You are on page 1of 1320

V7.

cover

Front cover

IBM i System Administration

(Course code OL19)

Student Notebook
ERC 14.1

Individually Licensed to Tharanga Nirupamali


Student Notebook

Trademarks
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
Active Memory™ AIX 5L™ AIX®
AS/400® BladeCenter® C/400®
DB™ DB2 Universal Database™ DB2®
Distributed Relational Domino® DRDA®
Database Architecture™
Electronic Service Agent™ EnergyScale™ eServer™
FlashCopy® Focal Point™ Initiate®
iSeries® i5/OS™ i5/OS®
Lotus® Micro-Partitioning® Notes®
OfficeVision® Operating System/400® POWER Hypervisor™
Power Systems™ POWER® PowerPC®
PowerVM™ POWER4™ POWER5™
POWER6® POWER7® Rational Team Concert™
Rational® Redbooks® RPG/400®
ServerProven® Service Director™ System i®
System p® System Storage® System x®
System z® Tivoli® WebSphere®
xSeries® z/OS® 400®
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.

December 2012 edition


The information contained in this document has not been submitted to any formal IBM test and is distributed on an “as is” basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customer’s ability to evaluate and integrate them into the customer’s operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.

© Copyright International Business Machines Corporation 1995, 2012.


This document may not be reproduced in whole or in part without the prior written permission of IBM.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions
set forth in GSA ADP Schedule Contract with IBM Corp.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
IA® is a trademark or registered trademark of Cast Iron Systems, Inc. (or its affiliates), an
IBM Company.
Other product and service names might be trademarks of IBM or other companies.

iii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

iv i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

Course description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix

Unit 1. IBM i overview and concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Power Systems with IBM i: Integrated by design . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Technology-independent machine interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
POWER Hypervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Innovative IBM i technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Power Systems with IBM i expand rich heritage . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
The IBM Power Systems family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
The Power Systems with IBM i product line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
CPU models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11
Single-level storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Power Systems with IBM i devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Sample configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Software overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Licensed internal code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Operating system IBM i (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Operating system IBM i (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Programming support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Application software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
Display installed software on a system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
CL command structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Object identification (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
Object identification (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26
Simple name versus qualified name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Library list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Your job's library list is built at sign-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29
Finding an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Types of jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31
Starting and ending a job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33
Job control summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-34
Job properties (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Job properties (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-36
What is a job description? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-38
Job description attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-39
Message summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-40
Basic message queue communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-42
Which output queue? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-43

© Copyright IBM Corp. 1995, 2012 Contents v


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Creating device descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-44


Automatic configuration naming conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-46
Additional objects required for remotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-47
How the pieces fit together (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-48
How the pieces fit together (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-49
How the pieces fit together (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-50
New systems management tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-51
How does Systems Director Navigator for i compare to System i Navigator? . . . .1-52
IBM Systems Director . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-53
Exercise: Exploring the user environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-54
Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-55
Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-56
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-57

Unit 2. Management Central overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Topic 1: Introduction to Management Central . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Command and graphical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4
Management Central: Basic overview (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6
Management Central: Basic overview (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8
Topic 2: Management Central setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10
Packaging and installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-11
Basic and extended operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-12
Configure connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-14
Create Connection wizard (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15
Create Connection wizard (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-16
Management Central server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-17
Management Central properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-18
Define central system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-20
Add endpoint systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-21
Create system groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-23
Advanced common functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-25
Global sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-26
Include and Columns options for displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-27
Management Central Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-28
Advanced Job Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-30
Advanced scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-32
Application Administration (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-33
Application Administration (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-34
Application Administration (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-36
MC: Pervasive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-37
Topic 3: Management Central functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-38
Management Central functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-39
Run command (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-40
Run command (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-41
Run command (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-42
Object packaging and distribution (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-43
Object packaging and distribution (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-45

vi i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Object packaging and distribution (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-46


Manage products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-47
Create products on source system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-49
Install products on source system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-50
Send and install products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-51
System monitor (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-52
System monitor (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
System monitor (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-56
System monitor (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-57
File monitor (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-59
File monitor (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-60
Jobs monitor (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-61
Jobs monitor (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-62
Messages monitor (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-63
Messages monitor (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-64
Collection Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-65
Collect data (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-67
Collect data (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-68
Display history graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-70
Inventory collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-72
Select inventory to collect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-73
Viewing the inventory list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-74
System Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-75
Compare and update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-77
Fixes functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-78
Send and Install Fixes wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-80
Compare and Update wizard (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-81
Compare and Update wizard (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-82
Compare and Update wizard (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-83
Manage users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-84
Create user definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-86
Reference Redbook SG24-5407 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-88
Additional resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-89
Exercise: Management Central inventory and system values . . . . . . . . . . . . . . . . 2-90
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-91
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-92

Unit 3. Security concepts and overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
The objectives of system security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Questions when planning for security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Physical security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Keylock security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Monitoring physical security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
System tools used to secure your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Security is always active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13

© Copyright IBM Corp. 1995, 2012 Contents vii


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 4. Security-related system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Security-related system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Locking system values using service tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Topic 1: Setting the level of security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
QSECURITY system value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
QSECURITY system value: Security level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Security level 40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Steps to change from level 30 to level 40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Security level 50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Steps to change to security level 50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16
System Values: Security (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-18
System Values: Security (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19
Topic 2: Using 5250 emulation to configure system values . . . . . . . . . . . . . . . . . .4-20
General security system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21
Security-related system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-23
Security-related restore system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
System values that apply to passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
System values that control auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Topic 3: Using IBM i Navigator to configure system values . . . . . . . . . . . . . . . . . .4-28
Configuration and Service: System Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
System Values: Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-30
System Values: Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-32
System Values: Jobs \> Interactive Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-35
System Values: Devices \> Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-36
Jobs System Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-37
Security: Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38
Security Policy Properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-40
Security Policy Properties: Public Authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-41
Security Policy Properties: Objects not auditable, shared memory . . . . . . . . . . . .4-42
Security Policy Properties: Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-43
Security: Password Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-45
Password Policy Properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-46
Password Policy Properties: Validation 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-48
Password Policy Properties: Validation 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-50
Password Policy Properties: Expiration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-53
Change Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-54
Password rules for changing password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-55
Security: Signon Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-56
Signon Policy Properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-57
Signon Policy Properties: Remote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59
Security: Restore Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60
Restore Policy Properties: Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61
Restore Policy Properties: Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-62
Restore Policy Properties: Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-64
Restore Policy Properties: Access Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-65
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-66

viii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-67

Unit 5. User security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Topic 1: User profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Roles served by user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
User profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
User profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Appendix B: Default values for user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
New User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
Create a new user: 5250 and IBM i Navigator . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
Create User: IBM Systems Director Navigator for I (1 of 2) . . . . . . . . . . . . . . . . . 5-13
Create User: IBM Systems Director Navigator for I (2 of 2) . . . . . . . . . . . . . . . . . 5-14
New User: Capabilities \> Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
System privileges: Special authority: SPCAUT . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
Privilege classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
New User: Capabilities \> Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
New User: Capabilities \> Password and Unique Identifier . . . . . . . . . . . . . . . . . . 5-22
New User: Jobs \> General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
New User: Jobs \> Session Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
New User: Jobs \> Display Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
Display Session: Limit capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-29
New User: Jobs \> Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30
New User: Jobs \> International . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-31
New User: Groups \> Group Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-33
New User: Personal \> Name, Location, and Mail . . . . . . . . . . . . . . . . . . . . . . . . 5-35
Appendix B: IBM-supplied user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38
User functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40
Changing a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-41
Deleting a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-42
User profile: New in V7R1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-43
Exercise: Working with user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-45
Topic 2: Group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-46
More facts about group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-47
Roles served by group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-49
New Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-50
New Group: Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-51
New Group: Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-52
Group functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-53
Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-54
Exercise: Working with group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-55
Topic 3: Management Central and working with profiles . . . . . . . . . . . . . . . . . . . . 5-56
Management Central: Users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-57
Users and Groups functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-59
New User Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-61
New User Definition: Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-63
User definition created . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-65

© Copyright IBM Corp. 1995, 2012 Contents ix


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create user from definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-66


Direct connect: Display user data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-67
Management Central: Display user inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-68
Topic 4: Service tools security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-69
Service tools user ID administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-70
System service tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-72
Service tools user IDs in SST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-73
Work with Service Tools User IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-74
QSECOFR terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-75
Lost password for QSECOFR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-76
Changing DST passwords: Manual mode procedure . . . . . . . . . . . . . . . . . . . . . . .5-77
Changing DST passwords: Menu navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-78
SST option 7: Allow change of security-related system values . . . . . . . . . . . . . . .5-79
Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-80
Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-81
Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-82
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-83

Unit 6. Resource security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
Topic 1: Resource security concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-5
User-owned objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Primary group authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7
QDFTOWN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-8
Where object permissions come from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
Where *PUBLIC authority comes from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-10
Specific object permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-12
Object management permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-13
Data permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-14
Commonly used permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-15
Specifying specific authority for objects in the integrated file system . . . . . . . . . . .6-16
Topic 2: Defining resource security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-18
Object permission: QSYS.LIB file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
Basic and Details permission displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-20
Permission: Add and Remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-21
Permission: Customize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-22
Permission: Authorization List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-23
Change owner: Change Primary Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-24
Permission search order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-25
Topic 3: Working with authorization lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-26
Authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-27
Create an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-28
Authorization list permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-30
Object secured by an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-31
Securing an object with an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-32
Authorization list considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-33
Authorization list versus group profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-34

x i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Groups and AUTLs compared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-35


Exercise: Working with authorization lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36
Topic 4: Column-level authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37
Column-level security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38
Granting column-level permission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-39
Column-level security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-41
Topic 5: Adopted authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-43
Adopted authority (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-44
Adopted authority (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-45
DSPPGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-46
Adopted authority (adopting a user profile) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-48
Adopted authority example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-49
Adopted authority (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-50
Adopted authority considerations (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-52
Adopted authority considerations (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-53
Authority checking (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-54
Authority checking (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-55
Fast path for object authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-56
Security example (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-57
Security example (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-58
Security example (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-59
Exercise: Working with object authority and adopted authority . . . . . . . . . . . . . . . 6-61
Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-62
Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-63
Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-64
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-65

Unit 7. Security auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Audit: Why and how? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Auditing: Some events to monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Levels of auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Examine your strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
An effective strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Event monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Using the history log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Steps to implement auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Values for the QAUDLVL and QAUDLVL2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12
Security: Auditing policy (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14
Security: Auditing policy (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
Security: Auditing policy (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Audit journal entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-18
Audit-related files and messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19
Action auditing for a specific user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
Action auditing for a specific object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
User: Capabilities \> Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
Printing or viewing audit journal entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25
DSPJRN to view a specific entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26

© Copyright IBM Corp. 1995, 2012 Contents xi


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

DSPJRN to view \> F10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-27


Output DSPJRN to disk \> print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-28
Consider journaling critical files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-30
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-31
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-32

Unit 8. Designing security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
Designing security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-3
Overall recommendation for security design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-4
Planning and setting up system security guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-6
Topic 1: Library security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8
Library security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
Topic 2: Menu security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-10
Menu security: Design guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-11
User profile session startup: Menu security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-13
Menu security: Sign-on processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14
Sign-on processing (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-15
Sign-on processing (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-17
System Request screen security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-18
System Request screen: A secondary job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19
Restricting the use of System Request screen options . . . . . . . . . . . . . . . . . . . . .8-20
Topic 3: Object security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-21
Object security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-22
Command security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-23
Appendix C: Secured commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-25
System-defined authorities for files and programs . . . . . . . . . . . . . . . . . . . . . . . . .8-26
System-defined authorities for libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27
How library authority and object authority work together . . . . . . . . . . . . . . . . . . . .8-28
Securing physical versus logical files (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-29
Securing physical versus logical files (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-30
Create Output Queue: Security attributes beyond resource security . . . . . . . . . . .8-31
Authority required to perform printing functions . . . . . . . . . . . . . . . . . . . . . . . . . . .8-33
Limit access to program function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-34
Authority to workstation (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-36
Authority to workstation (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-37
Data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-38
Topic 4: Security save and restore considerations . . . . . . . . . . . . . . . . . . . . . . . . .8-40
Restricting save and restore operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41
Backup and recovery of security information . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-42
Authority information saved with an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-44
Other authority information that is saved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-45
Restoring programs with restricted instructions . . . . . . . . . . . . . . . . . . . . . . . . . . .8-46
Topic 5: Security tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-47
Security tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-48
Security Tools (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-50
Security Tools (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-52
Security Tools (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-54

xii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Security Tools (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-56


Security Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-59
Security Wizard simulation (1 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-60
Security Wizard simulation (2 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-61
Security Wizard simulation (3 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-62
Security Wizard simulation (4 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-63
Security Wizard simulation (5 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-64
Security Wizard simulation (6 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-65
Security Wizard simulation (7 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-66
Security Wizard simulation (8 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-67
Security Wizard simulation (9 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-68
Security Wizard simulation (10 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-69
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-70
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-71

Unit 9. IBM Power Systems with IBM i: Availability overview . . . . . . . . . . . . . . . . . 9-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Topic 1: Availability concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Availability concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Estimating the value of availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6
What is an acceptable downtime? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Types of outages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10
Failure types (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12
Failure types (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
IBM Power Systems with IBM i hardware features(1 of 5) . . . . . . . . . . . . . . . . . . 9-16
IBM Power Systems with IBM i hardware features (2 of 5) . . . . . . . . . . . . . . . . . . 9-17
IBM Power Systems with IBM i hardware features (3 of 5) . . . . . . . . . . . . . . . . . . 9-19
IBM Power Systems with IBM i hardware features (4 of 5) . . . . . . . . . . . . . . . . . . 9-21
IBM Power Systems with IBM i hardware features (5 of 5) . . . . . . . . . . . . . . . . . . 9-22
IBM Power Systems with IBM i software features (1 of 6) . . . . . . . . . . . . . . . . . . 9-23
IBM Power Systems with IBM i software features (2 of 6) . . . . . . . . . . . . . . . . . . 9-25
IBM Power Systems with IBM i software features (3 of 6) . . . . . . . . . . . . . . . . . . 9-27
IBM Power Systems with IBM i software features (4 of 6) . . . . . . . . . . . . . . . . . . 9-29
IBM Power Systems with IBM i software features (5 of 6) . . . . . . . . . . . . . . . . . . 9-30
IBM Power Systems with IBM i software features (6 of 6) . . . . . . . . . . . . . . . . . . 9-31
Topic 2: LPAR and HMC concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . 9-32
PowerVM virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-33
What is logical partitioning? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-35
Allocating resources on an LPAR system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-37
Power Systems and operating systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-39
POWER Hypervisor functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-41
Software licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-43
Why would I use logical partitions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-45
LPAR allows for consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-46
How does LPAR work on POWER5, 6, and 7? . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-48
How does LPAR work on POWER4? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-49
HMC and SDMC appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-51
HMC/SDMC and managed system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-53

© Copyright IBM Corp. 1995, 2012 Contents xiii


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Managed system without HMC/SDMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-54


Power Systems management: Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-55
Hardware Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-56
HMC appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-58
HMC 7310 models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-59
HMC 7042 models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-60
HMC interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-61
HMC user interfaces and access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-62
Remote access to the HMC (browser-based since V7) . . . . . . . . . . . . . . . . . . . . .9-63
The big picture recap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-65
Advanced HMC features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-66
Dynamic partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-67
How DLPAR works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-69
Processor concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-70
Micro-partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-72
Virtual I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-73
Virtual I/O example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-75
Capacity on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-77
Partitioning concepts summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-78
LPAR configuration process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-79
Where can I find more information on LPAR? . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-81
Topic 3: Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-82
Clustering: What is a cluster? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-83
Types of clusters (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-84
Types of clusters (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-85
Types of clusters (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-86
Types of clusters (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-87
Elements of a cluster (1 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-88
Elements of a cluster (2 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-89
Elements of a cluster (3 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-91
Elements of a cluster (4 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-92
Elements of a cluster (5 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-93
Clustering: Backup example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-94
Clustering: Topology example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-95
Where can I find more information on clustering? . . . . . . . . . . . . . . . . . . . . . . . . .9-97
Topic 4: Integration of IXA/IXS/xSeries server . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-98
IBM Power System with IBM i and Windows servers . . . . . . . . . . . . . . . . . . . . . . .9-99
Benefits of IBM Power Systems with IBM i/ Windows server integration . . . . . . .9-101
What are we integrating? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-103
Integrated xSeries server: I/O device sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-105
Typical IXS installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-107
IXA xSeries adapter: Disk access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-109
Shared devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-112
IBM Power Systems with IBM i SAN for Windows servers . . . . . . . . . . . . . . . . . .9-113
Microsoft Cluster Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-115
Environment flexibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-116
Hot spare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-117

xiv i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Solution for planned and unplanned IBM Power Systems with IBM i server outages
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-118
For more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-119
Topic 5: Additional topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-120
Alternate installation device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-121
Uninterruptible power supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-122
UPS: System values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-124
UPS: When power fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-126
UPS: Time line of QUPSDLYTIM function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-127
UPS: Power loss controlled shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-128
UPS: Power handling program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-129
Availability: Dual systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-130
Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-131
Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-132
Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-133
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-134

Unit 10. Disk management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Topic 1: Concepts and overview of auxiliary storage pools . . . . . . . . . . . . . . . . . 10-3
Types of disk pools (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Types of disk pools (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Disk pool groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8
System auxiliary storage pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9
ASP benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
System ASP (ASP1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-11
IBM Power Systems with IBM i Navigator: Storage System Values . . . . . . . . . . 10-13
User ASPs (ASP2-ASP32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-14
Additional ASP considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-16
Sample configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-17
Benefits of independent disk pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18
IASPs in a single system environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20
IASPs in a multisystem environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-21
Topic 2: Concepts and overview of device parity protection: RAID-5 and RAID-6
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-22
Device parity protection (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-23
Device parity protection (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-24
RAID-5 and RAID-6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
Device parity protection benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-28
Device parity protection on input/output adapters . . . . . . . . . . . . . . . . . . . . . . . . 10-29
Device parity protection limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-31
New disk protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-34
Topic 3: Concepts and overview of mirrored protection . . . . . . . . . . . . . . . . . . . 10-35
Mirrored protection: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-36
Mirroring definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-38
Mirrored protection: Benefits and considerations . . . . . . . . . . . . . . . . . . . . . . . . 10-39
Disk-level mirrored protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
IOA-level mirrored protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-44

© Copyright IBM Corp. 1995, 2012 Contents xv


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IOP-level mirrored protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-45


Bus-level mirrored protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-46
Remote DASD mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-47
Advantages and disadvantages of remote mirroring . . . . . . . . . . . . . . . . . . . . . .10-49
Mirroring performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-51
Concurrent maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-53
Mirrored protection planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-55
Mirrored failure scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-59
Mirroring versus device parity protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-60
Comparison of disk protection tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-62
Full disk protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-63
Partial disk protection: Multiple ASPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-65
Cross-site mirroring (XSM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-67
Cross-site mirroring: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-69
Cross-site mirroring considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-71
Topic 4: Disk configuration and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-73
Disk configuration and protection procedures . . . . . . . . . . . . . . . . . . . . . . . . . . .10-74
Recovery of disk failure or disk errors (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . .10-75
Recovery of disk failure or disk errors (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . .10-76
DASD management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-77
Application administration: Disk units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-79
Steps to allow Navigator users to access DST . . . . . . . . . . . . . . . . . . . . . . . . . . .10-81
Disk unit management: Sign-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-83
Disk properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-85
Disk properties: Status and Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-86
Disk properties: Physical Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-87
Adding Disk Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-88
Add Disk Unit wizard (1 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-89
Add Disk Unit wizard (2 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-90
Add Disk Unit wizard (3 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-91
Add Disk Unit wizard (4 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-92
Add Disk Unit wizard (5 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-93
Add Disk Unit wizard (6 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-94
Add Disk Unit wizard (7 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-95
Add Disk Unit wizard (8 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-96
Disk pool: Graphical view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-97
Disk pool properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-99
Disk pool properties: Threshold and Capacity . . . . . . . . . . . . . . . . . . . . . . . . . .10-100
Disk pool properties: Balance / Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-101
New Disk Pool wizard (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-102
New Disk Pool wizard (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-104
Independent disk pools (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-105
Independent disk pools (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-106
Topic 5: Abnormal system end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-107
Abnormal system end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-108
Restart after abnormal end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-110
Edit Rebuild of Access Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-113
Edit Check Pending Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-116

xvi i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-119


Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-120
Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-121
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-122

Unit 11. Backup and recovery strategy using save/restore . . . . . . . . . . . . . . . . . . 11-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
Topic 1: Overview of the save/restore capabilities . . . . . . . . . . . . . . . . . . . . . . . . 11-3
How important is save/restore? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Uses for the save and restore capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
Failures that can occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
Topic 2: Media used to back up your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7
Managing tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8
Tape and tape library system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10
Tape library: Operating modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12
IBM i Navigator: Manage tapes and tape libraries . . . . . . . . . . . . . . . . . . . . . . . 11-14
IBM Systems Director Navigator for i: Manage tapes and tape libraries (1 of 3) 11-16
IBM Systems Director Navigator for i: Manage tapes and tape libraries (2 of 3) 11-18
IBM Systems Director Navigator for i: Manage tapes and tape libraries (3 of 3) 11-20
Devices: Tapes and tape libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21
INZTAP: Initialize Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Virtual tape support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24
Virtual tape implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26
Create a virtual tape device description (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . 11-28
Create a virtual tape device description (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . 11-29
Create the image catalog for virtual tape support . . . . . . . . . . . . . . . . . . . . . . . . 11-30
Create image catalog through System i Navigator . . . . . . . . . . . . . . . . . . . . . . . 11-31
Create new virtual volume using WRKIMGCLG command or ADDIMGCLGE command
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-32
System i Navigator: Create new virtual volume . . . . . . . . . . . . . . . . . . . . . . . . . . 11-33
LODIMGCLG command (using WRKIMGCLG) . . . . . . . . . . . . . . . . . . . . . . . . . 11-36
Load Image Catalog (using IBM i Navigator) . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
Virtual tape actions by IBM Systems Director Navigator for i (1 of 2) . . . . . . . . . 11-38
Virtual tape actions by IBM Systems Director Navigator for i (2 of 2) . . . . . . . . . 11-39
Optical storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-40
Exercise: Media devices and virtual tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-43
Topic 3: Save operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-44
SAV commands and menu options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-45
Save menu (second screen) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-46
SAVE option 21: Entire system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-49
SAVE option 22: System data only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-50
SAVE option 23: All user data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-51
How the system performs save processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-52
Where to perform the save to? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-53
SAVLIB: Save Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-55
SAVOBJ: Save Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-57
SAVCHGOBJ: Save Changed Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-59
Backing up spooled file data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-61

© Copyright IBM Corp. 1995, 2012 Contents xvii


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

File systems: Save commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-63


SAVSYSINF command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-65
SAVSYSINF command considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-67
SAVSYSINF backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-68
Parameter: Save-while-active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-69
Save-while-active parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-70
Save-outage time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-72
Checkpoint processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-74
SAVF: Saving using a save file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-76
SAVF: Save File Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-78
Miscellaneous SAV commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-80
Using Operational Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-83
IBM i Navigator: Backup policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-84
Automatic default backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-85
Backup policies: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-86
Backup policies: What . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-87
Backup policies: When . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-89
Backup policies: Where . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-91
IBM i Navigator summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-92
IBM i Navigator BRMS options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-93
IBM Systems Director Navigator for i BRMS options . . . . . . . . . . . . . . . . . . . . . .11-94
Save tips and hints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-95
Topic 4: Restore operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-97
Relationship between save and restore commands . . . . . . . . . . . . . . . . . . . . . . .11-98
Restore overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-99
Restore menu (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-100
RESTORE option 21: System and user data . . . . . . . . . . . . . . . . . . . . . . . . . . .11-101
Restore menu (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-102
RESTORE option 22: System data only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-103
RESTORE option 23: All user data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-104
Restore menu (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-105
What happens when you restore data? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-106
Sequence for restoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-109
Putting your system in a restricted state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-110
Recovery from an unsuccessful restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-112
Special considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-114
Exercise: Save/restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-116
Topic 5: LPAR save/restore considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-117
Logical partitions: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-118
HMC: Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-121
HMC: Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-122
LPAR save considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-123
Saving LPARs: Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-124
LPAR restoring: Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-125
Restore for LPARs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-126
D: IPL of partition from HMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-127
Topic 6: Backup/recovery for Windows servers . . . . . . . . . . . . . . . . . . . . . . . . .11-129
Backup methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-130

xviii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Save method comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-132


Backup considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-133
Objects to save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-134
Network storage spaces backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-136
Device sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-137
Allocate a tape device to a Windows server . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-138
Reallocate a tape device to the IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-139
Backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-140
Displaying status of a Windows server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-141
Starting a Windows server (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-142
Starting a Windows server (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-143
Shutting down a Windows server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-144
Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-146
Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-147
Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-148
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-149

Unit 12. Journal management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Topic 1: Journal management concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Think about your most important data file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Single-level storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Journal objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Objects that can be journaled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7
Display Journal Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Display Journal Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10
F10 = Display only entry details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12
Topic 2: Steps to implement journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-13
Implementing journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-14
Step 1: CRTJRNRCV command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-16
Step 2: CRTJRN command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17
Step 3a: Access path command (STRJRNAP) . . . . . . . . . . . . . . . . . . . . . . . . . . 12-19
Step 3b: Library command (STRJRNLIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20
Step 3c: Object command (STRJRNOBJ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-21
Step 3d: Physical file command (STRJRNPF) . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22
Step 3e: IFS object command (STRJRN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-24
IBM System i Navigator: Start journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25
Save objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-27
Topic 3: Journal receiver considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28
Managing the receiver chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-29
System change journal management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31
Journal receiver chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-33
WRKJRNA command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-34
F15 = Work with Receiver Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-36
Topic 4: Determining the recovery points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-38
Determine the best recovery points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-39
Display Journal (1 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-40
Display Journal (2 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-42

© Copyright IBM Corp. 1995, 2012 Contents xix


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display Journal (3 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-43


Display Journal (4 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45
Display Journal (5 of 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-47
Journal codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-48
Recovery point example (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-49
Recovery point example (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-50
User-generated entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-51
Command to send a user entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-52
Topic 5: Performing a recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-54
Work with Journals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-55
Forward recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-57
Select option 2 to start forward recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-58
Authority prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-59
Forward recovery object type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-61
Work with Forward Recovery for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-62
Backout recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-64
Select option 3 to start backout recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-65
Authority prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-66
Backward recovery object type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-68
Work with Backout Recovery for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-69
APYJRNCHG command (forward recovery) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-71
RMVJRNCHG command (backout recovery) . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-73
Operations that cause incomplete recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-74
Illogical conditions that stop APYJRNCHG or RMVJRNCHG . . . . . . . . . . . . . . .12-76
Topic 6: Additional journaling topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-77
SAVCHGOBJ: Journaling considerations (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . .12-78
SAVCHGOBJ: Journaling considerations (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . .12-80
SAVCHGOBJ: Journaling considerations (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . .12-81
Which files should be journaled? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-82
How should files be assigned to journals? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-83
Should journal receivers be in a user ASP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-84
Restore considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-85
Other journal considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-86
File journaling summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-88
Exercise: Journal management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-89
Topic 7: Remote journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-90
Remote journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-91
Remote journal: Hot backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-92
Remote journal benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-95
How to add a remote journal (1 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-97
How to add a remote journal (2 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-98
How to add a remote journal (3 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-99
How to add a remote journal (4 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-100
How to add a remote journal (5 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-101
How to add a remote journal (6 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-102
Remote journal APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-104
New in V7R1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-106
Topic 8: Access path protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-108

xx i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Introduction to access path journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-109


Access path protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-110
Access path's contribution to IPL time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-111
Edit Rebuild of Access Paths: EDTRBDAP command . . . . . . . . . . . . . . . . . . . 12-114
Explicit access path journaling (protection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-116
System-managed access-path protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-118
SMAPP performance and auxiliary storage use . . . . . . . . . . . . . . . . . . . . . . . . 12-120
Edit Recovery for Access Paths (EDTRCYAP) . . . . . . . . . . . . . . . . . . . . . . . . . 12-121
New panel in V7R1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-124
SMAPP contribution to system performance (1 of 2) . . . . . . . . . . . . . . . . . . . . 12-125
SMAPP contribution to system performance (2 of 2) . . . . . . . . . . . . . . . . . . . . 12-126
SMAPP summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-127
Checkpoint (1 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-128
Checkpoint (2 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-129
Checkpoint (3 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-130
Checkpoint (4 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-131
Checkpoint (5 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-132
Checkpoint (6 of 6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-133
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-134

Unit 13. Commitment control: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
What is commitment control? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Why commitment control? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
Complex transactions with multiple users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5
Functions of commitment control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6
Commitment control: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7
Rollback event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9
Previous example with commitment control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-11
Commitment control requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12
Start Commitment Control (STRCMTCTL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-13
Record lock-level parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15
Notify object parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-17
When is the notify object updated? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-19
Commitment control implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20
Two-phase commit: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-21
Commitment control: Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-23
Enhancements to database savepoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-24
IASP considerations for commitment control . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-25
XA transaction support for commitment control . . . . . . . . . . . . . . . . . . . . . . . . . 13-28
IBM i Navigator: Support for commitment control (1 of 6) . . . . . . . . . . . . . . . . . . 13-30
IBM i Navigator: Support for commitment control (2 of 6) . . . . . . . . . . . . . . . . . . 13-31
IBM i Navigator: Support for commitment control (3 of 6) . . . . . . . . . . . . . . . . . . 13-32
IBM i Navigator: Support for commitment control (4 of 6) . . . . . . . . . . . . . . . . . . 13-33
IBM i Navigator: Support for commitment control (5 of 6) . . . . . . . . . . . . . . . . . . 13-34
IBM i Navigator: Support for commitment control (6 of 6) . . . . . . . . . . . . . . . . . . 13-35
Exercise: Commitment control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-36
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-37

© Copyright IBM Corp. 1995, 2012 Contents xxi


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-38

Unit 14. Backup and recovery planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-2
Topic 1: The environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-3
Balance costs of backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-4
Can your business still function? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-5
Backup and recovery plan evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-6
What to save and how often? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-7
Save window/save strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-10
Simple save strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-12
Medium save strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-14
Complex save strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-15
Availability options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-17
Availability options by failure type: Recovery time . . . . . . . . . . . . . . . . . . . . . . . .14-20
Availability options by failure type: Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . .14-21
Topic 2: Creating a disaster recovery plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-22
Disaster recovery plan: Major goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-23
Disaster recovery plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-24
Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-45
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-46

Unit 15. Problem determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-2
Topic 1: Problem determination concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-3
Problem determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-4
Problem determination process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-5
Classification of symptoms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-6
Problem solving tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-8
SG24-8253: Diagnostic tools Redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-10
Topic 2: Problem determination using 5250 emulation . . . . . . . . . . . . . . . . . . . . .15-12
Work with Active Jobs command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-13
Work with Active Jobs screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-14
Work with Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-15
Option 3: Display Job Run Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-16
Option 10: Job log or DSPJOBLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-17
Ending a job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-18
End Job Abnormal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-19
Display system operator messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-20
History log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-21
Problem analysis: History log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-22
DSPLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-23
DSPLOG QHST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-24
Saving and deleting history logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-25
Copy screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-26
Topic 3: Problem determination using IBM i Navigator . . . . . . . . . . . . . . . . . . . . .15-27
Active Jobs: Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-28
Active Jobs: Job Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-29

xxii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TOC Active Jobs: Elapsed Performance Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-30


Job properties: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-31
Job properties: Performance and Printer Output . . . . . . . . . . . . . . . . . . . . . . . . . 15-32
Job properties: Messages and Job Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-33
Job properties: Server and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-34
Job properties: Date/Time and International . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-35
Job properties: Threads, Resources, and Other . . . . . . . . . . . . . . . . . . . . . . . . . 15-36
End a job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-37
End Job Abnormal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-38
Active Pools: Performance statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-39
System operator messages (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-40
System operator messages (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-41
Topic 4: Using the power off switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-42
Why use the power switch? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-43
Power down initiation using power push button or power switch . . . . . . . . . . . . 15-44
What can I do to help minimize problems? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-45
Topic 5: System cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-46
Cleaning up your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-47
Automatic cleanup (Operational Assistant) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-48
Tailoring automatic cleanup (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-49
Tailoring automatic cleanup (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-50
Tailoring automatic cleanup (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-51
Reorganize file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-52
Reorganize file or table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-53
Clear Save File (CRLSAVF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-54
Reclaim Storage (RCLSTG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-55
RCLSTG command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-56
After running RCLSTG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-58
Web sites for more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-59
Exercise: Problem determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-60
Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-61
Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-62
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-63

Unit 16. Introduction to Backup Recovery and Media Services. . . . . . . . . . . . . . . 16-1


Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2
Topic 1: Overview of BRMS functions and features . . . . . . . . . . . . . . . . . . . . . . . 16-3
Backup Recovery and Media Services (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4
Backup Recovery and Media Services (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5
Backup Recovery and Media Services (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7
Backup Recovery and Media Services (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-9
BRMS: Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-10
Supported tape systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11
FlashCopy support: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-12
BRMS main menu (GO BRMS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-14
Media management (WRKMEDBRM) (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . 16-15
Media management (WRKMEDBRM) (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16
Media information (WRKMEDIBRM) (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-17

© Copyright IBM Corp. 1995, 2012 Contents xxiii


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Media information (WRKMEDIBRM) (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-18


Backup control groups (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-19
Backup control groups (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-20
Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-21
Recovery with WRKMEDIBRM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-22
Archive (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-23
Archive (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-24
Archive (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-25
Archive (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-26
Advanced functions: HSM (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-27
Advanced functions: HSM (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-28
TSM application client to BRMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-29
Topic 2: Overview of IBM i Navigator and BRMS . . . . . . . . . . . . . . . . . . . . . . . . .16-31
IBM i Navigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-32
BRMS GUI V6R1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-33
BRMS GUI IBM i 7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-34
BRMS functions by release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-35
BRMS and GUI FAQs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-36
Topic 3: Additional reference material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-37
BRMS Internet home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-38
BRMS: Product Information link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-39
Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-40
Additional Internet sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-41
Where can I get education? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-42
Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-43
Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-44
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-45

Appendix A. Checkpoint solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1

Appendix B. Security tips and checklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1

Appendix C. Sample security tools reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1

Appendix D. Task list for new administration and control . . . . . . . . . . . . . . . . . . . D-1

xxiv i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
Active Memory™ AIX 5L™ AIX®
AS/400® BladeCenter® C/400®
DB™ DB2 Universal Database™ DB2®
Distributed Relational Domino® DRDA®
Database Architecture™
Electronic Service Agent™ EnergyScale™ eServer™
FlashCopy® Focal Point™ Initiate®
iSeries® i5/OS™ i5/OS®
Lotus® Micro-Partitioning® Notes®
OfficeVision® Operating System/400® POWER Hypervisor™
Power Systems™ POWER® PowerPC®
PowerVM™ POWER4™ POWER5™
POWER6® POWER7® Rational Team Concert™
Rational® Redbooks® RPG/400®
ServerProven® Service Director™ System i®
System p® System Storage® System x®
System z® Tivoli® WebSphere®
xSeries® z/OS® 400®
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
IA® is a trademark or registered trademark of Cast Iron Systems, Inc. (or its affiliates), an
IBM Company.

© Copyright IBM Corp. 1995, 2012 Trademarks xxv


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Other product and service names might be trademarks of IBM or other companies.

xxvi i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

pref Course description


IBM i System Administration

Duration: 4.5 days

Purpose
This course explains how to plan for, implement, and manage the
ongoing operations of the Power System with IBM i. Emphasis is on
security, system availability, backup and recovery, system software
management, and problem determination. You are also introduced to
the architecture and terminology of IBM i and the Power Systems with
IBM i.

Audience
This course is designed for IT managers and their staff who are
responsible for:
• Designing and implementing a security plan
• Implementing a backup and recovery plan
• Implementing a system availability plan
• Performing problem determination procedures and activities
This course is not recommended for system operators or end users.

Prerequisites
Before attending this course, students should:
• Attend the System Operator Workshop for System i (AS24 -
classroom / OV24 - ILO (Instructor Lead Online)) or have the
equivalent knowledge and experience on the system
• Have a basic understanding of security concepts on the Power
System with IBM i
• Have a working knowledge of how to perform backup and recovery
activities on the system

Objectives
After attending this class, the student should be able to:

© Copyright IBM Corp. 1995, 2012 Course description xxvii


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Describe the features, functions, and benefits of the Power System


with IBM i relevant to security
• Describe the security requirements for your Power System with
IBM i
• Identify the system security features that satisfy your requirements
• Describe and implement the features and facilities of the Power
System with IBM i available to audit security
• List the elements of a security plan
• Describe the features, functions, and benefits of the Power
Systems with IBM i relevant to availability and recovery
• List the elements of a security plan and a backup and recovery
plan
• Describe Power Systems with IBM i problem determination and
resolution techniques
• Perform these activities using either a green screen 5250
emulation session (through command line entry), by using System i
Navigator, or the IBM Systems Director Navigator

Curriculum relationship
This course can be substituted by attending two other courses:
• IBM i Security Concepts and Implementation (OL50/OV50)
• IBM i Recovery and Availability Management (OL51/OV51)

xxviii i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

pref Agenda
Day 1
Welcome, course administration, introductions, lab setup
Unit 1: IBM i overview and concepts
Lab 1: Establishing a user environment
Unit 2: Management Central overview
Lab 2: Management Central inventory and system values
Unit 3: Security concepts and overview
Unit 4: Security-related system values
Unit 5: User security - Topic 1
Lab 3: Working with user profiles

Day 2
Unit 5: User security - Topic 2
Lab 4: Working with group profiles
Unit 5: User security - Topics 3 - 4
Unit 6: Resource security - Topics 1 - 3
Lab 5: Working with authorization lists
Unit 6: Resource security - Topics 4 - 5
Lab 6: Working with object authority and adopted authority
Unit 7: Security auditing
Unit 8: Designing security

Day 3
Unit 9: IBM Power Systems with IBM i: Availability overview
Unit 10: Disk management
Unit 11: Backup and recovery strategy using save/restore - Topics 1 - 2
Lab 7: Media devices and virtual tape
Unit 11: Backup and recovery strategy using save/restore - Topics 3 - 4

Day 4
Lab 8: Save/restore
Unit 11: Backup and recovery strategy using save/restore - Topics 5 - 6
Unit 12: Journal management - Topics 1 - 6
Lab 9: Journal management
Unit 12: Journal management -Topics 7 - 8
Unit 13: Commitment control overview
Lab 10: Commitment control
Unit 14: Backup and recovery planning

© Copyright IBM Corp. 1995, 2012 Agenda xxix


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Day 5
Unit 15: Problem determination
Lab 11: Problem determination
Unit 16: Introduction to Backup Recovery and Media Services

xxx i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 1. IBM i overview and concepts

What this unit is about


This unit introduces the basic concepts of the IBM Power Systems
with IBM i. This material is a review of some of the basic concepts that
are taught in the prerequisite course, System Operator Workshop for
IBM i V7.

What you should be able to do


After completing this unit, you should be able to:
• Describe the IBM Power Systems with IBM i architecture
• Describe what objects are on IBM i
• Explain the syntax of IBM i control language (CL) commands
• Explain the concepts of libraries, library list, and jobs
• Explain the concepts of printing on IBM i
• Explain the device description and creation process

How you will check your progress


• Checkpoint questions
• Lab exercise

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe the IBM Power Systems with IBM i architecture
• Describe what objects are on the IBM i
• Explain the syntax of IBM i control language (CL) commands
• Explain the concepts of libraries, library list, and jobs
• Explain the concepts of printing on the IBM i
• Explain the device description and creation process

© Copyright IBM Corporation 2012

Figure 1-1. Unit objectives OL1914.1

Notes:

1-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Power Systems with IBM i: Integrated by design


IBM i

Traditional systems IBM POWER Systems with IBM i


IBM i
• Higher-level functions exposed to users and
Directory applications based on SLIC services
Backup and • Graphical user interface
recovery • Vast range of high-level language functions
(C/C++, RPG, COBOL)
on s
unicati
Comm Technology-independent machine interface
Online transaction
processing System licensed internal code
Security • Process control
• Resource management
Sys • Integrated SQL-compliant database
Relational man tems • Security enforcement
agem
database Java ent • Network communications
• File systems
• Storage management
• Java virtual machine (JVM)
Operating system • Other primitives

Hardware and microcode 64-bit POWER5+, POWER6, POWER7

© Copyright IBM Corporation 2012

Figure 1-2. Power Systems with IBM i: Integrated by design OL1914.1

Notes:
Many functions that have traditionally been performed by system control programs or
add-on programs are integrated into the system licensed internal code (SLIC) so that they
can be performed more efficiently. SLIC and i together provide efficient use of system
hardware resources.
This architectural feature is known as the technology-independent machine interface
(TIMI).

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Technology-independent machine interface


IBM i

Programs

TIMI

SLIC

64-bit RISC hardware

© Copyright IBM Corporation 2012

Figure 1-3. Technology-independent machine interface OL1914.1

Notes:
IBM Power Systems with IBM i are atypical in that they are defined by software, not by
hardware. When a program presents instructions to the machine interface for execution, it
thinks that the interface is the system hardware, but it is not. The instructions presented to
TIMI pass through a layer of microcode before they are understood by the hardware itself.
TIMI and SLIC allow Power Systems with IBM i to take technology in stride. New
architectural features can be used to fully accommodate post reduced instruction set
computer (RISC) technologies, which might incorporate 96-bit or 128-bit processors or
shifts to different processor technologies.

1-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

POWER Hypervisor
IBM i

Programs Programs Programs


i AIX 5L Linux

TIMI

SLIC OF / RTAS OF / RTAS

POWER Hypervisor

64-bit RISC hardware

© Copyright IBM Corporation 2012

Figure 1-4. POWER Hypervisor OL1914.1

Notes:
IBM Power Systems with IBM i work with a different structure when compared to the
previous technologies used with AS/400 and iSeries servers. Above the POWER5
technology-based hardware is a code layer called the POWER Hypervisor. This code is
part of the firmware shipped with the Power Systems with IBM i hardware. The POWER
Hypervisor resides in flash memory on the Service Processor. This firmware performs the
initialization and configuration of the Power Systems with IBM i hardware, as well as the
virtualization support required to run up to 254 partitions concurrently on the IBM Power
Systems with IBM i. Partition Licensed Internal Code (PLIC) allows for management of
multiple partitions of the Power Systems with IBM i hardware. It is included as part of the
POWER Hypervisor.
The layers above the POWER Hypervisor are different for each supported operating
system. The layers of code supporting Linux and AIX 5L consist of system firmware and
Run Time Abstraction Services (RTAS).

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Innovative IBM i technology


IBM i

© Copyright IBM Corporation 2012

Figure 1-5. Innovative IBM i technology OL1914.1

Notes:
We have had innovative technology built into IBM i throughout its life cycle. Here are some
aspects of this technology. These are the things that make our operating system better
than the other operating systems out there.
Innovative IBM i technology includes single level storage, object-based architecture,
operating system integration, work management and a technology independent machine
interface.

1-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Power Systems with IBM i expand rich heritage


IBM i

A technology-friendly architecture supporting continuous innovation without disruption


AS/400e iSeries eServer i5

AS/400

System i

© Copyright IBM Corporation 2012

Figure 1-6. Power Systems with IBM i expand rich heritage OL1914.1

Notes:
Twenty years ago, IBM introduced the AS/400, bringing together two of IBM's most
successful platforms of the time: S/36 and S/38. It was the first of a new generation of
servers with a revolutionary virtualized operating system. It allowed companies to simply
write business applications that used its integrated database.
In 1995, we moved to 64-bit technology; then, in 2000, we delivered Linux for POWER,
extending the platform to open applications. In 2004, we delivered POWER5 and support
for AIX. Finally, in 2007, we began our rollout of POWER6 with the Power 570.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The IBM Power Systems family


IBM i

Innovative, proven technology providing platform choice to


match unique business needs

BladeCenter
Simplify data center
complexity.

System z
The flagship for IBM
Systems innovation and the
heart of a highly secure,
resilient and integrated
infrastructure.
IBM Power Systems
Install faster, maintain easier.
Get the power to do more,
spend less.
System x
Innovation comes standard. System Storage
Connected. Protected. Complete.

