If you can upgrade you client to 5.4.x or higher then use: MEMORYEFFICIENT diskcachemethod diskcachelocation y:\TSMCache
Note that the cache location may require a few GB of space. We backup 8.2 million objects in 18 file systems without journaling (long story) on a 32bit 2003 server. This is about a 12 hour run. To speed up the backup you can also use: include.fs C: memoryefficientbackup=no This allows a file system to make a normal backup. Once you have completed a backup with a 5.4 or higher client you will have a TSM.ini file that will help you decide which file systems can be backed up normally. On a 64bit 2003 server we do 12.4 million without anything special. (Still no journaling) This is about a 10 hour run. Andy Huebner -----Original Message----- From: ADSM: Dist Stor Manager [mailto:[email protected]] On Behalf Of David Jelinek Sent: Friday, January 30, 2009 11:02 AM To: [email protected] Subject: [ADSM-L] Another question about backing up a filesystem with a large number of files. I have a filesystem on a windows server that has a very large number of files in it. I have been using journaling with some success until now. The problem is that once journaling is turned off for whatever reason, a full incremental backup is required before journaling can be used again. Even with memoryefficientbackup set to yes TSM runs out of memory if it is other than an initial backup. I tried dividing up the filesystem with commands like: dsmc incr "e:\blackboard\courses\a*" -subdir=yes dsmc incr "e"\blackboard\courses\b*" -subdir=yes but the backup seems to take forever for a single one of these commands. I have dsm.opt set to exclude all domains. My question is, if I delete or rename the old filespace and then try these backups. I know that the first time they will simply backup everything. Will they set things up on the TSM server so that subsequent backups will work against the divided filespaces and thus run a little quicker? TSM server is 5.3.1.3 on AIX TSM client is 5.3.5.6 Windows is Server 2003 Thanks in advance. -- David Jelinek Systems Programmer Adv Tech, IT, Central Michigan Univ. This e-mail (including any attachments) is confidential and may be legally privileged. If you are not an intended recipient or an authorized representative of an intended recipient, you are prohibited from using, copying or distributing the information in this e-mail or its attachments. If you have received this e-mail in error, please notify the sender immediately by return e-mail and delete all copies of this message and any attachments. Thank you.
