Changes . . . . . . . . . vSeptember 2002, Version 5 Release 1.5 . vPreface . . . . . . . . . . . . . . viiWho should read this book . . . . . . . . . viiWhat this book contains . . . . . . . . . . viiPrerequisite and related information . . . . . . viiiContacting customer support . . . . . . . . ixAccessing books online . . . . . . . . . . ixOrdering books . . . . . . . . . . . . . ixProviding feedback about books . . . . . . . . xConventions used in this book . . . . . . . . xReading syntax diagrams . . . . . . . . . . xChapter 1. Introducing Data Protectionfor Domino . . . . . . . . . . . . . 1Function . . . . . . . . . . . . . .Domino database backup and transaction logarchive . . . . . . . . . . . . .Domino database restore and activation . .Restore at document level . . . . . . .Restore of archived transaction logs . . .Expiration of archived transaction log files .Security . . . . . . . . . . . . .Performance . . . . . . . . . . .Backup strategy considerations . . . . . .Additional considerations for backup strategyselection . . . . . . . . . . . . .Online help . . . . . . . . . . . . . 1. 6. 713344445Chapter 2. Installing Data Protection forDomino . . . . . . . . . . . . . . . 9Installation requirements . . . . . . . . . . 9Hardware requirements. . . . . . . . . . 9Software requirements . . . . . . . . . . 9Installation instructions . . . . . . . . . . 10Chapter 3. Configuring Data Protectionfor Domino . . . . . . . . . . . . . 11Step 1: Communicating with the Storage ManagerServer . . . . . . . . . . . . . . .Step 2: Register the Data Protection for Dominoworkstation with a Storage Manager Server . .Step 3: Create policy . . . . . . . . . .Storage Manager policy requirements andrecommendations . . . . . . . . . .Step 4: Update the options and preferences file .Precedence of option resolution. . . . . .Option file configuration information . . . .Step 5: Schedule Data Protection for Dominooperations . . . . . . . . . . . . . . Copyright IBM Corp. 1999, 2002. 11. 11. 11.11131313. 15Chapter 4. Using the Graphical UserInterface . . . . . . . . . . . . . . 17Locating Additional Information . . . . . .Modifying Data Protection for DominoConfiguration . . . . . . . . . . . .Backing up Domino Databases Using IncrementalBackup . . . . . . . . . . . . . . .Backing up Domino Databases Using SelectiveBackup . . . . . . . . . . . . . . .Restoring Domino Databases . . . . . . .Activating Domino Databases . . . . . . .Archiving Domino Transaction Logs . . . . .Viewing and Restoring Archived Transaction LogsInactivating Domino Logs . . . . . . . .Selection Techniques and Shortcuts . . . . . 17. 17. 18.1818192020. 20. 21Chapter 5. Using the command-lineinterface . . . . . . . . . . . . . . 23About the commands . . .About options and preferencesDomdsmc Activatedbs. . .Syntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Archivelog . . .Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Changeadsmpwd .Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Help . . . . .Syntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Inactivatelogs . .Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Incremental. . .Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Query AdsmserverSyntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Query Dbbackup .Syntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Query Domino .Syntax . . . . . . .Parameters . . . . . .files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9525353535556565659616161iii

Example . . . . . .Domdsmc Query LogarchiveSyntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Query PendingdbsSyntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Query PreferencesSyntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Resetdatabase . .Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Restore . . . .Syntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Restorelogarchive.Syntax . . . . . . .Parameters . . . . .Example . . . . . .Domdsmc Selective . . . .Syntax . . . . . . .Parameters . . . . .Examples . . . . . .Domdsmc Set. . . . . .Syntax . . . . . . .Parameters . . . . .Example . . . . . 68787879192929295Appendix A. Using the StorageManager scheduler . . . . . . . . . 97 Example procedure . . . . . . . . . . . . 97On the Storage Manager Server. . . . . . . 97On the Domino Server. . . . . . . . . . 98Scheduler considerations . . . . . . . . . 100Setting up other schedules . . . . . . . . . 101Sample command file . . . . . . . . . . 101Appendix B. Silent installation . . . . 103Installing with the Setup Program (setup.exe)iv. 105Creating batch files . . . . . . . . . .Installing with MSI (msiexec.exe) . . . . . . .Install problems—capturing a log of the installationCreating the package on a cd or a file server . . .Creating a silent install package . . . . . .Playing back the silent installation . . . . . .Setup error messages . . . . . . . . . . .105105106106106107107Appendix C. Advanced restoreprocedures . . . . . . . . . . . . 109Recovery from loss of domino transaction logAlternate server and alternate partition restoresHow to perform an alternate server restoreHow to perform an alternate partition restore. . 109. . 110. . 111. . 113Appendix D. Problem determinationaids . . . . . . . . . . . . . . . 117Appendix E. Migration Scenarios . . . 119Migration in a replicated server environment . .Migration in a nonreplicated server environment. 119119Appendix F. Include/excludeprocessing . . . . . . . . . . . . 121Special notes. 121Appendix G. Multiple Domino Serverpartitions on Storage ManagerServers . . . . . . . . . . . . . . 123Multiple Domino Server partitions .Multiple Storage Manager Servers . 123. 123Appendix H. Data Protection forDomino messages . . . . . . . . . 125Logging Messages to the Storage Manager Server125Notices . . . . . . . . . . . . . . 143Trademarks . 145Glossary . . . . . . . . . . . . . 147Index . . . . . . . . . . . . . . . 149