© Copyright IBM Corporation 2012

Figure 1-7. The IBM Power Systems family OL1914.1

Notes:
All of IBM's systems and storage, along with the microelectronics upon which they are built,
are part of the same group today; the same management structure. The best of IBM's
technology is freely shared among all of the product lines. As a result, we have the most
comprehensive and competitive systems and storage products in the industry today.
Although many common technologies are shared among the various products, each
remains distinct in the markets they serve. Each grew out of separate beginnings.
• System z is the class if the industry in mainframes.
• BladeCenter leads the industry in its category, and System x, our Intel-based offering, is
gaining share against Dell and HP.
• System p leads the industry for UNIX-based servers.
• System Storage has forged ahead with storage virtualization technologies.
Power Systems with IBM i are in a class by themselves. Their beginnings (their roots) are
in business computing. It does not require the technical expertise of a mainframe, though it
functions with mainframe characteristics. Its roots are not in personal computing, where

1-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Intel-based solutions began, nor are they in engineering or scientific computing, where
UNIX-based solutions began.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The Power Systems with IBM i product line


IBM i

780
8-64 way

770
8-64 way

755
1-4 way

750
1-4 way Mid-sized to large
enterprises

Small to mid-sized
enterprises
All models also support integration with System x
and BladeCenter running Windows or Linux.

© Copyright IBM Corporation 2012

Figure 1-8. The Power Systems with IBM i product line OL1914.1

Notes:
In 2000, we delivered Linux for POWER, extending the platform to open applications.
Then, in 2004, we delivered POWER5 and support for AIX. Step by step, we are moving
away from a platform that many consider exemplifies unique and proprietary, to one that is
mainstream and based on open technology.
In 2007, we began our rollout of POWER6 with the 570.
In 2009, we began our rollout of POWER7.

1-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

CPU models
IBM i
• System i models
– Machine type (xxxx)
• 9402, 9404, 9406, Power Systems
with IBM i
– Model (aaa)
• Bxx, Cxx, Dxx,
• Exx, Fxx, 3xx, 5xx, 6xx
• nnS, Sxx, 150, 170
• 250, 270, 7xx, 8xx
• i825, i830, i840,
• i870, i890
• 515, 520, 525, 550, 570, 596, POWER6 (520, 570, 595)
• POWER7 (710, 720, 730, 740, 750, 755, 770, 780, 795)
• Each with different throughput
– Capacities
• Measured by commercial processing workload (CPW) 1995 2006
1995 2010
– Largest CPW is 399.200 on model 795
Cobra
Cobra POWER 7
• Processor architecture
– Speeds of up to 4.25 GHz Transistor count 4.7M 1,2B
– Cache size (level-1, 2, 3) Frequency 50 MHz Up to 4.25 GHz
– Parallel threads management Logical partitions None Up to 1000

© Copyright IBM Corporation 2012

Figure 1-9. CPU models OL1914.1

Notes:
Processor CPW: The commercial processing workload (CPW) represents maximum
relative performance running commercial processing workloads for a processor
configuration. Use this value to compare relative performance between models with the
same or different number of processors.
5250 CPW: This represents the relative performance available to perform 5250 online
transaction processing (OLTP) (interactive) workloads.
EnergyScale technology allows POWER7 processors to operate at a higher frequency for
increased performance and, consequently, more performance per watt. Alternatively, if
workloads permit, the processor clock frequency can be dramatically reduced to save
energy while maintaining required application performance.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Single-level storage
IBM i

Virtual address space with objects


PROGRAM DATA DATA PROGRAM DATA PROGRAM

PROGRAM PROGRAM DATA DATA DATA

DATA PROGRAM DATA PROGRAM DATA


JOB QUEUE OUTPUT QUEUE
PROGRAM DATA
USER PROFILE LIBRARY

Main Auxiliary
storage storage

© Copyright IBM Corporation 2012

Figure 1-10. Single-level storage OL1914.1

Notes:
All system storage (whether main storage or disk storage) is addressed in the same way.
This single, device-independent addressing mechanism means that objects are referred to
by name or name and library, never by disk location. All objects are created as if they
reside in a 18,446,744,000,000,000,000-byte address space. That is 18.4 quintillion bytes!
The IBM i's virtual addressing is independent of an object's physical location and also the
type, capacity, and number of disk units on the system.
What this means is that application programs do not require modification in order to take
advantage of new storage technologies. Users can leave all storage management entirely
to the machine.

1-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Power Systems with IBM i devices


IBM i

Input Process Output

Processing
unit

© Copyright IBM Corporation 2012

Figure 1-11. Power Systems with IBM i devices OL1914.1

Notes:
The following devices can be attached to your Power Systems with IBM i:
• Printers
• Workstations
• Tape units
• CD-ROMs
• Remote controllers
• Personal computers (PCs)
Your system receives data (input) from several devices including each workstation, disk,
tape, and CD-ROM attached to the system. The processing unit (which is contained in the
system unit) processes the data (that is, it performs operations on the input, such as adding
numbers together or comparing two values to determine if they are the same). The IBM i
then saves the data (output) to disk or tape, or it sends the output to a printer or
workstation.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Sample configuration
IBM i

IBM Power System SDLC


(Montreal) communications
line

Workstation
controller LAN adapter Tape unit Diskette unit CD-ROM unit

Console Order entry


Ethernet Shipping and receiving Modem
Display
Display Display Display Controller
Paris

Accounting Display

Display
Printer Printer

Printer Printer
© Copyright IBM Corporation 2012

Figure 1-12. Sample configuration OL1914.1

Notes:
This visual shows a sample Power System with IBM i configuration, which is the physical
and logical arrangement of devices and programs that make up a data processing system.
This configuration is simple so that it can be easily understood and read. Every Power
System with IBM i configuration varies depending on the needs of the business.

1-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Software overview
IBM i

Application
support

Programming
support

IIBM
BM i

Licensed internal
code

© Copyright IBM Corporation 2012

Figure 1-13. Software overview OL1914.1

Notes:
In addition to knowing which devices are attached to your system and how to operate them,
you should also be familiar with your system software (or programs). A program contains a
set of instructions that allows you to perform one or more related tasks.
There are four primary categories of programs in the IBM i which build on each other.
These are illustrated in the graphic in the visual, and they are (from top to bottom) the
application support, the programming support, IBM i (operating system), and finally, the
Licensed internal code (LIC).

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Licensed internal code


IBM i

Licensed internal code (LIC) is


a group of programs located in
storage that allow IBM i to run
on different processor models.

© Copyright IBM Corporation 2012

Figure 1-14. Licensed internal code OL1914.1

Notes:
Licensed internal code (LIC) is provided by IBM and is preinstalled on your Power Systems
with IBM i before the system is shipped.

1-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Operating system IBM i (1 of 2)


IBM i

• Operating system (5770-SS1)


• Previously called OS/400 and i5/OS
• Currently named IBM i (at V7R1, V6R1, and V5R4)
– Database management system
• DB2 for i
– Support for applications native to other operating systems
• UNIX application programming interfaces (APIs)
– Provide conformity to many UNIX standards
• Portable Application Solutions Environment (PASE)
– AIX-based applications
– AIX support
• Guest operating system
– Integrated xSeries server
• Intel-based applications
– Linux support
• Guest operating system

© Copyright IBM Corporation 2012

Figure 1-15. Operating system IBM i (1 of 2) OL1914.1

Notes:
You can think of IBM i as the brain of the Power Systems with IBM i. It is a group of system
programs that control the overall operation of the Power System with IBM i. For example,
IBM i allows multiple interactive and batch jobs to run concurrently. It provides the interface
which allows operator control of those jobs and allows security to be set up on your system.
i is provided by IBM and comes preinstalled on your Power System with IBM i.
Although not all IBM i functions are needed in every installation, the full range of functions
is available on every Power System with IBM i.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Operating system IBM i (2 of 2)


IBM i

• System resource management


– Processors
– Memory
– Disk
• System control interface
– CL support
• High-level programming language
– System or user-written commands
• Integrated support for:
– Security
– Communications
• Systems Network Architecture (SNA), Transmission Control Protocol/Internet Protocol (TCP/IP)
• Windows Network Neighborhood support
• HTTP/Apache and so forth
– System management
• System-managed access-path protection (SMAPP)
• System i Navigator
– Management Central
– Director Navigator for i

© Copyright IBM Corporation 2012

Figure 1-16. Operating system IBM i (2 of 2) OL1914.1

Notes:

1-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Programming support
IBM i

Java

ILE ILE
RPG C

HATS ILE
COBOL

Rational WebFacing
Developer for
Power Systems
SQL

© Copyright IBM Corporation 2012

Figure 1-17. Programming support OL1914.1

Notes:
In addition to languages, such as Java, ILE RPG, ILE C, and ILE COBOL, there are tools
that assist you with the edit of source programs, the design of screen displays and menus,
and the deployment of web-based applications.
The Rational Developer for Power Systems software product consists of the following
workstation tools:
• Source editing support for RPG, COBOL and DDS
• Remote access to files, members, objects, libraries and IFS files on the Power System
with IBM i
• Integration with Rational Team Concert for source control and collaborative application
development
• Debugging support for threads and variable changing and monitoring
• WebFacing
• Host Access Transformation Services (HATS)

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Application software
IBM i

• Traditional applications
– Workload
• Interactive, character-based (5250 or green screen)
– Interactive capacity (ICPW)
• Batch (no ongoing user interaction)
– Total capacity (CPW)
– Support through specific IBM i jobs
• Application users are IBM i users
– More detail covered in the work management unit
• Client/server applications
– Workload
• Information processing
– Interactive
– Batch
• Database serving
– Native IBM i server applications
– Third-party, pre-written server applications
• Interaction with IBM i jobs
– Application users might or might not be known to IBM i
> For example, SAP R/3: Specific users known only to the application
> For example, BaanERP: Specific users known to IBM Power Systems with IBM i

© Copyright IBM Corporation 2012

Figure 1-18. Application software OL1914.1

Notes:

1-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display installed software on a system


IBM i

© Copyright IBM Corporation 2012

Figure 1-19. Display installed software on a system OL1914.1

Notes:
To see a listing of the IBM licensed program products (LPP) installed on a system, you can
use both a 5250 green screen interface or the System i Navigator.
To display this information using a 5250 emulation session, issue the command Go
LICPGM, and then select option 10, (Display installed software). The command that is
being called by this menu option is Display Software Resources (DSPSFWRSC).
To display this information using System i Navigator:
1. Expand the system folder under My Connections.
2. Expand Configuration and Service.
3. Expand Software.
4. Click Installed Products.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

CL command structure
IBM i

Command name Parameter

CRTLIB LIB(PAYLIB)
Action Item Keyword Value
abbrev.

© Copyright IBM Corporation 2012

Figure 1-20. CL command structure OL1914.1

Notes:
All IBM i functions are controlled with a single language called control language (CL). CL
commands have a special structure and parameters to tell the system how to perform
requested functions.
Individual commands can be executed on the command line, within a job stream or a
program, and in any type of job by anyone authorized to use a command. Even when a
menu option is used to perform a system function, one or more CL commands are
executed by IBM i. There are over 1200 commands available on the Power Systems with
IBM i.
Each command consists of a command name followed by zero, one, or several (up to 75)
optional parameters.
• A command name consists of two abbreviated parts: an action and an object on which
the action is performed.
• A parameter also has two parts: a keyword followed by a value in parentheses.

1-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Commands can be entered from the command line, through the command entry display, or
by a program.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Library
IBM i

Object name Type Location


FILEC *FILE ##
PROGA *PGM @@
DSPJOB *CMD %%

PROGA
FILEC

DSPJOB

© Copyright IBM Corporation 2012

Figure 1-21. Library OL1914.1

Notes:
A library is a special type of object which contains a named set of objects and is used to
group objects. Basically, it is a directory to other objects. It is not an allocation of space as
on some other systems.
The only way an object can be located and used is through the library which points to it.
The objects to which a library points are not physically in the library. In fact, they are not
necessarily stored next to one another (contiguously) on disk.
There are many libraries on the IBM i. Objects are normally organized by library (either by
IBM or the administrator) based upon their relationship to one another. Here are some
examples of how objects can be organized:
• For security
• For backup
• By application
• By owner
• By object type (program versus files)
• By use (production versus test)

1-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object identification (1 of 2)
IBM i

Library, name, type

Library
QSYS

Library Library
PAYROLL OPRLIB

Program File File File


MASTER MASTER MASTER ACCOUNTS

© Copyright IBM Corporation 2012

Figure 1-22. Object identification (1 of 2) OL1914.1

Notes:
Every IBM i object has a name, occupies storage, and is stored within a library. Each object
can be created and deleted with CL commands. There are many types of objects on the
system. Each object type has its own identifier.
IBM i uses the object name plus the library name plus the object type to uniquely identify
objects on the Power System with IBM i. The graphic in the visual demonstrates this. There
are two objects named MASTER in library PAYROLL. One is a program (*PGM) and the
other is a file (*FILE).
A library is an object used to group related objects and to find objects by name. Thus, a
library is a directory to a group of objects.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Object identification (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 1-23. Object identification (2 of 2) OL1914.1

Notes:
The screen captures in the visual show the name, type, properties, and other
characteristics of each object.
When using a 5250 emulation screen, you can use the WRKLIB command to display the
information.
The alternative is to use the System i Navigator interface. The QSYS.LIB file system
supports the Power Systems with IBM i server library structure. This file system gives you
access to database files and all of the other IBM i object types that the library support
manages within the system and basic user auxiliary storage pools (ASPs).

1-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Simple name versus qualified name


IBM i

Simple name: PGM1

versus

Qualified name: LIB1/PGM1


Library Object
name name

© Copyright IBM Corporation 2012

Figure 1-24. Simple name versus qualified name OL1914.1

Notes:
When an object is referred to simply by its name, the system uses the library list to locate
the object.
When an object is qualified, by also using the library name, the system is able to go directly
to the object without searching the library list.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Library list
IBM i

System libraries QSYS *LIBL


QSYS2
(15 maximum)
QHLPSYS
QUSRSYS

Product libraries QRPGLE


QCBLLE

Current library PAYLIB


*CURLIB *USRLIBL
QGPL
User libraries QTEMP
(250 maximum) PAYTSTLIB

One associated with every job

© Copyright IBM Corporation 2012

Figure 1-25. Library list OL1914.1

Notes:
The IBM i uses a library list to find the files and programs you need when you run
applications. The library list is a list of libraries that the system searches sequentially for
objects needed by the user. It has two parts: the system portion and the user portion.
The system portion is specified in the QSYSLIBL system value. The system portion is used
for i libraries. The default for this system value does not need to be changed.
The user portion is provided by the QUSRLIBL system value, the initial library list specified
in the user's job description, or commands after the user is signed on. If you have an initial
library list, it overrides the QUSRLIBL system value. Application libraries should be
included in the user portion of the library list.

1-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Your job's library list is built at sign-on


IBM i

}
QSYSLIBL QSYS
QSYS2 System
QSYS
QSYS2
QHLPSYS
QUSRSYS
} QHLPSYS
QUSRSYS
part

Program

} product
part
QUSRLIBL FREDLIB Current
USER PROFILE
library
QGPL
QTEMP } CURLIB(FREDLIB)

}
QGPL User
1 2
QTEMP part
Job Descr INLLIBL
PAYLIB

}
QGPL SIGN ON
QTEMP
PAYLIB CURRENT LIBRARY FREDLIB

1 The job description can override system value QUSRLIBL


2 Value entered on Sign On panel overrides value in profile

© Copyright IBM Corporation 2012

Figure 1-26. Your job's library list is built at sign-on OL1914.1

Notes:
The library list is not a permanent structure. A library list is built for a job when it starts and
is deleted at end of job (EOJ).

Note

A job is any piece of work accomplished on the Power System with IBM i.

Your library list can be modified after sign-on through the use of CL commands:
CHGSYSLIBL (Change System Library List) Changes the system libraries
CHGCURLIB (Change Current Library) Changes the current library
ADDLIBLE (Add Library List Entry) Changes the user libraries
RMVLIBLE (Remove Library List Entry) Changes the user libraries
CHGLIBL (Change Library List) Changes the user libraries
EDTLIBL (Edit Library List) Changes the user libraries

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Finding an object
IBM i

Simple name: CALL PAY02


Qualified name: CALL PAYTSTLIB/PAY02

QSYS INQLIB Job's library list

QCWW QCXXX PAY77 AP60 QSYS


QSYS2 System libraries
QHLPSYS
QCZZZ QCYYY PAY99 AP55 QUSRSYS

QRPG Product libraries


QCBL
PAYTSTLIB PAYLIB Current library
PAYLIB
AP55 PAY02 PAY01 PAY04
QGPL User libraries
QTEMP
PAY01 AP05 PAY02 PAY05 PAYTSTLIB
INQLIB

© Copyright IBM Corporation 2012

Figure 1-27. Finding an object OL1914.1

Notes:
Which copy of the program PAY02 is run when it is called using the simple name?
This graphic illustrates how a library list dictates the system's search for objects. Program
object PAY02 from the PAYLIB library would be executed instead of PAY02 from the
PAYTSTLIB library because of the sequence of the libraries in the library list.

1-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Types of jobs
IBM i

Job: A unit of work to be done by the system

User jobs
Interactive
System jobs
Batch Autostart
Spooling
Communication

Qualified job name: Consists of the following three parts:


Job number User name Job name
003945 / SMITH / PRTINV

© Copyright IBM Corporation 2012

Figure 1-28. Types of jobs OL1914.1

Notes:
A job is the basic unit of work on the system. Every job has a unique name, made up of a
system assigned sequential number, the name of the user running the job, and a
user-assigned job name.
Spooling jobs are system-provided print programs (writers) that run similar to batch jobs
and print-spooled printer output. Using work management, you can control these writers.
Interactive jobs are workstation jobs, started when an operator signs on the workstation
display and ended when the user signs off the workstation display.
Traditionally, batch jobs are run by submitting requests for processing of data by programs
that do not need to interact with the user. These requests are placed on a job queue and
run when system resources become available.
Communication jobs are those which are started by a request made over a communication
line from another system.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Autostart jobs are specified to start automatically when their associated subsystem is
started. Autostart jobs typically do such things as set up or clean up after an application,
perform backups of data files, start devices, or vary on or off communication lines.
Every job on the Power System with IBM i must be associated with a job description.

1-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Starting and ending a job


IBM i

Job type Start End


Interactive Sign-on Sign off
Batch Placed on jobq EOJ
Autostart Start subsystem EOJ
Request from remote Same as batch or
Communication
system interactive
Spooling Start writer command End writer command

© Copyright IBM Corporation 2012

Figure 1-29. Starting and ending a job OL1914.1

Notes:
Different types of jobs start and end in different ways.
Each time a user signs on to a workstation, a new interactive job begins. That job continues
until the user signs off.
A batch job begins when the job leaves the job queue.
An autostart job begins when its associated subsystem is started and ends when the job
ends.
A communication job begins with a request from a remote system and, depending upon
whether it is an interactive or batch job, ends when the user signs off or the job ends.
A spooling job begins when the printer writer is started and ends when the printer is ended.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Job control summary


IBM i

SBMJOB

JOBQ
BATCH

OUTQ WRITER PRINTER

INTERACTIVE

CALL
WRKJOBQ WRKACTJOB WRKOUTQ WRKWTR
WRKSPLF

WRKUSRJOB
WRKSBMJOB

or
System i Navigator
© Copyright IBM Corporation 2012

Figure 1-30. Job control summary OL1914.1

Notes:
On this visual, the term job means user jobs, active batch and interactive jobs, jobs on job
queues, and jobs on output queues. After a job has started, you can locate that job, monitor
its status and activity, and change the way it processes, as well as change some of its
printing characteristics now and in the future.

1-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Job properties (1 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 1-31. Job properties (1 of 2) OL1914.1

Notes:
Job attributes from the job description and user profile appear in a job's properties. To view
this information follow these steps:
1. Expand the system you want to explore.
2. Expand Work Management.
3. Click Active Jobs.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Job properties (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 1-32. Job properties (2 of 2) OL1914.1

Notes:
The details of specific jobs can be found on the following tabs:
• General: The job description name being used by the job and the subsystem that is
controlling it
• Performance: The memory pool that the job is using and job performance statistics
• Printer Output: Properties that affect the printed output of the job (these can be viewed
or changed)
• Messages: List of messages sent to and from this job that are to be handled
• Job Log: Information detail to be kept for the job
• Server: Information about server jobs
• Security: User profile for the job
• Date/Time: Settings related to system time (these can be viewed or edited)

1-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • International: Properties that relate to text, character format, and language associated
with the job (these can be viewed or changed)
• Threads: Properties that relate to threads for a currently active job or one that is in a job
queue (these can be viewed or changed)
• Resources: Information about system resources, such as memory pool and disk pool
group information for the job, as well as information on memory and processor affinity
• Other: Properties that relate to the accounting code, DDM connections, and switch
settings (these can be viewed or changed)

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

What is a job description?


IBM i

© Copyright IBM Corporation 2012

Figure 1-33. What is a job description? OL1914.1

Notes:
A job description is an object that contains a set of information (attributes) that specifies
how a job should be run on the Power System with IBM i. There are many job descriptions
on every Power System with IBM i.
Each job run on a Power System with IBM i must have a job description associated with it.
Each job description can have multiple jobs associated with it.

1-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Job description attributes


IBM i

• A job description contains a specific set of job-related


attributes:
– Initial library list
– Which job queue to use
– Scheduling priority
– Routing data
– Message queue severity
– Output queue information
– User parameter

• The attributes determine how each job is run on the system.

• QDFTJOBD is a system-supplied job description in library


QGPL.

© Copyright IBM Corporation 2012

Figure 1-34. Job description attributes OL1914.1

Notes:
The job description holds properties that the job uses as it goes through the work
management life cycle.
These properties include the user profile the job starts to run under, the request data (which
tells the job what it should do), and the initial user portion of the library list, as well as
others.
The job description also holds information that tells the job which job queue to enter and
the routing data.
The routing data is later used by the subsystem to find the routing entry that contains
information needed for the job to start running.
The output queue is also defined within the job description. It tells where printer output
(also called spooled files) from a job goes.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Message summary
IBM i

• Messages
– Send, display, respond, and remove
– Informational, break, or inquiry
• Message queues
– Allocate and change delivery mode
– Break, notify, hold, and default

© Copyright IBM Corporation 2012

Figure 1-35. Message summary OL1914.1

Notes:
Messages are used to communicate with the system or other users, monitor system
activity, and control jobs. The two main types of messages are informational and inquiry
messages.
A workstation can communicate with a lot of different message queues that exist on the
Power Systems with IBM i. The system has message queues for each device configured to
the system and a queue for the system operator (QSYSOPR), and application and system
programs have program and job message queues. Message queues are created when a
workstation device description is created, a user profile is created, or with the Create
Message Queue (CRTMSGQ) command.
Message queue modes determine how a message is delivered. There are four delivery
modes:
• Break mode (*BREAK): When a message is received that is equal to or exceeds the
severity filter, the terminal alarm sounds, and the message is displayed immediately.

1-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Notify mode (*NOTIFY): This is the default mode for workstation and user message
queues. The message is held in the message queue, and the message light comes on.
• Hold mode (*HOLD): The user is never notified of messages that arrive in the message
queue. It is the responsibility of the user to periodically look in the queue for messages.
• Default mode (*DFT): Any messages requiring a reply are answered with the default
reply set up for the message. Information only messages are ignored.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Basic message queue communication


IBM i

PROFILE
DSP01 OPR01

CRTDEVDSP:

{ Workstation
message
DSP01
OPR01
User

}
message
queue
CRTUSRPRF

queue

CRTMSGQ: ARDEPT QSYSOPR System supplied

User-created System operator


message queue message queue

© Copyright IBM Corporation 2012

Figure 1-36. Basic message queue communication OL1914.1

Notes:
This visual depicts some of the commands that are associated with and use message and
message queue information.

1-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Which output queue?


IBM i

Job description

*USRPRF
Job's process
access group (PAG)
OUTQ ( name )
Program User profile
Output to
printer
Default
output queue
OUTQ (*WRKSTN
name
)
file
Device description
Printer *DEV
file
OUTQ ( name )
SPOOL(*YES) PRTDEV
(*SYSVAL
name )
*JOB
OUTQ
( name ) System value
PRT01
QPRTDEV ( name )
© Copyright IBM Corporation 2012

Figure 1-37. Which output queue? OL1914.1

Notes:
As each job starts, work management checks the objects (job description, user profile,
workstation device description) and system value (QPRTDEV) in the order shown on the
visual to determine whether a valid output queue name or printer device is defined. Once a
valid output queue or printer device is encountered, the search ends.
If the job description, user profile, and workstation device description all contain default
entries for the output queue and printer device, the printer name in the QPRTDEV system
value is used. By default, this system value contains the name of the first printer configured
on the system (usually PRT01).

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Creating device descriptions


IBM i

• Automatic: QAUTOCFG = '1'


– Local workstation controllers
– Local tape drives
– Local diskette drives
– Local printers
– Local display station
– Local area network

• Manual
– Remote devices
– Communications

© Copyright IBM Corporation 2012

Figure 1-38. Creating device descriptions OL1914.1

Notes:
Communicating with the Power Systems with IBM i requires the use of configuration
objects, which usually include the following:
Line descriptions: Line descriptions define the physical interface between the local
system and the remote system, controller, or network and the protocol used for
communications. Line descriptions can also include information about the line speed,
whether the line is switched or non-switched, and the network address or telephone
number of the local system.
Controller descriptions: The controller description describes the characteristics of the
remote system, controller, or network that is to communicate with the local system.
Controller descriptions can describe an actual physical controller or logically represent the
connection to another system or network.
Device descriptions: The device description describes the characteristics of the physical
or logical device that is to communicate with the local system. Device descriptions can
describe a physical device or logically represent a communications session or a program
running on another system.

1-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty These descriptions can be configured either automatically or manually through the use of
CL commands.
To automatically configure your local controllers and devices, use the system value
QAUTOCFG. The QAUTOCFG (automatic configuration) system value is set to yes by default,
if you do not change this default value then the system continues to automatically configure
any local controllers and devices you attach. This includes any new local workstation
controllers and tape controllers and any new twin axial display stations, twin axial printers,
tape units, diskette units, optical units, and media library devices.
The system automatically assigns names to all your local devices. The names that are
assigned depend on what you selected on the Device configuration naming option on
the Set Major Options display. The naming convention that you can select is one of the
following:
• Normal naming convention
• System/36 style naming convention
• Naming convention that is based on the device address
The system value that is set with this menu option is QDEVNAMING which controls
automatic configuration naming for your devices.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Automatic configuration naming conventions


IBM i

Device *Normal *S/36 *DEVADR


Workstation controller CTL01 CTL01 CTL01

Display stations DSP01, DSP02 W1, W2 DSP(CPA)*

Printers PRT01, PRT02 P1, P2 PRT(CPA)*

Diskette drive DKT01 I1

Tape drive TAP01 T1

Passthru device QPADEV*

SYSTEM VALUE: QDEVNAMING

* C=Controller P=Port A=Device address

© Copyright IBM Corporation 2012

Figure 1-39. Automatic configuration naming conventions OL1914.1

Notes:
Automatic configuration uses one of three methods for naming your local controllers and
devices. The graphic in the visual shows the normal naming convention (*NORMAL), the
System/36 style naming convention (*S36), and the naming convention that is based on
the device address (*DEVADR).
If you decide to manually configure the local devices, you should be aware of the
PRTDEVADR command. The Print Device Addresses (PRTDEVADR) command provides a
printed list of addresses and related information for devices attached to a local or remote
workstation controller. For each device attached to the local workstation controller named
in the controller description (CTLD parameter), the output shows the device's name, its port
and switch setting, its type and model number, its shared session number (valid only if
device type is 3486 or 3487), and whether the device is a display station or printer.

1-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Additional objects required for remotes


IBM i

Remote
*CTL
workstation CRTCTLRWS
Line controller

IBM i
*DEV
Display CRTDEVDSP
*LIN

CRTLIN x x x
*DEV
Printer CRTDEVPRT

© Copyright IBM Corporation 2012

Figure 1-40. Additional objects required for remotes OL1914.1

Notes:
A device description is software that identifies a piece of hardware to the system. A user
profile is software that identifies a user to the system. Device configuration for local devices
can be created automatically by the system, but user profiles must be created by a user
with *SECADM special authority.
The Create Controller Description (remote workstation) (CRTCTLRWS) command creates a
controller description for a remote workstation controller. For more information about using
this command, see the Communications Configuration book, SC41-5401. Restriction: You
must have input/output system configuration (*IOSYSCFG) special authority to use this
command.
The Create Device Description (display) (CRTDEVDSP) command creates a device
description for a display device. Restriction: You must have input/output system
configuration (*IOSYSCFG) special authority to use this command.
The Create Device Description (printer) (CRTDEVPRT) command creates a device
description for a printer device. Restriction: You must have input/output system
configuration (*IOSYSCFG) special authority to use this command.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How the pieces fit together (1 of 3)


IBM i

MSG
Device
description
Device
description
Aut keyword
AUT keyword

MSG
User profile
*WRKSTN
OUTQ *DEV
name

© Copyright IBM Corporation 2012

Figure 1-41. How the pieces fit together (1 of 3) OL1914.1

Notes:
The user profile controls much of what a user can do on the system. This is discussed in
the security unit.

1-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How the pieces fit together (2 of 3)


IBM i

User profile
.
Current library
.
.
Initial program
.
.
Initial menu
.
.
Authorizations
Special
User class
Password

© Copyright IBM Corporation 2012

Figure 1-42. How the pieces fit together (2 of 3) OL1914.1

Notes:
The general properties of a job determine how the system runs each job. Some of the
properties are grouped together in the job description for easier multiple job management.
The system knows what properties to get and when based on how the job properties are
specified.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How the pieces fit together (3 of 3)


IBM i

JOBQ
Job description Batch jobs
.
.
awaiting execution
Job queue
.
.

Output queue
.
.
Main storage
Library list

MSGQ OUTQ
Messages Output
awaiting view awaiting print

User workstation

© Copyright IBM Corporation 2012

Figure 1-43. How the pieces fit together (3 of 3) OL1914.1

Notes:
Job description attributes such as job queue, output queue and initial library list determine
various aspects of how the job will execute and use resources.

1-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New systems management tool


IBM i

• IBM Systems Director Navigator for i


– New Web-based tool for
managing i
– Alternative to System i Navigator
– Additions:
• Performance Data Investigator
• High Availability Solutions
Manager
– Automatic installation with
i 6.1 and 7.1
– Plans to snap into IBM Systems
Director*

© Copyright IBM Corporation 2012

Figure 1-44. New systems management tool OL1914.1

Notes:
IBM Systems Director Navigator for i replaces the System i Navigator Tasks for the web.
System i Navigator Tasks for the web provided servlet URLs for a subset of System i
Navigator (Windows) functions.
IBM Systems Director Navigator:
• Director means progressing towards Director interfaces and functionality.
• Navigator means coming from System i Navigator heritage.
• Tool is part of IBM i and is provided as part of i (no extra charge).
Ninety percent of System i Navigator (Windows) function can be accessed using the web
and IBM Systems Director Navigator.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How does Systems Director Navigator for i


compare to System i Navigator?
IBM i

• IBM Systems Director Navigator for i is intended for management of


only the server where you point your web browser. (Note: In V7R1 you
can select a target system.)
– Management Central capabilities are not included.
– You can use IBM Systems Director cross-platform products for multi-system
management.

• Both are built from the same source code for consistent functionality.
Panels look different when rendered on the Web console.

• Single user can only sign in to one web console.


– IBM Systems Director Navigator or System i Navigator URL Advisor

• Both can have functions restricted.


– System i Navigator does not install functions.
– Web console restricts users from specific tasks.

© Copyright IBM Corporation 2012

Figure 1-45. How does Systems Director Navigator for i compare to System i Navigator? OL1914.1

Notes:

1-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IBM Systems Director


IBM i

See and manage physical and virtual resources across multiple systems.

• Simplify platform management


across server infrastructure.
– Manage from a single console.
– See if servers are healthy.
– Monitor performance.
– Maximize utilization.
– Troubleshoot quickly.

• Manage the life cycle of


physical and virtual resources.
– Keep system software up to date.
– Deploy to multiple systems.

© Copyright IBM Corporation 2012

Figure 1-46. IBM Systems Director OL1914.1

Notes:
IBM Systems Director 6.3 manages a limited set of IBM i functions. This comes with an IBM
i order; you are entitled to it and can start using it.
IBM Systems Director 6.3 has some extension support for Virtualization Manager, IBM
Active Energy Manager, and Electronic Service Agent.

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Exploring the user environment


IBM i

At the end of the lab, you should be able to:


• Create a library.
• Create an output queue.
• Create a job description.
• Change your own user profile.
• Change your current library.
• Add/remove libraries to/from library list.

• User ID: OL50xx


• Password: OL50PWD
– (The password is set to expire.)

© Copyright IBM Corporation 2012

Figure 1-47. Exercise: Exploring the user environment OL1914.1

Notes:
The material presented in this unit reviewed some of the more basic concepts you learned
from on-the-job experience or through the course for Power Systems with IBM i operators.
A good understanding of these concepts is necessary to complete the remainder of the
course material.

1-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (1 of 2)
IBM i

1. True or False: The TIMI is a separately ordered software.

2. True or False: This system addresses both main storage


(memory) and auxiliary storage (disk) using the same
addressing scheme.

3. True or False: The LIC must be installed by the customer.

© Copyright IBM Corporation 2012

Figure 1-48. Checkpoint (1 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (2 of 2)
IBM i

4. True or False: Java is not supported on this system.

5. True or False: Using a simple naming convention is the best


method for locating or accessing an object on the system.

6. True or False: The new GUI that became available at V6R1


and V7R1 is Systems Director Navigator for IBM i.

© Copyright IBM Corporation 2012

Figure 1-49. Checkpoint (2 of 2) OL1914.1

Notes:

1-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe the IBM Power Systems with IBM I architecture
• Describe what objects are on the IBM i
• Explain the syntax of IBM i control language (CL) commands
• Explain the concepts of libraries, library list, and jobs
• Explain the concepts of printing on the IBM i
• Explain the device description and creation process

© Copyright IBM Corporation 2012

Figure 1-50. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 1. IBM i overview and concepts 1-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

1-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 2. Management Central overview

What this unit is about


In this unit, we will overview the major functions of the Management
Central interface, which is a function that can be installed as a part of
System i Navigator.

What you should be able to do


After completing this unit, you should be able to:
• Describe the capabilities of Management Central
• Create links to IBM Power Systems with IBM i
• Define in Management Central the central system, endpoint
systems, and system groups
• Define and perform the major functions of Management Central

How you will check your progress


• Checkpoint questions
• Lab exercise

References
SG24-5407 Management Central: A Smart Way to Manage
AS/400 Systems

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe the capabilities of Management Central
• Create links to IBM Power Systems with IBM i
• Define in Management Central the central system, endpoint
systems, and system groups
• Define and perform the major functions of Management
Central

© Copyright IBM Corporation 2012

Figure 2-1. Unit objectives OL1914.1

Notes:

2-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Introduction to Management


Central

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 2-2. Topic 1: Introduction to Management Central OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Command and graphical interfaces


IBM i

© Copyright IBM Corporation 2012

Figure 2-3. Command and graphical interfaces OL1914.1

Notes:
System i Navigator is a powerful graphical user interface (GUI) that provides an
explorer-like view of system resources.
The integration of System i Navigator with the Windows client desktop is an advantage for
administrators and operators as well as end users who do not have an extensive
knowledge of Control Language (CL) commands.
System i Navigator has been available since V3R1M1 of Client Access for Windows 95.
Continuous enhancements have been made to the application to support other 32-bit
Windows clients and also to include additional functions such as database support, file
systems and so on.
Under the system configuration entry (known as Configuration and Services in the
hierarchical tree of System i Navigator), you can view a list of hardware (including the
operational status) and software (installed product or supported product) on the system.
Fixes program temporary fixes or PTFs management and Collection Services is also
available under this category if the Management Central component is installed.

2-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Use the Network function to work with the TCP/IP configuration as well as configure and
manage new communication interfaces Point-to Point (PPP) or Serial Line Interface
Protocol (SLIP) using wizards.
This function also allows you to work with both TCP/IP servers and IBM i access host
servers.
The Security function provides a security wizard that runs through a set of questions and
generates a security recommendation based on your answers.
You can also manipulate security and auditing system values.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Management Central: Basic overview (1 of 2)


IBM i

• Suite of system management functions


• GUI integrated into IBM i
• Subset of System i Navigator
• Fully integrated into Windows environment

© Copyright IBM Corporation 2012

Figure 2-4. Management Central: Basic overview (1 of 2) OL1914.1

Notes:
Management Central is a suite of systems management functions. It has some powerful
extensions that allow you to manage multiple systems from a single IBM Power System
with IBM i in a TCP/IP network environment. Each new release brings more
enhancements.
A central IBM Power System with IBM i is the single system you use to manage the other
systems in your network. The other systems in your network are called endpoint systems.
Once you define endpoint systems to your network, you only need to do your system
administration tasks once. Your central IBM Power System with IBM i initiates your tasks
and stores all Management Central data.
In each new release, Management Central provides you with even more functions to help
you manage your systems. Take a look at the following functions. From managing users
across all your systems, to graphing performance over a year's time, to monitoring status
from your Internet-ready phone, Management Central frees you to focus on the important
parts of your business, and not just the day-to-day details.

2-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The following functions answer the question as to why you should use Management
Central:
• Synchronize functions, such as Enterprise Identity Mapping (EIM) and Kerberos, across
multiple systems
• Manage users and groups across multiple systems
• Monitor your systems, jobs, messages, files, and business-to-business (B2B) activity in
real time
• Historically graph system performance
• Manage fixes (PTF) and fix groups
• Run commands on multiple systems
• Schedule tasks
• Manage inventory service attributes, and contact information, as well as hardware,
software, fixes, system values, and users and groups
• Use Collection Services to collect performance data for future analysis on multiple
systems
• Save packages and send files and folders to multiple systems
• Create your own products and manage them across multiple systems
• Receive Extreme Support for the latest in IBM support
• Leverage System i Navigator for Wireless, allows you to manage multiple systems;
work with monitors for files, jobs, messages, and system performance; and run
commands on multiple systems from an Internet-ready phone or personal digital
assistant (PDA).

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Management Central: Basic overview (2 of 2)


IBM i

Firewall and Internet


Endpoint systems

Target

Central system
Model

Web application
Source
server

Optional System group

© Copyright IBM Corporation 2012

Figure 2-5. Management Central: Basic overview (2 of 2) OL1914.1

Notes:
Management Central uses the basic system operations on each of the endpoints (for
example, APIs for performance monitoring, system commands, and so forth).
Management Central does not place any limitation on the number of endpoint systems
used by its functions.
There are practical limits determined by your environment, networks, management
policies, and so forth.
In addition, there is no limit to the number of endpoint systems that can be in a group.
Endpoints do not need to be at the same level as the central system, nor does the central
system need to be at the same level as the client.
However, Management Central is only as effective as the client and central system
combination are.
Management Central provides the graphical interface (that is, view) of both input and
output management activities.

2-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Terms:
• Central system: Connects to other systems (called endpoints)
• Endpoints: Systems which your PC does not need to be in direct contact with in order
to manage them
• Source system: System from which objects, files, and information are sent within
Management Central's send tasks and which is the source of the objects, files and
information being sent.
• Model system: Has all desired fixes installed or has all system values set properly for
the targets.
• Target systems: Where objects, files and information are sent within Management
Central's send tasks, in other words, the destination that are often grouped into system
groups.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Management Central setup

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 2-6. Topic 2: Management Central setup OL1914.1

Notes:

2-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Packaging and installation


IBM i

• Packaging
– Server: 5770SS1 options *BASE
and 0003
– Client: IBM Power System with
IBM i running IBM i Access
(5770-XE1)
• Client installation
– Windows
• 2008 Server
• Windows 7
• Windows Vista
• XP
• Server 2003
• 2000
– IBM Power System with IBM i
running
IBM i NetServer or CD
– Custom or Full option
• TCP/IP only
© Copyright IBM Corporation 2012

Figure 2-7. Packaging and installation OL1914.1

Notes:
Management Central (MC) is included as a component of IBM Power Systems with IBM i
running IBM i Access for Windows at no additional cost.
The host IBM Power Systems IBM i function is integrated into base IBM i. The client
function is integrated into System i Navigator, which ships as part of IBM Power System
with IBM i running IBM i Access for Windows.
The general rule of thumb for connectivity is that N-2 and N+2 releases are supported. It is
recommended that your client and server be compatible as closely as possible. That would
mean a V6R1 client connects to a V6R1 server.
Management Central is a subcomponent of System i Navigator and is not installed with a
typical installation of IBM Power Systems with IBM i running IBM i Access for Windows.
When installing, choose Custom Install. Expand the System i Navigator tree and select
the appropriate components, such as Monitors and Commands.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Basic and extended operations


IBM i

• System i Navigator
– Basic operations
– Work management
– Configuration and services
– Network
– Integrated server admin
– Security
– Users and groups
– Database
– File systems
– Backup
– Commands
– Packages and products
– Monitors
– Logical system
– AFP manager
– Application administration

© Copyright IBM Corporation 2012

Figure 2-8. Basic and extended operations OL1914.1

Notes:
Basic support options
System i Navigator Base Support
• Many things are included here for underlying support such as common .dll and .jar
files
Basic Operations
• Message actions
• Ability to view spooled files
Work Management
• Job actions for job and system monitor menus
Configuration and Services
• View inventory directly
• Directly launch graph history from management collection objects

2-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Network
• View, start, and stop servers such as Management Central
Users and Groups
• Edit and send user profiles
File Systems
• Ability to view and select items from the file system such as files and programs
Command
• Create command definitions and run across a set of endpoint systems
Packages and Products
• Package object and files
• Create installable products and PTFs
Monitors
• System monitors
• Job monitors
• Message monitors

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Configure connections
IBM i

• Must create connection if none exists


• First system configured automatically becomes the central
system but can change at any time

© Copyright IBM Corporation 2012

Figure 2-9. Configure connections OL1914.1

Notes:
In order to be designated as the Management Central system, the IBM Power System with
IBM i must be in the list under My Connections.

2-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create Connection wizard (1 of 2)


IBM i

User profile used on


central system must
exist on each
endpoint system.

System to be
connected

© Copyright IBM Corporation 2012

Figure 2-10. Create Connection wizard (1 of 2) OL1914.1

Notes:
To see these windows:
1. Right-click My Connections.
2. Select Connection to Servers.
3. Select Add Connection.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create Connection wizard (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 2-11. Create Connection wizard (2 of 2) OL1914.1

Notes:
The final part of the process of adding a new connection is to verify the connection. It is
useful to check that all components on the server are running. You can verify connection for
an existing connection by right-clicking the server in the list of connections, then selecting
Connection to Server > Verify Connection.

2-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Management Central server


IBM i

• Integrated with other TCP/IP servers


• Must be running on IBM Power System with IBM i to perform
Management Central functions

© Copyright IBM Corporation 2012

Figure 2-12. Management Central server OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Management Central properties


IBM i

• Connection tuning
• Security options
– Require password on endpoint systems
• Same as central system
– Use Secure Sockets Layer (SSL)

© Copyright IBM Corporation 2012

Figure 2-13. Management Central properties OL1914.1

Notes:
When you right click Management Central and then select properties you will be presented
with the panel you see on the visual. On the general tab you can select which system will
be used as the central system. On the remaining panes you will have an option to set the
following:
Require password on endpoint systems
This security option specifies that the user profile used to sign on to the central system
must have the same password on each endpoint system. Even if this box is not checked,
the user profile used to sign on to the central system must exist on each endpoint system.
Selecting this box sets only the value for the central system. Each endpoint system must
be explicitly configured to require the password for Management Central functions.
Use Secure Sockets Layer (SSL)
This option specifies the use of SSL to ensure secure transmissions between the central
system and the endpoint systems. SSL provides the transport and authentication of public
key system certificates as well as private connection and data encryption. An SSL

2-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty connection can occur only between an SSL-enabled central system and an SSL-enabled
endpoint system. An SSL-enabled IBM Power System with IBM i is a system on which the
required administration and configuration tasks have been performed.
Authentication level
If Use Secure Sockets Layer (SSL) is selected, select an authentication level.
Maximum data transfer size (MB)
Specifies the maximum size in MB for a list of fixes sent from a source system to the
endpoint system. The value specified must be less than or equal to 2048. This does not
apply to sending files, folders, or packages to systems or groups. Limiting the size of the list
effectively limits the length of time allowed to complete the data transfer.
Maximum connections
Specifies the maximum number of endpoint systems to which the central system can
connect to at the same time. For example, if 200 for Maximum connections is specified
and then the central system connects to 202 endpoint systems, two connections fail.
Endpoint connection time-out (seconds)
Specifies the number of idle seconds that the central system waits before the attempt to
connect to an endpoint IBM Power System with IBM i is ended.
IP address lookup frequency
Specifies how often the IP address must be verified when connecting to an endpoint
system. Select Always or Never.
• If Always is selected, connecting to an endpoint system takes longer, but the IP
addresses are always correct.
• If Never is selected, connecting to an endpoint IBM Power System with IBM i is quicker
because the connection uses the IP address currently stored in Management Central.
Run Discover Systems at any time to update the list of IP addresses stored in
Management Central.
Refer to online help for which configuration options require the user to restart the MC
server jobs.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Define central system


IBM i

• First system under My Connections is default central system.


• This can change at any time.
• System to be managed must be in My Connections list.
• Any one of the systems in My Connections can be Management Central server.

© Copyright IBM Corporation 2012

Figure 2-14. Define central system OL1914.1

Notes:
In order to define a central system, there must be a TCP/IP connection under My
Connections.
You have the ability to change your central system at any point. Some things to remember:
• Changing the central system ends the connection to the current central system.
• All the objects you create under Management Central are created on the central
system.
• Once you change your central system, you no longer have access to the objects you
created on the original central system.

