ADSM-L

Re: [ADSM-L] TSM for VE - VMCLI

2017-10-18 13:22:00
Subject: Re: [ADSM-L] TSM for VE - VMCLI
From: "Storer, Raymond" <storerr AT NIBCO DOT COM>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Wed, 18 Oct 2017 17:19:11 +0000
Steven,

Sorry, I cannot help you with the vmcli commands.  However, you can easily use 
PowerShell or another scripting language to get vCenter to provide you a list 
of VMs and then sort, slice, dice, filter, and store them.  You could easily 
"roll your own" VM tagging structure for backups too--you don't need a later 
version of TSM for VE to do it if you plan to parse what vCenter gives you 
anyway.  Then, when you upgrade your TSM for VE at some future date you can 
migrate the tags you created to the ones the new version of TSM for VE uses.  
If running the script on the TSM for VE server, you could execute dsmc commands 
as your script spits them out.  If not, what options do you have for some sort 
of "job submission" to the TSM for VE server for it to execute the dsmc 
commands?

Ray

Ray Storer
NIBCO INC. | Intel Systems Specialist
P: 574.295.3457 | F: 574.295.1298 | M: 574.742.0192
storerr AT nibco DOT com | www.nibco.com




-----Original Message-----
From: ADSM: Dist Stor Manager [mailto:ADSM-L AT VM.MARIST DOT EDU] On Behalf Of 
Harris, Steven
Sent: Tuesday, October 17, 2017 6:11 PM
To: ADSM-L AT VM.MARIST DOT EDU
Subject: [ADSM-L] TSM for VE - VMCLI

Hi Guys

TSM Server 7.1.1 AIX,  TSM VE 7.1.1 linux X64

This shop has issues with us using the vSphere plugin as it requires too many 
permissions. We cannot move to later VE clients with expanded facilities 
because of a dependency on vCenter 5.5

So far, we have been managing by editing the dsm.sys files, but that is getting 
to be unsustainable.  The docs describe a VMCLI interface that may suit when 
scripted.  The idea would be to write Powershell/python scripts to query vmware 
for a list of vms, apply some filters that would allow includes and excludes 
from a database or maybe json files and generate a list of VMs to backup 
invoked by vmcli.

Is anyone using vmcli this way?  Any war stories to tell? Maybe its working 
well for you.

Please let me know

Thanks

Steve

Steven Harris
TSM Admin/Consultant

Canberra Australia



This message and any attachment is confidential and may be privileged or 
otherwise protected from disclosure. You should immediately delete the message 
if you are not the intended recipient. If you have received this email by 
mistake please delete it from your system; you should not copy the message or 
disclose its content to anyone.

This electronic communication may contain general financial product advice but 
should not be relied upon or construed as a recommendation of any financial 
product. The information has been prepared without taking into account your 
objectives, financial situation or needs. You should consider the Product 
Disclosure Statement relating to the financial product and consult your 
financial adviser before making a decision about whether to acquire, hold or 
dispose of a financial product.

For further details on the financial product please go to 
https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.bt.com.au&data=02%7C01%7Cstorerr%40NIBCO.COM%7C83db0417d83444957da208d515acb54d%7C3d27b36909d5422a8817fef5d8cba6cc%7C0%7C0%7C636438753892284762&sdata=j%2BE9CRZVyZR59IlUjyxM7vxrgnPVp%2F7ng8aA1r4Obpk%3D&reserved=0

Past performance is not a reliable indicator of future performance.

________________________________

CONFIDENTIALITY NOTICE: This email and any attachments are for the
exclusive and confidential use of the intended recipient. If you are not
the intended recipient, please do not read, distribute or take action in
reliance upon this message. If you have received this in error, please
notify us immediately by return email and promptly delete this message
and its attachments from your computer system. We do not waive
attorney-client or work product privilege by the transmission of this
message.

<Prev in Thread] Current Thread [Next in Thread>

ADSM.ORG Privacy and Data Security by KimLaw, PLLC