Summary of ChangesChanges for this publication are summarized below.September 2002, Version 5 Release 1.5 This release contains the following changes:v This publication contains revisions that meet IBM globalization requirements.v The language option specifies locale information for your environment. Thisoption is specified in the Data Protection for Domino preferences file(domdsm.cfg). See 92 for more information.v Data Protection for Domino supports Domino 6 and the alternate restore pathfeature for transaction logs in a Domino 6 environment.– See Appendix E, “Migration Scenarios” on page 119 for migration information.– See “Domdsmc Activatedbs” on page 25 for alternate restore path information.v The resetdatabase command resets a Domino server database that is in anincomplete state as a result of an unexpected termination during a DataProtection for Domino backup. See “Domdsmc Resetdatabase” on page 72 formore information.v The statistics option provides backup and restore information to assist inperformance measurement. This option is specified in the Data Protection forDomino preferences file (domdsm.cfg). See 94 for more information.These changes are identified by vertical revision bars ( ) along the left margin. Copyright IBM Corp. 1999, 2002v

vi

PrefaceIBM Tivoli Storage Manager for Mail 5.1.5 Data Protection for Lotus Domino is referredto as Data Protection for Domino throughout this book.Tivoli Storage Manager and Tivoli Storage Manager Server are referred to as StorageManager and Storage Manager Server respectively throughout this book.Data Protection for Domino is a comprehensive storage management softwareproduct. This book explains how to install, configure, and administrate DataProtection for Domino.Storage Manager is a separate client-server licensed product that provides storagemanagement services in a multi-platform computer environment.Who should read this bookThe target audience for this book are system installers, system users, and systemadministrators.In this book, it is assumed that you have an understanding of the followingapplications:Lotus Domino ServerStorage Manager ServerStorage Manager Backup-Archive ClientStorage Manager Application Program InterfaceIt is also assumed that you have an understanding of one of the followingoperating systems:v Windows NTv Windows 2000What this book containsThe book contains the following sections:v Chapter 1, “Introducing Data Protection for Domino” on page 1This section provides an overview of Data Protection for Domino.v Chapter 2, “Installing Data Protection for Domino” on page 9This section explains the environment requirements and steps necessary toinstall Data Protection for Domino.v Chapter 3, “Configuring Data Protection for Domino” on page 11This section explains registering and configuring Data Protection for Dominoand provides policy recommendations.v Chapter 4, “Using the Graphical User Interface” on page 17This section explains how to perform Data Protection for Domino functions froma graphical user interface.v Chapter 5, “Using the command-line interface” on page 23This section explains how to perform Data Protection for Domino functions froma command line interface, specifically using the command line syntax. Copyright IBM Corp. 1999, 2002vii