2-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Add endpoint systems


IBM i

• Must be connected to central system using TCP/IP


• Manual add shown below

© Copyright IBM Corporation 2012

Figure 2-15. Add endpoint systems OL1914.1

Notes:
Management Central offers two choices:
• New Endpoint System: Manual addition of an endpoint system (shown on above
visual)
• Discover Systems: Automatic addition of endpoint systems
New Endpoint System
The General panel provides the definition of a new endpoint system by specifying the name
and description of the system.
An endpoint IBM Power System with IBM i is defined by any user on the central system for
the purpose of performing tasks or running monitors in a distributed network.
An endpoint system must be able to be connected to the central system and must be
running i. The level of OS that is running on the endpoint system determines functions you
can perform on the system (see release level functionality).

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The name specified for the new endpoint system must be known to TCP/IP, either as an
entry in the IBM Power System with IBM i local host table or on the domain name server
(DNS). The domain name server maintains the host table for an entire TCP/IP domain.
If the Network component of System i Navigator is installed, add and remove entries to the
local host table and add hosts to the domain (expand Network, click Protocols, right-click
TCP/IP, and select Properties). When adding a system name to the host table, specify the
name in all uppercase letters.
Adding a new endpoint system under the Management Central tree will not add that system
to the IBM Power System with IBM i Connections tree.
Discover Systems
Use the Discover Systems dialog to search the selected TCP/IP subnets for IBM Power
Systems with IBM i systems. This can be done at server startup but is not recommended.
The systems found during discovery are added as endpoint systems on the central system.
If the IBM Power Systems with IBM i is already defined as an endpoint system, the IP
address is verified and updated if it has changed.
You can select the TCP/IP subnets to search and whether to use File Transfer Protocol
(FTP) or Simple Network Management Protocol (SNMP) to determine which systems are
IBM Power Systems with IBM i.
You can also specify the earliest release of OS to search for, and how long to wait for a
system to respond.

Warning

Depending on how many IBM Power Systems with IBM i are installed within your
organization and how many of these have the management central server running, you
may end up with a longer list of System being displayed than you had expected.

Automatic discovery
The only time connections are added automatically is when connecting to the central
system for the very first time (after install). This helps ensure your central system knows
about all your direct connects.

2-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create system groups


IBM i

• Create system groups by selecting endpoint systems to group


together as one unit.

© Copyright IBM Corporation 2012

Figure 2-16. Create system groups OL1914.1

Notes:
Selecting System Groups > New System Group displays a panel with two tabs: General
and Sharing.
General tab
The General tab allows you to create a list of endpoint systems to be included in the
system group. You can then perform functions on the group in one step, as if they were a
single system.
Specify the name of the group and a brief description to help you identify this group in a list
of groups. You then specify the endpoint systems to be included in the group.
Sharing tab
Specify whether you want other to view or modify your system group.
Owner: The name of the user who created the task, definition, or system group.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Sharing Levels:
None: Other users cannot view this item.
Read-only: Other users can view this item and use it. However, other users cannot
change or delete it.
Full: Other users can change and delete the group. Other users can also view and use
it to create new system groups.

2-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Advanced common functions


IBM i

• Some functions are common and available to many


Management Central items.
– Sharing
– Include and Columns options
– Scheduling
– Application administration
– MC-pervasive

© Copyright IBM Corporation 2012

Figure 2-17. Advanced common functions OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Global sharing
IBM i

• Default for sharing all new tasks


– Default is none
• Can be overridden at individual task level

© Copyright IBM Corporation 2012

Figure 2-18. Global sharing OL1914.1

Notes:
Sharing allows users to use (or share) the same items: System groups, package
definitions, command definitions, and system administration tasks.
You can use global sharing to share all tasks. Use global sharing to specify the level of
sharing for all your system administration tasks: None, Read-only, or Full sharing. If you
are in an environment where you are part of a team that works around the clock and you
choose to globally share your tasks at the Full level, your team could work with the tasks
you started even when you are not there.

2-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Include and Columns options for displays


IBM i

• Example of using Include option with Task Activity:

• Example of using Columns option with Task Activity command:

© Copyright IBM Corporation 2012

Figure 2-19. Include and Columns options for displays OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Management Central Scheduler


IBM i

• Allows you to schedule all types • Default for scheduling tasks


of Management Central tasks • Integrated into Management
• Allows you to select when you Central for the scheduling of
want a job to run on the system tasks
– Schedule once – No specific job scheduler container
– Recurring schedule
• Daily
• Weekly
• Monthly

© Copyright IBM Corporation 2012

Figure 2-20. Management Central Scheduler OL1914.1

Notes:
The Management Central Job Scheduler is an integrated scheduler that allows you to
organize when you want your tasks to occur.
This is the base i scheduler that is also invoked by the Add Job Schedule Entry
(ADDJOBSCDE) command.
You have the option of choosing to perform a task immediately or choosing a later time.
You also have the option of installing the Advanced Job Scheduler and overriding the
Management Central Scheduler.
With this scheduler it is possible to automate many of your recurring processes. For
example, you can schedule to clean up the save files and cover letters of the fixes from
your systems on the first of every month or to install a set of fixes.
You can schedule:
• Remote Commands
• Package Distribution

2-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Start collecting data


• Stop collecting data
• Inventory retrieval
• Fixes
- Install
- Install permanently
- Uninstall
- Clean up
- Cancel
Only those scheduled entries created by Management Central will be shown in the
Scheduled Tasks container.

Note

Management Central job schedule entries appear as job Qnnnn, where nnnn is a hex
number, on the Work with Job Schedule Entries green screen display.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Advanced Job Scheduler


IBM i

• IBM licensed program product


(5770-JS1)
• GUI integrated into Operations
Navigator
• Overrides Management Central
Scheduler
• Becomes default scheduler
• Provided as plug-in
• CL commands
• Calendaring
• Job sequencing
• Dependency scheduling
• Job history/statistics
• Report distribution
• Pager capabilities

© Copyright IBM Corporation 2012

Figure 2-21. Advanced Job Scheduler OL1914.1

Notes:
System i Navigator provides an integrated scheduler to organize when tasks are to start.
The Advanced Job Scheduler:
• Can be installed to override the default scheduler
• Is a separate licensed program (5761-JS1) that provides more robust scheduling than
the base scheduler
• Offers full calendar management
• Must be installed separately on both the Central System and the graphical client
When the Advanced Job Scheduler is installed on the graphical client, it is automatically
used instead of the Management Central Job Scheduler.
The Advanced Job Scheduler graphical user interface allows you to schedule jobs, create
groups, work with groups, submit jobs and groups immediately, display the status of jobs,
and create calendars and holiday calendars.

2-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The functions of the Advanced Job Scheduler include:


• Calendaring: Lets you use additional calendars (for example, a holiday calendar)
• Job Sequencing: Allows you to schedule a series of jobs in a sequence
• Dependency Scheduling: Allows you to schedule a job or a group of jobs to run
depending on the previous job result or object existence
• Job History/Statistics: Allows you to examine the status of jobs for further actions
• Pager Capability: If a job completes successfully or fails, a message can be sent either
to a user or to a pager
• GUI and CL Interface: Supports both, GUI from System i Navigator and 5250 screen
It is recommended that you install the Advanced Scheduler on all graphical clients using
Management Central.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Advanced scheduling
IBM i

• View scheduled tasks


– Select type of task

• Modify job scheduling


– Advanced Job Scheduler
• Scheduled job
• Right-click job name on right
panel
• Select Properties
• Modify scheduling on the
next panel

© Copyright IBM Corporation 2012

Figure 2-22. Advanced scheduling OL1914.1

Notes:

2-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Application Administration (1 of 3)
IBM i

• Install as a component of System i Navigator


• Controls access to functions
• Opened system through Management Central or IBM Power System
with IBM i connection

© Copyright IBM Corporation 2012

Figure 2-23. Application Administration (1 of 3) OL1914.1

Notes:
Right-click Management Central and select Application Administration. This opens the
Application Administration main dialog.
The Application Administration dialog, when opened through Management Central,
displays Management Central functions. The appropriate components must be installed to
administer the access, and the functions must be registered on the central server, or they
are not displayed.
When the Application Administration dialog is opened through an IBM Power System with
IBM i connection, the dialog does not display these functions, with the exception of Fixes,
Inventory, and Collection Services. The Fixes, Inventory, and Collection Services are
displayed as read-only.
Remember this only limits access from the GUI, not authority on the server.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Application Administration (2 of 3)
IBM i

• At IBM Power
System with IBM i
connections:
– System Director
Navigator for i
• All components
– Client applications
• PC applications
– Host applications
• Backup Recovery
and Media Services
(BRMS)
• On demand
• And so on

© Copyright IBM Corporation 2012

Figure 2-24. Application Administration (2 of 3) OL1914.1

Notes:
Application Administration allows system administrators to control the functions or
applications available to users on a specific system. This includes controlling the functions
available to users accessing the system through clients.
Application Administration is not installed with a typical installation. You must use
customize. It is not a security tool and can be defeated by a highly skilled user. In order to
use Application Administration, you must have *SECADM authority.
You must install the application on your PC before you can register it on the system. The
applications must be registered on the system before they can be administered through
Application Administration. By default, no applications are registered. When accessing
Application Administration for the first time, if applications are detected on the PC that are
not registered on the system, a message box is presented. The message box invites you to
add the applications.
Selecting Application Administration from Management Central allows you to control
Management Central functions. You cannot select Application Administration from endpoint
systems under Management Central.

2-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Selecting Application Administration from My Connections under Operations Navigator


allows you to control all of the Operations Navigator functions, as well as client and host
applications.
Access to the functions is restricted as follows:
• Default Access: Determines whether the user has default access to the functions when
the user or group is not explicitly allowed or denied access
• All Object Access: Defines if a user or group with All Object System privilege is
allowed access to the function
• Customized Access: Users with security administration privilege can explicitly allow or
deny access of users or groups to specific functions
The Application Administration interface in System i Navigator is enhanced with every OS
release. It provides an administrator with an interface to manage access to IBM Power
Systems with IBM i Access for Windows, System i Navigator, i, and TCP/IP applications.
Starting with V5R3, there are new CL commands available to manage the access
discussed on this visual through the 5250 command-line interface. These commands allow
the administrator to write CL programs to manage access. Using this approach, an
administrator can write a CL program on one system that contains all access policies and
restrictions and then distribute the program to other systems in the network. This approach
lowers the administration effort when setting up access on multiple systems.
• Work with Function Usage (WRKFCNUSG)
• Change Function Usage (CHGFCNUSG)
• Display Function Usage (DSPFCNUSG)

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Application Administration (3 of 3)
IBM i

• At Management
Central:
– Commands
– Packages and
Products
– Monitor
– Users and Groups
– Fixes
– Inventory
– System Values
– Collection Services
– Extreme Support

© Copyright IBM Corporation 2012

Figure 2-25. Application Administration (3 of 3) OL1914.1

Notes:

2-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

MC: Pervasive
IBM i

• Wireless remote system monitoring


• Devices
– PDA
– Web browsers
– Internet phones

© Copyright IBM Corporation 2012

Figure 2-26. MC: Pervasive OL1914.1

Notes:
Administrators have more flexibility in how they access and interact with Management
Central with Management Central - Pervasive. IBM Power Systems with IBM i Access for
Wireless lets you remotely monitor system performance and status using an Internet
phone, a personal data assistant (PDA) a wireless modem, or a traditional web browser on
a workstation.
After you set up a web server on your central system, you simply enter the URL into your
Internet phone, PDA, or browser to check the availability of your systems and any active
Management Central monitors. For example, you are able to find out if one of your systems
finished restarting, or if a monitor has exceeded any thresholds for CPU, disk utilization, or
other metrics.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Management Central


functions

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 2-27. Topic 3: Management Central functions OL1914.1

Notes:

2-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Management Central functions


IBM i

• Run commands
• Create and distribute packages
• Create, distribute, and install products
• Monitor job, message, system, file, and B2B in real time
• Access Collection Services (performance data collection)
• Take inventory:
– Track hardware configuration, software, fixes, system values, and users and
groups.
– Manage network and service attributes and contact information.
– Compare and update system values.
– Compare fixes and distribute and install missing fixes.
– Synchronize date and time.
– Scan for user-owned objects and users with search criteria.
• Manage users and groups and perform qualified search for users or
groups.
© Copyright IBM Corporation 2012

Figure 2-28. Management Central functions OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Run command (1 of 3)
IBM i

• Running remote command


– Create command definition
– Perform command to multiple systems or groups
– Schedule recurring commands
– View status, job log, and output
– Keep job log
– Handle inquiry

© Copyright IBM Corporation 2012

Figure 2-29. Run command (1 of 3) OL1914.1

Notes:
Command definitions allow you to define a command, then run the command to multiple
systems or a group of systems. You can save an i CL command that can be run over and
over against multiple systems and groups. Storing a command definition on the central
system allows you to share commonly used or complex commands with other users. When
a command is run, a task is created.
What can I do with command definitions?
• Add a reply list entry
• Create a command definition
• Run a command from an existing command definition
• Run a command on selected systems or groups
• Schedule from a command definition
• Work with reply list entries

2-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Run command (2 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 2-30. Run command (2 of 3) OL1914.1

Notes:
You can submit commands to any systems that run Management Central server.
To submit commands, you create command definitions, which allow you to define a
command, then run the command to multiple systems or a group of systems.
You can save a CL command that can be run over and over against multiple systems and
groups. Storing a command definition on the central system allows you to share commonly
used or complex commands with other users.
When a command is run, a Management Central task is created. The tasks can be
monitored from the Management Central task activity window.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Run command (3 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 2-31. Run command (3 of 3) OL1914.1

Notes:
In this window, you can choose the systems to execute the command definition.

2-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object packaging and distribution (1 of 3)


IBM i

• Managing software
– Create package definition
• Objects
– Configuration data
– Java applications
– Web files
– Software programs
• Integrated file system (IFS)
• Post-distribution actions
– Create package snapshots
– Distribute package to multiple systems or groups
– Schedule recurring distributions
– View status, job log, and output

© Copyright IBM Corporation 2012

Figure 2-32. Object packaging and distribution (1 of 3) OL1914.1

Notes:
Package definitions allow you to create a list of QSYS or Integrated File System (IFS) files
and treats them as a logical or physical group (for example, configuration data, Java
applications, HTML web page logical set, or a physical set), by taking a snapshot of the
files. When you create a snapshot of your files, you preserve them for later distribution.
Like other tasks, the package distributions can also be scheduled.
Once submitted, the status of the task can be reviewed from status window. Some actions
may have also been taken after successful package distribution, such as the restore object
command.
• Distribute Information to multiple systems and groups
• Define packages
- Can be from QSYS or IFS, but cannot mix files system types in same package
• Take snapshot of package

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

- Snapshot is taking physical package as it exists at the point in time when the
package was created
- Otherwise it will get logical view of files and send what is there at the time the
package is sent
• Schedule distributions
- Can be one-time or regular updates
• Perform action after distribution completes
- Must be batch type action

2-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object packaging and distribution (2 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 2-33. Object packaging and distribution (2 of 3) OL1914.1

Notes:
System i Navigator and Management Central allow you to logically group a number of
programs and files on a source IBM Power System with IBM i server and distribute those
objects to one or more destination IBM Power Systems servers with IBM i.
i save and restore commands are used by Management Central to create a snapshot of the
objects and manage the distribution of those objects to multiple endpoint systems,
confirming successful delivery back to the management central system.
There are two steps involved in using packaging to distribute objects between IBM Power
Systems with IBM i. The first is to create a definition, which includes a list of the objects to
be sent. The second is to initiate a distribution task that actually performs the transmittal
and subsequent restore on the target system. The graphic above shows us the first step.
Packaging saves objects from the integrated file system (IFS). Management Central
selects the appropriate save function (SAV, SAVDLO, or SAVOBJ) based on the file system
that contains the object. As a result, you must select objects from a single file system when
you define your package.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Object packaging and distribution (3 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 2-34. Object packaging and distribution (3 of 3) OL1914.1

Notes:
Here is an example of the second step of packaging. This picture here shows the initiation
of the distribution task and the choice of the target system.

2-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Manage products
IBM i

• Create and distribute a product

– Create product definition

– Install product on its source system

– Send and install product to multiple systems or groups

– Run remote command after installation

– View status, job log, and output

© Copyright IBM Corporation 2012

Figure 2-35. Manage products OL1914.1

Notes:
A product is an application program that has been packaged by using either the
Management Central packaging function or the System Manager licensed program (SM1).
The IBM Power System with IBM i provides management functions for software that is
identified as a product.
To use the management functions for your own software, the software must be identified to
the IBM Power System with IBM i as a product.
You need to create a product definition before you can convert your application into a
product that the IBM Power System with IBM i identifies as a product. A product definition
contains all the information that you need to send and install a product across multiple
systems. A product definition also gives you the ability to manage fixes for the product.
The source system on which you create the product definition is used to manage the
product. Once you create a product definition, you can install and generate fixes on the
source system. You can also send and install the product on other systems.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The application's send and install function extend the i product management capabilities in
multisystem enterprises. The other functions round out the application.
These functions include Installing user-defined products and managing these products.
The life of a product is as follows:
• Create a definition
• Install that definition onto source system
• Test the product, change, and reinstall as needed
• When you are done testing, send and install the product to other systems in your
network
• Generate and manage fixes for the product
• If you want a new version of the product, use new based on function (new based on
function means that you can create a new product that is based on an existing product).

2-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create products on source system


IBM i

• Management Central
– Definitions
• Product
• Welcome wizard explains create
procedure

© Copyright IBM Corporation 2012

Figure 2-36. Create products on source system OL1914.1

Notes:
The wizard helps you to create products.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Install products on source system


IBM i

• Installation opens
Welcome wizard

© Copyright IBM Corporation 2012

Figure 2-37. Install products on source system OL1914.1

Notes:
The wizard helps you to install products.

2-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Send and install products


IBM i

• Product must be installed (or


managed) in order to:
– Send and install to another system
– Send and install (delayed)
– Generate fixes

© Copyright IBM Corporation 2012

Figure 2-38. Send and install products OL1914.1

Notes:
The wizard helps you to send and install products.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System monitor (1 of 4)
IBM i

• Use graphical display of real-time performance data across one or more


systems
– One or more performance metrics
• 26 metrics
– Thresholds for each monitored metric
• Up to two thresholds for each metric
– Indicates threshold reached with ability to initiate action
• Monitor a single system from multiple PCs
• Monitor multiple systems from a single PC
• Determine status
– Identifies monitors with triggered thresholds
– Identifies whether or not monitors are running
• Distinguish between systems in graph by setting user preferences
• Make changes from the graphical display
• Monitor runs until you stop it (even if you are not signed on)
© Copyright IBM Corporation 2012

Figure 2-39. System monitor (1 of 4) OL1914.1

Notes:
Management Central’s System Monitors function, gathers and presents real-time
performance data for your systems. You can use System Monitors to see your performance
data as it happens. In contrast, you should use The Management Central Graph History to
see historical data saved on the system for more analysis. The data displayed in System
Monitors and Graph History are both gathered from the data collected through Collection
Services.
The Management Central System Monitors graph present system performance data in an
easy-to-use graphical interface that you can directly manipulate to get more detailed data.
Monitors allow you to collect performance data simultaneously for a wide variety of system
metrics, for any system or system group, and for specific time intervals. Once you start a
monitor, you are free to do other tasks. In fact, you could turn your PC off! It continues to
monitor your systems and perform any threshold commands or actions you specify. Your
monitor runs until you decide to stop it. To effectively monitor real-time system
performance, create a Management Central monitor.

2-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty At the first level of detail, the performance data is manipulated to provide a graphical
representation of the performance information. The second level of detail provides a list of
items that account for the first level (for example list of jobs). The third level of detail
provides properties of a specific item in the second level.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System monitor (2 of 4)
IBM i

• Each metric has defaults


– Interval collection
– Display time

© Copyright IBM Corporation 2012

Figure 2-40. System monitor (2 of 4) OL1914.1

Notes:
Possible values for metrics:
• CPU Utilization (Average)
• CPU Utilization (Interactive Jobs)
• CPU Utilization (Interactive Feature)
• CPU Utilization Basic (Average)
• CPU Utilization (Secondary Workloads)
• CPU Utilization (Database Capability)
• Interactive Response Time (Average)
• Interactive Response Time (Maximum)
• Transaction Rate (Average)
• Transaction Rate (Interactive)
• Batch Logical Database I/O

2-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Disk Arm Utilization (Average)


• Disk Arm Utilization (Maximum)
• Disk Storage (Average)
• Disk Storage (Maximum)
• Disk IOP Utilization (Average)
• Disk IOP Utilization (Maximum)
• Communications IOP Utilization (Average)
• Communications IOP Utilization (Maximum)
• LAN Utilization (Average)
• LAN Utilization (Maximum)
• Machine Pool Faults
• Communications Line Utilization (Average)
• Communications Line Utilization (Maximum)
• User Pool Faults (Average)
• User Pool Faults (Maximum)

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System monitor (3 of 4)
IBM i

• View graphics and detail

© Copyright IBM Corporation 2012

Figure 2-41. System monitor (3 of 4) OL1914.1

Notes:
Synchronize system time
If the local system time values are different between your central system and endpoint
system (because they are located in different time zones), the graph time scale would not
be accurate.
Change, on each system, the Coordinated Universal Time Offset (QUTCOFFSET) system
value, specifying the number of hours and minutes in which the current system time differs
from Coordinated Universal Time (UTC), also known as Greenwich Mean Time.
Since V5R3, Management Central now uses the new time zone (QTIMZON) system value
when synchronizing date and time values on target systems with a model system. This
means that it is no longer necessary to manually update the GMT offset (QUTCOFFSET)
system value on the target systems when the source system changes to or from Daylight
Saving Time (DST).

2-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System monitor (4 of 4)
IBM i

• Display history graph


© Copyright IBM Corporation 2012

Figure 2-42. System monitor (4 of 4) OL1914.1

Notes:
The monitor window shows a graphical view of the metrics for a monitor as they are being
collected.
You can have more than one monitor window open at the same time, and you can work
with other windows while the monitor windows are open. You can minimize the monitor
window and be informed by an audible or visible alarm when important thresholds are
reached.
The monitor window contains three panels.
Graphs
Each endpoint IBM Power System with IBM is represented by a unique graph line. Click the
legend icon in the lower right corner of any graph to see which IBM Power System with IBM
i is represented by each line.
Click the icon in the right-hand corner of the title bar of any monitor graph to minimize the
graph to just the title bar. Click the icon again to restore the graph to its previous size.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Click View from the menu bar and then select Sort Details to sort the data by value or by
name. Select Normalize Details to normalize the data to the largest value or to the graph
scale. Click any bar on the chart to see the properties for that item.
Sort Details
Allows you to sort the data in the Details pane by value or by name.
Normalize Details
Allows you to normalize the data in the Details pane to the largest value or to the graph
scale.

2-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

File monitor (1 of 2)
IBM i

• Provides the ability to monitor:


– All system logs
– Selected files
• Monitor multiple systems
• Define monitor based on:
– Specific text strings
– Specific file size
– When a file is modified
• Events can be triggered when a threshold is reached:
– Open event log
– Open a monitor
– Sound alarm
– Run a command

© Copyright IBM Corporation 2012

Figure 2-43. File monitor (1 of 2) OL1914.1

Notes:
You can use a file monitor to notify you whenever a selected file has changed. Alternately,
you can monitor for a specified size or for specified text strings.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

File monitor (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 2-44. File monitor (2 of 2) OL1914.1

Notes:
The General tab of the monitor Properties panel allows you to view and change general
information about the monitor.
Name: The unique name of the monitor. You can change the name, using up to 64
characters for the new name.
Description: A brief description to help you identify this monitor in a list of monitors. You
can change the description, using up to 256 characters for the new description. This field is
optional.
Files to monitor: You can select to monitor all system log files or selected files.
If you choose to monitor all system log files, the history log (QHST) is monitored on systems
that are running i.
If you choose to monitor selected files, you can type a file name, including a directory path,
and click Add to add it to the list of files to monitor. You can select one or more files in the
list and click Remove to remove them from the list.

2-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Jobs monitor (1 of 2)
IBM i

• Monitor jobs • Event logs


– Specific jobs – Can be saved
– Job types – Can be viewed
– Jobs running within a subsystem – Can take actions
– Group of jobs under a server • For active jobs
categorization • Create monitors from:
• Define metrics – Management Central
– Job count • Monitors
– Job status • Endpoint systems
– Job log message • System groups
– Job metric values – Individual system
• Define thresholds • My Connections
– Triggers : Actions
– Reset : Actions

© Copyright IBM Corporation 2012

Figure 2-45. Jobs monitor (1 of 2) OL1914.1

Notes:
You create a job monitor to monitor a set of related jobs. For example, you might create a
job monitor to monitor one or more servers that provide services for a critical application.
You might also create a job monitor to monitor batch jobs that run in the background. Job
monitors allow you to be alerted when the jobs do not run within your predetermined metric
thresholds.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Jobs monitor (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 2-46. Jobs monitor (2 of 2) OL1914.1

Notes:
There are two ways to specify the jobs to monitor:
Jobs: You can specify jobs by their job name, job user, job type and subsystem. Job name,
job user, and subsystem may contain an asterisk (*) as a wild card to represent one or
more characters.
Servers: You can specify jobs by their server name. To see the active servers on your
system, open the Work Management folder and Server jobs. You can also specify a custom
server by clicking Add custom server. To create a custom server, use the Change Job
(QWTCHGJB) API.
When multiple job selection criteria are specified, all jobs matching any of the criteria are
monitored.

2-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Messages monitor (1 of 2)
IBM i

• Track occurrence of messages


• Define monitor based upon:
– Message IDs
– Message types
– Message severities
• Take action based upon message
– Send an automated response to the message
– Automatically delete message
– Run command that starts another job
– Calling an application
• Paging software
– Apply to threshold count
• Trigger, reset commands
• Variables
© Copyright IBM Corporation 2012

Figure 2-47. Messages monitor (1 of 2) OL1914.1

Notes:
You create a message monitor to monitor for specified messages on a message queue.
For example, you might create a message monitor to monitor a message queue to
determine whether the application completed successfully. You might also create a
message monitor to monitor the system operator message queue for a specific message
that indicates when a critical storage condition exists. When you create that monitor, you
can specify commands to run when the message is detected.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Messages monitor (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 2-48. Messages monitor (2 of 2) OL1914.1

Notes:
Message Set: You can specify which messages that the monitor triggers on. This can be
done by specifying one or more message selection criteria. Each criteria can specifically or
generically specify messages based on message ID, message type, and message severity.
You can also specify a reply value for inquiry messages.
In addition, you can permanently remove monitored messages from the message queue.
Permanently remove from the message queue all messages that meet the criteria of a
message to be monitored.
Also you can specify the message count and i trigger and reset commands. You can click
Prompt for assistance in entering or selecting a command. If you select to trigger a
monitor, you cannot select to permanently remove monitored messages from the message
queue.

2-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Collection Services
IBM i

• Collect performance data for future analysis


– Performance Tool (5770-PT1)
– Other performance report

• Start collection
– On a single system
– On a system group

• Display data through graph history

• Copy data into database files

© Copyright IBM Corporation 2012

Figure 2-49. Collection Services OL1914.1

Notes:
With Management Central's Collection Services function, you can collect performance data
for future analysis by the Performance Tools for IBM Power Systems with IBM i licensed
program (5770-PT1) or other performance report applications.
You can also use the data collected through Collection Services to create graph and
summary data that is displayable through Management Central's Graph History.
To collect and store performance data for future analysis, you can start Collection Services
on a single system, or you can start Collection Services on system groups.
You can use performance data to make adjustments to programs and operations. These
adjustments can improve response times and throughputs and help your systems reach
their peak performance.
Collection Services collects data that identifies the relative amount of system resource
used by different areas of your system. When you collect and analyze this information on a
regular basis, you help balance your resources better, which in turn gets you the best

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

performance from your system. You can customize your data collections so you collect only
the data you want.
You can use Collection Services instead of the i performance monitor function (STRPFRMON
command) to collect your data and create database files. When you use i performance
monitor, your data is collected into as many as 30 database files. Collection Services stores
your data for each collection in a single collection object, from which you can create as
many different sets of database files as you need. You can use the database files with the
Performance Tools for IBM Power Systems with IBM i licensed program (5770-PT1) or
other applications to produce performance reports.
Collection Services deletes only cycled collection objects. A status of Cycled means that
Collection Services has stopped collecting data and storing it in the object. You can specify
Permanent if you do not want Collection Services to delete your collection objects for you.

2-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Collect data (1 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 2-50. Collect data (1 of 2) OL1914.1

Notes:
To initiate data collection from System i Navigator, right-click the system of choice under
end-point systems and click Collection Services > Start Performance Collection.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Collect data (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 2-51. Collect data (2 of 2) OL1914.1

Notes:
The following values pertain to the Cycle if already collecting checkbox on the General
tab of the Start Collection Services panel.
If checked: The existing collection is ended and a new collection is started with the values
specified in the panel.
If not checked: The collection keeps running but now uses these values for any new data
location to store collections.
What time is the collection recycled? If the time is within one hour of the current time, the
collection does not occur until the next day.
Frequency to cycle collections: How many hours into the collection is the collection
recycled?
• Default collection interval
• The elapsed time between intervals
• Collection retention period

2-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Create database files during collection. If checked, this collection runs just like the old
performance monitor.
The End System stores the values from the last collection. The properties are stored on the
End IBM Power Systems with IBM i in:
• Object: QPFRCOLDTA
• Library: QUSRSYS
• Type: *USRSPC

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display history graph


IBM i

© Copyright IBM Corporation 2012

Figure 2-52. Display history graph OL1914.1

Notes:
Each endpoint IBM Power System with IBM i is represented by a unique graph line.
Click the legend icon in the lower right corner of any graph to see which IBM Power System
with IBM i is represented by each line.
Here are some actions that you can perform:
• To change the color, width, or style of the line for each system, click Options from the
menu bar on the System i Navigator window, and select User Preferences.
• To change the size of the Graphs pane, click the icon in the right-hand corner of the title
bar of any graph to minimize the graph to just the title bar, and then click the icon again
to restore the graph to its previous size.
• To see the details of the data associated with the collection point, click any collection
point on a graph line.

2-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Collection points on the graph line are shown by three different graphics that correspond to
the three levels of data that are available:
• A square collection point means the data includes both the detailed information and
properties information.
• A triangular collection point represents summarized data that contains detailed
information.
• A circular collection point represents data that contains no detailed information or
properties information.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Inventory collection
IBM i

• Information collected from


endpoint systems
• Stored on central system
• Search inventory on systems
or groups
• Export and print
– Hardware
– Software
– Fixes
– Users and groups
– System values

© Copyright IBM Corporation 2012

Figure 2-53. Inventory collection OL1914.1

Notes:
With the inventory collection of Management Central, you can gather hardware, software,
fix, users and groups and system values information on your endpoint systems and store
the information on your central system.

2-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Select inventory to collect


IBM i

• Select to collect all inventory


• Select to collect specific inventory
– If you select Fixes, you will automatically collect software.

© Copyright IBM Corporation 2012

Figure 2-54. Select inventory to collect OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Viewing the inventory list


IBM i

• Must collect inventory before it is available for viewing


• Viewed from endpoint systems
– Information contained in database on central system Last collected

© Copyright IBM Corporation 2012

Figure 2-55. Viewing the inventory list OL1914.1

Notes:
Ensure that you run the collection before you try to view the inventory list. If inventory has
not been collected, no inventory information is available. There is a message above a blank
inventory panel with the status of Last collected: never. Otherwise, the status displays the
last collection date and time or the amount of time that has passed since the last collection.
The properties page of the inventories shows an option for refreshing the list every time it
appears in timed intervals. This option does not mean that the central system refreshes the
list from the endpoint systems. This option indicates how often the list is refreshed from the
data held in the central system only. To update the inventory on the central system with the
endpoint system's data, collect the inventory again.

2-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System Values
IBM i

• Manage system values across


systems
• Collect inventory for system
values
– Schedule
– Export to PC file
• Compare system values on
multiple target systems to those on
a model system
• Update system values on endpoint
systems based on those of a
model system
– Schedule updates
• Change system values on a single
system
• Synchronize date and time
© Copyright IBM Corporation 2012

Figure 2-56. System Values OL1914.1

Notes:
System values are pieces of information that affect the operating environment in the entire
system. A system value contains control information for the operation of certain parts of the
systems. You can change the system to define the working environment.
As an administrator, you can manage system values across multiple systems. You can
compare the system values on a model system to one or more target systems and then
update the target system values to match the values of the model system. If you prefer, you
can generate a list that shows the differences in values between the model system and the
target system rather than actually changing the values on the target system.
Be sure you have current system value inventories on your target systems.

Note

There are some limitations to the values which you can distribute, such as QTIME.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Synchronizing date and time values


To synchronize the date and time values across your network, just select your endpoint
systems or system groups whose date and time values you want to update from the list
under Management Central in System i Navigator.
The date and time system values that are updated on the target systems include system
date (QDAYOFWEEK, QDATE, QDAY, QMONTH, QYEAR), time of day (QTIME, QHOUR,
QMINUTE, QSECOND), and time zone (QTIMZON). Instead of immediately replacing the
current time with a new time value, the time adjustment is made incrementally over a
period of time by slowing down or speeding up time.
The time used from the model IBM Power System with IBM i is the software clock time
rather than the QTIME system value. The software clock time is the same as the QTIME
system value except when the Simple Network Time Protocol (SNTP) client is started on
the model system. When SNTP is running on the model system, the software clock is
synchronized to the time server specified in the SNTP configuration.
You can choose to synchronize the time without changing the time zone or synchronize
both the time and the time zone with those on the model system. When a system changes
to or from Daylight Saving Time (DST), the GMT offset (QUTCOFFSET) system value is
automatically updated from the GMT offset attribute of the time zone (QTIMZON) system
value.

2-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Compare and update


IBM i

• Use drop-down menu to select category


– Values to compare change based on category
• Lists current values of endpoint systems
• Inventory must be collected first in order to compare

© Copyright IBM Corporation 2012

Figure 2-57. Compare and update OL1914.1

Notes:
The Target Systems table is updated showing the selected system value in the heading of
the second column and the current value (as obtained from the system values inventory
database) for each target system.
The Summary category displays a list of the all system values you have selected for
update. Quick access to the Summary category is also provided by the Summary button
(the button with the pencil icon next to the category drop down).

Note

If system values inventory collection has not been done for a target system, a value not
collected is specified in the second column of the target system table for that target system.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Fixes functions
IBM i

• Install wizard
• Uninstall wizard
• Clean Up wizard
– Cover letters
– Save files
• Compare and Update
wizard
• Compare and update
multiple systems and
groups in one operation
• Schedule fix functions
• All systems must be at
V4R4 or higher
© Copyright IBM Corporation 2012

Figure 2-58. Fixes functions OL1914.1

Notes:
Managing fixes among several systems can be cumbersome. Wizards provide guided
procedures to assist you.
Wizards are available to guide you through these tasks:
• Installing fixes
• Permanently installing fixes
• Sending and installing fixes
• Uninstalling fixes
• Comparing and updating fixes
For example, to install multiple fixes, you select the fixes from a list and start the Install
wizard.
You can schedule these fixes at the time you want.

2-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty You can run CL commands as part of completing fix installations or as part of normal
day-to-day operations.
Send function allows you to send PTFs to another system or group. The PTF must have an
existing save file on the system. You can also choose to send requisite PTFs, even if they
are installed. This function has to be used from the Fixes Inventory tree.
Send and install provides an additional wizard, which can be used to install PTFs.
Cleanup function is used for removing PTFs that are not needed anymore. The parameters
for this function are Fix-ID, Product-ID and release of the PTF.
Install provides you with a wizard that takes you through the PTF installation steps. You
only have to confirm the system on which the PTFs should be installed, choose the PTFs,
and state if the PTFs should be installed immediately or when the IBM Power System with
IBM i is going to be restarted. It is also possible to restart the system from within this
wizard.
Uninstall is also wizard-driven. It allows you to choose to uninstall the PTFs temporarily or
permanently, immediately, or delayed. It is also possible to restart the system from within
this wizard.
Permanently Install uses a wizard. You have to state whether the PTFs should be installed
immediately or when the IBM Power System with IBM i is going to be restarted next time.
You can also restart the system from within this wizard.
Cancel Actions allows you to cancel any fix actions that were set to occur at the next restart
of a system. You can also specify what fixes to cancel actions on if the cancel actions are
being done on a group of systems. You can cancel actions immediately or schedule that
activity to begin at a later time.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Send and Install Fixes wizard


IBM i

• Wizard guides you through process


– Confirm selection of fixes
– Select systems
– Advanced
• Send requisite fixes
– Summary
– Schedule

© Copyright IBM Corporation 2012

Figure 2-59. Send and Install Fixes wizard OL1914.1

Notes:
You can distribute some or all of the fixes that you receive to a remote system with
Management Central. However, you must have the save files to distribute the fixes. If you
receive PTFs on media, you can use the Copy from Media function available from System i
Navigator to place the save files for the fixes onto your source system.

2-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Compare and Update wizard (1 of 3)


IBM i

• Management
Central
– Endpoint system or
system group
• Right-click
• Select Fixes
• Select Compare
and Update

© Copyright IBM Corporation 2012

Figure 2-60. Compare and Update wizard (1 of 3) OL1914.1

Notes:
To compare and update the levels of your fixes inventory, you need to define a model
system and a source system. Your source system has the fix save files on it. Use your
model system to compare against other systems in your network to ensure that your other
systems have the same level of fixes like the model system. The Compare and Update
wizard finds missing fixes and extra fixes on the target systems.
Each wizard has a welcome screen that explains what it accomplishes.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Compare and Update wizard (2 of 3)


IBM i

• Select products
– All or specific
products
• Default is
All products

© Copyright IBM Corporation 2012

Figure 2-61. Compare and Update wizard (2 of 3) OL1914.1

Notes:

2-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Compare and Update wizard (3 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 2-62. Compare and Update wizard (3 of 3) OL1914.1

Notes:
The third screen of the Compare and Update wizard allows the user to choose to apply
missing fixes (those installed on the model but not on the target system) or extra fixes
(those installed on the target but not the model system) or both missing and extra fixes to
the target system.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Manage users and groups


IBM i

You can manage users and groups across multiple systems.


• Create user definition.

• Create, edit, and delete users or groups.

• Scan for owned objects across systems.

• Collect and search inventory of users and groups.

• Send users or groups from one system to multiple systems.

© Copyright IBM Corporation 2012

Figure 2-63. Manage users and groups OL1914.1

Notes:
You can manage your users and groups across multiple systems using Management
Central. You can do tasks such as:
• Create a user definition and then create multiple users across multiple systems based
on the definition
• Create, edit, and delete users and groups across multiple endpoint systems or system
groups and even schedule these actions
• Scan for owned objects to find out what objects a user or group owns across multiple
endpoint systems or system groups, and even scan owned objects for multiple users
simultaneously
• Collect an inventory of the users and groups on one or more endpoint systems and then
view, search, or export that inventory to a PC file
• Send users and groups from one system to multiple endpoint systems or system
groups. Unlike the Copy action, the Send function copies as many user properties as

2-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty possible to the target system(s), including the user name and password, security
settings, authorities, and mail options
All i special authorities and other authorities that are needed when working with users and
groups through a 5250 emulation screen are honored when managing users and groups
with Management Central. This includes security administration (*SECADM) privileges and
authority to the profiles with which you're working.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create user definition


IBM i

© Copyright IBM Corporation 2012

Figure 2-64. Create user definition OL1914.1

Notes:
A user definition is an easy way to create a new user on multiple endpoint systems or
system groups. Create user definitions for the various types of users on your system. Then,
when a request comes in for a new user, all special authorities, auditing, session startup,
and other information common to that type of user is already there. You only need to
specify the name for the user, a brief description to help you identify this user in a list of
users, and a new password for the user. All other properties of the new user are based on
the properties stored in the user definition unless you choose to change them. You may
also select the groups the user should belong to and provide personal information about
the user at the time the user is created.
You can create the new user immediately, or you can schedule a later time when you want
the user to be created. For example, you can create a user definition named Accounting
Users, which specifies all the special authorities and other properties that the users in your
accounting department need. Then, at any time, you can create one or more new users
based on that definition on any endpoint system or system group.

2-86 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty In the user definition, you can specify a command or program to run on the target IBM
Power System with IBM i immediately after a user is created successfully on the system.
The command or program is run when a user is created from the definition. This can be any
command that can be used in the i batch environment. You cannot run an interactive
command. You can use the replacement variable and USER any place in the command
where you want the command to substitute the name of the user that is being created. For
example, you could specify the command CRTLIB and USER to create a library with the
user name as the name of the library. This creates a library each time the definition is used
to create a user.
When creating a new user from a definition, you can change properties of the new user,
and this does not affect the properties defined in the user definition. Or you can simply use
the definition properties for each new user you create, and then just specify a name and
password for the user.

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Reference Redbook SG24-5407


IBM i

© Copyright IBM Corporation 2012

Figure 2-65. Reference Redbook SG24-5407 OL1914.1

Notes:
The Redbook mentioned in the visual (SG24-5407) can be downloaded from the Redbooks
web site http://www.redbooks.ibm.com.
Even though this Redbook was written at the V4R4 level, it is still a relevant publication that
can be used the learn the features and functions that are supported by Management
Central.

2-88 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Additional resources
IBM i

• Web sites:
– Navigator for IBM i homepage
http://www-03.ibm.com/systems/i/software/navigator/index.html

– Information Center for IBM Power Systems with IBM i


http://publib.boulder.ibm.com/eserver/ibmi.html

© Copyright IBM Corporation 2012

Figure 2-66. Additional resources OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Management Central inventory and


system values
IBM i

At the end of the lab, you should be able to:


• Collect the inventory on a system
• View the inventory
• Search the inventory
• Export the inventory
• Collect the system values inventory

© Copyright IBM Corporation 2012

Figure 2-67. Exercise: Management Central inventory and system values OL1914.1

Notes:
The material presented in this unit reviewed some of the more basic concepts you learned
from on-the-job experience or through the IBM Power System with IBM i Operator’s course.
A good understanding of these concepts is necessary to complete the remainder of the
course material.

2-90 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint
IBM i

1. True or False: Management Central is a suite of systems management functions


that allows you to manage multiple systems in a TCP/IP network environment.

2. True or False: The Management Central server must be running in order for that
system to be visible in the Management Central view of systems.

3. True or False: Once an IBM Power System with IBM i is defined as the central
server you cannot define a different system as your central server.

4. True or False: Endpoint systems can be added either manually or automatically.

5. True or False: The advanced job scheduler is automatically included with every
IBM Power System with IBM i that is shipped from IBM.

6. True or False: Using Application Administration, it is possible to secure the


Management Central functions.

© Copyright IBM Corporation 2012

Figure 2-68. Checkpoint OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 2. Management Central overview 2-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe the capabilities of Management Central
• Create links to IBM Power Systems with IBM i
• Define in Management Central the central system, endpoint
systems, and system groups
• Define and perform the major functions of Management
Central

© Copyright IBM Corporation 2012

Figure 2-69. Unit summary OL1914.1

Notes:

2-92 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 3. Security concepts and overview

What this unit is about


The IBM Power Systems with IBM i family covers a wide range of
users. Security on these systems, is flexible enough to meet the
requirements of this wide range of users and situations. You need to
understand the features and options available so that you can adapt
them to your own security requirements.
In this unit, we will overview the tools at your disposal to secure your
system, control what users are allowed to do, and secure who can
access the data and limit what they do can to that data. This unit will
discuss the concepts, and the following units will cover the specific
details.

What you should be able to do


After completing this unit, you should be able to:
• List and discuss the objectives of system security
• Describe what physical security entails
• Discuss what keylock security means
• List and describe the capabilities of the system tools available to
secure your system

How you will check your progress


• Checkpoint questions

References
SC41-5302-11 IBM i 7.1 Security – Security Reference
IBM Publications Center:
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US
IBM i Information Center:
http://publib.boulder.ibm.com/iseries/

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• List and discuss the objectives of system security
• Describe what physical security entails
• Discuss what keylock security means
• List and describe the capabilities of the system tools available
to secure your system

© Copyright IBM Corporation 2012

Figure 3-1. Unit objectives OL1914.1

Notes:

3-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

The objectives of system security


IBM i

• Confidentiality
– Protecting against disclosing information to unauthorized people
– Restricting access to confidential information
– Protecting against curious system users and outsiders

• Integrity
– Protecting against unauthorized changes to data
– Restricting manipulation of data to authorized programs
– Providing assurance that data is trustworthy

• Availability
– Preventing accidental changes or destruction of data
– Protecting against attempts by outsiders to abuse or destroy system
resources

© Copyright IBM Corporation 2012

Figure 3-2. The objectives of system security OL1914.1

Notes:
System security is often associated with external threats, such as hackers or business
rivals. However, protection against system accidents by authorized system users is often
the greatest benefit of a well-designed security system. In a system without good security
features, pressing the wrong key might result in deleting important information. System
security can prevent this type of accident.
The best security system functions cannot produce good results without good planning.
Security that is set up in small pieces, without planning, can be confusing. It is difficult to
maintain and to audit. Planning does not imply designing the security for every file,
program, and device in advance. It does imply establishing an overall approach to security
on the system and communicating that approach to application designers, programmers,
and system users.

