This repository has been archived on 2024-04-08. You can view files and clone it, but cannot push or open issues or pull requests.
spdocker/source/server/normalrun.md

76 lines
5.0 KiB
Markdown
Raw Normal View History

2018-03-08 04:33:23 +00:00
---
subtitle: Normal Run
header-img: img/header_img/server.jpg
date: 2018-03-07 09:50:12
description: Spectrum Protect Server in a Docker Container - Normal Run
related:
- { page: "index", title: "Containerising SP" }
- { page: "firstrun", title: "Initial Container Setup" }
2018-03-08 05:37:49 +00:00
- { page: "upgrade", title: "Upgrading SP" }
2018-03-14 06:34:06 +00:00
- { page: "recover", title: "Recovering the SP Database" }
2018-03-08 04:33:23 +00:00
---
# Normal Run of a Spectrum Protect Server (in a container)
2019-05-06 05:00:01 +00:00
*Updated for Spectrum Protect 8.1.7!*
2018-03-08 04:33:23 +00:00
> **NOTES**:
2018-03-14 06:34:06 +00:00
> * The storage used in the example below is from the host file systems, passed to the container with Docker's `-v` option.
2019-05-06 05:00:01 +00:00
> * The host was using glusterfs for the persistent storage. That same filesystem is available on mulitple docker nodes, which means I would now have a Spectrum Protect server that could float between nodes if needed!
2018-03-14 06:34:06 +00:00
> * This implementation is using DISK or CLOUD storage pool storage. While accessing tape should be possible, I haven't explored what is required for that to work.
2018-03-08 04:33:23 +00:00
## Configuration
Our configuration will use these defaults
2018-03-14 06:34:06 +00:00
```bash Helpful Variables
2018-03-08 04:33:23 +00:00
TSM_DB=/srv/sp/database
TSM_USER=/srv/sp/user
TSM_DATA=/srv/sp/data
```
* **TSM_DB** is where the TSM Database will be stored on the Docker Host, and will be passed to the container with `-v $TSM_DB:/database`
* **TSM_USER** is where the TSM Instance user's home directory is on the Docker Host, and will be passed to the container with `-v $TSM_USER:/tsm`
* **TSM_DATA** is where the TSM Disk based storage pools are stored on the Docker Host, and will be passed to the container with `-v $TSM_DATA:/data`
If data is stored in a cloud pool, then this would be where the acceleration pool is holding data before it gets sent to the cloud.
# Normal Run
Starting SP for normal operations.
2019-05-06 05:00:01 +00:00
`docker run --detach=true --hostname=tsm --interactive=false -v $TSM_USER:/tsm -v $TSM_DB:/database -v $TSM_DATA:/data --memory=16g -p 1500:1500 -p 1543:1543 --privileged=true --rm=false --restart=no --tty=false --name=spectrumprotect ibm/spectrumprotect:8.1.7`
2018-03-08 04:33:23 +00:00
```tsm Expected Startup, viewable by doing docker log -f spectrumprotect
2019-05-06 05:00:01 +00:00
ANR7800I DSMSERV generated at 00:18:30 on Feb 5 2019.
2018-03-08 04:33:23 +00:00
IBM Spectrum Protect for Linux/x86_64
2019-05-06 05:00:01 +00:00
Version 8, Release 1, Level 7.000
2018-03-08 04:33:23 +00:00
Licensed Materials - Property of IBM
...
ANR8200I TCP/IP Version 4 driver ready for connection with clients on port
1500.
ANR2560I Schedule manager started.
ANR2825I License audit process 1 completed successfully - 0 nodes audited.
ANR0985I Process 1 for AUDIT LICENSE running in the BACKGROUND completed with
completion state SUCCESS at 04:09:10.
ANR0993I Server initialization complete.
IBM Spectrum Protect:SERVER1>
```
You should now be able to connect with the Admin Client.
**NOTES**:
* For Spectrum Protect you need to use `--privileged=true`. From what I have worked out, DB2 needs this. I did find some notes on DB2 in docker [here](https://www.ibm.com/developerworks/data/library/techarticle/dm-1602-db2-docker-trs/index.html), and tried these options without using `--privileged=true` but DB2 still reported some errors.
2018-03-14 06:34:06 +00:00
I don't think it is an issue running SP in privileged mode, but if you do find a solution to have it run without full privileges, I would be interested ;)
2018-03-08 04:33:23 +00:00
The link above has some important tips regarding DB2 memory and the `--memory=` setting.
* When defining your DISK based storage pools (or STGPOOLDIR for your cloud pools), remember the path to your "data" is `/data` inside the container. If you use another path, you will loose that data when the container is destroyed.
2018-03-14 06:34:06 +00:00
* You should be able to run many SP instances on the same host (or swarm) even at different version levels. In container, they can all respond to port 1500, and outside the container, they'll need to have unique ports EG: `-p 1501:1500`, `-p 1502:1500`, etc. (Just remember to think about resource requirements and potential resource contention.)
2018-03-08 04:33:23 +00:00
* Use the same `--hostname=` setting that you used when running the *init* steps above. DB2 is sensitive to hostname changes.
2018-03-14 06:34:06 +00:00
* Spectrum Scale makes a great persistent storage file system for Docker containers, and gives you great options for Spectrum Protect. For example, you could move SP to different hosts very easily (stop on hosta, start on hostb - if both hosts see the same Spectrum Scale file system and your database/data are on it).
2019-05-06 05:00:01 +00:00
# Shutting down Spectrum Protect
By Default when you issue a `docker stop` command, docker, gives the container 10 seconds (the default) for all processes to exit. If, that hasnt happened, then the docker host will send a `SIGKILL` to all the processes left.
Spectrum Protect will correctly handle the `SIGTERM` sent by docker, but it may take more than 10 seconds to shutdown. You can start your container with a `--stop-timeout` set to a larger value, if you want docker to shutdown Spectrum Protect.
Instead, of usng docker stop, I **strongly** recommend you connect with the admin client, and issue `HALT` instead. This way, you can make sure that Spectrum Protect is not doing something important first (using `Q SESSION` or `Q PROCESS`). When Spectrum protect has finished halting, the container will stop.