v Appendix A, “Using the Storage Manager scheduler” on page 97This section explains how to use the Data Protection for Domino centralscheduler service with Data Protection for Domino to automate backups ofDomino Server data.v Appendix B, “Silent installation” on page 103This section explains how to install Data Protection for Domino on multiplemachines.v Appendix C, “Advanced restore procedures” on page 109Describes steps to recover a lost Domino database and how to restore to analternate server.v Appendix D, “Problem determination aids” on page 117This section provides information on how to determine the cause of a problemshould an error condition occur while using Data Protection for Domino.v Appendix E, “Migration Scenarios” on page 119Describes migration information for Domino R4.x users.v Appendix F, “Include/exclude processing” on page 121Describes how to include or exclude data during Data Protection for Dominobackups.v Appendix G, “Multiple Domino Server partitions on Storage Manager Servers”on page 123Describes how to use Data Protection for Domino with multiple Domino serverpartitions on a single machine.v Appendix H, “Data Protection for Domino messages” on page 125This section lists the messages that can appear in Data Protection for Domino.v “Glossary” on page 147The glossary contains terms and definitions relevant to Data Protection forDomino.Prerequisite and related informationThe following table indicates which Web site to access for additional information.Table 1. Product related web sitesDescriptionURLTivoli Web sitewww.tivoli.comTivoli Storage ns/storage/news.htmlStorage Managerwww.tivoli.com/products/index/storage mgrData Protection for Dominowww.tivoli.com/products/index/data protect dominoData Protection for ta protect domino/Storage Manager productwww.tivoli.com/support/storage mgr/requirements and devices supported requirements.htmlviiiStorage Manager Downloadsftp://ftp.software.ibm.comStorage Manager Discussion Listvm.marist.edu:80/htbin/wlvindex?ADSM-L

Table 1. Product related web sites (continued)DescriptionURLIBM Redbookswww.redbooks.ibm.comInstallShield Supportsupport.installshield.com/default.aspTable 2. Related Storage Manager publicationsTitleOrder NumberIBM Tivoli Storage Manager for Windows Backup-Archive Client GC32-0788Installation and User’s GuideIBM Tivoli Storage Manager for Windows Administrator’s Guide GC32-0782IBM Tivoli Storage Manager for Windows Administrator’sReferenceGC32-0783IBM Tivoli Storage Manager MessagesGC32-0767IBM Tivoli Storage Manager Using the Application ProgramInterfaceGC32-0793Contacting customer supportIf you have a problem with any Tivoli product, you can contact Tivoli CustomerSupport. See the Tivoli Customer Support Handbook at the following Web site:www.tivoli.com/support/handbookThe handbook provides information about how to contact Tivoli CustomerSupport, depending on the severity of your problem, and the followinginformation:v Registration and eligibilityv Telephone numbers and e-mail addresses, depending on the country you are inv What information you should gather before contacting supportAccessing books onlineYou can access many Tivoli books online at the Tivoli Customer Support Web site:www.tivoli.com/support/public/Prodman/public manuals/td/TD PROD LIST.htmlThese books are available in PDF or HTML format, or both. Translated documentsare also available for some products.Ordering booksYou can order many Tivoli books online at the following Web site:www.ibm.com/shop/publications/orderYou can also order by telephone by calling one of these numbers:v In the United States: 800-879-2755v In Canada: 800-426-4968v In other countries, for a list of telephone numbers, see the following Web site:www.tivoli.com/inside/store/lit order.htmlPrefaceix

Providing feedback about booksWe are very interested in hearing about your experience with Tivoli products anddocumentation, and we welcome your suggestions for improvements. If you havecomments or suggestions about our products and documentation, contact us in oneof the following ways:v Send an e-mail to pubs@tivoli.comv Complete our customer feedback survey at the following Web site:www.tivoli.com/support/surveyConventions used in this bookThis document uses several typeface conventions for special terms and actions.These conventions have the following meaning:Table 3. Typeface conventionsExampleDescriptionboldCommands, keywords, authorization roles, orother information that you must use appearin bold. Example: Log on to the server asroot user.italicsValues or variables that you must provideappear in italics. Emphasized words andphrases also appear in italics. Example: Thenode name of the production node and backupnode must not be the same.bold italicsOptions and parameters appear in bolditalics. Example: Specify the value for thecompression option.monospaceDirectories, parameters, URLs, and outputexamples appear in monospace. Example: Theproduct is installed in the/usr/tivoli/tsm/client/ba/bin directory.UPPER CASEEnvironment variables associated withStorage Manager, operating systems, orDomino Server appear in UPPER CASE.Example: Make sure the DSM DIRenvironment variable is set correctly.Reading syntax diagramsThis section describes how to read the syntax diagrams used in this book. To reada syntax diagram, follow the path of the line. Read from left to right, and top tobottom.v The ,, symbol indicates the beginning of a syntax diagram.v The , symbol at the end of a line indicates the syntax diagram continues onthe next line.v The , symbol at the beginning of a line indicates a syntax diagram continuesfrom the previous line.v The ,. symbol indicates the end of a syntax diagram.Syntax items, such as a keyword or variable, can be:v On the line (required element)x