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Questions when planning for security


IBM i

• As you plan security on your system and decide how much


security you need, consider the following questions:
– Is there a company policy or standard that requires a certain level of
security?

– Do the company auditors require some level of security?

– How important is your system and the data on it to your business?

– How important is the error protection provided by the security


features?

– What are your company security requirements for the future?

© Copyright IBM Corporation 2012

Figure 3-3. Questions when planning for security OL1914.1

Notes:
To facilitate installation, many of the security capabilities on your system are not activated
when your system is shipped. Recommendations are provided in this topic collection to
bring your system to a reasonable level of security. Consider the security requirements of
your own installation as you evaluate the recommendations.

3-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Physical security
IBM i

Computer room System

Keep
Out

Display stations
Backup tapes

© Copyright IBM Corporation 2012

Figure 3-4. Physical security OL1914.1

Notes:
Physical security includes protecting the system unit, system devices, and backup media
from accidental or deliberate damage. Most measures you take to ensure the physical
security of your system are external to the system. However, the system is equipped with a
keylock that prevents unauthorized functions at the system unit.

Note

You must order the keylock feature on some models.

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Keylock security
IBM i

Low High

Manual Normal Automatic Secure

Use ded service tools Yes No No No


Load system from tape Yes No No No
Change IPL source Yes No No No
IPL through switch Yes Yes No No
Remote IPL No Yes Yes No
PWRDWNSYS: Workstation Yes Yes Yes Yes
Off through power switch Yes No No No

© Copyright IBM Corporation 2012

Figure 3-5. Keylock security OL1914.1

Notes:
You can retrieve and change the keylock position by using the Retrieve IPL Attributes
(QWCRIPLA) API or the Change IPL Attributes (CHGIPLA) command.
The keylock on the 940x control panel controls access to various system control panel
functions.
The keylock feature allows the remote user access to additional functions available at the
control panel. For example, it controls where the machine will IPL from and to what
environment, either IBM i or dedicated service tools (DST).
The IBM i system value, QRMTIPL controls the option to IPL the system remotely through a
telephone line. This value is shipped defaulted to off which will not allow the keylock to be
overridden. The system value can be changed to allow remote access, but does require
*SECADM and *ALLOBJ special authorities to change.
The IBM i system value, QRMTSRVATR, (Remote Service Attribute) controls the remote
system service problem analysis ability. The value allows the system to be analyzed
remotely. This value is shipped defaulted to off which will not allow the keylock to be

3-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty overridden. The system value can be changed to allow remote access, but does require
*SECADM and *ALLOBJ special authorities to change.

Note

You must order the keylock feature on some models.

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Monitoring physical security


IBM i

• Verify that the keylock switch is in SECURE or AUTO and that


the key is removed.
• Prevents:
– Turning system off with power switch
– Turning system on with power switch (SECURE only)
• If the computer is behind a door locked using an entry code,
ensure that the code is changed regularly.
• Restrict physical access to save and restore devices, such as
tape units and optical units.
• Ensure backup media is protected from damage and theft.
• Restrict access to publicly located workstations and the
console.

© Copyright IBM Corporation 2012

Figure 3-6. Monitoring physical security OL1914.1

Notes:

3-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System tools used to secure your system


IBM i

• Security level

• System values

• Signing

• Single sign-on enablement

• User profiles

• Groups profiles

• Resource security

• Data encryption

• Security audit journal

© Copyright IBM Corporation 2012

Figure 3-7. System tools used to secure your system OL1914.1

Notes:
Security level
There are five levels of security that can be set with the QSECURITY system value. The
different levels that can be specified are level 10, 20, 30, 40 or 50. Specific details will be
covered later in the class.
System values
Allow you to define system-wide security settings and allow you to provide customization
for many characteristics of your Power System with IBM i.
Signing
Signing your software object is particularly important if the object has been transmitted
across the Internet or stored on media which you feel might have been modified. The digital
signature can be used to detect if the object has been altered.
Digital signatures, and their use for verification of software integrity can be managed
according to your security policies using the Verify Object Restore (QVFYOBJRST) system
value, the Check Object Integrity (CHKOBJITG) command, and the Digital Certificate

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Manager tool. Additionally, you can choose to sign your own programs (all licensed
programs shipped with the system are signed).
Single signon enablement
Single signon is an authentication process in which a user can access more than one
system by entering a single user ID and password. To enable a single sign-on environment,
IBM provides two technologies that work together to enable users to sign in with their
Windows user name and password and be authenticated to Power Systems with IBM i
platforms in the network: Network Authentication Service (NAS) and Enterprise Identity
Mapping (EIM). Windows 2000, Windows XP, AIX, and z/OS use Kerberos protocol to
authenticate users to the network. A secure, centralized system, called a key distribution
center, authenticates principals (Kerberos users) to the network.
User profiles
The user profile is powerful and flexible tool used to control what the user can do and
customize the way the system appears to that user.
Groups profiles
A group profile is a special type of user profile. Rather than giving authority to each user
individually, you can use a group profile to define authority for a group of users.
Resource security
The ability to access an object is called authority. Resource security on the IBM i operating
system enables you to control object authorities by defining who can use which objects and
how those objects can be used.
You can specify detailed authorities, such as adding records or changing records. Or you
can use the system-defined subsets of authorities: *ALL, *CHANGE, *USE, and
*EXCLUDE.
Files, programs, and libraries are the most common objects requiring security protection,
but you can specify authority for any object on the system.
Data encryption
IBM i offers the possibility to encrypt data at ASP level and Database Column level. ASP
encryption can be turned off and on and the data encryption key can be changed for an
existing user ASP. These changes take a significant amount of time as all the data in the
disk pool needs to be processed. This would affect system performance.'field procedures.
Field procedures are user written exit programs that get executed every time a column is
changed or new values are inserted.
Security audit journal
You can use security audit journals to audit the effectiveness of security on your system.
The IBM i operating system provides the ability to log selected security-related events in a
security audit journal. Several system values, user profile values, and object values control
which events are logged.

3-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security is always active


IBM i

SIGNON:
Harry

MENU AUTHORITY

PAYROLL
AUTHORITY
MENU

PAYEDIT
AUTHORITY
PROGRAM

Operational
Read
PAYROLL
Execute
DATA

© Copyright IBM Corporation 2012

Figure 3-8. Security is always active OL1914.1

Notes:
On the Power Systems with BM i, security has been architected from the ground up.
Security is always available and active. Based on what level of security you choose to
configure and implement, will determine how secure your system will be.

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint
IBM i

1. True or False: The objectives of security are confidentiality, integrity,


and availability.

2. Physical security includes which of the following?


a. Controlling access to the CPU
b. Securing the tapes used for backup
c. Securing the printers connected to your system
d. All of the above

3. Which of the following is not one of the modes you can select for your
system?
a. Manual
b. Normal
c. Automatic
d. Secure
e. Lockdown

© Copyright IBM Corporation 2012

Figure 3-9. Checkpoint OL1914.1

Notes:

3-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• List and discuss the objectives of system security
• Describe what physical security entails
• Discuss what keylock security means
• List and describe the capabilities of the system tools available
to secure your system

© Copyright IBM Corporation 2012

Figure 3-10. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 3. Security concepts and overview 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

3-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 4. Security-related system values

What this unit is about


There are three components used to implement security on this
system. The operating system continually checks system values, user
profiles, and an object's resource security as it receives requests from
users to determine if that user will be allowed to access the object in
question.
In this unit, we will discuss system values and how you use these to
customize many characteristics of your system. Security is an integral
part of the operating system. It is not an add-on or extra purchase
feature of an application.

What you should be able to do


After completing this unit, you should be able to:
• List and explain the levels of security available
• Describe the capability in service tools to lock out users from
changing system values
• List the steps to move from one security level to another
• Define the different categories of system values available
• Explain how to use security policies to set system values
• List the commands used to set system values when using an
emulation
• List the steps used in IBM i Navigator to manipulate system values
• List the steps used in Systems Director Navigator for IBM i to
manipulate system values

How you will check your progress


• Checkpoint questions

References
SC41-5302-11 IBM I 7.1 Security - Security Reference (chapter 3)
IBM Publications Center:

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=U
S
IBM infocenter for i:
http://publib.boulder.ibm.com/iseries/

4-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit objectives
IBM i

After completing this unit, you should be able to:


• List and explain the levels of security available
• Describe the capability in service tools to lock out users from
changing system values
• List the steps to move from one security level to another
• Define the different categories of system values available
• Explain how to use security policies to set system values
• List the commands used to set system values when using an
emulation
• List the steps used in IBM i Navigator to manipulate system
values
• List the steps used in Systems Director Navigator for IBM i to
manipulate system values
© Copyright IBM Corporation 2012

Figure 4-1. Unit objectives OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security components
IBM i

People Objects
(users) (resources)
Individual
User profiles
objects

Job descriptions Library/directory

Group profiles Authorization lists

System values

© Copyright IBM Corporation 2012

Figure 4-2. Security components OL1914.1

Notes:
There are three components used to implement security on this system. The operating
system continually checks system values, user profiles, and objects as it receives requests
from users to determine if that user will be allowed to access the object in question.
In this unit, we will discuss system values and how you use these to customize many
characteristics of your system.
Security is an integral part of the operating system. It is not an add-on or extra purchase
feature of an application.

4-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security-related system values


IBM i

• Purpose
– Used to define customized (security) characteristics on the system
• How to set
– 5250 emulation
• WRKSYSVAL: Work with system values
• CHGSYSVAL: Directly change system values
– IBM i Navigator
• Configuration and Service > System Values
– IBM Systems Director Navigator for i
• Configuration and Service > System Values
• Authority required
– Must have *SECADM and *ALLOBJ authority to change security -related system
values
– Can be locked with an option through dedicated service tools (DST) or system
service tools (SST)

© Copyright IBM Corporation 2012

Figure 4-3. Security-related system values OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Locking system values using service tools


IBM i

Steps to lock/unlock using STRSST:


1. Sign on to an emulation session.
2. Enter the STRSST command.
3. Type your service tools user ID and password.
4. Select option 7 = Work with system security.
5. Select option 1 to lock or option 2 to unlock.

Steps to lock/unlock using DST:


1. Load the initial program in attended mode.
2. Select option 3 = Use dedicated service tools from the IPL or
Install System display.
3. Sign on to DST with your service tools user ID and password.
4. Select option 13 = Work with system security.
5. Select option 2 to lock or option 1 to unlock.
© Copyright IBM Corporation 2012

Figure 4-4. Locking system values using service tools OL1914.1

Notes:
You can use system service tools (SST) or dedicated service tools (DST) to lock and
unlock the security-related system values. However, you must use DST if you are in
recovery mode because SST is not available during this mode. Otherwise, use SST to lock
or unlock the security-related system values.
You can restrict the following system values by using the lock option:
QALWJOBITP QAUTORMT QLMTDEVSSN QPWDLMTREP
QRETSVRSEC QALWOBJRST QAUTOVRT QLMTSECOFR
QPWDLVL QRMTSIGN QALWUSRDMN QCRTAUT
QMAXSGNACN QPWDMAXLEN QRMTSRVATR QAUDCTL
QCRTOBJAUD QMAXSIGN QPWDMINLEN QSCANFS
QAUDENACN QDEVRCYACN QPWDCHGBLK QPWDPOSDIF
QSCANFSCTL QAUDFRCLVL QDSPSGNINF QPWDEXPITV

4-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty QPWDRQDDGT QSECURITY QAUDLVL QDSCJOBITV


QPWDEXPWRN QPWDRQDDIF QSHRMEMCTL QAUDLVL2
QFRCCVNRST QPWDLMTAJC QPWDRULES QUSEADPAUT
QAUTOCFG QINACTMSGQ QPWDLMTCHR QPWDVLDPGM
QVFYOBJRST

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 1: Setting the level of security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 4-5. Topic 1: Setting the level of security OL1914.1

Notes:

4-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

QSECURITY system value


IBM i

• Purpose:
– Used to specify the level of security to be enforced on the system.

• How to set:
– 5250 emulation: WRKSYSVAL QSECURITY
– IBM i Navigator: Configuration and Service > System Values >
Security > General tab
– IBM Systems Director Navigator for i: Configuration and Service >
System Values > Security (properties) > General tab

• Authority required:
– Must have *SECADM and *ALLOBJ authority to change system values
– Can be locked with an option through service tools (DST and SST)

• Journal entry:
– SV
© Copyright IBM Corporation 2012

Figure 4-6. QSECURITY system value OL1914.1

Notes:
System security level specifies the level of security on the system. A change to this system
value takes effect at the next IPL.
The shipped value is 40 (Protect from undocumented system interfaces)

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

QSECURITY system value: Security level


IBM i

Level 50 Enhanced integrity

Level 40 System integrity


Level 30 Resource

Level 20 Password

Recommended value: Level 40

© Copyright IBM Corporation 2012

Figure 4-7. QSECURITY system value: Security level OL1914.1

Notes:
You can choose how much security you want the system to enforce by setting the security
level (QSECURITY) system value. If you want to change the security level, use the Work
with System Values (WRKSYSVAL) command.
The comparison of the functions supported by the different levels of security is:

Function Level 30 Level 40 Level 50


User name required to sign on. Yes Yes Yes
Password required to sign on. Yes Yes Yes
Password security active. Yes Yes Yes
Menu and initial program
Yes Yes Yes
security active.
Limit capabilities support
Yes Yes Yes
active.
Resource security active. Yes Yes Yes

4-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Function Level 30 Level 40 Level 50


Access to all objects. No No No
User profile created
No No No
automatically.
Security auditing capabilities
Yes Yes Yes
available.
Programs that contain
restricted instructions cannot Yes Yes Yes
be created or recompiled.
Programs that use
unsupported interfaces fail at No Yes Yes
run time.
Enhanced hardware storage
protection is enforced for all No Yes Yes
storage.
Library QTEMP is a temporary
No No No
object.
*USRSPC, *USRIDX, and *USRQ
objects can be created only in
Yes Yes Yes
libraries specified in the
QALWUSRDMN system value.
Pointers used in parameters
are validated for user domain
No Yes Yes
programs running in system
state.
Message handling rules are
enforced between system and No No Yes
user state programs.
A program's associated space
No Yes Yes
cannot be directly modified.
Internal control blocks are
No Yes Yes
protected.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security level 40
IBM i

Level 50 Enhanced integrity


Level 40 System integrity
Level 30 Resource
Level 20 Password

• Prevents use of unsupported interfaces


• Prevents use of restricted instructions
• Controls use of job descriptions on SBMJOB
• Prevents sign-on without a user ID and password
• Enhanced hardware storage protection
• Default for QSECURITY system value

© Copyright IBM Corporation 2012

Figure 4-8. Security level 40 OL1914.1

Notes:
Level 40 is referred to as system integrity security. At this level, the system itself is
protected against users. User-written programs cannot directly access the internal control
blocks through pointer manipulation.
Select system security level using System i Navigator panels.
Security level 40:
• Prevents accessing objects through unsupported interfaces. Example: Calling the
command processing program for the SIGNOFF command
• Prevents accessing internal system structures with C/400, Pascal or Assembler
• Controls use of job descriptions on SBMJOB
• Does not allow *SBSD to allow signon without entering userid and password
• Enables enhanced hardware storage protection, defining system information on disk as
read-write, read only, or no access
At level 20-30, action is usually allowed but logged to QAUDJRN journal.
At level 40-50, action usually fails and is logged to QAUDJRN journal.

4-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Steps to change from level 30 to level 40


IBM i

1. Activate the security auditing function.

2. Set the QAUDLVL system value to include *AUTFAIL and


*PGMFAIL.

3. Monitor the audit journal for *AUTFAIL and *PGMFAIL entries


while running all of your applications at security level 30.

4. If you have any programs that were created before Version 1


Release 3, use the CHGPGM command with the FRCCRT
parameter to create validation values for those programs.

5. Make corrections to any applications that are logging failures.

6. Change the QSECURITY value to 40 and perform an IPL.

© Copyright IBM Corporation 2012

Figure 4-9. Steps to change from level 30 to level 40 OL1914.1

Notes:
Before migrating to level 40, make sure that all of your applications run successfully at
security level 30. Security level 30 gives you the opportunity to test resource security for all
of your applications. Follow these steps to migrate to security level 40:
1. Activate the security auditing function, if you have not already done so.
2. Make sure that the QAUDLVL system value includes *AUTFAIL and *PGMFAIL.
*PGMFAIL logs journal entries for any access attempts that violate the integrity
protection at security level 40.
3. Monitor the audit journal for *AUTFAIL and *PGMFAIL entries while running all of your
applications at security level 30. Pay particular attention to the following reason codes
in AF type entries:
C: Object validation failure
D: Unsupported interface (domain) violation
J: Job-description and user-profile authorization failure

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

R: Attempt to access protected area of disk (enhanced hardware storage protection)


S: Default sign-on attempt
These codes indicate the presence of integrity exposures in your applications. At
security level 40, these programs fail.
4. If you have any programs that were created before Version 1 Release 3, use the
CHGPGM command with the FRCCRT parameter to create validation values for those
programs. At security level 40, the system translates any program that is restored
without a validation value. This can add considerable time to the restore process.

Note

Restore program libraries as part of your application test. Check the audit journal for
validation failures.

5. Based on the entries in the audit journal, take steps to correct your applications and
prevent program failures.
6. Change the QSECURITY value to 40 and perform an IPL.

4-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security level 50
IBM i

Level 50 Enhanced integrity


Level 40 System integrity
Level 30 Resource
Level 20 Password

• QTEMP: Enhanced protection from other jobs


• Parameter validation when calling system programs
• Message handling restrictions between user and system
programs
• Internal control blocks protected from modification
• Restricting user domain object types (*USRSPC, *USRIDX, and
*USRQ)
© Copyright IBM Corporation 2012

Figure 4-10. Security level 50 OL1914.1

Notes:
Level 50 is referred to as enhanced system integrity security. Level 50 is the recommended
level of security for most businesses because it offers the highest level of security currently
possible. Not only is the system protected against user-written programs, but it ensures
that users only have access to data on the system, rather than information about the
system itself. This offers greater security against anyone attempting to learn about your
system.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Steps to change to security level 50


IBM i

1. Evaluate the QALWUSRDMN system value.

2. Recompile any COBOL programs that were compiled using a


pre-V2R3 compiler.

3. Recompile any S/36 environment COBOL programs that


were compiled using a pre-V2R3 compiler.

4. Recompile any RPG/400 or System/38 environment RPG


programs that use display files if they were compiled using a
pre-V2R2 compiler.

5. Change the security value to 50, and perform an IPL.

© Copyright IBM Corporation 2012

Figure 4-11. Steps to change to security level 50 OL1914.1

Notes:
If your current security level is 30 or 40, you need to evaluate the QALWUSRDMN value and
recompile some programs to prepare for security level 50.
Most of the additional security measures that are enforced at security level 50 do not cause
audit journal entries at lower security levels. Therefore, an application cannot be tested for
all possible integrity error conditions before changing to security level 50.
The actions that cause errors at security level 50 are uncommon in normal application
software. Most software that runs successfully at security level 40 also runs at security
level 50.
If you are currently running your system at security level 30 or 40, do the following to
prepare for security level 50:
1. Evaluate the QALWUSRDMN system value. Controlling user domain objects is important
to system integrity.
2. Recompile any COBOL programs that assign the device in the SELECT clause to
WORKSTATION if the COBOL programs were compiled using a pre-V2R3 compiler.

4-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty 3. Recompile any S/36 environment COBOL programs that were compiled using a
pre-V2R3 compiler.
4. Recompile any RPG/400 or System/38 environment RPG programs that use display
files if they were compiled using a pre-V2R2 compiler.
You can go directly from security level 30 to security level 50. Running at security level 40
as an intermediate step does not provide significant benefits for testing.
If you are currently running at security level 40, you can change to security level 50 without
extra testing. Security level 50 cannot be tested in advance. The additional integrity
protection that is enforced at security level 50 does not produce error messages or journal
entries at lower security levels.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System Values: Security (1 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 4-12. System Values: Security (1 of 2) OL1914.1

Notes:
The steps to follow when using IBM i Navigator to change the QSECURITY System Value
are:
1. Expand the Configuration and Service branch on the function tree.
2. Click the System Values sub-branch to see the categories displayed on the right pane.
3. Double-click Security in the right pane to see the panel displayed in the lower right
corner on the visual.
4. Select the level of security that is to be implemented, and then click OK.
5. IPL the system (partition) for this change to take effect.

4-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System Values: Security (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 4-13. System Values: Security (2 of 2) OL1914.1

Notes:
The steps to follow when using IBM Systems Director Navigator for i to change the
QSECURITY System Value are:
1. Click Configuration and Service; the Configuration and Service tab appears on the
right pane.
2. On the right pane, click System Values; the System Values tab is displayed on the right
pane
3. On the right pane, in the Category column, click the Security pop-up button [»], and
click the Properties option.
4. Select the level of security that is to be implemented, and click OK.
5. An IPL of the partition is needed to effectuate this change.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Using 5250 emulation to


configure system values

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 4-14. Topic 2: Using 5250 emulation to configure system values OL1914.1

Notes:

4-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

General security system values


IBM i

• Purpose
– Specify system values that control security on the system.

• How to set
– WRKSYSVAL *SEC
• (Work with the system values that are in the security category.)

• Authority required
– User profile must have *ALLOBJ and *SECADM authority.

• Journal entry
– SV

© Copyright IBM Corporation 2012

Figure 4-15. General security system values OL1914.1

Notes:
General security system values allow you to set security function to support the decisions
you made when developing your security policy. Most of the changes take affect
immediately and do not require an IPL of the system.
General system values that control security on your system are as follows:
QALWUSRDMN: Allow user domain objects in the libraries
QCRTAUT: Create default public authority
QDSPSGNINF: Display signon information
QFRCCVNRST: Force conversion on restore
QINACTITV: Inactive job timeout interval
QINACTMSGQ: Inactive job message queue
QLMTDEVSSN: Limit device sessions
QLMTSECOFR: Limit security officer

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

QMAXSIGN: Maximum sign-on attempts


QMAXSGNACN: Action when maximum sign-on attempts exceeded
QRETSVRSEC: Retain server security
QRMTSIGN: Remote sign-on requests
QSCANFS: Scan file systems
QSCANFSCTL: Scan file systems control
QSECURITY: Security level
QSHRMEMCTL: Shared memory control
QUSEADPAUT: Use adopted authority
QVFYOBJRST: Verify object on restore

4-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security-related system values


IBM i

• Purpose
– Specify system values that relate to security on the system.

• How to set
– WRKSYSVAL

• Authority required
– User profile must have *ALLOBJ and *SECADM authority.

• Journal entry
– SV

© Copyright IBM Corporation 2012

Figure 4-16. Security-related system values OL1914.1

Notes:
The following information are descriptions of additional system values that relate to security
on your system. These system values are not included in the *SEC group on the Work with
System Values display.
QAUTOCFG: Automatic device configuration
QAUTOVRT: Automatic configuration of virtual devices
QDEVRCYACN: Device recovery action
QDSCJOBITV: Disconnected job timeout interval
QRMTSRVATR: Remote service attribute
QSSLCSL: Secure Sockets Layer (SSL) cipher specification list (New at V6R1)
QSSLCSLCTL: Secure Sockets Layer (SSL) cipher control (New at V6R1)
QSSLPCL: Secure Sockets Layer (SSL) protocols (New at V6R1)

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security-related restore system values


IBM i

• Purpose
– Controls how and which security-related objects are restored on the
system.

• How to set
– WRKSYSVAL *SEC

• Authority required
– User profile must have *ALLOBJ and *SECADM authority.

• Journal entry
– SV

© Copyright IBM Corporation 2012

Figure 4-17. Security-related restore system values OL1914.1

Notes:
The following information are descriptions of system values that relate to restoring
security-related objects on the system which should be considered when restoring objects
as well.
QVFYOBJRST: Verify object on restore
QFRCCVNRST: Force conversion on restore
QALWOBJRST: Allow restoring of security sensitive objects

4-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System values that apply to passwords


IBM i

• Purpose
– Specify system values to set requirements for the passwords users
assign.

• How to set
– WRKSYSVAL *SEC

• Authority required
– User profile must have *ALLOBJ and *SECADM authority.

• Journal entry
– SV

© Copyright IBM Corporation 2012

Figure 4-18. System values that apply to passwords OL1914.1

Notes:
The system values control passwords:
QPWDCHGBLK: Block password change (New at V6R1)
QPWDEXPITV: Expiration interval
QPWDEXPWRN: Password expiration warning (New at V6R1)
QPWDLVL: Password level
QPWDLMTCHR: Restricted characters
QPWDLMTAJC: Restrict adjacent characters
QPWDLMTREP: Restrict repeating characters
QPWDMINLEN: Minimum length
QPWDMAXLEN: Maximum length
QPWDPOSDIF: Character position difference
QPWDRQDDIF: Required difference

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

QPWDRQDDGT: Require numeric character


QPWDRULES: Password rules (New at V6R1)
QPWDVLDPGM: Password validation program

4-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System values that control auditing


IBM i

• Purpose
– Specify system values to control security auditing on the system.

• How to set
– WRKSYSVAL *SEC

• Authority required
– User profile must have *AUDIT authority.

• Journal entry
– SV

© Copyright IBM Corporation 2012

Figure 4-19. System values that control auditing OL1914.1

Notes:
These system values control auditing on the system:
QAUDCTL: Auditing control
QAUDENDACN: Auditing end action
QAUDFRCLVL: Auditing force level
QAUDLVL: Auditing level
QAUDLVL2: Auditing level extension
QCRTOBJAUD: Create default auditing

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Using IBM i Navigator to


configure system values

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 4-20. Topic 3: Using IBM i Navigator to configure system values OL1914.1

Notes:

4-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Configuration and Service: System Values


IBM i

© Copyright IBM Corporation 2012

Figure 4-21. Configuration and Service: System Values OL1914.1

Notes:
Changes to the majority of the system values will take effect immediately. An IPL is
required only when changing the security level (QSECURITY) system value or the
password level (QPWDLVL) system value.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System Values: Date and Time


IBM i

© Copyright IBM Corporation 2012

Figure 4-22. System Values: Date and Time OL1914.1

Notes:
Date:
Use the Date tab to specify the current date for your system. The Date tab also specifies a
leap year adjustment that ensures that the system date is correct when a leap year occurs.
System date: The system supports dates that range from August 24, 1928 to July 6, 2053.
To change only the year, highlight the year and click the up or down arrow. To change only
the month, highlight the month and click the up or down arrow.
System value: QDAYOFWEEK, QDATE, QDAY, QMONTH, and QYEAR.
Special considerations: The system date is automatically updated when the time reaches
midnight, 12:00:00 AM.
Leap year adjustment: Adjusts the system calendar for the leap year in different calendar
systems. If your calendar year agrees with the Gregorian calendar system, select Use
Gregorian leap year adjustment. If your calendar year differs from the Gregorian, adjust
the system calendar to account for the leap year of the calendar year you are using. To
make the adjustment, divide the leap year in your calendar system by 4; then set Leap

4-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty year adjustment to the value of the remainder. For example, the Gregorian calendar year
of 1984 was the year 73 in the Republic of China. Because 73 was a leap year, you divide
73 by 4; this leaves a remainder of 1. Therefore, to adjust the system calendar for the
Republic of China, specify one for Leap year adjustment.
System value: QLEAPADJ.
Special considerations: Changing the leap year system value does not change the system
clock and job dates of active jobs, but it may change the date system value.
Time: Use the Time tab to adjust the current time for your system.
Time of day: The QTIMADJ system value identifies the software used to adjust the system
clock in order to keep it synchronized with an external time source. This value should be
maintained by the time adjustment software and is intended as an aid to prevent multiple
time adjustment applications from conflicting with one another.
Time adjustment specifies whether a time maintenance application is specified to maintain
the system time and whether or not there is a time adjustment in progress. The time
adjustment may initiate from the time maintenance application or you can manually start a
time adjustment.
Adjusting does not cause large jumps in time that can be experienced with setting the clock
with the Time of Day system value. Adjusting takes time to complete because it is not a
single, instantaneous change to the clock. For example, adjusting the clock by 1 second
could take 10 seconds of real time to complete. Two hours forward or backward is the
maximum amount of adjustment that can be made.
Time zone: A time zone specifies how to set your system time. You can specify a time
zone for each system in your business environment. The time zone setting specifies the
offset from UTC and whether to observe Daylight Saving Time (DST) or not. If you specify
to observe Daylight Saving Time, the system automatically updates the system time when
Daylight Saving Time begins and ends. You do not need to manually set the system time
when Daylight Saving Time begins and ends.
System value: QTIMZON

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System Values: Devices


IBM i

© Copyright IBM Corporation 2012

Figure 4-23. System Values: Devices OL1914.1

Notes:
Automatic Configuration tab
Use the Automatic Configuration tab to specify automatic configuration controls. This tab
allows you to specify which objects are automatically configured. Automatic configuration is
a function that names and creates devices and controllers. The objects are also varied on.
System value: QAUTOCFG
Local controllers and devices: Specifies whether devices and controllers added to the
system are configured automatically. For more information about what specific controllers
and devices are configured, refer to chapter 1 in Local Device Configuration. If this option is
not selected, you must manually configure any new local controllers or devices that you
add to your system. If this option is selected, automatic configuration is on. The system
automatically configures any new local controllers or devices that are added to your
system. The system operator receives a message indicating the changes to the system's
configuration.

4-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Allow automatic configuration: Specify the following options related to automatic
configuration.
Device naming convention: Specifies the naming convention that is used when the
system automatically creates device descriptions when Local Controllers and devices is
selected. These names are used when creating device descriptions for local controllers or
devices that are added to your system. Possible values are:
• Use i5/OS naming: (should be IBM i) Use naming conventions according to IBM i
standards
• Use System/36 naming: Use naming conventions according to System/36 standards
• Use Device address: Derive the device name from the device address
System value: QDEVNAMING
Remote controllers and devices: Specifies whether remote controllers and devices
connected to the system are configured automatically. If this option is not selected, you
must manually configure any new remote controllers or devices that connect to the system.
System value: QAUTORMT
Pass-through devices and TELNET: Specifies the number of virtual devices to
automatically configure. If you do not want to automatically configure any devices, do not
select this option. Devices are not automatically deleted to bring the total number down to
the specified limit for this system value. Therefore, if you change from a higher value to a
lower value, the system does not delete virtual devices.
The system deletes virtual devices only if they are damaged, or if the device needs to be
created again to change its type. If you select Pass-through devices and TELNET, select
one of the following options to specify the maximum number of devices that are configured:
• No maximum number of devices: An unlimited number of virtual devices may be
configured automatically
• Maximum number of devices (1-32500): The maximum number of devices that may
be configured automatically. Possible values are 1 through 32500 devices
System value: QAUTOVRT
Recovery tab
The system value QDEVRCYACN specifies what action to take when an I/O error occurs for
an interactive job's workstation. Possible values for the QDEVRCYACN system value:
• *DSCMSG: Disconnects the job. When signing on again, an error message is sent to the
user's application program.
• *MSG: Signals the I/O error message to the user's application program. The application
program performs error recovery.
• *DSCENDRQS: Disconnects the job. When signing-on again, a cancel request function is
performed to return control of the job back to the last request level.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• *ENDJOB: Ends the job. A job log is produced for the job. A message indicating that the
job ended because of the device error is sent to the job log and the QHST log. To
minimize the performance impact of the ending job, the job's priority is lowered by 10,
the time slice is set to 100 milliseconds, and the purge attribute is set to yes.
• *ENDJOBNOLIST: Ends the job. A job log is not produced for the job. A message is sent
to the QHST log indicating that the job ended because of the device error.

4-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System Values: Jobs > Interactive Jobs


IBM i

© Copyright IBM Corporation 2012

Figure 4-24. System Values: Jobs \> Interactive Jobs OL1914.1

Notes:
Use the CL commands DSPSYSVAL, CHGSYSVAL, or WRKSYSVAL to display or change
system values.
The QDSCJOBITV system value determines if and when the system ends a disconnected
job. The interval is specified in minutes.
The QINACTITV system value specifies in minutes how long the system allows a job to be
inactive before taking action. A workstation is considered inactive if it is waiting at a menu
or display or if it is waiting for message input with no user interaction.
• Standard value *NONE means no timeout
• Valid interval is 5 - 300
The QINACTMSGQ system value specifies what action the system takes when the inactive
job time-out interval for a job has been reached.
• Standard value *ENDJOB means job is ended
• Other valid values are *DSCJOB or the name of a message queue

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System Values: Devices > Recovery


IBM i

iSeries
Five minutes inactive

QCPFMSG
CPI1126
*MSGF
DSPMSG

INACTMSGQ
System values: OR
* MSGQ
QINACTITV (5)
QINACTMSGQ (INACTMSGQ)
INACTPGM
* PGM
CRTMSGQ INACTMSGQ

© Copyright IBM Corporation 2012

Figure 4-25. System Values: Devices \> Recovery OL1914.1

Notes:
• Here the alternate way of using QINACTMSGQ is shown: a timeout message can be sent
to a message queue and an operator or a program can take the appropriate action.
• User or program can monitor for message on message queue and take appropriate
action.
• Message ID is CPI1126.

4-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Jobs System Values


IBM i

© Copyright IBM Corporation 2012

Figure 4-26. Jobs System Values OL1914.1

Notes:
The system value QENDJOBLMT specifies the amount of time (in seconds) for application
cleanup during the immediate ending of a job. This system value's time limit is used when
ending one job or when ending all jobs in all subsystems.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security: Security Policy


IBM i

© Copyright IBM Corporation 2012

Figure 4-27. Security: Security Policy OL1914.1

Notes:
IBM i Navigator provides you with the ability to set your system's security values through its
graphical interface. The window above is accessed from the IBM i Navigator environment
panel.
A group of system values is used to define system-wide security settings.
The system values can be retrieved and changed under program control by using Work
System Value (WRKSYSVAL) command or Change System Value (CHGSYSVAL) command.
There are five policies in the Security component of System i Navigator:
• Auditing Policy: Specify system values to control security auditing on the system
• Password Policy: Specify system values to set requirements for the passwords users
assign
• Restore Policy: Controls how and which security-related objects are restored on the
system
• Security Policy: Specify system values that control security on the system

4-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Signon Policy: Specify system values to set requirements for the passwords users
assign

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Policy Properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 4-28. Security Policy Properties: General OL1914.1

Notes:
The QRETSVRSEC system value determines whether decryptable authentication
information associated with user profiles or validation list (*VLDL) entries can be retained
on the host system. This does not include the Power System with IBM i user profile
password.
The authentication information can be removed from the system by setting the
QRETSVRSEC system value to 0 the CLRSVRSEC command might run for an extensive
period of time.
The QUSEADPAUT system value defines which users can create programs with the use
adopted authority (*USEADPAUT(*YES)) attribute. All users authorized by the
QUSEADPAUT system value can create or change programs and service programs to use
adopted authority if the user has the necessary authority to the program or service
program. The system value can contain the name of an authorization list.

4-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Policy Properties: Public Authority


IBM i

© Copyright IBM Corporation 2012

Figure 4-29. Security Policy Properties: Public Authority OL1914.1

Notes:
The QCRTAUT system value is used to determine the public authority for a newly created
object if the following conditions are met:
• The value of the create authority (keyword CRTAUT) at the CRTLIB or CHGLIB
command, is set to *SYSVAL
• A new object is created in that library with public authority (keyword AUT) of
*LIBCRTAUT

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Policy Properties: Objects not auditable,


shared memory
IBM i

© Copyright IBM Corporation 2012

Figure 4-30. Security Policy Properties: Objects not auditable, shared memory OL1914.1

Notes:
The QALWUSRDMN system value specifies which libraries are allowed to contain user
domain objects of type *USRSPC, *USRIDX, and *USRQ. The restriction does not apply to
user domain objects of type *PGM, *SRVPGM, and *SQLPKG.
The QSHRMEMCTL system value defines which users are allowed to use shared memory or
mapped memory that has write capability.

4-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Policy Properties: Scan


IBM i

© Copyright IBM Corporation 2012

Figure 4-31. Security Policy Properties: Scan OL1914.1

Notes:
QSCANFS and QSCANFSCTL are system values that enable programs to be called from two
new registered exit program entries. Registered programs are intended to scan the files in
the integrated file system and return the results to the system. Once a virus is detected, the
appropriate action can be taken in order to eliminate the virus.

Note

Do not scan the IFS using IBM i NetServer. Mapping a drive with all object authority
exposes the system to virus attack by a PC virus. Consider this could:
• Use up network resources
• Move data across the network in the clear
• Scanner can go into infinite loops

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The QSCANFS system value specifies whether objects in the root (/), QOpenSys, and
user-defined file systems should be scanned by exit programs registered with any of the
integrated file system scan-related exit points. The default value sets objects to be scanned
if any exit programs are registered through API.
The Integrated file system scanning is configured by registering exit programs to the
integrated file system scan-related exit points. These exit programs entries are
QIBM_QP0L_SCAN_OPEN (Integrated File System Scan on Open Exit Program) and
QIBM_QP0L_SCAN_CLOSE (Integrated File System Scan on Close Exit Program).
The QSCANFSCTL system value specifies different control options for scanning objects. For
example, *FSVRONLY for this system value means a scan only takes place if you access
the Power System with IBM i from a file server.

Important

The file system the object is in must be completely converted (all objects within the
directory) to a *TYPE 2. You can use the Convert Directory (CVTDIR) command's
OPTION(*CHECK) to determine if the file system has been completely converted. In V5R3,
shortly after the initial IPL, the system starts a background task that will find any *TYPE1 to
*TYPE2. Therefore, it may appear as if a file is in an *TYPE2 directory, but the file system
may not have yet completed this conversion. The SCAN status for an object shows as
*PENDING/CONVERSION if it is awaiting conversion.
The object attributes can be specified for either *TYPE1 (before conversion) or *TYPE2
directory file systems. The actual scanning, if enabled, only occurs if the object exists in a
file system that has been completely converted to *TYPE2.

4-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security: Password Policy


IBM i

© Copyright IBM Corporation 2012

Figure 4-32. Security: Password Policy OL1914.1

Notes:
Following are the system values that control passwords. These system values require
users to change passwords regularly and help prevent users from assigning trivial, easily
guessed passwords. They can also make sure passwords meet the requirements of your
communications network.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Password Policy Properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 4-33. Password Policy Properties: General OL1914.1

Notes:
The password level of the system can be set to allow for user profile passwords from 1-10
characters or to allow for user profile passwords from 1-128 characters. Possible values for
the QPWDLVL system value are:
• 0: The system supports user profile passwords with a length of 1-10 characters.
• 1: QPWDLVL 1 is the equivalent support of QPWDLVL 0 with the following exception: IBM
i NetServer passwords for Windows 95/98/ME clients are removed from the system.
• 2: The system supports user profile passwords from 1-128 characters. Upper and lower
case characters are allowed. Passwords can consist of any character, and the
password is case sensitive.
• 3: QPWDLVL 2 is the equivalent support of QPWDLVL 2 with the following exception:
QPWDLVL 3 cannot be used if your system communicates with the Windows 95/98/ME
IBM i Client Support for Windows Network Neighborhood (IBM i NetServer) product.

4-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Minimum time between password changes: Specifies the minimum time that must occur
between password changes. You can select None or any number of hours between 1 and
99.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Password Policy Properties: Validation 1


IBM i

© Copyright IBM Corporation 2012

Figure 4-34. Password Policy Properties: Validation 1 OL1914.1

Notes:
The QPWDMINLEN system value controls the minimum number of characters in a password.
The QPWDMAXLEN system value controls the maximum number of characters in a
password.
The QPWDRQDDGT system value controls whether a numeric character is required in a new
password. This value provides additional security by preventing users from using all
alphabetic characters.
The QPWDLMTAJC system value limits the use of numeric characters next to each other
(adjacent) in a password. This value provides additional security by preventing users from
using birthdays, telephone numbers, or a sequence of numbers as passwords.
The QPWDLMTREP system value limits the use of repeating characters in a password. This
value provides additional security by preventing users from specifying passwords that are
easy to guess, such as the same character repeated several times.
The QPWDLMTCHR system value limits the use of certain characters in a password. This
value provides additional security by preventing users from using specific characters, such

4-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty as vowels, in a password. Restricting vowels prevents users from forming actual words for
their passwords.
The QPWDRQDDIF system value controls whether the password must be different from
previous passwords. This value provides additional security by preventing users from
specifying passwords used previously. It also prevents a user whose password has expired
from changing it and then immediately changing it back to the old password.
The QPWDPOSDIF system value controls each position in a new password. This provides
additional security by preventing users from using the same character (alphabetic or
numeric) in a position corresponding to the same position in the previous password.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Password Policy Properties: Validation 2


IBM i

© Copyright IBM Corporation 2012

Figure 4-35. Password Policy Properties: Validation 2 OL1914.1

Notes:
Use the Validation 2 tab to specify password restrictions. Changing values on this tab will
cause certain corresponding system values on the Validation 1 tab to be ignored by the
system. System Value QPWDRULES is set.
Password level (current): Displays the current password level set.
Password validation options: Specifies the rules used to check whether a password is
formed correctly. Changes made to this system value take effect the next time a password
is changed.
Use the validation system values on the Validation 1 tab: System Value QPWDRULES
gets value *PWDSYSVAL.' This system value is ignored and the other password system
values are used to check whether a password is formed correctly.
Specifically, the QPWDLMTAJC, QPWDLMTCHR, QPWDLMTREP, QPWDMAXLEN,
QPWDMINLEN, QPWDPOSDIF, and QPWDRQDDGT system values will be used instead of
QPWDRULES.

4-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Use the following validation rules Certain corresponding system values on the
Validation 1 tab will be ignored:
Specifically, the QPWDLMTAJC, QPWDLMTCHR, QPWDLMTREP, QPWDMAXLEN,
QPWDMINLEN, QPWDPOSDIF, and QPWDRQDDGT system values will be ignored.
Minimum length (*MINLENnnn): Specifies the minimum number of characters for a
password. The possible values vary depending on the password level for your system.
Maximum length (*MAXLENnnn): Specifies the maximum number of characters for a
password. The possible values vary depending on the password level for your system.
Restrict repeating characters: Specifies whether repeating characters are allowed in a
password. This option provides additional security by preventing users from specifying
passwords that are easy to guess, such as the same character repeated several times.
Possible values are:
Characters can be used more than once: The same characters can be used more
than once in a password.
Characters cannot be used more than once (*CHRLMTREP)
Characters cannot be used consecutively (*CHRLMTAJC): The same character can
be used more than once, but it cannot be used consecutively in a password.
Letter Characters
Minimum Number (*LTRMINn): Specifies the minimum number of letter characters that
must occur in the password.
Maximum Number (*LTRMAXn): Specifies the maximum number of letter characters
that may occur in the password.
Restrict consecutive letter characters (*LTRLMTAJC): The password may not contain
2 or more adjacent (consecutive) to each other.
Digits
Minimum Number (*DGTMINn): Specifies the minimum number of digit characters that
must occur in the password.
Maximum Number (*DGTMAXn): Specifies the maximum number of digit characters
that may occur in the password.
Restrict consecutive digit characters (*DGTLMTAJC): The password may not contain
two or more adjacent (consecutive) digit characters.
Special Characters
Minimum Number (*SPCCHRMINn): Specifies the minimum number of special
characters that must occur in the password.
Maximum Number (*SPCCHRMAXn): Specifies the maximum number of special
characters that may occur in the password.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restrict consecutive special characters (*SPCCHRLMTAJC): The password may not


contain two or more adjacent (consecutive) special characters.
First Character
Restrict from being a letter (*LTRLMTFST): The first character of the password may
not be a letter character.
Restrict from being a digit (*DGTLMTFST): The first character of the password may
not be a digit character.
Restrict from being a special character (*SPCCHRLMTFST): The first character of the
password may not be a special character.
Last Character
Restrict from being a letter (*LTRLMTLST): The last character of the password may
not be a letter character.
Restrict from being a digit (*DGTLMTLST): The last character of the password may not
be a digit character.
Restrict from being a special character characters (*SPCCHRLMTLST): The last
character of the password may not be a special character.
Require a new character in each position from previous password (*LMTSAMPOS):
The same character cannot be used in a position corresponding to the same position in the
previous password.
Restrict user profile in password (*LMTPFRNAME): The uppercase password value may
not contain the complete user profile name in consecutive positions.
Require a minimum number of lowercase and uppercase letters (*MIXCASEn): The
password must contain at least n uppercase and n lowercase letters.

4-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Password Policy Properties: Expiration


IBM i

© Copyright IBM Corporation 2012

Figure 4-36. Password Policy Properties: Expiration OL1914.1

Notes:
The QPWDEXPITV system value controls the number of days allowed before a password
must be changed. If a user attempts to sign on after the password has expired, the system
shows a display requiring that the password be changed before the user is allowed to sign
on.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Change Password
IBM i

© Copyright IBM Corporation 2012

Figure 4-37. Change Password OL1914.1

Notes:
The password-composition system values are enforced only when the password is
changed using the CHGPWD command, the Change Password in IBM i Navigator, the
ASSIST menu option to change a password, or the QSYCHGPW application programming
interface (API). They are not enforced when the password is set using the CRTUSRPRF or
CHGUSRPRF command.

