How to recover TSM server database (IBM Spectrum Protect)

At first, it requires to build the same name of TSM instance before you starting to recover TSM database. For rebuilding TSM instance on the server, refer to How to create TSM server instance (IBM Spectrum Protect Version 8). Now assuming that you have completed building TSM instance as the same name that you’re recovering, here’re the steps how to recover TSM server database. The procedure may apply to multiple versions of IBM Spectrum Protect from 6 to latest.

How to recover TSM server database (IBM Spectrum Protect) Read More »

How to create TSM server instance (IBM Spectrum Protect Version 8)

Here is the procedure of how to create IBM TSM server instance. The procedure was written based on the version 8 of IBM Spectrum Protect Version. But the procedure can apply to version 7 as well as the later version. Usually, you can use the procedure after TSM server newly installed and more often, use this procedure when running TSM server disaster recovery. Before executing TSM server database recovery process (dsmserv restore db), the same name of TSM instance should be ready as an empty vessel.

How to create TSM server instance (IBM Spectrum Protect Version 8) Read More »

TSM Node Replication Steps (IBM Spectrum Protect)

Here’re very simple steps of configurating TSM node replication between source/target TSM server. There are many options and considerations that you need to dive in to fully understand and implement the solution suited to your needs but this page focused on introducing just quick steps of TSM node replication. You can note the below configuration variables that are being used/described for the details procedures below.

TSM Node Replication Steps (IBM Spectrum Protect) Read More »

How to exchange SSL certificate for TSM server to server communication(IBM Spectrum Protect)

ANR8583E An SSL socket-initialization error occurred on session 12. The GSKit return code is 414 GSK_ERROR_BAD_CERT.
ANR8599W The connection with srctsm01.mydomain.com:45274 failed due to an untrusted server certificate. An attempt to reconnect and establish certificate trust might follow.

This is new requirement from TSM server version 8 which implements SSL certificates on both ends. This not only strengthen a security posture for TSM server and client communication but also TSM server to server communication. If you had been running node replication successfully before version 8, However, after version upgrade, now you might notice the entire node replication failure due to SSL certificate error. No worries! Here’re the steps to exchange and properly install TSM server certificates on both source and target TSM servers.

gsk8capicmd_64 -cert -add -label 192.168.0.12 -db cert.kdb -stashed -file /tmp/cert256.arm

How to exchange SSL certificate for TSM server to server communication(IBM Spectrum Protect) Read More »

nslookup on NetApp Clustered ONTAP (name resolution)

It is always best practice to validate hostname on NetApp side before adding the host to export-policy rule. That way, you ensure to cross off one possible reason to fail NFS mount. There is no such command nslookup on NetApp ONTAP. Instead, there are equivalent commands. See below. It has the exact same effect of running nslookup on Windows or Linux servers.

nslookup on NetApp Clustered ONTAP (name resolution) Read More »

Scroll to Top