v Above the line (default element)v Below the line (optional element).Syntax Diagram DescriptionExampleAbbreviations:Uppercase letters denote the shortestacceptable truncation. If an item appearsentirely in uppercase letters, it cannot betruncated.,, KEYWOrd,.You can type the item in any combination ofuppercase or lowercase letters.In this example, you can enter KEYWO,KEYWORD, or KEYWOrd.AsteriskBracesColonCommaEqual SignHyphenParenthesesPeriodSpaceSymbols:*{}Enter these symbols exactly as they appear in :the syntax diagram., ().Variables:Italicized lowercase items (var name) denotevariables.,,KEYWOrdvar name,.In this example, you can specify a var namewhen you enter the KEYWORD command.Repetition:An arrow returning to the left means you canrepeat the item.,,A character or space within the arrow meansyou must separate repeated items with thatcharacter or space.3 repeat,.,,,3 repeat,,3 repeat,.A footnote by the arrow references thenumber of times you can repeat the item.(1),.Notes:1Specify repeat as many as 5 times.Prefacexi

Syntax Diagram DescriptionExampleRequired Choices:When two or more items are in a stack andone of them is on the line, you must specifyone item.ABC,,,.In this example, you must choose A, B, or C.Optional Choice:,,When an item is below the line, that item isoptional. In the first example, you can chooseA or nothing at all.,,,.A,.ABCWhen two or more items are in a stack belowthe line, all of them are optional. In thesecond example, you can choose A, B, C, ornothing at all.Defaults:Defaults are above the line. The default isselected unless you override it. You canoverride the default by including an optionfrom the stack below the line.A,.,,BCIn this example, A is the default. You canoverride A by choosing B or C. You can alsospecify the default explicitly.Repeatable Choices:A stack of items followed by an arrowreturning to the left means you can selectmore than one item or, in some cases, repeata single item.,,3ABC,.In this example, you can choose anycombination of A, B, or C.Syntax Fragments:Some diagrams, because of their length, must ,,The fragment namefragment the syntax. The fragment nameappears between vertical bars in the diagram. The fragment name:The expanded fragment appears betweenvertical bars in the diagram after a headingwith the same fragment name.ABCxii,.

Prefacexiii

xiv

Chapter 1. Introducing Data Protection for DominoData Protection for Domino for Windows NT/2000 is an application that backs upand restores Lotus Domino databases and transaction logs. When archival loggingis used on the Domino server, it archives transaction log files and retrieves them asrequired for a database recovery. Database backups and archived transaction logfiles are stored on Storage Manager storage. Data Protection for Domino helpsprotect and manage Lotus Domino Server data by allowing you to perform thefollowing actions:v Back up online Lotus Domino databases.v Maintain multiple backup versions of Domino databases.v Archive Lotus Domino transaction log files when archival logging is in effect.v Restore backup versions of a Lotus Domino database and apply changes sincethe last backup from the transaction log.v Restore Domino databases to a specific point in time.v Restore one or more archived transaction log files.v Expire database backups automatically based on version limit and retentionperiod.v Expire archived transaction log files when no longer needed.v Obtain online context-sensitive, task, and conceptual help.v View online documentation for Data Protection for Domino.v Automate scheduled backups.v Restore Domino databases to an alternate server or partition. Data Protection for Domino communicates with a Storage Manager Server usingthe Storage Manager application program interface (API). Data Protection forDomino communicates with a Domino Server using the Lotus Domino API.Note: References to procedures performed using command line commands canalso be performed using the graphical user interface (GUI).FunctionThis section provides an overview of Data Protection for Domino functions:v Domino Database Backup and Transaction Log Archivev Domino Database Restore and Activationv Restore of Archived Transaction Logsv Expiration of Archived Transaction Log Filesv Securityv PerformanceDomino database backup and transaction log archiveThe backup and recovery API in Domino R5 provides the capability to performonline full backups of individual databases and archives of the transaction logwhen archival logging is in effect. A transaction log captures database changes forlogged databases so full database backups are not required as frequently. Updatesto a logged database are recorded in the Domino server transaction log. Changes toa database since the last full backup can be applied from the transaction log afterthe backup is restored from the last full backup. Enabling transaction logging forall databases on a Domino server is not required, so the backup process musthandle both logged and unlogged databases. Copyright IBM Corp. 1999, 20021