4-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Password rules for changing password


IBM i

Password validation program


N Pass
rules
Message Y

N
QPWDVLDPGM

Y
Validation
program

Message PGM
N
detects
error?
Password
changed
Y
© Copyright IBM Corporation 2012

Figure 4-38. Password rules for changing password OL1914.1

Notes:
If *REGFAC or a program name is specified in the QPWDVLDPGM system value, the system
runs one or more programs after the new password has passed any validation tests you
specify in the password-control system values. You can use the programs to do additional
checking of user-assigned passwords before they are accepted by the system.
The topic “Using a Password Approval Program” in the book IBM i 7.1 Security - Security
Reference discusses the requirements of the password approval program and shows an
example.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security: Signon Policy


IBM i

© Copyright IBM Corporation 2012

Figure 4-39. Security: Signon Policy OL1914.1

Notes:
The Signon Policy of System i Navigator allows you to view or change the system values
that control the signon of the users.
Following are the system values that control the signon of the users.

4-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Signon Policy Properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 4-40. Signon Policy Properties: General OL1914.1

Notes:
The QMAXSIGN system value controls the number of consecutive signon attempts that are
not correct by local and remote users. Incorrect sign-on attempts can be caused by a user
ID that is not correct, a password that is not correct, or inadequate authority to use the
workstation.
The QMAXSGNACN system value determines what the system does when the maximum
number of sign-on attempts is reached at a workstation. Possible values for the
QMAXSGNACN System Value:
• 3: Disable both the user profile and device
• 1: Disable the device only
• 2: Disable the user profile only
The QDSPSGNINF system value determines whether the Sign-on Information display is
shown after signing on. The Sign-on Information display shows:
• Date of last signon

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Any signon attempts that were not valid


• The number of days until the password expires (if the password is due to expire in
seven days or less)
The QLMTSECOFR system value controls whether a user with all-object (*ALLOBJ) or
service (*SERVICE) special authority can sign on to any workstation. Limiting powerful user
profiles to certain well-controlled workstations provides security protection.
The QLMTDEVSSN system value specifies whether a user is allowed to be signed on to
more than one device at a time. This value does not restrict the System Request menu or a
second sign-on from the same device. If a user has a disconnected job, the user is allowed
to sign on to the system with a new device session.

4-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Signon Policy Properties: Remote


IBM i

© Copyright IBM Corporation 2012

Figure 4-41. Signon Policy Properties: Remote OL1914.1

Notes:
The QRMTSIGN system value specifies how the system handles remote sign-on requests.
Examples of remote sign-on are display station pass-through from another system, the
workstation function of the System i Access licensed program, and TELNET access.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security: Restore Policy


IBM i

© Copyright IBM Corporation 2012

Figure 4-42. Security: Restore Policy OL1914.1

Notes:
The restore policy controls how and which security-related objects are restored on the
system.
When an attempt is made to restore an object onto the system, three system values work
together as filters to determine if the object is allowed to be restored. The first filter is the
verify object on restore QVFYOBJRST system value. The second filter is the force
conversion on restore QFRCCVNRST system value. The third filter is the allow object on
restore (QALWOBJRST) system value.

4-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restore Policy Properties: Signatures


IBM i

© Copyright IBM Corporation 2012

Figure 4-43. Restore Policy Properties: Signatures OL1914.1

Notes:
The QVFYOBJRST system value determines whether objects are required to have digital
signatures in order to be restored to your system. You can prevent anyone from restoring
an object unless that object has a proper digital signature from a trusted software provider.
This value applies to objects of types *PGM, *SRVPGM, *SQLPKG, *CMD and *MODULE. It also
applies to *STMF objects which contain Java programs.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restore Policy Properties: Conversion


IBM i

© Copyright IBM Corporation 2012

Figure 4-44. Restore Policy Properties: Conversion OL1914.1

Notes:
This system value QFRCCVNRST allows you to specify whether to convert the following
object types during a restore:
• Program *PGM
• Service program *SRVPGM
• SQL Package *SQLPKG
• Module *MODULE
The following are possible conversion values:
0: Level 0. Restore all objects without conversion.
1: Level 1. Objects with validation errors are converted.
2: Level 2. Objects that must be converted to be used on the current version of the
operating system and objects with validation errors are converted.

4-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty 3: Level 3. Objects that are suspected of having been tampered with, must be converted to
be used on the current version of the operating system, or have validation errors are
converted.
4: Level 4. Objects that contain validation errors, require conversion for use, or are
suspected of having been tampered with are converted. Objects that contain sufficient
creation data and do not have a valid digital signature are also converted.
5: Level 5. Objects that contain validation errors, require conversion for use, are suspected
of having been tampered with, or contains sufficient creation data are converted.
6: Level 6. Objects that contain validation errors, require conversion for use, are suspected
of having been tampered with, or do not have a valid digital signature are converted.
7: Level 7. All objects are converted.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restore Policy Properties: Objects


IBM i

© Copyright IBM Corporation 2012

Figure 4-45. Restore Policy Properties: Objects OL1914.1

Notes:
The QALWOBJRST system value determines whether objects that are security-sensitive
may be restored to your system. You can use it to prevent anyone from restoring a system
state object or an object that adopts authority.
When your system is shipped, the QALWOBJRST system value is set to *ALL. This value is
necessary to install your system successfully.

4-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restore Policy Properties: Access Paths


IBM i

© Copyright IBM Corporation 2012

Figure 4-46. Restore Policy Properties: Access Paths OL1914.1

Notes:
The QSAVACCPTH system value indicates whether or not the access paths are saved
during a save operation. The access path is the order in which records in one or more
database files are organized for processing by a program.

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint
IBM i

1. True or False: In order to implement security on your system,


you must install additional security software on your system.

2. True or False: It is possible to lock out users from changing


system values.

3. True or False: One of the components available to implement


security on your system is system values.

© Copyright IBM Corporation 2012

Figure 4-47. Checkpoint OL1914.1

Notes:

4-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• List and explain the levels of security available
• Describe the capability in service tools to lock out users from
changing system values
• List the steps to move from one security level to another
• Define the different categories of system values available
• Explain how to use security policies to set system values
• List the commands used to set system values when using an
emulation
• List the steps used in IBM i Navigator to manipulate system
values
• List the steps used in Systems Director Navigator for IBM i to
manipulate system values
© Copyright IBM Corporation 2012

Figure 4-48. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 4. Security-related system values 4-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

4-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 5. User security

What this unit is about


There are three components used to implement security on this
system. The operating system continually checks system values, user
profiles, and an object's resource security as it receives requests from
users to determine if that user will be allowed to access the object in
question.
In this unit, we will discuss user profiles and how you use these to
customize the capabilities that a user will have once he or she is
signed on to the system.

What you should be able to do


After completing this unit, you should be able to:
• Explain the purpose served by user profiles
• List the steps to create a user profile
• Explain the purpose served by group profiles
• List the steps to create a group profile
• Explain the Management Central capabilities in relation to
identifying users on the system
• List the steps to recover a lost or forgotten password in the OS for
the security office profile (QSECOFR)
• List the steps to recover a lost or forgotten password in service
tools for the security office profile (QSECOFR)

How you will check your progress


• Checkpoint questions
• Lab exercise

References
SC41-5302-11 IBM I 7.1 Security - Security Reference (chapter 3)
IBM Publications Center:
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?C
TY=US

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-1


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM infocenter for i:


http://publib.boulder.ibm.com/iseries/

5-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit objectives
IBM i

After completing this unit, you should be able to:


• Explain the purpose served by user profiles
• List the steps to create a user profile
• Explain the purpose served by group profiles
• List the steps to create a group profile
• Explain the Management Central capabilities in relation to
identifying users on the system
• List the steps to recover a lost or forgotten password in the OS
for the security office profile (QSECOFR)
• List the steps to recover a lost or forgotten password in service
tools for the security office profile (QSECOFR)

© Copyright IBM Corporation 2012

Figure 5-1. Unit objectives OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-3


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security components
IBM i

People Objects
(users) (resources)
Individual
User profiles
objects

Job descriptions Library/directory

Group profiles Authorization lists

System values

© Copyright IBM Corporation 2012

Figure 5-2. Security components OL1914.1

Notes:
There are three components used to implement security on this system. The operating
system continually checks system values, user profiles, and objects as it receives requests
from users to determine if that user will be allowed to access the object in question.
In this unit, we will discuss user and group profiles and how you use these to customize
capabilities and what authority users will have once they are signed on to the system. We
will also look at the capabilities provided by Management Central in relation to working with
users on the system.

5-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: User profiles

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 5-3. Topic 1: User profiles OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-5


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Roles served by user profiles


IBM i

A user profile has several roles on the system.


– Controls how the user signs on the system
– Controls what the user is allowed to do after signing on
– Establishes how the user’s actions are audited
– Designed to customize the system and adapt it to the user
– Used to identify the user’s jobs and printer output
– Contains information about the objects owned by the user
– Contains information about private authorities to objects
– Is a management and recovery tool

© Copyright IBM Corporation 2012

Figure 5-4. Roles served by user profiles OL1914.1

Notes:
A user profile has several roles on the system:
• It contains security-related information that controls how the user signs on the system,
what the user is allowed to do after signing on, and how the user's actions are audited.
• It contains information that is designed to customize the system and adapt it to the user.
• It is a management and recovery tool for the operating system. The user profile
contains information about the objects owned by the user and all the private authorities
to objects.
• The user profile name identifies the user's jobs and printer output.

5-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

User profiles
IBM i

• Purpose
– Used to define users and groups on the system

• How to set
– 5250 emulation:
• WRKUSRPRF: Create, change, and delete profiles on the system
• CHGUSRAUD: Change user audit settings
– IBM i Navigator: Users and Groups > All Users > Properties
– IBM Systems Director Navigator for i: Users and Groups > Create Users or Change Users

• Authority required
– Must at least have *SECADM authority to work with profiles
– Must have *AUDIT authority to change user auditing

• Journal entry
– AD for changes to user auditing
– CO for creation of a user profile
– CP for changes to user profiles
– DO for deletion of a user profile
– ZC for changes to user profile that are not relevant to security

© Copyright IBM Corporation 2012

Figure 5-5. User profiles OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-7


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User profile
IBM i

User information
User profile • Password
Tells the system
who you are • Password expiration level
• Initial menu/program
• User class
• Special authority

List of objects Object


owned authorizations

• Static
– User information
• Dynamic
– List of owned objects
– List of object authorizations
© Copyright IBM Corporation 2012

Figure 5-6. User profile OL1914.1

Notes:
The user profile contains a list of objects owned by the user profile, a list of objects which
the user profile does not own but is otherwise authorized to access, and information about
the user: current library, initial program, initial menu, special authorities, user class, group
profile, maximum storage, and much more.
Every object on the system must have an owner. If an object does not have an owner, it
may not be used, and the RCLSTG command is typically executed in order to assign it to
QDFTOWN.
Do not assign all (or nearly all) objects to only one owner profile. Profiles that own many
objects with many private authorities can become very large. To prevent impacts to either
performance or system operations, distribute ownership of objects to multiple profiles.
Avoid applications owned by IBM-supplied user profiles, such as QSECOFR or QPGMR.
These profiles can become difficult to manage because they own a large number of
IBM-supplied objects.

5-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Appendix B: Default values for user profiles


IBM i

© Copyright IBM Corporation 2012

Figure 5-7. Appendix B: Default values for user profiles OL1914.1

Notes:
Refer to the table listed in Appendix B of the IBM i Security - Security Reference 7.1
manual, SC41-5302-11.
This table shows the default values that are used for all IBM-supplied user profiles and on
the Create User Profile (CRTUSRPRF) command. The parameters are sequenced in the
order they appear on the Create User Profile display.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-9


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New User
IBM i

© Copyright IBM Corporation 2012

Figure 5-8. New User OL1914.1

Notes:
Creating a new user profile is a function that can be done from an 5250 Emulation screen
or using IBM i Navigator, or IBM Systems Director Navigator for i
When using an emulation session, you can directly key in the command CRTUSRPRF, or
you can use option 1=Create on the Work with Profiles panel.
With IBM i Navigator, you can either right-click Users and Groups or right-click All users.

5-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create a new user: 5250 and IBM i Navigator


IBM i

© Copyright IBM Corporation 2012

Figure 5-9. Create a new user: 5250 and IBM i Navigator OL1914.1

Notes:
5250 emulation screens, IBM i Navigator, and IBM Systems Director Navigator for i provide
you with the ability to create new users and groups. In order to create user profiles on the
system, your user profile needs security administration (*SECADM) privileges or security
officer (*SECOFR) privilege.
Create a profile on an emulation session by using the Create User Profile (CRTUSRPRF)
command or by using the Work with User Profiles (WRKUSRPRF) command and selecting
option 1=Create.
In IBM i Navigator, click My Connections > Users and Groups; then click the appropriate
branch to view all users, groups, or users not in a group. You can use the Include option to
control which of the possible users within each container you can work. All is the default.
To create a new user, open Users and Groups and right-click All Users; then, select New
User. The New User panel appears.
Password: Specifies the password for the user. The rules that determine whether a
password is valid are specified on the Password System Values dialog (expand
Configuration and Service to see system values).

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-11


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

If you specify no password for this user, the user cannot sign on. The user is still
functioning, and programs or other users can access its resources.
Enable user for processing: Specifies whether the user is enabled or disabled. A user
that is disabled cannot sign on to the system.

5-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Create User: IBM Systems Director Navigator for I
(1 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 5-10. Create User: IBM Systems Director Navigator for I (1 of 2) OL1914.1

Notes:
IBM Systems Director Navigator for i also provides you with the ability to maintain user
profiles. Your user profile needs security administration (*SECADM) privileges or security
officer (*SECOFR) privilege in order to maintain user profiles. To work with user profiles:
Click IBM i Management to expand the left pane. Click Users and Groups to open the
right pane. Click Create User to create a new user profile.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-13


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create User: IBM Systems Director Navigator for I


(2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 5-11. Create User: IBM Systems Director Navigator for I (2 of 2) OL1914.1

Notes:
IBM Systems Director Navigator for i offers the option to create a user profile from a copy of
an existing profile. After clicking OK, the right pane shows the options as we found them in
the IBM i Navigator.

5-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Capabilities > Privileges


IBM i

© Copyright IBM Corporation 2012

Figure 5-12. New User: Capabilities \> Privileges OL1914.1

Notes:
Privilege class
Based on their privilege class, users can be given privileges that allow certain actions on
system resources. The Capabilities Privileges dialog specifies the privileges for a user or
for a group (and the members of the group).
System privileges
Specifies the system privileges for this user or group. Privileges are required to perform
certain functions on the system. When you are working with a group, the privileges
specified apply to all users who are members of the group.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-15


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System privileges: Special authority: SPCAUT


IBM i

• All object access (*ALLOBJ)


– Access to all system resources
• Auditing control (*AUDIT)
– Control audit system values
• Job control (*JOBCTL)
– Manage output queues, job queues, and printers; change job attributes; stop
subsystems; IPL
• Save/restore (*SAVSYS)
– Save, restore, and free storage for all system objects
• Security administration (*SECADM)
– Create, change, delete user profiles; manage OfficeVision for objects and users
• Spool control (*SPLCTL)
– Manage all users' spooled files
• System configuration (*IOSYSCFG)
– Change system configuration
• System service access (*SERVICE)
– Display and alter service function
© Copyright IBM Corporation 2012

Figure 5-13. System privileges: Special authority: SPCAUT OL1914.1

Notes:
The system privileges (Special authority – SPCAUT as called in 5250 emulation) that
can be specified for a user are:
All object access (*ALLOBJ): The user can access any system resource whether or not
the user has private authority.
Auditing Control (*AUDIT): The user has authority to perform auditing functions. This
authority is granted to users who turn auditing on or off for the system and control the level
of auditing on an object or user.
Job control (*JOBCTL): The user has authority to change, display, hold, release, cancel,
and clear all jobs running on the system or on a job queue or output queue that is operator
controlled. The user also has the authority to start writers and to stop active subsystems.
This authority is usually granted to users who operate the system.
Save/restore (*SAVSYS): The user has authority to save, restore, and free storage for all
objects on the system, whether or not the user has authority to the object. This authority is
usually granted to users who operate the system.

5-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Security administration (*SECADM): The user can create, change, or delete user profiles,
if authorized to those commands and the user profiles.
Spool control (*SPLCTL): The user can perform all spool functions.
System configuration (*IOSYSCFG): The user has authority to change system I/O
configurations.
System service access (*SERVICE): The user can perform service functions.
The system security level determines what the default special privileges are for each user.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-17


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Privilege classes
IBM i

System
Privilege classes
privileges
Security Security System
Programmer User
officer administrator operator
All object access X 20 20 20 20

Auditing control X

Job control X 20 X 20

Save/restore X 20 X 20 20

Security
X X
administration

Spool control X

System
X
configuration
System service
X
access
© Copyright IBM Corporation 2012

Figure 5-14. Privilege classes OL1914.1

Notes:
The table shows the privilege classes (User class in 5250 Emulation) available on the
system. Each class has a default set of system privileges (special authority in 5250
Emulation). The authorities specified under System privileges override the default
privileges for this user or group. When you are working with a group, the privileges
specified apply to all users who are members of the group.
Choices are:
• User: The user's default privileges are save/restore and all object access for security
levels 10 and 20. The user does not get any privileges at other security levels.
• Programmer: The user's default privileges are save/restore, job control, and all object
access for security levels 10 and 20. The user does not get any privileges at other
security levels.
• System operator: The user's default privileges are save/restore, job control, and all
object access for security levels 10 and 20. The user's default privileges are
save/restore and job control at other security levels.

5-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Security administrator: The user's default privileges are save/restore, job control,
security administration, and all object access for security levels 10 and 20. The user's
special authority is security administration at other security levels.
• Security officer: The user's default privileges are all object access, save/restore,
auditing control, security administration, system configuration, system service access,
job control, and spool control.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-19


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New User: Capabilities > Applications


IBM i

© Copyright IBM Corporation 2012

Figure 5-15. New User: Capabilities \> Applications OL1914.1

Notes:
Using the Applications tab, you can identify which functions a user or group may access.
Where the access is derived from is also displayed. Access for allows you to select one of
the following categories of applications:
• IBM i Navigator: Includes IBM i Navigator and any plug-in extensions
• Client Applications: Includes all client applications that provide functions on clients
that can be administered through Application Administration
• Host Applications: Includes all applications that reside entirely on the IBM i and
provide functions that can be administered through Application Administration
You can customize access for a user or group to a specific functions. Where the access is
derived from is also displayed.
Access to the functions is restricted as follows:
• Default access: Determines whether the user has default access to the functions when
the user or group is not explicitly allowed or denied access

5-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • All object access: Defines if a user or group with All Object System privilege is allowed
access to the function
• Customized access: Users with security administration privilege can explicitly allow or
deny access of users or groups to specific functions
There is a set of commands that can be called from a 5250 emulation session. The menu
CMDFCNUSG shows the available commands: WRKFCNUSG, CHGFCHUSG and DSPFCNUSG
commands are available. The Work with Function Usage (WRKFCNUSG) command shows a
list of function identifiers and allows you to change or display specified functions.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-21


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New User: Capabilities > Password and Unique


Identifier
IBM i

© Copyright IBM Corporation 2012

Figure 5-16. New User: Capabilities \> Password and Unique Identifier OL1914.1

Notes:
Password tab
Requiring users to change their passwords after a specified length of time reduces the risk
of an unauthorized person accessing the system. The Capabilities Password dialog
specifies the change interval used for the user's password. The number of days the user's
password is valid can be specified in the system value. Also, the number of days can be
specified explicitly or the user's password can never expire.
Select As specified by system value if you want the password expiration setting to match
the specified system value. The QPWDEXPITV (password expiration) system value controls
the number of days a password is valid.
Manage this password locally: When you select this option, the password can be
managed on the local system. This is the recommended setting. This option is available for
systems running V5R4 or later. You cannot change this option if you are viewing this dialog
from Management Central. This field corresponds to the local password management
(LCLPWDMGT) parameter of the CRTUSRPRF and CHGUSRPRF commands.

5-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Manage this password remotely: When you select this option, the password will not be
managed on the local system. Specifying this value will cause the local i5/OS password to
be set to *NONE. The password value specified in the password parameter will be sent to
other IBM products and options that do password synchronization (for example, Integrated
Server support). The user will not be able to change his or hers own password using the
Change Password (CHGPWD) command. They will not be able to sign on to the system
directly.
Prevent password change (New at V6R1): Specifies the value for blocking password
changes once the password has been successfully changed.
As specified by system value: Specifies that the password uses the specified system
value for password blocking. The QPWDCHGBLK (Block password changes) system value
controls the password blocking.
None: Specifies that no password blocking exists for this user.
Hours after last change (1-99): The number of hours until a password is allowed to be
changed.
Unique Identifier tab
The system uses the user identification (UID) number to identify a user and to verify the
user's authority. For most installations, the best approach is to let the system choose a
unique number for the new user's UID. However, if your system is part of a network, you
may need to assign UID numbers to match those assigned on other systems in the
network. When moving files across systems or managing users across systems, it is very
important that the UID is preserved across systems for a specific user.
• Set the UID to a specific number: If your system is part of a network, you may need to
assign a specific UID number to match those assigned on other systems in the network.
If you specify a UID number, use a number from 1 to 4,294,967,294.
• Let each server choose a unique user identification number (UID): For best results,
let each system generate these numbers. This option is available only when you are
creating a new user.
• Find a unique user identification (UID) number across all selected systems: If you
are adding a new user to an endpoint system or to multiple systems (using
Management Central), you can choose to let the central system find a unique number
based on the inventory across all selected systems.
Two new user profile parameter fields were added in V5R3.
• Local password management (LCLPWDMGT): This parameter specifies whether to
manage the user profile password locally. If you do not want to manage the password
locally, the password value is still sent to other IBM products that do password
synchronization. If you do not manage passwords locally, then the local password is set
to *NONE.
• EIM association (EIMASSOC): This parameter allows you to define Enterprise Identity
Mapping (EIM) identifier associations for the specified user profile for the local registry.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-23


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

To use this parameter, you specify the EIM identifier, an action option for the
association, the type of identifier association, and whether to create the specified EIM
identifier if it does not already exist.

5-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Jobs > General


IBM i

© Copyright IBM Corporation 2012

Figure 5-17. New User: Jobs \> General OL1914.1

Notes:
Each piece of work in a system is called a job, and each job has a unique name. Jobs can
have values that determine how they are run on the system. These values can be specified
for a user on the Jobs panel, General tab.
Current library: The current library is searched before the libraries in the user portion of
the library list for any objects specified as *LIBL. If the user creates objects and specifies
*CURLIB, the objects are put in the current library.
Job description: When a user signs on, the system looks at the workstation entry in the
subsystem description to determine what job description to use for the interactive job. If the
workstation entry specifies *USRPRF for the job description, the job description in the user
profile is used.
Home directory: Lists the path name of the home directory for this user. The home
directory is the user's initial working directory. If the home directory doesn't exist when the
user signs on, the root directory is used. If you specify a directory path name, use up to
2048 characters.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-25


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New User: Jobs > Session Startup


IBM i

© Copyright IBM Corporation 2012

Figure 5-18. New User: Jobs \> Session Startup OL1914.1

Notes:
Options on the Session Startup tab include the following:
Display sign-on information:
Indicates whether the sign-on information shows when the user signs on the system. If you
are changing this field, you can specify the system value, to display sign-on information, or
to not display it. Sign-on information includes date of last sign-on, sign-on attempts that
were not valid, and number of days before the user's password expires if the password is
due to be changed.
Number of device sessions a user can have: Indicates the number of device sessions a
user can have.
• As specified by system value: Specifies that the password uses the specified system
value. The QLMTDEVSSN (Limit Device Sessions) system value controls the number of
device sessions.
• No limit: There is no limit specified for the number of device sessions.
• Device sessions (1-9): The number of device sessions that a user can have.

5-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Jobs > Display Session


IBM i

© Copyright IBM Corporation 2012

Figure 5-19. New User: Jobs \> Display Session OL1914.1

Notes:
Options on the Display Session tab include the following:
Attention program: The Attention-key-handling program (ATNPGM) is the program that is
called when the user presses the Attention (ATTN) key during an interactive job.
Limit capability: Lists the limits the user has over the initial program, initial menu, current
library, and the ATTN key handling program values while signed on to an i Series session.
This value is ignored when the security level is 10. If you are changing this field, you can
specify no limit, partial limit, or full limiting of the user's capabilities where the user cannot
change the program, menu, or current library. If specific commands are limited, users
cannot run them from the command line.
In PC-based applications, setting a user profile to LMTCPB(*YES) does not prevent the user
from running a Power System with IBM i command through a tool such as System i
Navigator or Rational Developer for Power Systems Software.
Assistance level: The QASTLVL system value is used to determine the assistance level.
Keyboard buffering: The QKBDBUF system value is used.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-27


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User options: Lists the level of detail the user sees and the default function of the Page Up
and Page Down keys when the user is signed on the system. The possible values are:
• No user options: No detailed information is shown. Or one or more of the following can
be specified:
- Show parameter keywords: Parameter keywords are shown instead of the
possible parameter values when a command is displayed.
- Show all details: Detailed information is shown when the user is doing display and
edit options.
• Change direction of rollkey: The actions of the Page Up and Page Down keys are
reversed.
• Do not show status messages: The user sees no status messages.
• Show status messages: The user sees status messages.
• Display help on full screen: Help information is shown on full screen.
• Send message to spool file owner: A message is sent to this user's message queue
when a spooled file for this user is printed or held by the printer writer. The owner of the
spool file receives a message.

5-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display Session: Limit capabilities


IBM i

• The Display Session tab allows you to limit users’ capability to change their
initial program, menu, current library, and attention program and prohibit
them from running most Power System with IBM i commands.

Limit initial
Initial Initial Current Attention Execute
program/menu
program menu library program commands
capabilities

Do not limit Yes Yes Yes Yes Yes

Limit some
No Yes No No Yes
capabilities

Limit capabilities No No No No No

Note: Users can still run commands created or changed with parameter
ALWLMTCPB(*YES).

© Copyright IBM Corporation 2012

Figure 5-20. Display Session: Limit capabilities OL1914.1

Notes:
The ALWLMTUSR parameter on commands and Limit Capabilities and Limit some
capabilities do not restrict a user from doing the following:
• Running commands in CL programs that are running a command as a result of taking
an option from a menu
• Running remote commands through applications, such as FTP
The commands allowed by default are DSPMSG, DSPJOB, DSPJOBLOG, and STRPCO,
SIGNOFF, and SNDMSG.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-29


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New User: Jobs > Output


IBM i

© Copyright IBM Corporation 2012

Figure 5-21. New User: Jobs \> Output OL1914.1

Notes:
Output tab
You can specify the printer used to print the output for this user. Spooled files are placed in
an output queue with the same name as the printer when the output queue (OUTQ) is
specified as the print device (*DEV).
The print device and output queue information from the user profile are used only if the
printer file specifies *JOB and the job description specifies *USRPRF.
International tab
You can specify the name of a message queue for a user. A message queue is an object
on which messages are placed when they are sent to a person or a program. A message
queue is used when a user sends or receives messages. If the message queue does not
exist, it is created when the profile is created or changed. The message queue is owned by
the profile being created or changed.
You can specify the language identifier and country or region identifier to be used by the
system for the user.

5-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Jobs > International


IBM i

© Copyright IBM Corporation 2012

Figure 5-22. New User: Jobs \> International OL1914.1

Notes:
International tab
You can specify the language identifier and country or region identifier to be used by the
system for the user.
The Coded character set ID (CCSID) defines the definitions of the characters Code page
used for the started job.
A locale identifies formatting information that is culturally specific. For a specific cultural
region, this information describes the valid alphabetic characters, collating sequence,
number formats and currency amounts, and date and time formats.
Sort sequence specifies which sort sequence is used for this user's jobs. A sort table may
be associated with a particular language on the system. Possible values are:
• Use system value: Specifies that the QSRTSEQ system value is used.
• Use hexadecimal values: Specifies that the standard hexadecimal sort sequence is
used for this user.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-31


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Use unique-weight table: Specifies that the sort sequence table associated with the
user's language is used. The table must contain a unique weight for each character in
the code page.
• Use shared-weight table: Specifies that the sort sequence table associated with the
user's language is used. The table can contain the same weight for multiple
characters.
• table-name: Specifies the name of the sort sequence table for the user.
Character Control ID preference specifies the character ID control preference for this user's
jobs. Possible values are:
• Use system value: Specifies that the QCHRIDCTL system value is used.
• Use device character ID: Specifies that the device character ID is used.
• Use job CCSID: Specifies that the current job CCSID is used.

Note

The Character ID control preference field is displayed only in V4R3 or higher.

5-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Groups > Group Info


IBM i

© Copyright IBM Corporation 2012

Figure 5-23. New User: Groups \> Group Info OL1914.1

Notes:
Specifying a group profile name makes the user a member of the group profile. The group
profile can provide the user with authority to use objects for which the user does not have
specific authority. You may specify up to 16 additional groups for the user.
If the user is a member of a group, you use the owner parameter in the user profile to
specify who owns any new objects created by the user. Objects can be owned either by the
user or by the user's first group (the value of the GRPPRF parameter). You can specify the
OWNER field only if you have specified the Group profile field.
If the user profile is a member of a group and OWNER(*USRPRF) is specified, the Group
authority (GRPAUT) field controls what authority is given to the group profile for any objects
created by this user.
Possible values for GRPAUT:
• *ALL: The group profile is given all management and data authorities to any new
objects the user creates

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-33


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• *CHANGE: The group profile is given the authority to change any objects the user
creates
• *USE: The group profile is given authority to view any objects the user creates
• *EXCLUDE: The group profile is specifically denied access to any new objects created
by the user
When a user creates a new object, the Group authority type (GRPAUTTYP) parameter in
the user's profile determines what type of authority the user's group receives to the new
GRPAUT parameters to determine the group’s authority to a new object.
Possible values for GRPAUTTYP:
• *Private: The authority defined in the GRPAUT parameter is assigned to the group
profile as a private authority.
• *PGP: The group profile defined in the GRPPRF parameter is the primary group for the
newly created object. The primary group authority for the object is the authority
specified in the GRPAUT parameter.

5-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User: Personal > Name, Location, and Mail


IBM i

© Copyright IBM Corporation 2012

Figure 5-24. New User: Personal \> Name, Location, and Mail OL1914.1

Notes:
Mail tab
Mail service level: Specifies the type of mailbox for the Power System with IBM i to use to
store the user's mail. The Mail service level value matches the type of email application
that the user has.
The possible values are:
• User index
• System mailbox
• Lotus Domino
The Power System with IBM i places all mail for the user in the mailbox type that you
specify, regardless of the source of the mail or the type of address that the sender specifies
on the incoming mail.
Preferred address type: Specifies how the Power System with IBM i should format the
address on incoming mail for this user. The possible choices are:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-35


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• User ID and address: Used for OfficeVision or JustMail users. A System Network
Architecture distribution service (SNADS) network uses this addressing scheme for
distributing mail.
• SMTP name: Used in an email or Internet network.
• O/R name: Used for an X.400 email network. This value is set only through a 5250
terminal or 5250 emulation session. If you are changing the preferred address type, you
may change this value to another value, but you may not specify this value in the
Preferred address type field.
• Other: Used for configuring other email options that are not part of the Power System
for IBM i support. This value is set only through a 5250 terminal or 5250 emulation
session. If you are changing the preferred address type, you may change this value to
another value, but you may not specify this value in the Preferred address type field.

Note

These choices are available only for systems at V4R2 or later.

Addresses: The Personal Mail dialog shows one or more addresses the Power System
with IBM i uses to locate the user when email arrives. The appearance of the following
fields are dependent on the Preferred address type and the Power System with IBM i
configurations.
The possible fields are:
• User ID: For mail users with a Power System with IBM i user profile, the user ID is the
user profile name.
• Address: Identifies the user. The address usually matches the name of the Power
System with IBM i where the user receives mail. When you are using Management
Central to work with users on multiple systems, you can select Use system name to
specify the target system, or you can specify another address.
• System name: Identifies the Power System with IBM i where the user receives mail. If
you are using Management Central to work with users on multiple systems, you can
select Use system name to specify the target system, or you can specify another
system to use as the mail system.

5-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

If you are viewing the properties of an existing user, you may see the special values *PC
(personal computer) and *ERROR (one system in the network is designated to receive all
unresolved distributions). These values are set only through a 5250 terminal or 5250
emulation session. You may change these values to a system name, but you may not
specify these values in the System name field.

• SMTP name: Specifies the user name for email in an SMTP network, including the
Internet. The system inserts the user profile name if the user is not in the Power System
with IBM i distribution directory. The SMTP name can be a value other than the user
profile name. The SMTP name can be up to 64 characters with no blank spaces
between characters.
• SMTP route: Identifies the route to the recipient's host within an SMTP network.
• Domain: Identifies the user's location within an SMTP network. If you are using
Management Central to work with users on multiple systems, you can select Use
system domain to specify the domain of the SMTP server on the target system, or you
can specify another SMTP server domain.
• Address type: Identifies the type of non-standard email for the user.
• Field name: Defines the non-standard email address for this user. It tells the system
which field in the system distribution directory to use for this user's address.
• Value: Defines the user's address for the Field name.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-37


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Appendix B: IBM-supplied user profiles


IBM i

© Copyright IBM Corporation 2012

Figure 5-25. Appendix B: IBM-supplied user profiles OL1914.1

Notes:
The tables listed in Appendix B of the IBM i Security – Security Reference manual
(SC41-5302-11) list each IBM-supplied profile, its purpose, and any values for the profile
that are different from the defaults for IBM-supplied user profiles. This is the first of multiple
tables that are listed in Appendix B.

Note

IBM-supplied user profiles now includes additional user profiles that are shipped with the
licensed program products. The table includes only some, but not all, user profiles for
licensed program products; therefore, the list is not all-inclusive.

5-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Warning

• Password for the QSECOFR profile: You must change the password for the QSECOFR
profile after you install your system. This password is the same for every Power System
with IBM i product and poses a security exposure until it is changed. However, do not
change any other values for IBM-supplied user profiles. Changing these profiles can
cause system functions to fail.
• Authorities for IBM-supplied profiles: Use caution when removing authorities that
IBM-supplied profiles have for objects that are shipped with the operating system.
Some IBM-supplied profiles are granted private authorities to objects that are shipped
with the operating system. Removing any of these authorities can cause system
functions to fail.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-39


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User functions
IBM i

© Copyright IBM Corporation 2012

Figure 5-26. User functions OL1914.1

Notes:
You can access the details of users' profiles in System i Navigator by right-clicking a
specific user and selecting Properties.

5-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Changing a user profile


IBM i

© Copyright IBM Corporation 2012

Figure 5-27. Changing a user profile OL1914.1

Notes:
You can change a user profile using option 2 (Change) from either the Work with User
Profiles display or the Work with User Enrollment display. You can also use the Change
User Profile (CHGUSRPRF) command.
Using IBM i Navigator: Right click the user profile name, and select Properties.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-41


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Deleting a user profile


IBM i

© Copyright IBM Corporation 2012

Figure 5-28. Deleting a user profile OL1914.1

Notes:
Specifies whether you choose not to:
• Delete the user if the user owns objects
• Delete the user and all the objects that the user owns
• Delete the user and transfer ownership of the user’s objects to another user.
If you select to transfer objects, you must then select the user you want to own the
objects. The objects are transferred to the new user regardless of that user's current
authority to the objects.
Scan for Owned Objects: List the objects in the system owned by this user. The output
from this function is quite interesting as it includes objects you know about as well as
internal work objects the system uses for this user while the user is active. A window is
shown for each user or group in the list.

5-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

User profile: New in V7R1


IBM i

© Copyright IBM Corporation 2012

Figure 5-29. User profile: New in V7R1 OL1914.1

Notes:
In IBM i 7.1 the parameters USREXPDATE and USREXPITV have been added to the
CRTUSRPRF and CHGUSRPRF commands.
These parameters cannot be set (yet) using the IBM i Navigator and the IBM Systems
Director Navigator for i interfaces.
USREXPDATE: Specifies the date when the user profile expires and is automatically
disabled.
If a user profile is set to expire, the QSECEXP1 job is scheduled to run nightly.
The following IBM-supplied user profiles cannot specify a user expiration date:
QANZAGENT, QAUTPROF, QCLUMGT, QCLUSTER, QCOLSRV, QDBSHR,
QDBSHRDO, QDFTOWN, QDIRSRV, QDLFM, QDOC, QDSNX, QEJB, QEJBSVR,
QFNC, QGATE, QIBMHELP, QIPP, QLPAUTO, QLPINSTALL, QLWISVR,
QMGTC, QMSF, QNETSPLF, QNFSANON, QNTP, QPEX, QPM400, QSECOFR,
QSNADS, QSPL, QSPLJOB, QSRVAGT, QSYS, QTCM, QTCP, QTFTP,

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-43


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

QTMHHTTP, QTMHHTP1, QTSTRQS, QWEBADMIN, QWSERVICE, QYCMCIMOM,


QYPSJSVR
USREXPITV: Specifies the expiration interval (in days) before the user profile is
automatically disabled.
Use the Display User Profile (DSPUSRPRF) command to display the date the user profile
expires.

Note

A value must be specified for this parameter if the User expiration date (USREXPDATE)
parameter has a value of *USREXPITV.
If the USREXPDATE parameter has a value other than *USREXPITV, no value is allowed for
this parameter.

1-366: If the user profile does not have a user expiration date, or the user profile has
expired and the Status parameter is set to *ENABLED, specifies the number of days
between today and the new date when the user profile expires.
If the user profile has not yet expired, the user expiration interval is changed, but the
existing user expiration date is not changed.
Use the Display Expiration Schedule (DSPEXPSCD) command to display a list of all user
profiles set to expire.

5-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Exercise: Working with user profiles


IBM i

At the end of the lab, you should be able to:


• Create a user profile
• Observe and verify the permissions associated with this new
user profile
• Test how the initial menu and limit capabilities parameters
work to control and limit what a user is allowed to do at sign-on
• Verify that the limit capabilities specified for this user profile are
working as expected
• Make changes to a user profile

© Copyright IBM Corporation 2012

Figure 5-30. Exercise: Working with user profiles OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-45


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Group profiles

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 5-31. Topic 2: Group profiles OL1914.1

Notes:

5-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

More facts about group profiles


IBM i

• Group profiles allow users with similar jobs to share


permissions without having to share the same password.
• You should choose a naming convention which makes groups
easily recognizable.
• You can create a group profile with no password (sign-on not
allowed).
• You should assign groups in order of use.
• Permissions are added at the group level.

© Copyright IBM Corporation 2012

Figure 5-32. More facts about group profiles OL1914.1

Notes:
A group profile is a special type of user profile that provides the same authority to a group
of users.
A group profile serves two purposes on the system:
• Security tool: A group profile provides a method for organizing authorities on your
system and sharing them among users. You can define object authorities or special
authorities for group profiles rather than for each individual user profile. A user can be a
member of up to 16 group profiles.
• Customizing tool: A group profile can be used as a pattern for creating individual user
profiles. Most people who are part of the same group have the same customizing
needs, such as the initial menu and the default printer. You can define these things in
the group profile and then copy the group profile to create individual user profiles.
You create group profiles in the same way that you create individual profiles. The system
recognizes a group profile when you add the first member to it. At that point, the system
sets information in the profile indicating that it is a group profile. The system also generates

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-47


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

a group identification number (GID) for the profile. You can also designate a profile as a
group profile at the time when you create it by specifying a value in the GID parameter.

5-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Roles served by group profiles


IBM i

A group profile has several roles:


– Security tool
• It provides a method for organizing authorities and sharing them among users.
• It is used to define object or special authorities for group profiles rather than for
each individual user profile.
• A user can be a member of up to 16 group profiles.
– Customizing tool
• A group profile can be used as a pattern for creating individual user profiles.
• You create group profiles in the same way that you create individual profiles.
• The system recognizes a group profile when you add the first member to it.
• The system also generates a group identification number (GID) for the profile.

© Copyright IBM Corporation 2012

Figure 5-33. Roles served by group profiles OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-49


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New Group
IBM i

© Copyright IBM Corporation 2012

Figure 5-34. New Group OL1914.1

Notes:
Here you can see that under My Connections > Users and Groups, all users are grouped
for viewing according to all users, groups, users not in a group.
At the container level you see the menu options available.
Select Open or Explore to see the list of groups.
Select New Group to create a new group on that system.
You can use the Include option to control which of the possible groups within each
container you can work. All is the default.

5-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New Group: Capabilities


IBM i

© Copyright IBM Corporation 2012

Figure 5-35. New Group: Capabilities OL1914.1

Notes:
Click the New Group Capabilities button in order to designate the privilege class and
system privileges for a group profile.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-51


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New Group: Networks


IBM i

© Copyright IBM Corporation 2012

Figure 5-36. New Group: Networks OL1914.1

Notes:
The user identification (UID) and group identification (GID) numbers identify the group to
the system. For best results, let each system choose a unique number for the UID and GID
of the new group. However, if your system is part of a network, you may need to assign
specific UID and GID numbers to match those assigned on other systems in the network.
When moving files across systems or managing users across systems, it is very important
that the unique identifiers are preserved across systems for a specific group.
If you are viewing the properties of a group from the group inventory on an endpoint system
(using Management Central), you cannot make any changes to the group settings. To
make changes, you can right-click the group in the list and select Edit.

5-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Group functions
IBM i

© Copyright IBM Corporation 2012

Figure 5-37. Group functions OL1914.1

Notes:
Right-click a group profile in order to perform group profile tasks such as displaying
objects owned by the group, copying the group profile, deleting the group profile or viewing
and changing group profile attributes.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-53


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Deleting a group
IBM i

© Copyright IBM Corporation 2012

Figure 5-38. Deleting a group OL1914.1

Notes:
You can specify a primary group for an object. The name of the primary group profile and
the primary group's authority to the object are stored with the object. Using primary group
authority may provide better performance than private group authority.
You can change these authorities either through System i Navigator panels or through
command parameters.
The GRPAUTTYP parameter in a user profile can be used to make the user's group the
primary group for the object. Use the CHGOBJPGP or WRKOBJPGP commands to specify the
primary group for an object. You can change the authority the primary group has by using
EDTOBJAUT or the GRTOBJAUT or RVKOBJAUT commands.
You cannot delete a group profile if it is the primary group for any objects.

5-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Exercise: Working with group profiles


IBM i

At the end of the lab, you should be able to:


• Test to see the messages received when you try to access an
object not authorized to your profile
• Add a user to a group to gain access to objects that are
secured by that group profile
• Test your access to objects that are authorized to a group
profile
• Verify that specific user-assigned authorities override
authorities gained by belonging to a group profile

© Copyright IBM Corporation 2012

Figure 5-39. Exercise: Working with group profiles OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-55


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Management Central and


working with profiles

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 5-40. Topic 3: Management Central and working with profiles OL1914.1

Notes:

5-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Management Central: Users and groups


IBM i

• Create user
– Use definition
• Template
– Create similar users based on the original
• Create, edit, copy, and delete users and groups
– Scan for owned objects
– Schedule those actions
• Send users or groups from one system to multiple systems
– Names
– Passwords
– Security settings
– Authorities
– Enterprise Identity Mapping (EIM)
– Mail options
• Integrated with inventory
– Schedule collection
– Search Manage across multiple systems
– Export

© Copyright IBM Corporation 2012

Figure 5-41. Management Central: Users and groups OL1914.1

Notes:
You can now manage your users and groups across multiple systems using Management
Central:
• Create a user definition and then create multiple users across multiple systems based
on the definition. Create user definitions for the types of users on your system. Then,
when a request comes in for a new user, all special authorities, attributes, and other
information common to that type of user are already there. You can even specify a
command to be run after a user is created from a user definition.
• Create, edit, and delete users and groups across multiple endpoint systems or system
groups--and even schedule these actions. For example, use the Edit Users function to
change the properties for one or more users on the selected endpoint systems or
system groups. This is useful if, for example, you need to change the authority level for
several users on multiple systems, or, if a user who has access to multiple systems
changes his or her name, you can easily edit that information and apply the change to
all systems.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-57


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Scan for owned objects to find out what objects a user or group owns across multiple
endpoint systems or system groups, and even scan owned objects for multiple users
simultaneously.
• Collect an inventory of the users and groups on one or more endpoint systems, and
then view, search, or export that inventory to a PC file. Extensive advanced search
capabilities are provided for easy searching. For example, you can search the inventory
for all users who have Security Officer privileges, as well as query other profile
properties. Columns are sortable, so when you view user or group inventory, you can
click on the column headings to organize the information how you want it.
• Send users and groups from one system to multiple endpoint systems or system
groups. Unlike the Copy action, the Send function copies as many user properties as
possible to the target systems, including the user name and password, security
settings, authorities, and mail options.

Note

All i5/OS special authorities and other authorities that are needed when working with users
and groups through a 5250 emulation screen are honored when managing users and
groups with Management Central. This includes security administration (*SECADM)
privileges and authority to the profiles with which you are working.