Domino Server 5.04 (or later) allows the active transaction log to be backed up aswell.Note: Transactions recorded in the transaction log are keyed by a DatabaseInstance Identifier (DBIID) which is unique for each database on a Dominoserver. The DBIID must match that of a restored database for transactions inthe log to be applied to the database. The most common reason for a DBIIDto change is compaction of the database to reduce file size. Therefore,whenever the DBIID of a database changes, a full backup must be taken sothat subsequent updates (which are recorded in the transaction log) can beapplied to a restored backup of that database. Transactions recorded sincethe DBIID change cannot be applied to prior backups of that databasebecause the DBIID won’t match. See your Domino server documentation formore information on the DBIID and when it can change.Data Protection for Domino provides two types of database backups and anarchive log function:Incremental BackupAn incremental backup provides a conditional backup function thatperforms a full online backup of Domino databases under the followingconditions:v The database is within the Domino data path or symbolically linked tothe Domino data path by directory or database links.v The database is not excluded from backup by exclude statements withinthe Storage Manager options file.v If the database is logged, the DBIID has changed.v If the database is not logged, it has been modified since the last backupoccurred (data and non-data modification dates are checked).v The database is new or newly included in the backup.The incremental command also includes a function that determines ifactive backup database copies exist on the Storage Manager Server that aredeleted from the Domino server or excluded from backup. If so, they aremarked inactive so that automatic expiration of these backup copies canoccur according to defined management class parameters for backup files.Selective BackupA selective backup unconditionally backs up the specified databases, unlessthey are excluded from backup through exclude statements within theStorage Manager options file.Archive LogAn archive log stores filled transaction log files on the Storage ManagerServer so that space allocated to these files can be reused by the Dominologger. The archivelog command is available when transaction logging onthe Domino server is enabled in archival mode. Filled transaction log filesmust be archived frequently enough to ensure the transaction log neverfills completely and stops the Domino server.Domino Server 5.04 (or later) allows the active transaction log to be backedup as well.Transaction log files stored on the Storage Manager Server areautomatically restored as needed for a database recovery.Archived transaction log files are retained on the Storage Manager Serveras long as a database backup exists that needs these log files for acomplete recovery. See “Expiration of archived transaction log files” onpage 4 for further details.2

Note: When circular logging is used on the Domino server (or whenlogging is disabled on the Domino server), transaction log files arenot archived. See “Backup strategy considerations” on page 5 formore information.Domino database restore and activationA Domino database recovery can involve restoring several transaction log files inaddition to the database backup file from the Storage Manager Server, dependingon the backup strategy you choose. The function to restore database files isseparate from the function that applies updates from the transaction log. Thisallows you to restore database files separately while transaction logs are processedfor all restored databases. This avoids restoring the same transaction log filesmultiple times. Restoring and updating a database with current changes from thetransaction log is a two-step process implemented by the restore and activatedbscommands.See “Backup strategy considerations” on page 5 for additional information onbackup and restore strategies.RestoreRestore is the first step of a two-stage recovery process. This function restores asingle database or group of databases from Storage Manager storage to theDomino server. You can restore the database to a different database file name or toa different Domino server. You can also restore a group of databases to a differentdirectory and preserve existing file names. In addition, if you specify a point intime on the restore command, the most recent backup version prior to that time isrestored. To restore a database without applying updates from the transaction log,the two steps can be combined into one step by specifying /activate yes during therestore command.ActivationThis is the second step of the two stage recovery process. This function bringsrestored databases online for use by the Domino Server. You can optionally applytransactions from the transaction log to update the database. Transactions can beapplied up to a specific point in time or up through the most recent changesrecorded in the transaction log. If archival logging is in effect, Data Protection forDomino automatically restores archived transaction log files as needed. Domino 6 Server provides an alternate restore path feature that allows you tospecify the directory where transaction logs are restored. You can use this featurewith the activatedbs command. See “Domdsmc Activatedbs” on page 25 for detailson performing this procedure.The query pendingdbs command retrieves a list of restored databases not yetactivated. Databases pending activation are assigned a temporary file name toavoid recognition as database files on the Domino Server.Restore at document levelData Protection for Domino restores Domino databases at the database level. Torestore a document in a database, the entire database must first be restored and thedocument copied.A database can be restored to the production server under a temporary name andthe desired document can be copied to the appropriate database. If forperformance reasons, the production server cannot be used in the restore process,Chapter 1. Introducing Data Protection for Domino3

the database can be restored to an alternate server and copied to the productionserver. It is recommended that you perform alternate server restores when possibleto reduce demands on the production Domino Server. See “Alternate server andalternate partition restores” on page 110 for details on performing this procedure. Restore of archived transaction logsThis function allows a single, archived transaction log file to be restoredindependently of a routine database restore. Restoring a single, archivedtransaction log file assists with disaster recovery operations. By retrieving the mostrecent archived log file, it is possible to rebuild the Domino transaction log controlfile. This allows archived transaction log files to be used to recover restoreddatabase backups to a more current state, even after a loss of the active transactionlog.See “Recovery from loss of domino transaction log” on page 109 for moreinformation about disaster recovery procedures using an archived transaction log.Expiration of archived transaction log filesAn archived transaction log file on a Domino Server can contain transactions formultiple databases. An archived transaction log file will not expire until alldatabase

IBM Tivoli Storage Manager for Windows Administrator's Reference GC32-0783 IBM Tivoli Storage Manager Messages GC32-0767 IBM Tivoli Storage Manager Using the Application Program Interface GC32-0793 Contacting customer support If you have a problem with any Tivoli product, you can contact Tivoli Customer

Related Documents:

Ot µ sDs Glistserv@marist.eduC IBM u b G ªWA Σ o sDs C: MbU ñ A X yϕµñuCXAIX A X yAw AIX W xsΘNz{í]iHbΣL@ t WB@C IBM Tivoli Storage Manager X y UϕCXTivoli Storage Manager A X yC X y D q X IBM Tivoli Storage Management Products License Information GH09-4572 IBM Tivoli Storage Manager TºΓU GC40-0711 IBM Tivoli Storage Manager for AIX zΓU

IBM Tivoli Composite Application Manager for SOA IBM Tivoli Usage and Accounting Manager Application Layer Management IBM Tivoli Application Dependency Discovery Manager IBM Tivoli OMEGAMON XE for Messaging IBM Tivoli Composite Application Manager for Response Time IBM Tivoli Composite Application Manager for Web Resources

IBM Tivoli Storage Manager (5608-ISM), IBM Tivoli Storage Manager Extended Edition (5608-ISX), IBM Tivoli Storage Manager for Storage Area Networks (5608-SAN), IBM Tivoli Storage Manager for Space Management (5608-HSM), and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. Order .

Tivoli Storage Manager for Windows Quick Start GC35-0409 Tivoli Storage Manager for Windows Administrator's Guide GC35-0410 Tivoli Storage Manager for Windows Administrator's Reference GC35-0411 Tivoli Storage Management Products License Information LC23-4470 Tivoli Storage Manager for HP-UX Quick Start GC35-0412

Decision Support for z/OS IBM Tivoli System Automation & IBM Tivoli Workload Automation IBM Tivoli Netview for z/OS, OMEGAMON, IBM Tivoli Composite Application Manager, DFSMS IBM Tivoli Identify Manager, IBM Tivoli Access Manage

Tivoli Security Operations Manager Products include: Tivoli Composite Application Manager Tivoli Config Mgr Tivoli Decision Support for z/OS 9Tivoli Monitoring 9IBM Director Tivoli Ent Console Tivoli NetView Tivoli OMEGAMON 9Tivoli Provisioning Manager Tivoli Remote Cnt

IBM Tivoli Storage Manager (5608-ISM), IBM Tivoli Storage Manager Extended Edition (5608-ISX), IBM Tivoli Storage Manager for Storage Area Networks (5608-SAN), and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. Order publications through your IBM representative or the IBM branch .

www.2id.korea.army.mil 2 Indianhead August 13, 2010 “Jeju Island, it takes about a half day to travel, so on a long weekend you can spend three full days touring, exploring, and enjoying yourself.” Pfc. Reginald Garnett HHC, 1-72th Armor OpiniOn “Gangneung is a great place to visit. It has a beautiful beach, Gyeongpo Beach, where many .