5-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Users and Groups functions


IBM i

© Copyright IBM Corporation 2012

Figure 5-42. Users and Groups functions OL1914.1

Notes:
Using Management Central, you can choose to perform functions against a single system
at a time when you choose an ‘endpoint' system.
Also under Management Central, you have the option to perform functions against a
system group, which means you would be performing the selected function or activity
against all of the systems that are part of the defined group. In other words, you perform
the operation one time, but in fact it is performed on multiple systems!
The functions that can be performed are:
• New User
• New Group
• Edit User
• Edit Group
• Delete User
• Delete Group

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-59


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Scan for Owned Objects


• Users
• Groups
All of these functions could be performed from:
• Endpoint systems
• System groups
• Direct connect under My Connections

5-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User Definition


IBM i

• Management Central
– Definitions
• User
• Template to create users

© Copyright IBM Corporation 2012

Figure 5-43. New User Definition OL1914.1

Notes:
When creating a new definition, the User name, Password, Groups, and Networks
options are disabled because those fields are not generic: they are unique to the individual
user you create and the systems you want to create that user on.
When editing user settings for a definition, the unique identifier (UID) cannot be set to a
specific number as you can do when creating a new user. The unique identifier is
accessible from the Capabilities button. You can let each server choose a unique number
or let the central system find a unique number based on the inventory across all selected
systems. The default setting is to allow each server to choose a unique number for a new
user's UID.
The UID is used to ensure that each user is unique. When managing users across
systems, it sometimes becomes very important that this ID is preserved across systems for
a specific user. The UID number is another way of identifying a user to a program. For
example, the UID number is used by programming interfaces in the Integrated File
Systems environment. The UID also becomes critical when sending users across multiple
systems as the UID numbers of the users being sent may need to be synchronized.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-61


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

When creating a user over multiple systems, the administrator needs the ability to decide
what mail system to use. The System Name on the Mail page of Personal properties has
been updated to be a drop-down combo box. The default is Use system name, but a
specific system name could be typed in.

5-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

New User Definition: Actions


IBM i

• Specify commands to run


– Call programs
– Create objects for user
• Libraries and so forth

© Copyright IBM Corporation 2012

Figure 5-44. New User Definition: Actions OL1914.1

Notes:
On the Actions tab of a new user definition, you can specify a command to be run on the
target system. The command is stored in the user definition and is run when a user is
created from the definition. This can be any command that can be used in the batch
environment. You cannot run an interactive command.
The command is run under the authority of the administrator who is creating the user. If any
objects are created by the command (such as a library and job description), these objects
are owned by the administrator. If the objects should be owned by the new user, the
administrator must run another command to change object ownership. Thus, if you typically
create several objects for a new user, you can specify your CL program with this
information, and these objects will be automatically created at the same time the user is
created.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-63


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Note

Some commands, such as Submit Job (SBMJOB), cause a job to run on the target system
after the user is created successfully. If the user definition includes such a command, you
should check the job log of the submitted job after the create user operation has completed
to make sure the submitted job also ran successfully. To find the qualified name of the
submitted job, display the status of the create task under Task Activity->Users and
Groups, select Task Output, and open the job log for the create task.

Hint

Wildcards like CRT* can be used so that when Prompt is selected, all commands
beginning with CRT are listed.

5-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

User definition created


IBM i

• Properties specified
when creating
definition
– Personal
– Capabilities
– Job defaults and
attributes
• Ability to change
properties when
creating user

© Copyright IBM Corporation 2012

Figure 5-45. User definition created OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-65


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create user from definition


IBM i

Select the systems or groups to create the user.

© Copyright IBM Corporation 2012

Figure 5-46. Create user from definition OL1914.1

Notes:

5-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Direct connect: Display user data


IBM i

© Copyright IBM Corporation 2012

Figure 5-47. Direct connect: Display user data OL1914.1

Notes:
When you connect to a system that appears under the My Connections branch, you are
establishing a direct connection from your PC to that system. Notice that when you click
ALL Users, the data listed consists of the names of the user profile and the description.
There is no additional data that can be displayed.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-67


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Management Central: Display user inventory


IBM i

© Copyright IBM Corporation 2012

Figure 5-48. Management Central: Display user inventory OL1914.1

Notes:
When you compare the information being displayed on the previous page to the
information displayed on this page, you will notice that you have access to a lot more
information about a user through the Display User Inventory branch.
You can also customize the information being displayed and request that additional
columns of data to be displayed when this function is selected. To call up the Columns
panel, highlight User Inventory, and click View > Customize this view > Columns.
You also have the option to export inventory information to your PC, and, in the process,
you can specify how the data is to be formatted. You can choose to reformat your data into
the following formats:
• ASCII tab delimited text (*.txt)
• Unicode table delimited text (*.txt)
• Comma separated variable (*.csv)
• Web page (*.html)
• Microsoft excel (*.xls)
• Lotus123 compatible (*.csv)

5-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 4: Service tools security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 5-49. Topic 4: Service tools security OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-69


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Service tools user ID administration


IBM i

• Users must authenticate themselves to access DST and SST.

• The service tools user IDs are used for both SST and DST.

• Starting with V5R1, the following changes were implemented:


– Passwords are case sensitive and shipped expired.
– All default passwords are shipped uppercase. This includes QSECOFR,
1111111111, 22222222, and QSRV.
– It is now possible to create an additional 96 customized service tools
user IDs.
– It is recommended that individual users of DST should have their own
user IDs and should maintain their own passwords.
– The IBM-supplied IDs should be used only in rare circumstances.

© Copyright IBM Corporation 2012

Figure 5-50. Service tools user ID administration OL1914.1

Notes:
Use of Start Service Tools (STRSST) command from a 5250 workstation can also be
defined to permit DST-like user ID/password and individual privilege grant/revoke
functions. Any use of SST requires signing on as a service tools user. We recommend you
create at least two service tools user profiles/passwords in addition to those supplied with
IBM i. Use these additional user profiles to do any of these functions. That way, you do not
accidentally disable the service tools profile supplied by IBM.
Since V5R3, it possible to access disk management functions with IBM i Navigator. These
are functions that are accessed through service tools and will require that you sign on with
your service tools user ID and password. The functions that can be accessed include:
• Display disk configuration
• Add unassigned disk units to an auxiliary storage pool (user ASP or new Independent
ASP)
• LPAR configuration and management

5-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty IBM i Navigator use of disk management or LPAR configuration and management also
requires IBM i Navigator Application Administration to explicitly be specified to permit
access. The command to be processed to Add Service Table entry is:
ADDSRVTBLE SERVICE('as-sts') PORT(3000) PROTOCOL('tcp') TEXT('Service Tools
Service') ALIAS('AS-STS')
In order to activate this new service, you will need to end TCP on your system then restart
it. To do this, issue the End TCP (ENDTCP) and then Start TCP (STRTCP) command.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-71


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System service tools


IBM i

• Service tools user profiles


– Provide better control of access to SST or DST functions
• Service tools device profiles
– Provide access to functions in service tools device IDs used for LAN-
attached Operations Console and client GUI supported by the service
tools server
• Service tools security data
– Reset operating system default password
– Change operating system install security
– View service tools security log
– Save and restore service tools security data
– Manage password level

© Copyright IBM Corporation 2012

Figure 5-51. System service tools OL1914.1

Notes:
Service profiles which are created by the administrator have limited privileges. It is
necessary to explicitly grant authority for any additional functions required by the user. Any
service tools user profiles created by the administrator are able to access DST or SST.
Authorized users could previously access any service tool on the system if they had a valid
password and user ID. Users who needed access to only one tool could access all tools.
This posed a potential security risk.
Starting with V5R1, the OS delivered a number of new SST management functions. When
used with the existing functions, they provide a comprehensive toolkit with which the
administer may manage service tool operations.
Beginning with V5R2, it is now manage and create service tools user IDs from SST by
selecting option 8 (Work with service tools user IDs) from the main SST display. You no
longer need to go into DST to reset passwords, grant or revoke privileges, or create service
tools user IDs.

5-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Service tools user IDs in SST


IBM i

© Copyright IBM Corporation 2012

Figure 5-52. Service tools user IDs in SST OL1914.1

Notes:
Perform the following steps to create a service tools user ID:
1. Start SST.
2. Sign on to SST using your service tools user ID and password.
3. When the System Service Tools (SST) main menu appears, select option 8 (Work with
service tools user IDs and devices).
4. From the Work With Service Tools User IDs And Devices display, select option 1
(Service tools user IDs).
5. Type 1 (Create) on the Service Tools User IDs display, type the new service tools user
ID in the field provided, and press Enter. The Create Service Tools User ID display
appears.

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-73


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Work with Service Tools User IDs


IBM i

© Copyright IBM Corporation 2012

Figure 5-53. Work with Service Tools User IDs OL1914.1

Notes:
The Work with Service Tools User IDs screen lists the system service tool users and allows
the following options/actions: 1= Create, 2 = Change password, 3 = Delete, 4 = Display, 5 =
Enable, 6 = Disable, 7 = Change privileges, 8 = Change description.

5-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

QSECOFR terminology
IBM i

• Within IBM i, there are two security officer user profiles


(QSECOFR).
• The OS user profiles
– Created with the Create User Profile (CRTUSRPRF) command.
– Used to sign on to IBM i
– Contains its own password
• The service tools user IDs
– Created within DST through the Work with DST Environment menu
options
– Used to sign on to service tools (DST or SST)
– Contains its own password (which is different from the OS profile)

© Copyright IBM Corporation 2012

Figure 5-54. QSECOFR terminology OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-75


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Lost password for QSECOFR


IBM i

• If the IBM i QSECOFR password is lost:


– Use CHGUSRPRF to change the password for QSECOFR (requires that
your user ID has *ALLOBJ and *SECADM).
– Use DST Service Tools Security Data option 1 (Reset operating
system default password). This will change the password to the
default shipped value at the next IPL.
• If the service tools QSECOFR password is lost or disabled:
– The DST password is disabled after three unsuccessful attempts to
sign on.
– Sign on to the OS with QSECOFR and issue the command:
CHGDSTPWD *default
– You can also use another service tools ID with the required authority
to reset QSECOFR.
– Perform a scratch install.

© Copyright IBM Corporation 2012

Figure 5-55. Lost password for QSECOFR OL1914.1

Notes:

5-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Changing DST passwords: Manual mode
procedure
IBM i

• If the system is powered on:


– Put the system in manual mode.
– Select option 21 on the control panel, and press Enter.
– Sign on to the DST sign-on screen at the system console.
• If the system is powered off:
– Put the keylock to Manual position and start an attended (manual)
IPL.
– At the IPL or Install the System display select option 3 (Use Dedicated
Service Tools (DST)).
– Type in one of the DST security user IDs and passwords:
• QSECOFR
• QSRV
• 11111111
• 22222222

© Copyright IBM Corporation 2012

Figure 5-56. Changing DST passwords: Manual mode procedure OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-77


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Changing DST passwords: Menu navigation


IBM i

• On the Use Dedicated Service Tools (DST) menu, select


option 5 (Work with DST environment).
• On the Work with DST Environment menu, select option 3
(Service tools user profiles).
• On the Work with Service Tools User Profiles menu, select
option 2 (Change Password).
• Change passwords for the default user IDs:
– QSECOFR
– QSRV
– 11111111
– 22222222
• Press F3 (Exit) to leave DST mode.

© Copyright IBM Corporation 2012

Figure 5-57. Changing DST passwords: Menu navigation OL1914.1

Notes:

5-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
SST option 7: Allow change of security-related
system values
IBM i

© Copyright IBM Corporation 2012

Figure 5-58. SST option 7: Allow change of security-related system values OL1914.1

Notes:
System service tools (SST) and dedicated service tools (DST) provide an option that allows
you to prevent changes to a variety of security-related system values. If the value of the
Allow system value security changes option is set to NO, the system values cannot be
changed by using the Change system value (CHGSYSVAL) command (or any other user
interfaces).

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-79


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (1 of 3)
IBM i

1. True or False: User profiles are one of the security components


available to implement security on the system.

2. The user profile does not contain which of the following?


a. Password
b. User classification
c. Special authorities assigned
d. List of owned object
e. List of authorized objects
f. Listing of all the authorization lists where the user is included

3. The _______ special authority allows a user access to all system


resources.
a.*ALLOBJ
b. *JOBCTL
c. *SPLCTL
d. *SECADM
e. *SERVICE

© Copyright IBM Corporation 2012

Figure 5-59. Checkpoint (1 of 3) OL1914.1

Notes:

5-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (2 of 3)
IBM i

4. True or False: A user profile can be used to specify an initial


program to be called when the user signs on to the system.

5. By specifying ______, you can keep a user from changing


which menu and which library they will sign on to from the sign
on screen.
a. Do not limit capabilities
b. Limit some capabilities
c. Limit capabilities

6. True or False: Ideally, group profiles should be created with a


password of *NONE because you should not sign on to the
system using this group ID.

© Copyright IBM Corporation 2012

Figure 5-60. Checkpoint (2 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-81


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (3 of 3)
IBM i

7. The maximum number of group profiles that a user can belong to is?
a. 16
b. 32
c. 64
d. *NOLIMIT

8. True or False: With Management Central you can send a user profile
to other systems in your network.

9. True or False: The same QSECOFR user ID and password is used to


sign on to the operating system and to service tools.

10. True or False: I can recover the QSECOFR service tool profile by
signing on with the IBM i QSECOFR profile and using the CHGDSTPWD
command.
© Copyright IBM Corporation 2012

Figure 5-61. Checkpoint (3 of 3) OL1914.1

Notes:

5-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• Explain the purpose served by user profiles
• List the steps to create a user profile
• Explain the purpose served by group profiles
• List the steps to create a group profile
• Explain the Management Central capabilities in relation to
identifying users on the system
• List the steps to recover a lost or forgotten password in the OS
for the security office profile (QSECOFR)
• List the steps to recover a lost or forgotten password in service
tools for the security office profile (QSECOFR)

© Copyright IBM Corporation 2012

Figure 5-62. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 5. User security 5-83


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

5-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 6. Resource security

What this unit is about


There are three components used to implement security on this
system. The operating system continually checks system values, user
profiles, and an object's resource security as it receives requests from
users to determine if that user will be allowed to access the object in
question.
In this unit, we will discuss resource security and how you can
authorize which objects users are allowed to access and you can
customize what actions a user can perform against the data once an
object is accessed.

What you should be able to do


After completing this unit, you should be able to:
• Describe what resource security is and how it is implemented
• Explain how ownership of an object is established
• Explain the purpose served by the QDFTOWN user profile
• Explain how public authority is assigned to an object
• Explain the difference between object management and data
authority that can be assigned to an object
• Explain the purpose served by an authorization list
• List the steps to secure an object with an authorization list
• Describe the search order used by the system to determine if a
user is allowed to access an object

How you will check your progress


• Checkpoint questions
• Lab exercise

References
SC41-5302-11 IBM i Security - Security Reference 7.1
IBM Publications Center:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-1


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US
IBM infocenter for i:
http://publib.boulder.ibm.com/iseries/

6-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe what resource security is and how it is implemented
• Explain how ownership of an object is established
• Explain the purpose served by the QDFTOWN user profile
• Explain how public authority is assigned to an object
• Explain the difference between object management and data
authority that can be assigned to an object
• Explain the purpose served by an authorization list
• List the steps to secure an object with an authorization list
• Describe the search order used by the system to determine if a
user is allowed to access an object

© Copyright IBM Corporation 2012

Figure 6-1. Unit objectives OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-3


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security components
IBM i

People Objects
(users) (resources)
Individual
User profiles
objects

Job descriptions Library/directory

Group profiles Authorization lists

System values

© Copyright IBM Corporation 2012

Figure 6-2. Security components OL1914.1

Notes:
There are three components used to implement security on this system. The operating
system continually checks system values, user profiles and objects as it receives requests
from users to determine if that user will be allowed to access the object in question.
In this unit we will discuss user and group profiles and how you use these to customize the
capabilities and what authority users will have once they are signed on to the system. We
will also look at the capabilities provided by Management Central in relation to working with
users on the system.

6-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Resource security concepts

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 6-3. Topic 1: Resource security concepts OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-5


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User-owned objects
IBM i

• Each object has one owner.


• The user who creates an object is assigned as the owner.
• The owner initially has all object and data permission.
• The authority can be removed, but the owner can grant any
authority back to himself at any time.
• The ownership of an object can be transferred to another user.
• It is not possible to delete a user who owns objects. Two
solutions are offered:
– Transfer ownership
– Delete owned objects

© Copyright IBM Corporation 2012

Figure 6-4. User-owned objects OL1914.1

Notes:

6-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Primary group authority


IBM i

• Primary group authority is stored in the object header (good for


performance).
• There can be only one primary group authority per object,
unlike real private authorities where there can be many per
object.
• The object owner cannot be the primary group for object.
• When assigning a primary group:
– Object created by profile with GRPAUTTYP(*PGP).
– Use WRKOBJPGP or CHGOBJPGP to specify primary group object.
– Use CHGPGP for objects in the integrated file system.

© Copyright IBM Corporation 2012

Figure 6-5. Primary group authority OL1914.1

Notes:
You can specify a primary group for an object. The name of the primary group profile and
the primary group's authority to the object are stored with the object. Using primary group
authority may provide better performance than private authority granted to a group profile.
Only a user profile with a group identification number (GID) can be the primary group for an
object. Primary group authority is not considered private authority.
You can change these authorities either through IBM i Navigator panels, IBM Systems
Directory Navigator for i panels, or through command parameters.
The GRPAUTTYP parameter in a user profile can be used to make the user's group the
primary group for the object. Use the CHGOBJPGP or WRKOBJPGP commands to specify the
primary group for an object. You can change the authority the primary group has by using
EDTOBJAUT or the GRTOBJAUT and RVKOBJAUT commands.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-7


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

QDFTOWN
IBM i

• QDFTOWN is an IBM-supplied user profile used when:


– An object has no owner.
– The object ownership might pose security exposure.
• The object ownership is assigned to QDFTOWN in the following cases:
– The owning profile becomes damaged and is deleted. The RCLSTG command
assigns ownership of objects to QDFTOWN.
– An object is restored and the owner profile does not exist.
– A program that needs to be created again is restored, but program creation is not
successful.
– The maximum storage limit is exceeded for the user profile that owns an authority
holder that has same name as the file being moved, renamed, or whose library is
being renamed.
• Consider the following recommendations:
– QDFTOWN should not normally own objects.
– Ownership can be transferred with the WRKOBJOWN command, by IBM i Navigator,
or IBM Systems Director for i.

© Copyright IBM Corporation 2012

Figure 6-6. QDFTOWN OL1914.1

Notes:

6-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Where object permissions come from


IBM i

• To access or use an object, you must have the appropriate


authority. This authority can come from:
– All object access (*ALLOBJ) special authority
– A private or explicit authority to the object
– Authorization list
– Primary group authority
– Public authority (*PUBLIC)
– Adopted authority

© Copyright IBM Corporation 2012

Figure 6-7. Where object permissions come from OL1914.1

Notes:
Authority means the type of access allowed to an object. Different operations require
different types of authority.
All objects have public authority. This is the authority you get when you do not have any
other authority to the object. Public authority can be *EXCLUDE, which implies that the
public (all user profiles that do not have *ALLOBJ special authority) is excluded from an
object, unless in one or the other way special authority is granted.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-9


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Where *PUBLIC authority comes from


IBM i

• Defined by the AUT parameter on the CRTxxx command.


• It defaults to *LIBCRTAUT.

System values

QCRTAUT: *CHANGE
Library PAYLIB

CRTAUT: *SYSVAL

Output queue MYQUEUE

AUT(*LIBCRTAUT)

© Copyright IBM Corporation 2012

Figure 6-8. Where *PUBLIC authority comes from OL1914.1

Notes:
Every library has a parameter called CRTAUT (create authority). This parameter determines
the default public authority for any new object that is created in that library. When you
create an object, the AUT parameter on the create command determines the public
authority for the object. If the AUT value on the create command is *LIBCRTAUT, which is
the default, the public authority for the object is set to the CRTAUT value for the library.
The QCRTAUT system value is used to determine the public authority for a newly created
object if the following conditions are met:
• The create authority (CRTAUT) parameter for the library of the new object is set to
*SYSVAL
• The new object is created with public authority (AUT) of *LIBCRTAUT
The default value for the QCRTAUT system value is *CHANGE. This may introduce a higher
authority level to new objects than actually needed. However, prior to V5R3, changing this
system value to *USE or *EXCLUDE caused problems for some objects, such as
automatically created device descriptions. In V5R3, the default value for the AUT parameter

6-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty has changed from *LIBCRTAUT to *CHANGE on several CRT commands for line, controller,
and device description. This solves the problem with public authority of automatically
created configuration objects we had prior to V5R3.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-11


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Specific object permissions


IBM i

• Private and public permissions consist of one or more of the


following:
Specific object authorities

Exclude

Object management Data authority

Operational Read

Management Add

Existence Update

Alter Delete

Reference Execute

Authorization list
© Copyright IBM Corporation 2012

Figure 6-9. Specific object permissions OL1914.1

Notes:
Authority to an object is divided into three categories:
1. Object authority defines what operations can be performed on the object as a whole.
2. Data authority defines what operations can be performed on the contents of the object.
3. Field authority defines what operations can be performed on data fields. Field
authorities (Reference and Update) are supported through the SQL statements GRANT
and REVOKE. You can display these authorities through DSPOBJAUT and EDTOBJAUT.

6-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object management permissions


IBM i

Permission Definition

Look at the description of an object and use the object as determined by the
Operational
data authorities the user has.
(*OBJOPR)
To open a file, the user must have *OBJOPR
Authorize users to the object, move or rename the object, and add members
Management
to database files.
(*OBJMGT)
All functions defined for *OBJALTER and *OBJREF.

Existence Change ownership and delete the object, free storage for the object, and
(*OBJEXIST) perform save and restore operations for the object.

Add, clear, initialize, and reorganize members of database files, alter and add
Alter
attributes to database files, add and remove triggers, and change attributes of
(*OBJALTER)
SQL packages.

Reference
Specify database file as the parent in a referential constraint.
(*OBJREF)

Authorization list
Add and remove users and their authorities from an authorization list.
(*AUTLMGT)

© Copyright IBM Corporation 2012

Figure 6-10. Object management permissions OL1914.1

Notes:
Notice that authorization list management authority may not be specified for the public at
the time of creation of the object. For some objects, such as files and programs, public
authority may be controlled by specifying the name of an authorization list.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-13


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Data permissions
IBM i

Permission Definition

Read
Display the contents of an object, such as viewing the records in a file.
(*READ)

Add Add entries to an object, such as adding messages to a message queue or


(*ADD) records to a file.

Update
Change entries in an object, such as changing records in a file.
(*UPD)

Delete Remove entries from an object, such as removing messages from a


(*DLT) message queue or deleting records from a file.

Execute
Run a program or search a library or directory.
(*EXECUTE)

Exclude
Object access prevented.
(*EXCLUDE)

© Copyright IBM Corporation 2012

Figure 6-11. Data permissions OL1914.1

Notes:
Exclude is a specific authority. The absence of a specific authority does not mean the
access is excluded. It means that an authority is found elsewhere, according to the
authority checking process.
Field authorities (Reference and Update) are supported through SQL statements GRANT
and REVOKE. You can display these authorities through DSPOBJAUT and EDTOBJAUT.

6-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Commonly used permissions


IBM i

Object control Data authority


Operation Management Existence Alter Reference Read Add Update Delete Execute

All X X X X X X X X X X

Change X X X X X X

Use X X X

Exclude

© Copyright IBM Corporation 2012

Figure 6-12. Commonly used permissions OL1914.1

Notes:
Certain sets of object and data authorities are commonly required to perform operations on
objects. You can specify these system-defined sets of authority (*ALL, *CHANGE, *USE)
instead of individually defining the authorities needed for an object.
*EXCLUDE authority is different than having no authority.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-15


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Specifying specific authority for objects in the


integrated file system
IBM i

• *RWX: Object operational authority and all the data authorities


• *RX: Object operational authority, read, and execute
• *RW: Object operational authority, read, add, update, and
delete
• *WX: Object operational authority, add, update, delete, and
execute
• *R: Object operational authority and read
• *W: Object operational authority, add, update, and delete
• *X: Object operational authority and execute
• *EXCLUDE: Prevents access to object

© Copyright IBM Corporation 2012

Figure 6-13. Specifying specific authority for objects in the integrated file system OL1914.1

Notes:
*RWX: The users are given *RWX authority to perform all operations on the object except
those limited to the owner or controlled by object existence, object management, object
alter, and object reference authority. The user can change the object and perform basic
functions on the object. *RWX authority provides object operational authority and all the data
authorities.
*RX: The users are given *RX authority to perform basic operations on the object, such as
run a program or display the contents of a file. The user is prevented from changing the
object. *RX authority provides object operational authority and read and execute
authorities.
*RW: The users are given *RW authority to view the contents of an object and change the
contents of an object. *RW authority provides object operational authority and data read,
add, update, and delete authorities.
*WX: The users are given *WX authority to change the contents of an object and run a
program or search a library or directory. *WX authority provides object operational authority
and data add, update, delete, and execute authorities.

6-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *R: The users are given *R authority to view the contents of an object. *R authority provides
object operational authority and data read authority.
*W: The users are given *W authority to change the contents of an object. *W authority
provides object operational authority and data add, update, and delete authorities.
*X: The users are given *X authority to run a program or search a library or directory. *X
authority provides object operational authority and data execute authority.
*EXCLUDE: Exclude authority prevents the user from accessing the object.
*AUTL: The public authority of the authorization list specified in the AUTL parameter is used
for the public authority for the object.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-17


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Defining resource security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 6-14. Topic 2: Defining resource security OL1914.1

Notes:

6-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object permission: QSYS.LIB file system


IBM i

© Copyright IBM Corporation 2012

Figure 6-15. Object permission: QSYS.LIB file system OL1914.1

Notes:
The File Systems function in IBM i Navigator consists of the Integrated File System (IFS)
as well as IBM i NetServer File Shares. The IFS allows you to work with the files and
folders on the Power System with IBM i. File Shares shows the IBM i NetServer file shares.
The Open IBM i NetServer option in the File Share context menu opens up a separate
window, which allows you to work with the IBM i NetServer. The functions were previously
discussed during Unit 2. Now we review setting up and editing the file system object
permissions.
Setting up and editing permissions of file system objects
You can grant or revoke permissions on file system objects to restrict users from accessing
them. You can view or change the current permission settings of a file or folder by
right-clicking the file/folder and selecting Permissions from the context editor.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-19


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Basic and Details permission displays


IBM i

Basic = Commonly used permissions

Details = Object and data permission

© Copyright IBM Corporation 2012

Figure 6-16. Basic and Details permission displays OL1914.1

Notes:
The Permissions panel is used to:
• Specify individual access authority or permissions
• Specify the authorization list that will manage authorities for this object
• Define who is designated as the owner of this object
• Define if this object authority is controlled through a primary group
• Define the default public authority for newly created objects
• Define the specified object, data and where applicable column authority to this object
On this panel, you can click Add to add a user to the list of who is authorized to this object.

6-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Permission: Add and Remove


IBM i

© Copyright IBM Corporation 2012

Figure 6-17. Permission: Add and Remove OL1914.1

Notes:
This visual shows the System i Navigator permission screens for adding or removing users
and the permission allowed those users.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-21


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Permission: Customize
IBM i

© Copyright IBM Corporation 2012

Figure 6-18. Permission: Customize OL1914.1

Notes:
Shown are the System i Navigator screens for specifying detail permission for users and
objects. Besides the standards of *USE, *CHANGE, *ALL and *EXCLUDE, custom
permission is also available.

6-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Permission: Authorization List


IBM i

© Copyright IBM Corporation 2012

Figure 6-19. Permission: Authorization List OL1914.1

Notes:
You can group objects with similar security requirements using an authorization list. An
authorization list, conceptually, contains a list of users and the authority that the users have
to the objects secured by the list. The authorization list is explained later in the unit.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-23


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Change owner: Change Primary Group


IBM i

© Copyright IBM Corporation 2012

Figure 6-20. Change owner: Change Primary Group OL1914.1

Notes:
System i Navigator also allows designation of a primary group profile.

6-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Permission search order


IBM i

All object authority User profile: Stop when any


Private authority authority is found.
Authorization list

None found

All object authority Group profiles: Like user profile.


Primary group Repeats for each group profile and
Private authority accumulates. Stops when sufficient
Authorization list authority is accumulated.

None found
Object *Public: This is used when
Authorization list no authority is found for
user or groups.
Insufficient
Adopted profile Adopted profiles: These are
All object authority used when authority is
Private authority insufficient.
Authorization list

© Copyright IBM Corporation 2012

Figure 6-21. Permission search order OL1914.1

Notes:
The system goes through a permission search order.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-25


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Working with authorization


lists

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 6-22. Topic 3: Working with authorization lists OL1914.1

Notes:

6-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authorization list
IBM i

Name: AUTL1
Owner: USER3
LIBA LFILEB
User authority:

*PUBLIC Exclude
USER1 Use
USER2 Change
USER4 All
USER5 Change PROGD
PFILEC

*PUBLIC is on all authorization lists.

© Copyright IBM Corporation 2012

Figure 6-23. Authorization list OL1914.1

Notes:
A user in an authorization list has the same authority to each of the objects controlled by
the authorization list. Notice that different users may have different authority to these
objects.
In order to add or remove objects to an authorization list, or to add or remove users to an
authorizations list, authorization list management rights must be defined for the user profile
which is making these changes.
Setting up an authorization list requires three steps:
1. Creating the authorization list.
2. Adding users to the authorization list.
3. Locating each individual object and specifying that it is secured with the authorization
list.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-27


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create an authorization list


IBM i

© Copyright IBM Corporation 2012

Figure 6-24. Create an authorization list OL1914.1

Notes:
Authorization lists
The Authorization list function is used to:
• Create, delete, display, or change authorization lists
• Add, change, or remove users from the authorization lists
• Change the owner and primary group of an authorization list
• Display objects secured by the authorization list
This function is equivalent to using the CRTAUTL, DLTAUTL, ADDAUTLE, CHGAUTLE, and
RVMAUTLE commands.

6-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

To create a new authorization list, select Security, right-click Authorization Lists, and
then select New Authorization List from the context menu.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-29


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authorization list permissions


IBM i

© Copyright IBM Corporation 2012

Figure 6-25. Authorization list permissions OL1914.1

Notes:
To work with an authorization list, either double-click the desired authorization list or
right-click and select Open from the context menu.
From this interface, you can review the object location, object type, owner, and primary
group and list the objects secured by the authorization list; add new users or groups to the
authorization list; or change the owner or primary group.
The Basic and Details views display the permissions allowed by the authorization list. The
Basic view displays the user or groups permission to authorization list management
authorities. These authorities are Use, Change, All, and Exclude. The Details view displays
the users or groups object permissions (Operational, Management, Existence, Alter and
Reference) and data permissions (Read, Add, Update, Delete, and Execute).
To work with the authority that user's have to the authorization list, you must have
authorization list management 9*AUTLMGT) authority, as well as the specific authorities you
are granting.

6-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Object secured by an authorization list


IBM i

© Copyright IBM Corporation 2012

Figure 6-26. Object secured by an authorization list OL1914.1

Notes:
You cannot change the Secured Objects list from the Secured Objects button. You can
only list the objects secured by the authorization list. To change the secured objects list,
you must modify the object to be secured to use the desired authorization list.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-31


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Securing an object with an authorization list


IBM i

© Copyright IBM Corporation 2012

Figure 6-27. Securing an object with an authorization list OL1914.1

Notes:
Shown are the System i Navigator screens for securing an object with an authorization list.

6-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authorization list considerations


IBM i

• You cannot use an authorization list to specify authority to a


user profile.
• You cannot use an authorization list to specify authority to an
authorization list.
• An object can be secured by only one authorization list.
• Deleting an object does not affect the list that secured it.
• A user's list authority applies to all objects secured by that list.

© Copyright IBM Corporation 2012

Figure 6-28. Authorization list considerations OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-33


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authorization list versus group profile


IBM i

BILL Use FINDEPT/FILE3


WAYNE All LIB23
GUNNAR Use DSP05
FRANK Change
Objects
Authorization list

BILL GROUP Use FINDEPT/FILE3


WAYNE All LIB23
Change DSP05
GUNNAR
FRANK Objects

Group profile

© Copyright IBM Corporation 2012

Figure 6-29. Authorization list versus group profile OL1914.1

Notes:
Authorization lists and group profiles both give multiple users access to multiple objects.

6-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Groups and AUTLs compared


IBM i

Authorization lists Groups

Authorization lists can secure Groups can secure multiple


multiple objects. objects.
A user can be on multiple lists. A user can be a member of up
to 16 groups as a maximum.
Users can have different All users in a group have the
authority. same authority.
Same authority for different Different authority for different
objects using the same list. objects.
An object can be secured by An object can be authorized to
only one authorization list. many groups.

© Copyright IBM Corporation 2012

Figure 6-30. Groups and AUTLs compared OL1914.1

Notes:
Authorization lists are best used when users have different authorities to the same objects.
Group profiles are best used when users have the same authorities to the same objects.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-35


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Working with authorization lists


IBM i

At the end of the lab, you should be able to:


• Create an authorization list
• Add a user to an authorization list and specify what authority
will be assigned
• Secure an object with an authorization list
• Display the list of users on an authorization list
• Display what objects are secured with an authorization list

© Copyright IBM Corporation 2012

Figure 6-31. Exercise: Working with authorization lists OL1914.1

Notes:

6-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 4: Column-level authority

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 6-32. Topic 4: Column-level authority OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-37


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Column-level security
IBM i

GRANT UPDATE (CDTLMT) ON QCUSTCDT TO OL50GRP

CUSNUM LSTNAM CDTLMT

938472 HENNING 5000

397267 TYRON 1000

693829 THOMAS 9999

OL50GRP: Needs OL5001: No


update access update access

© Copyright IBM Corporation 2012

Figure 6-33. Column-level security OL1914.1

Notes:
Currently the user OL50GRP has some permission to the file QCUSTCDT.
Using the SQL GRANT command, the user OL50GRP will be granted update authority to
the credit limit (CDTLMT) field in the QCUSTCDT file.

6-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Granting column-level permission


IBM i
• MANAGER: Suppose OL50GRP already has specific *USE authority to QCUSTCDT.
Grant OL50GRP update authority to CDTLMT:

Check the Update box on


CDTLMT > OL50GRP row.

© Copyright IBM Corporation 2012

Figure 6-34. Granting column-level permission OL1914.1

Notes:
Column-level security in DB2 universal data base (UDB) for IBM i provides an easier and
more flexible way to control access to columns in the database tables. It is a way of using
the system security functions to restrict users from certain columns in a table.
Two authorities are supported:
• Reference is the ability to grant reference authority to certain columns of a table or
physical file such that those columns can be referred as parent keys in a referential
constraint. Those columns that have not been granted reference authority, cannot be
referred as parent keys.
• Update is the ability to grant update authority to certain columns of a database file such
that those columns can be updated during database I/O. Those columns that have not
been granted update authority cannot be updated while performing database I/O.
Column-level security support can be defined using the SQL statements GRANT and
REVOKE. There is no native i5/OS command to achieve the same function. The CL
command DSPOBJAUT is used to display the column-level authorities defined on a file.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-39


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Granting column-level authorities to a user is really giving that user update authority to the
table and then restricting the columns that can be updated in the table.
To be able to update a column, a user must have authority to the columns being updated if
column level authorities exist.

6-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Column-level security considerations


IBM i

• Column-level security enforcement primarily occurs during the


update operation on the file.
• There is no new enforcement during open of the file.
• Column-level authorities are stored in the database file object
and managed by DB2 UDB.
• Object authorities are stored in the user profile and managed
by the system security manager.

© Copyright IBM Corporation 2012

Figure 6-35. Column-level security considerations OL1914.1

Notes:
The enforcement of Column-level security is done primarily during the update operation on
the file. The update operation fails when an update is attempted on columns that restrict
the update operation.
There is no new enforcement during open of the file. Implementation gives the user some
object authority when column level authority is granted so normal object level authority
processing occurs.
The column level authorities are stored in the database file object and are managed by
DB2 UDB for i5/OS.
Object authorities are stored in the user profile and managed by the system security
manager.
Column level authorities still work with all system security components like group profiles
and program-adopted authority.
Column-level authorities cause a small percentage growth in the size of the database file
object.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-41


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Column-level authorities are no longer needed once a user is given the appropriate
object-level authority. For example, if a user is given update authority to just the first
column in a table and later given an update authority at the table level, the column level
authority defined for the first column is no longer needed, and it is removed. The system
eliminates column-level authorities when the user is granted authority to all of the columns
of the table. This is done to avoid an overhead in the checking of authorities.
Since the column authorities are stored with the file, when you restore the user profile, it will
not restore the column level rights. In a recovery situation, when a file with column level
authorities are restored, there are a couple of options:
• You must grant user authority to one column to have DB2 reactivate all column level
authorities for that user.
• Use RSTAUT CL command as part of the recovery process to have database reactivate
column level authorities.
To be able to grant column-level authorities, the user needs *EXECUTE authority on the
library and *OBJMGT on the table or column, in addition to the data right (Update,
Reference) being granted on the column.

6-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 5: Adopted authority

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 6-36. Topic 5: Adopted authority OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-43


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Adopted authority (1 of 3)
IBM i

Everything you have shown me deals


with permanent grants of authority.
I would like to give a user temporary
access to several objects without a lot of
grants and revokes. What can I do?
You need to use
adopted authority.

© Copyright IBM Corporation 2012

Figure 6-37. Adopted authority (1 of 3) OL1914.1

Notes:

6-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Adopted authority (2 of 3)
IBM i

• When a program created with USRPRF(*OWNER) is run,


objects are accessed with the authority of the user running the
program plus the program owner's authority.

• Authority is in effect as long as the program that originally


adopts is still in the stack.

• This method temporarily gives authority to objects the user


normally would not have.

• Both object authorities and special authorities are adopted.

• Program owner's groups are not used for adopted authority.

© Copyright IBM Corporation 2012

Figure 6-38. Adopted authority (2 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-45


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

DSPPGM
IBM i

Display Program Information

Program : PGM1 Library : APP_LIB


Owner : OFCMGR
Program attribute : CLP

Program creation information:


Program creation date/time . . . . . . . . . .: 12/23/96 11:41:02
Source file . . . . . . . . . . . . . . . . . : SOURCE
Library . . . . . . . . . . . . . . . . . .: APP_SOURCE
Source member. . . . . . . . . . . . . . . . .: PGM1
Source file change date/time . . . . . . . . .: 12/23/97 11:40:58
Observable information . . . . . . . . . . . . : *ALL
User profile . . . . . . . . . . . . . . . . .: *OWNER
Use adopted authority . . . . . . . . . . . . .: *YES
Log command (CL program). . . . . . . . . . . .: *YES
Allow RTVCLSRC (CL program). . . . . . . . . . : *YES
Fix decimal data. . . . . . . . . . . . . . . : *NO

Press Enter to continue.


F3=Exit F12=Cancel

© Copyright IBM Corporation 2012

Figure 6-39. DSPPGM OL1914.1

Notes:
User profile (USRPRF):
Specifies whether the authority checking done while this program is running should include
only the user who is running the program (*USER) or both the user who is running the
program and the program owner (*OWNER). The profiles of the program user or both the
program user and the program owner are used to control which objects can be used by the
program, including the authority the program has for each object. Only the program owner
or a user with QSECOFR authority can change the user profile attribute.

Note

This parameter is ignored if REPLACE (*YES) is specified.

*USER: The program runs under the user profile of the program's user.

6-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *OWNER: The user profiles of both the program owner and the program user are used
when the program is run.
Use adopted authority (USEADPAUT):
Specifies whether program adopted authority from previous programs in the call stack will
be used as a source of authority when this program is running.
*SAME: The use adopted authority attribute does not change.
*YES: Program adopted authority from previous call levels is used when this program is
running. If an authorization list is specified for the QUSEADPAUT system value and the
user is not authorized to that authorization list, *NO is used.
*NO: Program adopted authority from previous call levels is not used when this program
is running.
The USEADPAUT value can be changed with the CHGPGM command. It defaults to a value of
*YES when the program is created.
QUSEADPAUT system value:
Defines which users can create programs with the use adopted authority
(*USEADPAUT(*YES)) attribute.
QUSEADPAUT defaults to *NONE. All users can create, change, or update programs and
service programs to use adopted authority if the user has the necessary authority to the
program or service program.
QUSEADPAUT can also contain the name of an authorization list. The user's authority is
checked against the authorization list. If the user has at least *USE authority to the named
authorization list, the user can create, change, or update programs or service programs
with the USEADPAUT(*NO) attribute. This authority cannot come from the adopted authority.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-47


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Adopted authority (adopting a user profile)


IBM i

*PGM: PGM1
Owner: OFCMGR
*FILE : FILE1
USRPRF (*OWNER)
OFCMGR: *CHANGE
USER01: *OBJOPR
*PUBLIC : *EXCLUDE
*EXECUTE

• USER01 can call PGM1.


• USER01 has *CHANGE authority to FILE1 while running PGM1.
• Granting *USE authority to PGM1 includes *OBJOPR and
*EXECUTE.

© Copyright IBM Corporation 2012

Figure 6-40. Adopted authority (adopting a user profile) OL1914.1

Notes:
All of the owner's authority is adopted by a user while PGM1 is in the user's program
invocation stack.

Warning

A user should not be allowed to adopt the authority of QSECOFR and be able to get to a
command line unless such is intended.

Adopted authority is ANDed with any specific authority the user already has to an object or
objects.

6-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Adopted authority example


IBM i

Call stack Authorities during


program execution
PGM1
Owner: OFCMGR User plus OFCMGR
User profile: *OWNER

PGM2 User plus OFCMGR


Owner: QSECOFR plus QSECOFR
User profile: *OWNER

PGM3
Owner: QPGMR User plus OFCMGR
User profile: *USER plus QSECOFR

PGM4
Owner: OFCMGR User plus OFCMGR
User profile: *OWNER
Use adopted AUT: *NO

© Copyright IBM Corporation 2012

Figure 6-41. Adopted authority example OL1914.1

Notes:
In addition to the above flowchart, consider special authority:
Although it is not part of the above authority checking process, a user may be authorized to
perform a function through a special authority. The special authority could come from the
user profile or adopted profiles.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-49


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Adopted authority (3 of 3)
IBM i

Security considerations

CALL PROG1 CHGLIB


CALL PROG1

M. HONEST A. CROOK

HONEST CROOK

PROG1

PROG2 SECURE
PROG2 FILE

© Copyright IBM Corporation 2012

Figure 6-42. Adopted authority (3 of 3) OL1914.1

Notes:
Since adopted authority is transferred through a call, a person with bad intentions can use
these by manipulating the library list. If a user can change the sequence of libraries on the
library list, or add additional libraries to the list, the user may be able to perform functions
that break security requirements.
• All special and private authorities are adopted.
• Allowing a program to run under the owner's user profile is an intentional release of
control, which may allow unanticipated access to objects.
• If a program is created again using REPLACE(*YES) from a CRTxxxPGM command,
the new copy of the program uses the value for the USRPRF and USEADPAUT
parameters from the replaced program.
• The adopt function is additive for all programs in the program stack. For example, if a
primary program adopts the owner's authority, any secondary programs that are
created with USRPRF(*USER) still operate under the owner's authority of the primary
program.

6-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • A program using adopted authority operates under the owner's authority in addition to
the user's authority. If the user has authority and the program owner is excluded,
access is allowed.
• If a program that uses adopted authority submits a job, that submitted job does not have
the adopted authority of the submitting program.
• If the job is running with program-adopted authority and the owner of the program is a
member of a group profile, the authority of the owner's group profile is not used.
• The adopted authority is not used if one of the following events occur:
- System Request key pressed
- ATTN key pressed, including TFRGRPJOB
- Break message handling program takes control
- DEBUG facilities take control of the job

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-51


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Adopted authority considerations (1 of 2)


IBM i

• Adopted authority is added to the user's authority.

• Adopted profile's special and private authorities are used.

• Adopted profile's group is not used.

• Public authority that adopted profile would have is not used.

• Program interruptions suspend adoption.


– Debug
– TFRGRPJOB
– System request
– Break message program

• Audit: DSPPGMADP, DSPPGM, DSPSRVPGM

• Programs always created with USEADPAUT(*YES).

© Copyright IBM Corporation 2012

Figure 6-43. Adopted authority considerations (1 of 2) OL1914.1

Notes:

6-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Adopted authority considerations (2 of 2)


IBM i

• This provides a way to temporarily grant a user authority.

• Should perform only the function the user does not have authority to do
and return.

• Propagating authority down the call stack is dangerous, especially when


adopting a powerful profile, such as QSECOFR.

• You should library-qualify calls made to programs that adopt.

• You should secure programs that adopt.

• This provides the ability to restrict direct object access but allow access
through applications.

© Copyright IBM Corporation 2012

Figure 6-44. Adopted authority considerations (2 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-53


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authority checking (1 of 2)
IBM i
Sufficient
Fast path for object authority
Authorized
Insufficient
User’s authority: Exit this box immediately when
any authority is found.
Insufficient *ALLOBJ? Sufficient
Is owner and has some authority?
Fast path for user authority? Authorized
Private authority?
Authorization list?
No authority found
Group’s authority: Exit this box immediately for this group
when any authority is found.
Insufficient *ALLOBJ? Sufficient
Is owner and has some authority? ADDITIVE
Primary group (if group is primary group) Authorized
Authority? ADDITIVE
Private authority? ADDITIVE
Authorization list? ADDITIVE
(Repeat above if more groups.)
No authority found
Public authority Sufficient
If *PUBLIC=*AUTL, get public from authorization list.
Authorized
Otherwise use public authority stored with object.
Insufficient
Adopt
© Copyright IBM Corporation 2012

Figure 6-45. Authority checking (1 of 2) OL1914.1

Notes:
When a user attempts to perform an operation on an object, the system verifies that the
user has adequate authority for the operation. The system first checks authority to the
library or directory path that contains the object. If the authority to the library or directory
path is adequate, the system checks authority to the object itself. In the case of database
files, authority checking is done at the time the file is opened, not when each individual
operation to the file is performed.
During the authority-checking process, when any authority is found (even if it is not
adequate for the requested operation), authority checking stops, and access is granted or
denied. The adopted authority function is the exception to this rule. Adopted authority can
override any specific (and inadequate) authority found.

6-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authority checking (2 of 2)
IBM i

Adopt

No
Does program adopt?

Yes
Program OWNER'S AUTHORITY. Exit
this box immediately when any authority is found.
*ALLOBJ? Sufficient
Is owner and has some authority? ADDITIVE Authorized

Insufficient
Yes Current program: USEADPAUT(*YES)
More programs in stack? Next program.
No
No
Does program adopt?
Yes
Program OWNER'S AUTHORITY. Exit this
box immediately when any authority is found.
Private and primary group authority? ADDITIVE Sufficient
Authorized
Authorization list? ADDITIVE
Insufficient

Current program: USEADPAUT(*YES)


Yes More programs in stack? Next program.
No
Access denied
© Copyright IBM Corporation 2012

Figure 6-46. Authority checking (2 of 2) OL1914.1

Notes:
Adopted authority could override specific, inadequate authority, if used.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-55


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Fast path for object authority


IBM i

• Using information stored with the object, authorize access if all


of the following are true:
– No private authorities
– Not secured by an authorization list
– Owner authority sufficient
– Primary group (if one exists) authority sufficient
– Public authority sufficient
• Otherwise, return to calling flowchart with Insufficient.

© Copyright IBM Corporation 2012

Figure 6-47. Fast path for object authority OL1914.1

Notes:

6-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security example (1 of 3)
IBM i

DEPT03 *AUTL: LISTA


Owned objects: X, Z, PGM3 ANN: *ALL
X: *ALL CATHY: *EXCLUDE
Z: *ALL DEPT03: *USE
PGM3: *ALL *PUBLIC: *USE

CATHY DAVID ANN BILL


X: *USE Z: *USE X: *ALL
Group: DEPT03 Group: DEPT03

PGM1 PGM2 PGM3


Needs *CHANGE to X Needs *CHANGE to Y Needs *CHANGE to Z
USRPRF(*USER) USRPRF(*USER) USRPRF(*USER)
*PUBLIC: *USE *PUBLIC: *USE *PUBLIC: *USE
Owner: DEPT03

File X File Y File Z


*PUBLIC: *USE Auth List: LISTA *PUBLIC: *CHANGE
Owner: DEPT03 *PUBLIC: *AUTL Owner: DEPT03

© Copyright IBM Corporation 2012

Figure 6-48. Security example (1 of 3) OL1914.1

Notes:
This class exercise depicts a security example with several users, group profiles, objects
and authorization lists. You are to answer questions about users and their access to
programs and objects and how the system would allow or not allow users to access
objects.

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-57


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security example (2 of 3)
IBM i

a. Is the user authorized to run the program and access the file without a
security message?
b. What authority did the user get for files X, Y, and Z?
c. From where did the user get his/her authority?
d. How would the following change the table:
– CHGPGM PGM(PGM3) USRPRF(*OWNER)

d. PGM3-Z
PGM1 - X PGM2 - Y PGM3 - Z
USRPRF(*OWNER)

a. _________________ __________________ __________________ _________________


Ann b. _________________ __________________ __________________ _________________
c. _________________ __________________ __________________ _________________

a. _________________ __________________ __________________ _________________


Bill b. _________________ __________________ __________________ _________________
c. _________________ __________________ __________________ _________________

a. _________________ __________________ __________________ _________________


Cathy b. _________________ __________________ __________________ _________________
c. _________________ __________________ __________________ _________________

a. _________________ __________________ __________________ _________________


David b. _________________ __________________ __________________ _________________
c. _________________ __________________ __________________ _________________

© Copyright IBM Corporation 2012

Figure 6-49. Security example (2 of 3) OL1914.1

Notes:
These are questions for the class exercise:
A) Is the user authorized to run the program and access the file without a security
message?
B) What authority did the user get for Files X, Y and Z?
C) From where did the user get his/her authority?
D) If PGM3 is changed to use adopted authority, how would authority be affected?

6-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security example (3 of 3)
IBM i

a. Is the user authorized to run the program without a security message?


b. What authority did the user get for files X, Y, and Z?
c. From where did the user get his/her authority?
d. How would the following change the table:
– CHGPGM PGM(PGM3) USRPRF(*OWNER)

d. PGM3-Z
PGM1 - X PGM2 - Y PGM3 - Z
USRPRF(*OWNER)

a. Yes Yes Yes


Ann b. *ALL *ALL *CHANGE Same
c. User-Private User-*AUTL *PUBLIC-Object

a. No No Yes
Bill b. *USE *USE *CHANGE Same
c. *PUBLIC-Object *PUBLIC-*AUTL *PUBLIC-Object

a. No No Yes
Cathy b. *USE *EXCLUDE *ALL Same
c. User-Private User-*AUTL Group-Specific

a. Yes No No Yes
David b. *ALL *USE *USE *ALL
c. Group-Specific Group-*AUTL User-Private Adopted DEPT03

© Copyright IBM Corporation 2012

Figure 6-50. Security example (3 of 3) OL1914.1

Notes:
Here are the answers to the questions in the class exercise.

Ann PGM1 - X A) Yes, B) *ALL, C) User -Private


Ann PGM2 - Y A) Yes, B) *ALL, C) User - Autl
Ann PGM3 - Z A) Yes, B) *CHANGE, C) Public - Object, D) Same

Bill PGM1 - X A) No, B) *USE, C) Public - Object


Bill PGM2 - Y A) No, B) *USE, C) Public - Autl
Bill PGM3 - Z A) Yes, B) *CHANGE, C) Public - Object, D) Same

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-59


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Cathy PGM1 - X A) No, B) *USE, C) User -Private


Cathy PGM2 - Y A) No, B) *Exclude, C) User - Autl
Cathy PGM3 - Z A) Yes, B) *ALL, C) Group - Specific, D) Same

David PGM1 - X A) Yes, B) *ALL, C) Group - Specific


David PGM2 - Y A) No, B) *USE, C) Group - Autl
David PGM3 - Z A) No, B) *USE, C) User - Private, D) *Yes, *ALL, Adopted DEPT03

6-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Exercise: Working with object authority and
adopted authority
IBM i

At the end of the lab, you should be able to:


• Assign permission to objects
• Assign authority to a profile by referencing another profile
• Perform the necessary steps to delete a user profile

© Copyright IBM Corporation 2012

Figure 6-51. Exercise: Working with object authority and adopted authority OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-61


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (1 of 3)
IBM i

1. True or False: An object can be owned by multiple users on the


system.

2. True or False: The name of the primary group and its authority to the
object are stored in the object header.

3. When an object does not have an owner specified, it gets assigned to


the ______ user profile.
a. *USER
b. *SECOFR
c. *SYSOPR
d. QDFTOWN

4. True or False: The QCRTAUT system value is used to determine the


public authority for a newly created object.

5. True or False: Read, add, and update are authorities that can be
specified to the object management authority for a specific object.

© Copyright IBM Corporation 2012

Figure 6-52. Checkpoint (1 of 3) OL1914.1

Notes:

6-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (2 of 3)
IBM i

6. True or False: OBJOPR, OBJMGT, and OBJEXIST are authorities that


can be specified to the data authority for a specific object.

7. The very first thing that a system checks when determining if a user is
allowed to access an object is:
a. Group authority
b. Authorization list
c. Private authorities
d. All object access

8. The maximum number of authorization lists that a user can be


specified in is:
a. 16
b. 32
c. 64
d. No maximum

© Copyright IBM Corporation 2012

Figure 6-53. Checkpoint (2 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-63


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (3 of 3)
IBM i

9. _______ authority is an authority that can be assigned to an


object temporarily.
a. User
b. Object
c. Resource
d. Adopted

10. True or False: Applications that utilize calls to programs that


adopt authority should library-qualify those calls.

© Copyright IBM Corporation 2012

Figure 6-54. Checkpoint (3 of 3) OL1914.1

Notes:

6-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe what resource security is and how it is implemented
• Explain how ownership of an object is established
• Explain the purpose served by the QDFTOWN user profile
• Explain how public authority is assigned to an object
• Explain the difference between object management and data
authority that can be assigned to an object
• Explain the purpose served by an authorization list
• List the steps to secure an object with an authorization list
• Describe the search order used by the system to determine if a
user is allowed to access an object

© Copyright IBM Corporation 2012

Figure 6-55. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 6. Resource security 6-65


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

6-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 7. Security auditing

What this unit is about


Auditing system activity is an important part of system security.
Security auditing can help detect system misuse and intrusions. You
can use specific systems values to control auditing on the IBM i
operating system.
In this unit, we will describe the different types of security auditing and
the steps specifically required to implement security auditing on your
system.

What you should be able to do


After completing this unit, you should be able to:
• List and discuss the types of security-related activities that you can
monitor on your system
• List the different levels of security auditing that you can implement
• Explain why implementing auditing is an ongoing process
• List and configure the commands and system values used to
implement security auditing
• Explain the steps required to implement the different types of
security auditing

How you will check your progress


• Checkpoint questions

References
SC41-5302-11 IBM I 7.1 Security - Security Reference (chapter 3)
IBM Publications Center:
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US
IBM InfoCenter for i:
http://publib.boulder.ibm.com/iseries/

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-1


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• List and discuss the types of security-related activities that you
can monitor on your system
• List the different levels of security auditing that you can
implement
• Explain why implementing auditing is an ongoing process
• List and configure the commands and system values used to
implement security auditing
• Explain the steps required to implement the different types of
security auditing

© Copyright IBM Corporation 2012

Figure 7-1. Unit objectives OL1914.1

Notes:

7-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Audit: Why and how?


IBM i

• Why?
– Keep system at planned security level
• How?
– Implement at any security level or
– Use system functions
• DSPUSRPRF
• DSPOBJAUT
• DSPPGMADP

© Copyright IBM Corporation 2012

Figure 7-2. Audit: Why and how? OL1914.1

Notes:
People audit their system security for several reasons:
• To evaluate whether the security plan is complete
• To make sure that the planned security controls are in place and working
• To make sure that system security is keeping pace with changes to the system
environment
• To prepare for a future event, such as installing a new application, moving to a higher
security level, or setting up a communications network

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-3


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Auditing: Some events to monitor


IBM i

• Save/restore information

• Authorization failures

• References to objects through interfaces not supported

• Deleted objects

• Security related functions

• Action auditing information

© Copyright IBM Corporation 2012

Figure 7-3. Auditing: Some events to monitor OL1914.1

Notes:
All events can be journaled, or you may select the ones you want.
Your journal receiver should not be deleted from the system until the information is saved to
tape media.

7-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Levels of auditing
IBM i

• The levels of auditing that can be implemented include:


– System-wide auditing

– Auditing by specific user

– Auditing by specific object

– Auditing by network intrusion

– Combination of the above

© Copyright IBM Corporation 2012

Figure 7-4. Levels of auditing OL1914.1

Notes:
The security audit journal is the primary source of auditing information on the events that
occur on the system.
Starting with V5R4, intrusion detection was added as an auditable event. Intrusion
detection involves gathering information about unauthorized access, attempts, and attacks
coming in over the TCP/IP network. Security administrators can analyze the auditing
records that intrusion detection provides in order to secure the IBM i network from these
types of attacks.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-5


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Examine your strategy


IBM i

• Security strategies tend to become less effective over time.


Some of the things that can change are:
– Operating system updates
– New products
– Procedural changes
– New user profiles
– Changing roles
– Terminations and resignations
– New and changed objects
– Deleted objects
– Changes to system values and network attributes

© Copyright IBM Corporation 2012

Figure 7-5. Examine your strategy OL1914.1

Notes:

7-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

An effective strategy
IBM i

• Used to define security requirements

• Endorsed by management

• Communicated to employees

• Enforceable

• Periodically reexamined

© Copyright IBM Corporation 2012

Figure 7-6. An effective strategy OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-7


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Event monitoring
IBM i

• Tools used to monitor events:


– History log (QHST)
– Security audit journal
– Critical database files: Journal

• Events you might want to monitor include:


– Invalid sign-on attempts
– Authority failures
– Access of or changes to critical files

© Copyright IBM Corporation 2012

Figure 7-7. Event monitoring OL1914.1

Notes:

7-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Using the history log


IBM i

• The history log is used to monitor for:


– Start and completion of jobs
– Device status messages
– System operator messages and responses
– Failed sign-on attempts

• To display the contents:


– DSPLOG LOG(QHST)

• To display a specific message range:


– DSPLOG LOG(QHST) MSGID(CPF2200)

© Copyright IBM Corporation 2012

Figure 7-8. Using the history log OL1914.1

Notes:
Security messages are in the range 2200 to 22FF. They have prefixes CPI, CDF, CPD and
CPA.
However, logging information to the audit journal provides better system performance and
more complete information about these security-related events than the QHST log. The
QHST log should not be considered a complete source of securing violations. Use the
security audit functions instead.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-9


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Steps to implement auditing


IBM i

CRTJRNRCV JRNRCV(SECRCV1) LIB(USRLIB)

CRTJRN JRN(QSYS/QAUDJRN) JRNRCV(SECRCV1)

CHGSYSVAL SYSVAL(QAUDLVL QAUDLVL2)


VALUE(*NONE)
(or one or some of the values on the next page)

CHGSYSVAL SYSVAL(QAUDCTL)
VALUE(*NONE) (*OBJAUD *AUDLVL *NOQTEMP)

© Copyright IBM Corporation 2012

Figure 7-9. Steps to implement auditing OL1914.1

Notes:
The journal QAUDJRN must exist in library QSYS in order to change this system value to a
value other than *NONE. The journal QAUDJRN cannot be deleted or moved from the QSYS
library until the system value is changed to *NONE.
• QAUDLVL: Security auditing level controls the level of auditing on the system. The
system audits functions that can affect security. QAUDLVL default value is *NONE.
Choose the values you wish to journal. These values apply to all users of the system.
• The QAUDLVL2 system value also specifies which actions are audited for all users of
the system and is used when more than 16 auditing values are needed. The AUDLVL
parameter in the user profile determines which actions are audited for a specific user.
The values for the AUDLVL parameter apply in addition to the values for the QAUDLVL
and QAUDLVL2 system values.
• QAUDCTL: Audit control. This system value contains the on and off switches for object
and user level auditing. This system value activates auditing on the system that is
selected by the Change Object Audit (CHGOBJAUD) and Change User Audit
(CHGUSRAUD) commands and the QAUDLVL system value.

7-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty - A change to this system value takes effect immediately. The shipped value is *NONE.
To turn auditing on, specify either *OBJAUD or *AUDLVL. If auditing is active, specify
*NONE to turn auditing off.
- One or more of the following values may be specified. If you specify *NONE, that
must be the only specified value:
• *NONE: No auditing of objects (Change Object Audit (CHGOBJAUD) command) or
of user actions (Change User Audit (CHGUSRAUD) command, AUDLVL keyword)
is done on the system. In addition, no auditing controlled by the QAUDLVL
system value is done.
• *NOQTEMP: No auditing of most objects in QTEMP is done. You must specify
*NOQTEMP with either *OBJAUD or *AUDLVL. You can not specify *NOQTEMP by
itself.
• *OBJAUD: Auditing is performed for objects that have been selected using the
CHGOBJAUD, CHGDLOAUD, or CHGAUD commands.
• *AUDLVL: Auditing is performed for any functions selected on the QAUDLVL
system value and on the AUDLVL parameter of individual user profiles. The audit
level for a user is specified using the Change User Audit (CHGUSRAUD)
command.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-11


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Values for the QAUDLVL and QAUDLVL2


IBM i

*NONE *NETFAIL *SECRUN


*NOTAVL *NETSCK *SECCKD
*AUDLVL2 *OBJMGT *SECURITY
*ATNEVT *OFCSRV *SECVFY
*AUTFAIL *OPTICAL *SECLDL
*CREATE *PGMADP *SERVICE
*DELETE *PGMFAIL *SPLFDTA
*JOBBAS *PRTDTA *SYSMGT
*JOBCHGUSR *SAVRST
*JOBDTA *SECCFG
*NETBAS *SECDIRSRV
*NETCLU *SECIPC
*NETCMN *SECNAS
© Copyright IBM Corporation 2012

Figure 7-10. Values for the QAUDLVL and QAUDLVL2 OL1914.1

Notes:
*NONE: No events controlled by the QAUDLVL or QAUDLVL2 system values are logged.
Events are logged for individual users based on the AUDLVL values of user profiles.
*NOTAVL: This value is displayed to indicate that the system value is not available to the
user because the user does not have either *AUDIT or *ALLOBJ special authority. The
system value cannot be set to this value.
*AUDLVL2: Both QAUDLVL and QAUDLVL2 system values will be used to determine the
security actions to be audited.
*ATNEVT: Attention events are logged.
*AUTFAIL: Authority failure events are logged.
*CREATE: Object create operations are logged.
*DELETE: Object delete operations are logged.
*JOBBAS: Job base functions are audited.
*JOBCHGUSR: Changes to a thread's active user profile or its group profiles are audited.

7-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *JOBDTA: Actions that affect a job are logged. *JOBDTA is composed of two values,
*JOBBAS and *JOBCHGUSR, which enable you to better customize your auditing. If both of
the values are specified, you will get the same auditing as if just *JOBDTA is specified.
*NETBAS: Network base functions are audited.
*NETCLU: Cluster and cluster resource group operations are audited.
*NETCMN: Network and communication functions are audited.
*NETFAIL: Network failures are audited.
*NETSCK: Socket tasks are audited.
*OBJMGT: Object move and rename operations are logged.
*OFCSRV: Changes to the system distribution directory and office mail actions are logged.
*OPTICAL: Use of Optical Volumes is logged.
*PGMADP: Obtaining authority from a program that adopts authority is logged.
*PGMFAIL: System integrity violations are logged.
*PRTDTA: Printing a spooled file, sending output directly to a printer, and sending output to
a remote printer are logged.
*SAVRST: Save and restore operations are logged.
*SECCFG: Security configuration is audited.
*SECDIRSRV: Changes or updates when doing directory service functions are audited.
*SECIPC: Changes to interprocess communications are audited.
*SECNAS: Network authentication service actions are audited.
*SECRUN: Security run time functions are audited.
*SECSCKD: Socket descriptors are audited.
*SECURITY: Security-related functions are logged. *SECURITY is composed of several
values to enable you to better customize your auditing.
*SECVFY: Use of verification functions are audited.
*SECVLDL: Changes to validation list objects are audited.
*SERVICE: Using service tools is logged.
*SPLFDTA: Actions performed on spooled files are logged.
*SYSMGT: Use of systems management functions is logged.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-13


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security: Auditing policy (1 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 7-11. Security: Auditing policy (1 of 3) OL1914.1

Notes:
System i Navigator has screens that allow you to view or change the auditing policy for the
system.

7-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security: Auditing policy (2 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 7-12. Security: Auditing policy (2 of 3) OL1914.1

Notes:
The Audit Policy panel seen in this visual is accessed under IBM i Navigator by selecting
Security and then Policies, then either double-clicking or right-clicking Audit Policy and
selecting Properties. The Audit Policy is similar to setting the value in Auditing System
Values on a IBM i.
These system values are:
• QAUDCTL: Activate action auditing
• QAUDLVL and QAUDLVL2: List of actions to audit
• QCRTOBJAUD: Sets default auditing for newly created objects
Prior to V5R3, the system value QAUDLVL can only store 16 auditing values, which was
enough at that time. With the introduction of new auditing values, a new system value
QAUDLVL2 was introduced at V5R4.
If you will only be auditing for 16 of the supported values or less, then you would use the
QAUDLVL system value only. However, if you will be auditing for more than 16 of the

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-15


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

supported values, then the value *AUDLVL2 must be defined in the system value QAUDLVL
in order to activate the system value QAUDLVL2.
When *AUDIT special authority is specified in your user profile, you can turn auditing on or
off for the following options:
• Action auditing (system page)
• Auditing for newly created objects (next objects page)

7-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security: Auditing policy (3 of 3)


IBM i

© Copyright IBM Corporation 2012

Figure 7-13. Security: Auditing policy (3 of 3) OL1914.1

Notes:
QCRTOBJAUD system value specifies the default auditing value used when objects are
created into a library or directory.
If the CRTOBJAUD value of the library or directory is set to *SYSVAL, the value specified in
QCRTOBJAUD system value is used to set the object auditing value for the object being
created.
The object auditing value of an object determines if an auditing entry is sent to the system
auditing journal QAUDJRN in library QSYS when the object is used or changed. The
auditing entry is only sent to the auditing journal if auditing is currently active on the system.
To start auditing, system value QAUDCTL must be set to a value other than *NONE.
A change to this system value takes effect immediately. The shipped value is *NONE.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-17


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Audit journal entries


IBM i

Journal Entry
Operation description
code type
T AF All authority failures
T CA Changes to object authority (authorization list or object)
T CP Create, change, delete, display, restore of user profiles
T DO All delete operations on the system
T DS DST security officer password reset
T JD Changes to the USER parameter of a job description
T NA Changes to network attributes
T OW Changes to object ownership
Changes to programs (CHGPGM) that will now adopt the owner's
T PA
authority
T PW Passwords used that are not valid
T RA Restore of objects when authority changes
T RJ Restore of job descriptions that contain user profile names
T RO Restore of objects when ownership information changes
T RP Restore of programs that adopt their owner's authority
T RU Restore of authority for user profiles
T SE Changes to subsystem routing
T SV Changes to system value
U User-specified, user-created entry

© Copyright IBM Corporation 2012

Figure 7-14. Audit journal entries OL1914.1

Notes:
System-detected entries are written automatically to the receiver.
User entries are written by issuing the SNDJRNE command.
For a complete list of all of the Audit journal (QAUDJRN) entry types, refer to the IBM i 7.1
Security - Security Reference manual (SC41-5301-11, Appendix F, Table 161) in the
Information Center. Appendix F will detail all of the journal entry types and formats.
You can download this publication from the following web site:
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US or using the
Security tab at the http://publib.boulder.ibm.com/iseries/ information center site.

7-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Audit-related files and messages


IBM i

Physical file Journal Message


Description
name entry code ID
CP12246 Authority violation
CP12247 Domain violation
QASYAFJE AF CP12248 Submit job violation
CP12249 Default sign-on
CP12250 CRC failure
CP12251 Password not valid
QASYPWJE PW
CP12252 User ID not valid
QASYPWJE CA CP12252 Authority change
QASYOWJE DW CP12254 Ownership change
QASYPAJE PA CP12255 Change program to adopt
QASYSVJE SV CP12256 System value change
QASYNAJE NA CP12257 Network attribute changes
QASYRPJE NA CP12258 Restore of programs that adopt
QASYRJJE RJ CP12259 Restore of job description that contains a user profile name
QASYROJE RO CP12260 Restore of object owner changes
QASYRAJE RA CP12261 Restore of object and authority changes
QASYRUJE RU CP12262 Restore of authority for user
QASYDOJE DO CP12263 Delete of object
QASYJDJE JD CP12264 Job description change to specify user name
QASYSEJE RC CP12265 Routing entry changed
QASYCPJE CP CP12266 User profile changed
QASYDSJE DS CP12267 Request to change DST QSECOFR password

© Copyright IBM Corporation 2012

Figure 7-15. Audit-related files and messages OL1914.1

Notes:
Overview of the model database output files that can be used to define the record when
you create an output file with the DSPJRN command.
Complete layouts for the model database outfiles are found in Appendix F, “Layout of audit
journal entries,” on page 561 of the IBM I 7.1 Security – Security reference (SC41-5302-11)
guide.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-19


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Action auditing for a specific user


IBM i
• Use CHGUSRAUD to set the AUDLVL for a selected user profile.
CHGUSRAUD USRPRF(ADM01) AUDLVL(*SAVRST *CMD *DELETE*SPLFDTA)

© Copyright IBM Corporation 2012

Figure 7-16. Action auditing for a specific user OL1914.1

Notes:
Values from the user profile parameter AUDLVL, system value QAUDCTL, and system value
QAUDLVL work together to control action auditing.
Example:
CHGUSRAUD USRPRF(ADM01) AUDLVL(*CMD *DELETE)
The Change User Audit (CHGUSRAUD) command allows a user with *AUDIT special
authority to set up or change auditing for a user. The system value QAUDCTL controls
turning auditing on and off. The auditing attributes of a user profile can be displayed with
the Display User Profile (DSPUSRPRF) command.

7-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

The changes made by CHGUSRAUD take effect the next time a job is started for this user.
Do not precede an entry with an asterisk unless that entry is a special value that is shown
(on the display itself or in the help information) with an asterisk.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-21


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Action auditing for a specific object


IBM i

• Values from the user profile parameter OBJAUD, system value


QAUDCTL, and the object work together to control object auditing.
• Use CHGOBJAUD to specify auditing actions on objects
– *NONE
– *USRPRF
– *CHANGE
– *ALL

CHGOBJAUD OBJ(ADM01/CUSMSI) OBJTYPE(*FILE) OBJAUD(*USRPRF)

• Use CHGUSRAUD to set the OBJAUD values in selected user profile


– *SAME
– *NONE
– *CHANGE
– *ALL

CHGUSRAUD USRPRF(ADM01) OBJAUD(*CHANGE)


© Copyright IBM Corporation 2012

Figure 7-17. Action auditing for a specific object OL1914.1

Notes:
Values from the user profile parameter OBJAUD, system value QAUDCTL, and the object
work together to control object auditing.
In the visual, the Change Object Auditing (CHGOBJAUD) command allows users with
*AUDIT special authority to set up auditing on an object. Users with *AUDIT special
authority can turn auditing on or off for an object regardless of whether they have authority
to the object.
The system value QAUDCTL controls turning auditing on and off.
The auditing attribute of an object can be displayed with the Display Object Description
(DSPOBJD) command.

7-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

Do not precede an entry with an asterisk unless that entry is a special value that is shown
on the display itself or in the help information with an asterisk (*).

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-23


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User: Capabilities > Auditing


IBM i

© Copyright IBM Corporation 2012

Figure 7-18. User: Capabilities \> Auditing OL1914.1

Notes:
A security auditor inside or outside your organization can use the auditing function that the
system provides to gather information about security-related events that occur on the
system. The Capabilities panel Auditing dialog specifies the object auditing values for this
user.
System values and values specified for users work together to control action auditing.
Which events you choose to log depends on both your security objectives and your
potential exposures. The Capabilities panel Auditing dialog specifies the action auditing
values for this user.

7-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Printing or viewing audit journal entries


IBM i

• You have the following options for working with audit journal
entries:
– Use DSPJRN to view and print entries
– Output DSPJRN to disk
• User program
• QUERY/400
• Query manager
• SQL

© Copyright IBM Corporation 2012

Figure 7-19. Printing or viewing audit journal entries OL1914.1

Notes:
The Display Journal (DSPJRN) command allows you to convert journal entries (contained in
one or more receivers) into a form suitable for external representation. Output of the
command can be displayed or printed with the job's spooled printer output or directed to a
database output file. If the database output file exists, records may either replace or be
added to the current data in the indicated file member. The system creates the specified
database file and member if they do not exist. Database files created by the system have a
standard format. A warning message is sent, and the records are truncated if any of the
entries are longer than the specified maximum record length of the output files.
The contents of selected entries in the journal receivers may be converted for output. It is
also possible to selectively limit the entries that are displayed. If no journal entries satisfy
the selection or limitation criteria, an escape message is sent indicating that fact.
Gaps might exist in the sequence numbers of the entries converted. These occur because
some of the journal entries represent internal system information. These entries are not
converted. It is possible to show journal entries whose journal sequence numbers are reset
in the chain of receivers being specified.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-25


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

DSPJRN to view a specific entry


IBM i

Display Journal Entry

Object . . . . . . . . : Library . . . . . . :
Member . . . . . . . . . : Sequence. . . . . . : 32488
Code . . . . . . . . . . : T - Audit trail entry
Type . . . . . . . . . . : DO - Delete object

Entry specific data


Column *...+....1....+....2....+....3....+....4....+....5
00001 'QBATCHJOBD QGPL *JOBD

Press Enter to continue.

F3=Exit F6=Display only entry specific data


F10=Display only entry details F12=Cancel F24=More keys

© Copyright IBM Corporation 2012

Figure 7-20. DSPJRN to view a specific entry OL1914.1

Notes:
The Display Journal (DSPJRN) command allows you to view selected journal entries at your
workstation. The journal entry shown is one that you requested on the Display Journal
display. The default is to display entries from only the attached receiver.
If you requested to see more than one journal entry, you can see the next one you
requested by pressing Enter. If you are currently viewing the last requested entry, pressing
Enter will take you back to the Display Journal display. You can go backward through the
requested entries by pressing F14.
If you see More... on the lower right side of your display, there is more information to view.
Press Page Down (or Roll Up) to move toward the end of the information. Press Page Up
(or Roll Down) to move toward the beginning of the information. If you see Bottom instead
of More..., you are at the end of the information.

7-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

DSPJRN to view > F10


IBM i

Display Journal Entry Details

Journal.......: QAUDJRN Library .......: QSYS


Sequence.......: 32488

Code..........: T - Audit trail entry


Type...........: DO - Delete object

Object.........: Library.........:
Member.........: Flag...........: 0
Date...........: 22/09/94 Time............: 13:42:36
Count/RRN.......: 0 Program.........: CLRLIB_PGM

Job............: 012462/BAD_PGMR/QPADEV0048
User profile......: BAD_PGMR Ref Constraint...: No
Commit cycle ID..: 0 Trigger........: No

Press Enter to continue.

F3=Exit F10=Display entry F12=Cancel F14=Display previous entry


F15=Display only entry specific data

© Copyright IBM Corporation 2012

Figure 7-21. DSPJRN to view \> F10 OL1914.1

Notes:
The Display Journal Entry Details display shows only the detail entry data for a specific
journal entry. The journal entry shown is one that you requested on the Display Journal
display.
If you requested to see more than one journal entry, you can see the next one you
requested by pressing Enter. If you are currently viewing the last requested entry, pressing
Enter takes you back to the Display Journal display. You can go backward through the
requested entries by pressing F14.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-27


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Output DSPJRN to disk > print


IBM i

DSPJRN JRN(QSYS/QAUDJRN) +
ENTTYP(AF) +
OUTPUT(*OUTFILE) +
OUTFILFMT(*TYPE5) +
OUTFILE(QTEMP/your_file)

• The format of your_file will be QASYAFJ5.


• Use QUERY or your own program for further analysis.

© Copyright IBM Corporation 2012

Figure 7-22. Output DSPJRN to disk \> print OL1914.1

Notes:
Outfile format (OUTFILFMT)
Specifies the format of the journal entries written to the output file specified on the file to
receive output prompt (OUTFILE parameter). This parameter can be specified only if the
value *OUTFILE is specified on the OUTPUT parameter.
The information fields and the format of the information in each journal entry is shown in
tables for this parameter in the command description in the CL reference information at
IBM InfoCenter for i http://publib.boulder.ibm.com/iseries/
The possible values are:
*TYPE1: The converted entries are formatted to include the minimum information that can
be specified.
*TYPE2: The converted entries include the information returned when
OUTFILFMT(*TYPE2) is specified, plus the name of the user profile for the job that
generated the displayed journal entries and the name of the system on which the output
records were generated.

7-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *TYPE3: The converted journal entries include all the information returned when
OUTFILFMT(*TYPE3) is specified and the null value indicators.
*TYPE4: The converted entries include the information returned when
OUTFILFMT(*TYPE4) is specified, the journal identifier, the physical file trigger indicator,
and the referential constraint indicator.
*TYPE5: The converted entries include the information returned when
OUTFILFMT(*TYPE5) is specified, the program library, and ASP information.
File to receive output (OUTFILE): Specifies the name and library of the database file to
which the output of the command is directed. If the output file already exists, the system
attempts to use it. Records may replace or be added to the current data in the file member.
If no records are written to the database file (because of the specified selection values) and
*REPLACE is specified on the OUTMBR parameter, records are cleared from the existing
database file. If the file does not exist, this command creates a database file in the
specified library.

Note

*TYPE2 and *TYPE4 output formats are no longer updated; therefore, IBM recommends
that you stop using *TYPE2 and *TYPE4 formats and use only *TYPE5 formats.

Refer to Appendix F in Security Reference for names and layout of all system-supplied
auditing profiles.

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-29


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Consider journaling critical files


IBM i

• Offers both *BEFORE and *AFTER imaging

• Tracks changes by job, date, time, and user profile

• Journal receiver entries cannot be modified, even by QSECOFR

• Journal receivers can be saved

© Copyright IBM Corporation 2012

Figure 7-23. Consider journaling critical files OL1914.1

Notes:
This is not security audit journaling. This is normal database file journaling in which detailed
record images of additions, deletions, and changes to records in a database file are logged
to a journal.

7-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint
IBM i

1. True or False: Security auditing is implemented to keep a


system at a planned security level.

2. Which of the following is not one of the levels of security


auditing that can be implemented on the system?
a. System wide
b. Specific user
c. Specific object
d. Configuration changes

3. True or False: An effective security strategy does not require


that it be endorsed by management.

© Copyright IBM Corporation 2012

Figure 7-24. Checkpoint OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 7. Security auditing 7-31


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• List and discuss the types of security-related activities that you
can monitor on your system
• List the different levels of security auditing that you can
implement
• Explain why implementing auditing is an ongoing process
• List and configure the commands and system values used to
implement security auditing
• Explain the steps required to implement the different types of
security auditing

© Copyright IBM Corporation 2012

Figure 7-25. Unit summary OL1914.1

Notes:

7-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 8. Designing security

What this unit is about


Security is the prevention of access to objects by unauthorized users.
Integrity is the protection of objects from accidental destruction or
alteration. The security aids provided in the operating system assist
the system administrator to control who can use the system, who can
use the objects, and what authority they will have to those objects.

What you should be able to do


After completing this unit, you should be able to:
• List some recommendations for security design
• Discuss the concept of implementing library security
• Discuss some design guidelines to keep in mind when
implementing menu security
• Describe the process used by the system for sign-on processing
• Explain the functions provided by the System Request screen and
how to secure this screen or the screen options
• Discuss the concepts of implementing object security
• List and discuss the commands used to back up and recover
security information
• Describe the security tools that are available to assist you with the
implementation of security

How you will check your progress


• Checkpoint questions

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-1


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• List some recommendations for security design
• Discuss the concept of implementing library security
• Discuss some design guidelines to keep in mind when
implementing menu security
• Describe the process used by the system for sign-on
processing
• Explain the functions provided by the System Request screen
and how to secure this screen or the screen options
• Discuss the concepts of implementing object security
• List and discuss the commands used to back up and recover
security information
• Describe the security tools that are available to assist you with
the implementation of security
© Copyright IBM Corporation 2012

Figure 8-1. Unit objectives OL1914.1

Notes:

8-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Designing security
IBM i

• Most people use a combination of the following methods to


secure their system:
– Library security
– Menu security
– Object security
– File security
– Adopted security
– Command security
• Using combinations of
– Users
– Groups
– Authorization lists

© Copyright IBM Corporation 2012

Figure 8-2. Designing security OL1914.1

Notes:
Most users of the Power Systems with IBM i end up using a combination of all of the
security methods that are supported on the i platform.
Use the information covered in this unit (in conjunction with the publication mentioned on
the following pages) as a conceptual overview of the steps that need to be taken to secure
your system.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-3


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Overall recommendation for security design


IBM i

• Keep the design as simple as possible.

• Use resource security along with the other methods available to protect
information.

• Secure only those objects that require securing.

• Move from general to specific authority.

• Determine what should be the default *PUBLIC authority, and


implement it with the CRTAUT parameter.

• Avoid private authorities that are less than public authority.

• Use authorization lists to secure group objects with the same security
requirements.
© Copyright IBM Corporation 2012

Figure 8-3. Overall recommendation for security design OL1914.1

Notes:
Use resource security along with the methods available, such as limited capabilities in the
user profile and restricting users to a set of menus, to protect information.

Important

If you use a product such as IBM i Access or if you have communication lines attached to
your system, do not rely only on limiting capabilities in the user profile and menu access
control. You must use resource security to secure any objects that you do not want to be
accessible through these interfaces.

Secure only those objects that really require security. Analyze a library to determine which
objects, such as data files, are confidential, and secure those objects. Use public authority
for other objects, such as data areas and message queues.
Move from the general to the specific:

8-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Plan security for libraries and directories. Deal with individual objects only when
necessary.
• Plan public authority first, followed by group authority and individual authority.
Make the public authority for new objects in a library (CRTAUT parameter) the same as the
public authority for the majority of existing objects in the library.
To make auditing easier and improve authority-checking performance, avoid defining
private authority that is less than the public authority for an object.
Use authorization lists to group objects with the same security requirements. Authorization
lists are simpler to manage than individual authorities and help to recover security
information.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-5


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Planning and setting up system security guide


IBM i

http://publib.boulder.ibm.com/eserver/ibmi.html
• Security
– Planning and setting up system security
• PDF file: Planning and setting up system security

© Copyright IBM Corporation 2012

Figure 8-4. Planning and setting up system security guide OL1914.1

Notes:
The information in this topic collection provides you with detailed information about
planning, setting up, and using your system security. This topic collection combines the
information formerly in the Basic system security and planning topic collection and in the
Tips and Tools for Securing Your iSeries manual.
Determining your company's system security is one of the most basic and most important
decisions that you will make during the course of building your security plan. With system
security, you need to balance the need to safeguard your valuable information and the
need of users to access that information to successfully make your company thrive. To
strike this balance, you must understand the specific needs and goals of your company's
current direction but also be aware of future needs. Your security plan must protect your
resources but also must be flexible enough to grow as your company grows.
Several tools exist that can aid you in creating, configuring, and managing your
system-level security on your server. It is important to note that security does not end with
protecting the server and managing access to assets that are stored on the system. A
complete security implementation needs to include not only system-level security, but also

8-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty network-level security and transaction-level security. This topic focuses on system-level
security.
Use this information to develop a personalized plan that fits your company's specific
system security needs. After you complete the planning phase of your system security, you
can set up system security by using the instructions provided in this information.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-7


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 1: Library security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 8-5. Topic 1: Library security OL1914.1

Notes:
Many factors affect how you choose to group your application information into libraries and
manage libraries. To access an object, you need authority to the object itself and to the
library containing the object. You can restrict access to an object by restricting the object
itself, the library containing the object, or both.
Planning libraries
A library is like a directory used to locate the objects in the library. *USE authority to a library
allows you to use the directory to find objects in the library. The authority for the object itself
determines how you can use the object. *USE authority to a library is sufficient to perform
most operations on the objects in the library. Using public authority for objects and
restricting access to libraries can be a simple, effective security technique. Putting
programs in a separate library from other application objects can also simplify security
planning. This is particularly true if files are shared by more than one application. You can
use authority to the libraries containing application programs to control who can perform
application functions.

8-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Library security
IBM i

• Library security is effective only if these rules are followed:


– Libraries contain objects with similar security requirements.

– Access is granted or restricted at the library level.

– Typically, users that have access to the library have access to all the
objects in the library (through *PUBLIC authority).

– Users are not allowed to add new objects to restricted libraries.

– Secure your library lists and any commands used to change them.

– This might not be granular enough, especially for sensitive objects.

© Copyright IBM Corporation 2012

Figure 8-6. Library security OL1914.1

Notes:
Changes to programs in the libraries are controlled. That is, application libraries should
have public authority of *USE or *EXCLUDE unless users need to create objects directly into
the library.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-9


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Menu security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 8-7. Topic 2: Menu security OL1914.1

Notes:
Menu security controls which menu functions a user can perform. This system was
originally designed as a follow-on product for S/36 and S/38. Many system installations
were, at one time, S/36 or S/38 installations. To control what users can do, security
administrators on those earlier systems often used a technique that is referred to as menu
security or menu access control. Menu access control means that when a user signs on,
the user sees a menu. The user can perform only those functions that are on the menu.
The user cannot get to a command line on the system to perform any functions that are not
on the menu. In theory, the security administrator does not need to worry about authority to
objects because menus and programs control what users can do.

Note

Menus are not secure if the system allows any network interfaces to access the system.
Most network interfaces do not know anything about menu security.

8-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Menu security: Design guidelines


IBM i

• Do not provide a command line on menus designed for restricted users.

• Avoid having functions with different security requirements on the same


menu.

• Make sure that the set of menus provides all the necessary links
between menus.

• Provide access to a few system functions.

• Provide access to decision-support tools from menus.

• Consider controlling access to the System Request screen.

• For users allowed to run a single function, avoid menus entirely and
specify an initial program.
© Copyright IBM Corporation 2012

Figure 8-8. Menu security: Design guidelines OL1914.1

Notes:
Here are design guidelines for menu security:
• Do not provide a command line on menus designed for restricted users.
• Avoid having functions with different security requirements on the same menu. For
example, if some application users are allowed to only view information, not change it,
provide a menu that has only display and print options for those users.
• Make sure that the set of menus provides all the necessary links between menus so the
user does not need a command line to request one.
• Provide access to a few system functions, such as viewing printer output. The ASSIST
system menu gives this capability and can be defined in the user profile as the
Attention-key-handling program. If the user profile has a class of *USER and has limited
capabilities, the user cannot view the output or jobs of other users.
• Provide access to decision-support tools from menus.
• Consider controlling access to the System Request screen or some of the options on
this screen.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-11


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• For users who are allowed to run only a single function, avoid menus entirely and
specify an initial program in the user profile. Specify *SIGNOFF as the initial menu.

8-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

User profile session startup: Menu security


IBM i

• Confine users to a menu interface.


– Initial program (program-name)
– Initial menu Sign off

- Or -

– Initial program No initial program


– Initial menu (menu-name)

– Limit initial program


or menu capabilities
Limit capabilities

• Do not provide command line.


© Copyright IBM Corporation 2012

Figure 8-9. User profile session startup: Menu security OL1914.1

Notes:
You can specify the name of a program to call when a user signs on. This program runs
before the initial menu, if any, is displayed. If the Limit capabilities field in the user's profile
is *YES or *PARTIAL, the user cannot specify an initial program on the Sign On display.
You can specify the name of a menu to be shown when the user signs on. The initial menu
is displayed after the user's initial program runs. The initial menu is called only if the user's
routing program is QCMD or QCL.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-13


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Menu security: Sign-on processing


IBM i

© Copyright IBM Corporation 2012

Figure 8-10. Menu security: Sign-on processing OL1914.1

Notes:
When you start a job on the system, objects are associated with the job, such as an output
queue, a job description, and the libraries on the library list. Authority for some of these
objects is checked before the job is allowed to start and for other objects after the job
starts. Inadequate authority may cause errors or may cause the job to end.
The system administrator can change the system signon display to add text or company
logo to the display. Care must be taken to make sure the field names or buffer lengths of
the display file are not changed when adding text to the display file. Changing the field
names or buffer lengths may cause signon to fail.
The source for the signon display file is shipped as a member (QDSIGNON or QDSIGNON2)
in the QSYS/QAWTSSRC physical file. QDSIGNON contains the source for the signon screen
source used when system value QPWDLVL is set to 0 or 1. Member QDSIGNON2 contains
the signon screen source used when the system value QPWDLVL is set to 2 or 3.

8-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Sign-on processing (1 of 2)
IBM i

No
Valid user/password? Error message
Yes
No
Authorized to device? Error message
Yes
Yes
Program/menu/lib exceed Error message
capability?
No
Program No
INLPGM in profile?
keyed?
Yes
Yes
Call keyed Call INLPGM
program
A
© Copyright IBM Corporation 2012

Figure 8-11. Sign-on processing (1 of 2) OL1914.1

Notes:
After the user enters a user ID and password, these steps are performed before a job is
actually started on the system:
1. The user profile and password are verified.
2. The user's authority to use the workstation is checked.
3. The system verifies authority for the values in the user profile and in the user's job
description that are used to build the job structure, such as job description, output
queue, current library, and libraries in library list.
After the job is started, these steps are performed before the user sees the first display or
menu:
1. If the routing entry for the job specifies a user program, normal authority checking is
done for the program, the program library, and any objects used by the program.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-15


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

2. If the routing entry specifies the command processor (QCMD):


a. Authority checking is done for the QCMD processor program, the program library, and
any objects used, as described in step 1.
b. The user's authority to the Attention-key-handling program and library is checked.
c. Normal authority checking is done for the initial program (and its associated objects)
specified in the user profile.
d. Normal authority checking is done for the initial menu (and its associated objects)
specified in the user profile.

8-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Sign-on processing (2 of 2)
IBM i

No
Menu keyed?
Yes
* SIGNOFF in Yes
profile? Sign off user
Display
keyed menu No

Display
profile menu

© Copyright IBM Corporation 2012

Figure 8-12. Sign-on processing (2 of 2) OL1914.1

Notes:
If the user has the capability, a keyed menu name overrides the menu name in the user
profile. *SIGNOFF is a valid menu name. It causes the user to be signed off. Menu name
might not be blank.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-17


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System Request screen security


IBM i

• To prevent specific users from seeing the System Request screen, specify
the following:
GRTOBJAUT OBJ(QSYS/QGMNSYSR) OBJTYPE(*PNLGRP)
USER(USERA) AUT(*EXCLUDE)
© Copyright IBM Corporation 2012

Figure 8-13. System Request screen security OL1914.1

Notes:
A user can use the system request function to suspend the current job and display the
System Request screen. The System Request screen allows the user to send and display
messages, transfer to a second job, or end the current job. This might represent a security
exposure because the public authority to the System Request screen is *USE when a
system is shipped.
To call up the System Request screen:
1. Press the Sys Req key to show an input line at the bottom of the display.
2. Press Enter to show the System Request screen.
Each time the System Request key is pressed, the system automatically changes the
current user profile of the job to the initial user profile of the job. This is done so that the
user does not have any additional authority on the System Request screen or in the
Presystem Request Program exit program. After the System Request function is
completed, the current user profile of the job is returned to the value that it was before the
System Request key was pressed.

8-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System Request screen: A secondary job


IBM i

Job A Job B

Sign-on
1 Process
System Request
Sign-on
2 Process
System Request
Resume processing
3
System Request
Resume processing
4
Sign off
Resume processing
5
Sign off

© Copyright IBM Corporation 2012

Figure 8-14. System Request screen: A secondary job OL1914.1

Notes:
From the System Request screen, select option 1 to display the signon for a secondary job
(Job B in this example). The original job (Job A in this example) is suspended during the
time Job B is processed.
If the operator presses Sys Req and picks option 1, Job B is suspended and Job A is
continued from the point it was suspended.
Thus, the operator can jump between two jobs, processing one while the other is
suspended.
When the operator signs off one job (either one) the other job is given control to continue
processing.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-19


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restricting the use of System Request screen options


IBM i

Option Command
1 Transfer Secondary Job (TFRSECJOB)
2 End Request (ENDRQS)
3 Display Job (DSBJOB)
4 Display Message (DSPMSG)
5 Send Message (SNDMSG)
6 Display Message (DSPMSG)
80 Disconnect Job (DSCJOB)
90 Sign Off (SIGNOFF)

• Any of the options can be restricted by removing public


authority to the associated command. For example:
GRTOBJAUT OBJ(TFRSECJOB) OBJTYPE(*CMD)
USER(*PUBLIC) AUT(*EXCLUDE)

© Copyright IBM Corporation 2012

Figure 8-15. Restricting the use of System Request screen options OL1914.1

Notes:
You can prevent users from selecting specific options from the System Request screen by
restricting the authority to the associated commands.

8-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 3: Object security

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 8-16. Topic 3: Object security OL1914.1

Notes:
Object security, as a part of resource security, defines which users are allowed to use
objects on the system and what operations they are allowed to perform on those objects.
Also, deciding who will be allowed access to what information on your system is an
important part of your security policy.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-21


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Object security
IBM i

• Access is granted or restricted at the individual object level.

• This is the most secure method.

• This method provides the most granularity.

• It can also be the most complex to set up.

• It can have performance impacts both at run time and at


backup and restore time.

© Copyright IBM Corporation 2012

Figure 8-17. Object security OL1914.1

Notes:

8-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Command security
IBM i

• Change the authority to specific commands.

• User needs *USE authority in order to run a command.

• Change the default values for commands.

© Copyright IBM Corporation 2012

Figure 8-18. Command security OL1914.1

Notes:
When your system arrives, the ability to use commands is set up to meet the security
needs of most installations. Some commands can be run only by a security officer. Others
require a special authority, such as *SAVSYS. Most commands can be used by anyone on
the system. You can change the authority to commands to meet your security
requirements.
For example, you might want to prevent most users on your system from working with
communications. You can set the public authority to *EXCLUDE for all commands that work
with communications objects, such the CHGCTLxxx, CHGLINxxx, and CHGDEVxxx
commands.
If you need to control which commands can be run by users, you can use object authority
to the commands themselves. Every command on the system has object type *CMD and
can be authorized to the public or only to specific users. To run a command, the user needs
*USE authority to that command.
Appendix C, in the Security Reference manual lists all the commands that are shipped with
the public authority set to *EXCLUDE.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-23


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

If you use the System/38 library, you need to restrict security-relevant commands in that
library also. Alternately, you might restrict access to the entire library. If you use one or
more national language versions of the i5/OS licensed program on your system, you need
to restrict commands in the additional QSYSxxx libraries on your system as well.
Another useful security measure is to change the default values for some commands. The
Change Command Default (CHGCMDDFT) command allows you to do this.

8-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Appendix C: Secured commands


IBM i

© Copyright IBM Corporation 2012

Figure 8-19. Appendix C: Secured commands OL1914.1

Notes:
This section of the Security Reference manual identifies which commands have restricted
authorization (public authority is *EXCLUDE) when your system is shipped. It shows which
IBM-supplied user profiles are authorized to use these restricted commands.
Any commands not listed here are public, which means they can be used by all users.
However, some commands require special authority, such as *SERVICE or *JOBCTL. The
special authorities required for a command are listed in Appendix D of the manual,
“Authority required for objects used by commands”.
If you choose to grant other users or the public *USE authority to these commands, update
this table to indicate which commands are no longer restricted on your system. Using some
commands might require the authority to certain objects on the system as well as to the
commands themselves.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-25


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System-defined authorities for files and programs


IBM i

*USE *CHANGE *ALL authority *EXCLUDE 1


authority authority authority
Operations View View, change, Create and delete the None.
allowed for information in and delete file. Add, change, and
files the file. records in the delete the records in the
file. file. Authorize others to
use the file.
Operations Change or Delete or clear None. Any access to
not allowed delete any the entire file. the file.
for files information in
the file. Delete
the file.
Operations Run the Change the Create, change, and None.
allowed for program. description of delete the program.
programs the program. Authorize others to use
the program.
Operations Change or Change or Change the owner of the Any access to
not allowed delete the delete the program, if the program the program.
for programs program. program. adopts authority.

¹) *EXCLUDE overrides any authorities that you grant to the public or through a group profile.
© Copyright IBM Corporation 2012

Figure 8-20. System-defined authorities for files and programs OL1914.1

Notes:
IBM i 7.1. Security - Planning and setting up system security
This page from the Planning and setting up system security section of the IBM i Information
Center describes system defined authorities and the operations that can be performed
against file and program objects.

8-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System-defined authorities for libraries


IBM i

*USE authority *CHANGE authority *ALL *EXCLUDE 1


authority authority

Operations • For objects in the • For objects in the • Everything None.


allowed for library, any library, any allowed
libraries operation allowed operation with
by the authority to allowed by the change
the specific object. authority to the authority.
• For the library, specific object. • Delete the
view descriptive • Add new objects library.
information. to the library. • Authorize
• Change the others to
library the library.
description.

• Add new objects to Delete the library. None. Any access to


Operations
the library. the library.
not allowed
• Change the library
for libraries
description.
• Delete the library.

¹) *EXCLUDE overrides any authorities that you grant to the public or through a group profile.
© Copyright IBM Corporation 2012

Figure 8-21. System-defined authorities for libraries OL1914.1

Notes:
IBM i 7.1. Security - Planning and setting up system security
This page from the Planning and setting up system security section of the IBM i Information
Center describes system defined authorities and the operations that can be performed
against library objects.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-27


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How library authority and object authority work together


IBM i

Object type Operations Object authority needed Library authority needed

File Change data *CHANGE *EXECUTE

File Delete the file *OBJOPR, *OBJEXIST *EXECUTE

File Create the file None *EXECUTE, *ADD

Program Run the program *USE *EXECUTE, *OBJOPR

Program Recompile the program *OBJEXIST, *OBJMGR, *ADD, *READ


*READ

Program Delete the program *OBJEXIST *EXECUTE

© Copyright IBM Corporation 2012

Figure 8-22. How library authority and object authority work together OL1914.1

Notes:
IBM i 7.1. Security - Planning and setting up system security
This page from the Planning and setting up system security section of the IBM i Information
Center describes how library authorities and object authorities work together to provide
access to the objects.

8-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Securing physical versus logical files (1 of 2)


IBM i

Logical files

CUSTINFO CUSTCRDT CUSTSLS

Name
Name Name
Address
Address Address
Credit limit
Credit limit Sales
Sales

Physical Files – CUSTMAST

Name Address Credit Limit Sales To Date

© Copyright IBM Corporation 2012

Figure 8-23. Securing physical versus logical files (1 of 2) OL1914.1

Notes:
Resource security on the system supports field-level security of a file. You can also use
logical files to protect specific fields or records in a file.
A logical file can be used to specify a subset of records that a user can access (by using
select and omit logic). Therefore, specific users can be prevented from accessing certain
record types.
A logical file can be used to specify a subset of fields in a record that a user can access.
Therefore, specific users can be prevented from accessing certain fields in a record.
A logical file does not contain any data. It is a particular view of one or more physical files
that contain the data. Providing access to the information defined by a logical file requires
data authority to both the logical file and the associated physical files.
The visual shows an example of a physical file and three different logical files associated
with it.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-29


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Securing physical versus logical files (2 of 2)


IBM i

• To use logical files as a security tool:


– Grant all data authorities to the underlying physical files.

– Revoke *OBJOPR from the physical files. This prevents users from
accessing the physical files directly.

– Grant the appropriate data authorities to logical files. Revoke any


authorities you do not want.

– Grant *OBJOPR to the logical files.

© Copyright IBM Corporation 2012

Figure 8-24. Securing physical versus logical files (2 of 2) OL1914.1

Notes:
The IBM i command RVKOBJAUT can be used to revoke the users specific authority for an
object.
The IBM i command GRTOBJAUT can be used to grant the users specific authority for an
object.

8-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Create Output Queue: Security attributes beyond
resource security
IBM i

© Copyright IBM Corporation 2012

Figure 8-25. Create Output Queue: Security attributes beyond resource security OL1914.1

Notes:
In order to make changes to spool files the user must either be the owner of that spool file
or have spool control authority (*SPLCTL) assigned to their user profile.
The optional parameters that can be specified when create an output queue are:
• DSPDTA: Specifies whether users who have authority to read the output queue can
display the output data of any spooled file on the queue or only the data in their own
files.
*NO (default): Users authorized to use the queue can display, copy or send the
output of their own files only unless they have some other special authority.
*YES: Any user having the authority to read the queue can display, copy, or send the
data of any file on the queue.
*OWNER: The owner of the file or a user with *SPLCTL special authority can display,
copy, or send the spooled files on the queue.
• AUTCHK: Specifies whether the commands that check the requestor's authority to the
queue also check for ownership authority or data authority.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-31


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

*OWNER (default): The requestor must have ownership authority to the output queue
in order to pass the output queue authorization test. The requestor can have
ownership authority by being the owner of the queue, sharing a group profile with
the queue owner, or running a program that adopts the owner's authority.
*DTAAUT: The requestor must have the appropriate data authority to the output
queue (*READ, *ADD and *DELETE) in order to pass the output queue authority.
• OPRCTL: Specifies whether a user who has SPCAUT(*JOBCTL) is allowed to manage or
control the files on this queue.
*YES (default): A user with job control special authority can control the queue and
make changes to the files on the queue.
*NO: This queue and its files cannot be controlled or changed by users with job
control special authority unless they also have some other special authority.

8-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authority required to perform printing functions


IBM i

Output queue Special


Printing function DSPDTA AUTCHK OPRCTL
authority authority

Any Any Any *READ None


Add spooled files to queue.
Any Any *YES Any *JOBCTL

View list of spooled files Any Any Any *READ None


(WRKOUTQ command). Any Any *YES Any *JOBCTL

*YES Any Any *READ None


*NO *DTAAUT Any *CHANGE None
Display, copy, or send spooled files *NO *Owner Any Owner3 None
(DSPSPLF, CPYSPLF, SNDNETSPLF, *YES
SNDTCPSPLF). Any *YES Any *JOBCTL
*NO Any *YES Any *JOBCTL
*Owner Any Any Any Any

Change, delete, hold, and release spooled Any *DTAAUT Any *CHANGE None
file (CHGSPLFA, DLTSPLF, HLDSPLF, Any *OWNER Any Owner None
RLSSPLF). Any Any *YES Any *JOBCTL

Change, clear, hold, and release output Any *DTAAUT Any *CHANGE None
queue (CHGOUTQ, CLROUTQ, HLDOUTQ, Any *OWNER Any Owner None
RLSOUTQ). Any Any *YES Any *JOBCTL

Start a writer for the queue Any *DTAAUT Any *CHANGE None
(STRPRTWTR, STRRMTWTR) Any Any *YES Any *JOBCTL

© Copyright IBM Corporation 2012

Figure 8-26. Authority required to perform printing functions OL1914.1

Notes:
The table shows what combination of output queue parameters and authority to the output
queue is required to perform print management functions on the system.
For example in the first block in the visual, in order to add a spool file to an output queue
the conditions that must be met are either:
1. The output queue was created with any value specified for the parameters DSPDTA,
AUTCHK, OPRCTL and the user has *READ authority to that output queue and there is no
special authority required.
2. The output queue was created with any value specified for the parameters DSPDTA and
AUTCHK, and for the parameter OPRCTL it was set to *YES and the user can have any
authority to that output queue and must have the *JOBCTL special authority assigned to
their profile.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-33


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Limit access to program function


IBM i

• You have the ability to secure a portion of an application


program.

• This is implemented through IBM i Navigator Application


Administration or Users and Groups.

• Blocks of application code must be registered.

• Application code calls an API to check security for the user


before it calls the code block.

© Copyright IBM Corporation 2012

Figure 8-27. Limit access to program function OL1914.1

Notes:
The limit access to program function allows you to provide security to some portion of an
application program when you do not have a IBM i object to secure. Before the limit access
to program function support was added in V4R3, you could accomplish this by creating an
authorization list or other object and checking the authority to the object to control access
to the program function. Now, you can use the limit access to program function to more
easily control access to an application, parts of an application, or functions within a
program.
There are two methods that you can use to manage user access to application functions
through IBM i Navigator. The first uses Application Administration support (right click at the
hostname, and select Application Administration).
The second method of managing user access involves IBM i Navigator's Users and Groups
support (select a user, click the Capabilities button, select the Applications tab). Also, the
IBM Systems Director Navigator for i offers two methods to manage user access to
application functions. The first uses the System entry that opens the right pane, where
Application Administration can be selected.

8-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The second method also can be accessed through the Users and Groups entry. Select
Users at the right pane. At the selected user, left-click the [»] button, and select the
Application Administration option.
If you are an application writer, you can use limit access to program function APIs to do the
following:
• Register a function
• Retrieve information about the function
• Define who can or cannot use the function
• Check to see if the user is allowed to use the function

Note

This support is not a replacement for resource security. The limit access to program
function does not prevent a user from accessing a resource (such as a file or program)
from another interface.

To use this support within an application, the application provider must register the
functions when the application is installed. The registered function corresponds to a code
block for specific functions in the application. When the application is run by the user, the
application calls the API before the application calls the code block. The API calls the
check usage API to see if the user is allowed to use the function. If the user is allowed to
use the registered function, the code block is run. If the user is not allowed to use the
function, the user is prevented from running the code block.
The system administrator specifies who is allowed or denied access to a function. The
administrator can either use the API to manage the access to program function or use the
IBM i Navigator Application Administration GUI. The IBM i Information Center provides
information about the limit access to program function APIs.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-35


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authority to workstation (1 of 2)
IBM i

• QLMTSECOFR = 1 means *ALLOBJ and *SERVICE users are limited to


specific devices.
• QSECOFR, QSRV, and y can always sign on at the console.
• The QCONSOLE system value is used to determine which device is console.

*CHANGE
Determine user's or Is QSECURITY No
authority to greater => 30?
Workstation.
Yes
Less than Does user have
*CHANGE No
*ALLOBJ or
*SERVICE?
Sign-on fails.
Yes

Is QLMTSECOFR No
= 1?

A
Allow sign-on.
© Copyright IBM Corporation 2012

Figure 8-28. Authority to workstation (1 of 2) OL1914.1

Notes:
In certain installations, it can be a security exposure to allow the security officer to sign on
any workstation. QLMTSECOFR makes it easy to control this.
The authority to Workstation actually means: the authority to the Device Description
describing the defined workstation.

8-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authority to workstation (2 of 2)
IBM i

A
Less than *CHANGE
Test user's
*CHANGE or greater
authority to
workstation.
No authority
Less than *CHANGE
Test groups' or greater
*CHANGE
authority to
workstation.
No authority
Does user have
Yes *SERVICE but
not *ALLOBJ?

No
No Does QSECOFR
have *CHANGE
or greater?

Yes

Sign-on fails. Allow sign-on.


© Copyright IBM Corporation 2012

Figure 8-29. Authority to workstation (2 of 2) OL1914.1

Notes:
The authority to Workstation actually means: the authority to the Device Description
describing the defined workstation.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-37


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Data encryption
IBM i

• Disk encryption protects:


– Data transmission to and from the disk drive
– Data transmission in the cross site mirroring environment
– Data in the case of theft of the disk drive

• DB2 column encryption (since i 7.1)


– Enhanced data security

• Tape encryption
– Software
– Hardware

© Copyright IBM Corporation 2012

Figure 8-30. Data encryption OL1914.1

Notes:
Disk encryption: In order to use disk encryption, you must have 5770-SS1 Option 45 -
Encrypted ASP Enablement installed. The option to enable encryption is available when
you create a disk pool or independent disk pool. If disk encryption is used in a clustering
environment, you must set the master key manually on each system within the device
domain. Independent disk pools must be created using IBM i Navigator or IBM Systems
Director Navigator for i. The character-based interface (5250 emulation) cannot be used.
Disk encryption can be used to encrypt existing disk pools or independent disk pools.
Starting disk encryption on an existing disk pool might take an extended amount of time to
encrypt the data in the disk pool, potentially affecting system performance. Reference:
http://publib.boulder.ibm.com/infocenter/iseries/ > i 7.1 > Systems management > Disk
management > Disk Encryption
Column encryption: To enhance data security, column encryption may be accomplished
by using a new database feature called field procedures. A field procedure is a user-written
exit routine to transform values in a single column. When values in the column are
changed, or new values inserted, the field procedure is invoked for each value, and can
transform that value (encode it) in any way. The encoded value is then stored. When

8-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty values are retrieved from the column, the field procedure is invoked for each value, which
is encoded, and must decode it back to the original value. Reference:
http://publib.boulder.ibm.com/infocenter/iseries/ > i 7.1 > Database > Programming > SQL
programming > Data definition language > Defining Field procedures
Tape encryption: Tape encryption provides security and reduces the risk of data being
misused. After a tape is encrypted, data is unreadable to people without a key. Software
tape encryption: Use the products and applications that are described to encrypt your data.
Hardware tape encryption: Hardware tape encryption uses tape devices with data
encryption capabilities and the IBM Encryption Key Manager to encrypt your data. The IBM
i only supports library managed encryption.
Decrypting your data: There are two methods available to read or restore tape data that
was previously encrypted.
• If the products and applications used for software tape encryption are installed on your
partition, your tape management application can specify the encryption keystore file
and record label information for each file that is to be decrypted.
• Use a decryption data area to specify the encryption keystore file and record label
information to be used to decrypt your tapes. The data area must be named
QTADECRYPT and can be created in either library QTEMP or QUSRSYS. The data area
must provide the following information. Reference:
http://publib.boulder.ibm.com/infocenter/iseries/ > i 7.1 > Storage solutions > Tape >
Tape encryption

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-39


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 4: Security save and restore


considerations

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 8-31. Topic 4: Security save and restore considerations OL1914.1

Notes:

8-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restricting save and restore operations


IBM i

• You can control the ability to save and restore objects in


several ways:
– Restrict physical access to save and restore devices.
• Physical tape units
• Optical units

– Restrict authority to the device descriptions objects for the save and
restore devices (and the commands used to create these).

– Restrict authority to use the save and restore commands.

– Only give *SAVSYS special authority to trusted users.

© Copyright IBM Corporation 2012

Figure 8-32. Restricting save and restore operations OL1914.1

Notes:
You can restrict the ability to save objects from your system or restore objects to your
system.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-41


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup and recovery of security information


IBM i

© Copyright IBM Corporation 2012

Figure 8-33. Backup and recovery of security information OL1914.1

Notes:
Saving your security information is just as important as saving your data. In some
situations, you might need to recover user profiles, object authorities, and the data on your
system. If you do not have your security information saved, you might need to manually
rebuild user profiles and object authorities. This can be time-consuming and can lead to
errors and security exposures.
This table shows the commands used to save and restore security information.
Security information is stored differently on the save media than it is on your system. When
you save user profiles, the private authority information stored with the user profile is
formatted into an authority table.
An authority table is built and saved for each user profile that has private authorities. This
reformatting and saving of security information can be lengthy if you have many private
authorities on your system.

8-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The SAVESECDTA, SAVSYS, and RSTUFSRPRF commands save and restore ownership,
primary group, primary group authority and public authority for object types *USRPRF,
*AUTL, and *AUTHLR.
The following is a security recommendation summary:
• Use *PUBLIC authority where possible
• Use library security to secure an object
• Make group profiles the owners or objects
• User either authorization lists or private authorities to secure an object, not both
For the RSTUSRPRF command, *ALLOBJ special authority is no longer (as of V4R3)
removed from user profiles in some cases. It is removed when a user profile is restored to
a system at security level 30 or higher in either of these situations:
• The profile was saved from a different system and the user performing the RSTUSRPRF
does not have *ALLOBJ and *SECADM special authorities
• The profile was saved from the same system at security level 20
It is never removed from these IBM-supplied user profiles:
• QSYS (system)
• QSECOFR (security officer)
• QLPAUTO (licensed program - Automatic Install)
• QLPINSTALL (licensed program install)
For V5R4, there is a new command, SAVSYSINF, that is used to partially save data
normally saved with the SAVSYS command. It is not mentioned in the chart because it does
not save security data. There is further discussion of this command later in the course.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-43


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authority information saved with an object


IBM i

• Public authority
• Owner name
• Owner’s authority to object
• Primary group name
• Primary group’s authority to object
• Authorization list name
• Field level authorities
• Object auditing value
• Whether any private authority exists
• Whether any private authority is less than public
• Private authorities for the object, if PVTAUT(*YES) is specified
on the SAVxxx command
© Copyright IBM Corporation 2012

Figure 8-34. Authority information saved with an object OL1914.1

Notes:

8-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Other authority information that is saved


IBM i

• Authority information saved with authorization list:


– Normal authority information stored with any object, such as the public authority,
owner, and primary group
• Authority information saved with user profile:
– User profile attributes shown on the Create User Profile display
– Other application information associated with the user profile, for example:
• Server authentication entries
• User application information entries that are added using the Update User
Application Information (QsyUpdateUserApplicationInfo) API.
• Authority table saved associated with user profile:
– One record for each private authority of the user profile, including usage settings
for registered functions
• Function registration information saved with QUSEXRGOBJ object:
– The function registration information saved by saving the QUSEXRGOBJ *EXITRG
object in QUSRSYS

© Copyright IBM Corporation 2012

Figure 8-35. Other authority information that is saved OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-45


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restoring programs with restricted instructions


IBM i

• Validation value stored with program and checked when


restored.
• Restore actions for invalid programs:
– Re-create program
– Entry in QAUDJRN
– Message in job log
– Ownership to QDFTOWN
– Revoke authority
• QSECURITY (40 or 50) and ALWOBJDIF affect restore actions.

© Copyright IBM Corporation 2012

Figure 8-36. Restoring programs with restricted instructions OL1914.1

Notes:

8-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 5: Security tools

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 8-37. Topic 5: Security tools OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-47


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security tools
IBM i

• Additional IBM i commands to help you manage security:


– Available through
• Individual command
• SECTOOLS menu (commands run interactively)
• SECBATCH menu (report commands submitted or scheduled)
– Work with profiles (SECTOOLS)
• Disable users during specified periods
• Delete or disable a user on a specific date
• Disable profile after certain inactivity period
• Analyze profile for default passwords
– Work with auditing (SECTOOLS)
• One-step setup
• Display auditing system values
– Security reports (SECTOOLS and SECBATCH)

© Copyright IBM Corporation 2012

Figure 8-38. Security tools OL1914.1

Notes:
Refer to Appendix B for sample Security Tools reports.
SECTOOLS and SECBATCH menus are shipped with public authority *EXCLUDE.
Prior to V5R3, the following commands required *ALLOBJ special authority and were
shipped with a public authority of *EXCLUDE. Starting in V5R3, the commands are shipped
with PUBLIC authority of *USE. A user that only has *AUDIT special authority and users
who have *ALLOBJ and any other required special authorities can run the commands:
• DSPSECAUD (Display Security Auditing)
• PRTADPOBJ (Print Adopting Objects)
• DSPAUDJRNE (Display Audit Journal Entries)
• PRTPVTAUT (Print Private Authorities)
• PRTPUBAUT (Print Publicly Auth Objects)
• PRTCMNSEC (Print Communications Security)

8-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • PRTJOBDAUT (Print JOBD Authority)


• PRTQAUT (Print Queue Authority)
• PRTSBSDAUT (Print Subsystem Description)
• PRTSYSSECA (Print System Security Attribute)
• PRTTRGPGM (Print Trigger Programs)
• PRTUSROBJ (Print User Objects)
• PRTUSRPRF (Print User Profile)
Prior to V5R3, a user needed *ALLOBJ authority to perform these commands

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-49


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Tools (1 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 8-39. Security Tools (1 of 4) OL1914.1

Notes:
The Security Tools (SECTOOLS) menu simplifies the management and control of the
security on your system.
Option 1. Analyze default passwords (ANZDFTPWD)
Select this option to print a report containing all the user profiles on the system that
have a default password and to optionally take an action against those profiles.
Option 2. Display active profile list (DSPACTPRFL)
Select this option to display a list of user profiles which are always considered active
and are not disabled by the Analyze Profile Activity (ANZPRFACT) command. The list
of user profiles is maintained by using the Change Active Profile List (CHGACTPRFL)
command.
Option 3. Change active profile list (CHACTPRFL)
Select this option to add or remove user profiles from the list of profiles that are
always considered active. The profiles in this list are never disabled by the Analyze
Profile Activity (ANZPRFACT) command.

8-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The current list of active user profiles can be displayed using the Display Active
Profile List (DSPACTPRFL) command.
Option 4. Analyze profile activity (ANZPRFACT)
Select this option to disable user profiles which have been inactive for the specified
number of days.
User profiles can be excluded from this processing by using the Change Active
Profile List (CHGACTPRFL) command to maintain a list of profiles that will always be
considered active.
The current list of active user profiles can be displayed using the Display Active
Profile List (DSPACTPRFL) command.
Option 5. Display activation schedule (DSPACTSCD)
Select this option to display a list of user profiles, the enable time, disable time, and
the days on which the enable and disable jobs are submitted. The profile activation
schedules are managed using the Change Activation Schedule Entry
(CHGACTSCDE) command.
Option 6. Change activation schedule entry (CHGACTSCDE)
Select this option to manage a scheduled job that activates a user profile for a
period of time on specific days.
The current profile activation schedule can be displayed using the Display Activation
Schedule (DSPACTSCD) command.
Option 7. Display expiration schedule (DSPEXPSCD)
Select this option to display a list of user profiles, the expiration date, and the
expiration action to be taken (disable or delete the profile). The profile expiration
schedules are managed using the Change Expiration Schedule Entry
(CHGEXPSCDE) command.
Option 8. Change expiration schedule entry (CHGEXPSCDE)
Select this option to manage a scheduled job that changes a user profile to expire
on a certain date and to take an action against the expired user profile (disable or
delete).
The current profile expiration schedule can be displayed using the Display
Expiration Schedule (DSPEXPSCD) command.
Option 9. Print profile internals (PRTPRFINT)
Select this option to print a report of internal information on the number of entries in
a user profile (*USRPRF) object. The number of entries in a profile determines its
size. The Print Profile Internals (PRTPRFINT) command determines how full a user
profile (*USRPRF) object is based on the number of entries it contains. For more
details, refer to the help for the PRTPRFINT.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-51


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Tools (2 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 8-40. Security Tools (2 of 4) OL1914.1

Notes:
Option 10. Change security auditing (CHGSECAUD)
Select this option to change the current settings of the system values that control
what is being audited on the system. Current audit information can be displayed
using the Display Security Auditing (DSPSECAUD) command.
Option 11. Display security auditing (DSPSECAUD)
Select this option to display the current information about the security audit journal
and the current settings for the system values that control what is being audited on
the system.
Option 12. Copy audit journal entries
Select this option to copy security audit journal entries from the security audit journal
(QAUDJRN) into one or more outfiles.

8-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Option 20. Submit or schedule security reports (SECBATCH)


Select this option to submit one or more security reports to a job queue to be run
later as a batch job or to schedule batch jobs to submit security reports at regular
intervals.
Option 21. Adopting objects (PRTADPOBJ)
Select this option to print a report of the objects that adopt the special and private
authorities of a specified user profile.
Option 22. Audit journal entries (DSPAUDJRNE)
Select this option to generate a security journal audit report. The report is based on
specified audit entry types and specified user profiles and can be limited to specific
dates and times. The report can optionally be displayed or printed.
Option 23. Authorization list authorities (PRTPVTAUT)
Select this option to print a report containing all authorization lists on the system and
the users that are authorized to each authorization list.
Option 24. Command authority (PRTPUBAUT)
Select this option to print a list of commands (*CMD) in a library that do not have
public authority of *EXCLUDE.
Option 25. Command private authority (PRTPVTAUT)
Select this option to print a report containing all commands in a specified library and
the users that are authorized to each command.
Option 26. Communications security (PRTCMNSEC)
Select this option to print a report containing security information about the
communications configuration on the system.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-53


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Tools (3 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 8-41. Security Tools (3 of 4) OL1914.1

Notes:
Option 27. Directory private authority (PRTPVTAUT)
Select this option to print a report containing all directories on the system and the
users that are authorized to each directory.
Option 28. Document authority (PRTPUBAUT)
Select this option to print a list of documents (*DOC) in a folder that do not have
public authority of *EXCLUDE.
Option 29. Document private authority (PRTPVTAUT)
Select this option to print a report containing all documents in a specified folder and
the users that are authorized to each document.
Option 30. File authority (PRTPUBAUT)
Select this option to print a list of files (*FILE) in a library that do not have public
authority of *EXCLUDE.

8-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Option 31. File private authority (PRTPVTAUT)


Select this option to print a report containing all files in a specified library and the
users that are authorized to each file.
Option 32. Folder authority (PRTPUBAUT)
Select this option to print a list of folders (*FLR) on the system that do not have
public authority of *EXCLUDE.
Option 33. Folder private authority (PRTPVTAUT)
Select this option to print a report containing all folders on the system and the users
that are authorized to each folder.
Option 34. Job description authority (PRTJOBDAUT)
Select this option to print a list of job descriptions in a specified library that do not
have public authority of *EXCLUDE, and that also have a user name specified in the
job description.
Option 35. Library authority (PRTPUBAUT)
Select this option to print a list of libraries (*LIB) on the system that do not have
public authority of *EXCLUDE. You can also choose to print a list of specified object
types within the listed libraries, that do not have public authority of *EXCLUDE.
Option 36. Library private authority (PRTPVTAUT)
Select this option to print a report containing all libraries on the system and the users
that are authorized to each library.
Option 37. Object authority (PRTPUBAUT)
Select this option to print a list of specified object types that do not have public
authority of *EXCLUDE.
Option 38. Private authority (PRTPVTAUT)
Select this option to print a list of specified object types and the private authorities
for each object.
Option 39. Program authority (PRTPUBAUT)
Select this option to print a list of programs (*PGM) in a library that do not have public
authority of *EXCLUDE. Only programs that a user can call and do not have public
authority of *EXCLUDE, will be included in this list.
Option 40. Program private authority (PRTPVTAUT)
Select this option to print a report containing all programs in a specified library and
the users that are authorized to each program.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-55


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Tools (4 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 8-42. Security Tools (4 of 4) OL1914.1

Notes:
Option 41. User profile authority (PRTPUBAUT)
Select this option to print a list of user profiles on the system that do not have public
authority of *EXCLUDE.
Option 42. User profile private authority (PRTPVTAUT)
Select this option to print a report containing all user profiles on the system and the
users that are authorized to each user profile.
Option 43. Job and output queue authority (PRTQAUT)
Select this option to generate a report containing output queue and job queue
authority information for objects in a specified library.
Option 44. Subsystem authority (PRTSBSDAUT)
Select this option to print a list of subsystem descriptions in a library that contain a
default user in a communications entry.

8-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Option 45. System security attributes (PRTSYSSECA)


Select this option to print a report containing security-related system values and
network attributes to a spooled file. The report includes the current values and the
recommended values.
Option 46. Trigger programs (PRTTRGPGM)
Select this option to print a list of programs that have been defined as trigger
programs for the physical files in a specified library.
Option 47. User objects (PRTUSROBJ)
Select this option to print a list of objects in a specified library that are not created by
IBM.
Option 48. User profile information (PRTUSRPRF)
Select this option to print a report containing information about all the user profiles
on the system. You can specify to include authority information, environment
information, password information, or *ALL information about selected user profiles.
Option 60. Configure system security (CFGSYSSEC)
Select this option to activate the security features on your system. This option does
the following:
• Turn on security auditing
• Change system values
• Modify system-supplied user profiles
Only select this option if you know what features are being activated.
To determine what security features are activated, issue the Retrieve CL Source
(RTVCLSRC) command against the program QSECCFGS and examine the source file
created.
Option 61. Revoke public authority to objects (RVKPUBAUT)
Select this option to limit the use of commands and programs on your system. This
option changes the public authority of certain commands and programs to
*EXCLUDE. Only select this option if you know what commands and programs have
their public authority changed.
To determine what command and program authorities are changed, issue the
Retrieve CL Source (RTVCLSRC) command against the program QSECRVKP and
examine the source file created.
Option 62. Check object authority (CHKOBJITG)
Select this option to check all objects owned by a specified user profile to determine
if any objects have been altered, thereby creating an integrity violation. If an integrity
violation has occurred, the object name, library, object type, object owner, and type
of failure are logged to a specified database file

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-57


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

At the next page we only find: Option 80. Related security tasks (SECURITY)
Select this option to use additional commands related to security on your system
This will direct you to the IBM i Security menu.

8-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard
IBM i

© Copyright IBM Corporation 2012

Figure 8-43. Security Wizard OL1914.1

Notes:
The Security Wizard using the IBM i Navigator is accessible by right-clicking Security, then
selecting Configure from the context menu. The Security Wizard asks a set of simple
questions about your system and how it is used. Based on your answers, it generates a set
of security recommendations for how your security values should be set. You can choose
which recommendations to accept, and the wizard makes the changes for you. It also
creates a detailed report for the administrator and the user explaining the
recommendations. At the end of the wizard, you can either apply the security
recommendations to the system immediately or save the recommendations and apply
them later. You can exit the Security Wizard at any time by clicking Cancel.
The next set of graphics simulates the running of the Security Wizard from this point in the
process.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-59


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Wizard simulation (1 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-44. Security Wizard simulation (1 of 10) OL1914.1

Notes:
Based on a user's responses the goal of the Security Wizard is:
• To configure security-related system values and network attributes
• To configure security-related reporting for monitoring the system
• To generate an Administrator Information Report and a User Information report
• To provide recommended settings for various security-related items on the system

8-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard simulation (2 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-45. Security Wizard simulation (2 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown prompting the user with security related
questions.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-61


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Wizard simulation (3 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-46. Security Wizard simulation (3 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown prompting the user with network security
related questions.

8-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard simulation (4 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-47. Security Wizard simulation (4 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown prompting the user with netserver
security related questions.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-63


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Wizard simulation (5 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-48. Security Wizard simulation (5 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown prompting the user with security audit
related questions.

8-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard simulation (6 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-49. Security Wizard simulation (6 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown prompting the user with security reporting
related questions.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-65


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Wizard simulation (7 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-50. Security Wizard simulation (7 of 10) OL1914.1

Notes:
The System i Navigator Security wizard is shown summarizing the answers to the
previously prompted questions.

8-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard simulation (8 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-51. Security Wizard simulation (8 of 10) OL1914.1

Notes:
The wizard produces detailed information reports including the following:
• Report explaining the wizard's recommendations
• Report detailing the procedures that should be followed before implementation
• Report listing relevant information to be distributed to the users of the system

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-67


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security Wizard simulation (9 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-52. Security Wizard simulation (9 of 10) OL1914.1

Notes:
The wizard asks you if you want to apply the recommended security changes to the
system. You can select:
• Yes: Apply the recommendations made by the security wizard. and make changes
immediately.
• No: Save the changes that were recommended by the security wizard, but do not apply
them.
If you select No, then the next time the security wizard is started, it will display the panel on
the next page as opposed to the panel that you saw on the visuals labeled 1 of 10 (starting
the wizard the very first time).
Click Finish or Cancel to end this process.

8-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Security Wizard simulation (10 of 10)


IBM i

© Copyright IBM Corporation 2012

Figure 8-53. Security Wizard simulation (10 of 10) OL1914.1

Notes:
Notice that at this point in the process, you have the option to apply the recommended
changes or to save the changes. Also remember, clicking Cancel exits you from the wizard
Yet another security implementation tool, Secure Perspective for IBM i has been withdrawn
from marketing and is no longer available for IBM i 7.1. The use of this IBM i licensed
program product is only available as a contract service offering from IBM Lab Services.

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-69


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint
IBM i

1. True or False: It is recommended that you only secure those objects


that require securing.

2. True or False: Access to objects cannot be specified at the library


level.

3. True or False: It is possible to control whether a user has access to a


command line.

4. True or False: You cannot limit access to the System Request screen.

5. True or False: You can define ASP encryption through 5250 interface.

6. The most granular security that you can specify is:


a. Library
b. User
c. Object
d. Program level

© Copyright IBM Corporation 2012

Figure 8-54. Checkpoint OL1914.1

Notes:

8-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• List some recommendations for security design
• Discuss the concept of implementing library security
• Discuss some design guidelines to keep in mind when
implementing menu security
• Describe the process used by the system for sign-on
processing
• Explain the functions provided by the System Request screen
and how to secure this screen or the screen options
• Discuss the concepts of implementing object security
• List and discuss the commands used to back up and recover
security information
• Describe the security tools that are available to assist you with
the implementation of security
© Copyright IBM Corporation 2012

Figure 8-55. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 8. Designing security 8-71


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

8-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 9. IBM Power Systems with IBM i: Availability


overview

What this unit is about


This overview is designed to emphasize the importance of a good
recovery plan by reviewing the potential for failures that can occur on a
system and the hardware and software availability features.

What you should be able to do


After completing this unit, you should be able to:
• Explain the concept of availability
• Describe the different types of failures that can occur
• Describe hardware and software availability features
• Explain the concept of logical partitioning (LPAR)
• List some of the reasons to implement LPAR
• Explain the functions served by a Hardware Management Console
(HMC)
• Explain the concept of clustering
• List the different types of clustering that can be implemented
• Explain the different ways an xSeries can be integrated with the
IBM Power Systems with IBM i
• Describe the consequences for a company if the IBM Power
Systems with IBM i are not available to perform normal business

How you will check your progress


• Checkpoint questions

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Explain the concept of availability
• Describe the different types of failures that can occur
• Describe hardware and software availability features
• Explain the concept of logical partitioning (LPAR)
• List some of the reasons to implement LPAR
• Explain the functions served by a Hardware Management Console
(HMC)
• Explain the concept of clustering
• List the different types of clustering that can be implemented
• Explain the different ways an xSeries can be integrated with the IBM
Power Systems with IBM i
• Describe the consequences for a company if the IBM Power Systems
with IBM i are not available to perform normal business

© Copyright IBM Corporation 2012

Figure 9-1. Unit objectives OL1914.1

Notes:

9-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Availability concepts and


overview

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 9-2. Topic 1: Availability concepts and overview OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Availability concepts
IBM i

• Concepts to know and understand that are associated with


availability:
– Business continuity
– Disaster recovery
– High availability
– Backup window
– An unplanned outage
– High availability solutions
– A cluster

© Copyright IBM Corporation 2012

Figure 9-3. Availability concepts OL1914.1

Notes:
Before you plan for the availability of your system, it is important for you to understand
some of the concepts associated with availability. Businesses and their IT operations that
support them must, determine which solutions and technologies address their business
needs. In the case of business continuity requirements, detailed business continuity
requirements must be developed and documented, the solution types must be identified,
and the solution choices must be evaluated.
Business continuity is the capability of a business to withstand outages, which are times
when the IBM Power System with IBM i is unavailable, and to operate important services
normally and without interruption in accordance with predefined service-level agreements.
To achieve a given level of business continuity, a collection of services, software, hardware,
and procedures must be selected, described in a documented plan, implemented, and
practiced regularly. The business continuity solution must address the data, the operational
environment, the applications, the application hosting environment, and the user interface.
All must be available to deliver a good, complete business continuity solution. Your
business continuity plan includes disaster recovery and high availability (HA).

9-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Disaster recovery provides a plan in the event of a complete outage at the production site
of your business, such as during a natural disaster. Disaster recovery provides a set of
resources, plans, services, and procedures used to recover important applications and to
resume normal operations from a remote site. This disaster recovery plan includes a stated
disaster recovery goal (for example, resume operations within eight hours) and addresses
acceptable levels of degradation.
High availability is another major aspect of business continuity goals for many customers.
High availability is the ability to withstand all outages (planned, unplanned, and disasters)
and to provide continuous processing for all important applications. The ultimate goal is for
the outage time to be less than .001% of the total service time. The differences between
high availability and disaster recovery typically include more demanding recovery time
objectives (seconds to minutes) and more demanding recovery point objectives (zero user
disruption).
Availability is measured in terms of outages, which are periods of time when the IBM Power
System with IBM i is not available to users. During a planned outage (also called a
scheduled outage), you deliberately make your system unavailable to users. You might use
a scheduled outage to run batch work, back up your system, or apply fixes.
Backup window is the amount of time that your system can be unavailable to users while
you perform your backup operations. Your backup window is a scheduled outage that
typically occurs in the night or on a weekend when your system has less traffic.
An unplanned outage, also called an unscheduled outage, is typically caused by a failure.
You can recover from some unplanned outages (such as disk failure, system failure, power
failure, program failure, or human error) if you have an adequate backup strategy.
However, an unplanned outage that causes a complete system loss, such as a tornado or
fire, requires you to have a detailed disaster recovery plan in place in order to recover.
High availability solutions provide fully automated failover to a backup system to ensure
continuous operation for users and applications. These HA solutions must provide an
immediate recovery point and ensure that the time of recovery is faster than a non-HA
solution. Unlike with disaster recovery, where entire systems experience an outage, high
availability solutions can be customized to individual critical resources within a system; for
example, a specific application instance. High availability solutions are based on cluster
technology. You can use clusters to avoid the impacts of both planned and unplanned
outages. Even though you still have an outage, the business function is not impacted by
the outage.
A cluster is a collection of interconnected complete systems used as a single, unified
resource. The cluster provides a coordinated, distributed process across the systems to
deliver the solution. This results in higher levels of availability, some horizontal growth, and
simpler administration across the enterprise. Cluster resource services detect outage
conditions and coordinate automatic movement of critical resources to a backup system.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Estimating the value of availability


IBM i

• To estimate the value of your information services,


follow these steps:
– Develop a list of the major services and solutions that your system
provides.
– Assess how much it costs when these services are unavailable.
– Look at direct costs versus indirect costs.
– Consider tangible costs versus intangible costs.
– Analyze fixed costs versus variable costs.

© Copyright IBM Corporation 2012

Figure 9-4. Estimating the value of availability OL1914.1

Notes:
To estimate the value of your information services, follow these steps:
Develop a list of the major services and solutions that your system provides. Your system
exists so that users and solutions can accomplish tasks that are critical to the operation of
your business. The systems provide solutions to a business function. If the IBM Power
System with IBM i is unavailable, the business function cannot be completed or is
significantly degraded to the point of causing the business lost revenue or increased
expenses.
Assess how much it costs you when these services are unavailable. Each application or
service has a direct effect on business functions. You need to determine how these
business functions would be affected and what would be the overall cost to your business if
these services were unavailable.
Look at direct costs versus indirect costs. Direct costs are losses that can be traced directly
to a system being unavailable. Indirect costs are those that are incurred by another
department or function as a result of an outage.

9-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Consider tangible costs versus intangible costs. Tangible costs can be measured in
currency. However, there are other costs that are not measured with money, such as
market share, lost opportunity, and good will.
Analyze fixed costs versus variable costs. Fixed costs are those that result from a failure
and are the same, regardless of the length of the outage. Variable costs are those that vary,
based on the length of the outage.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

What is an acceptable downtime?


IBM i

© Copyright IBM Corporation 2012

Figure 9-5. What is an acceptable downtime? OL1914.1

Notes:
After understanding availability at a basic level, it is important to assess your individual
availability needs. Higher availability is more costly than a lower-level availability. You must
balance your needs and services with the overall cost of implementing and maintaining
these availability solutions.
You want to be sure that you have analyzed your business needs thoroughly in order to
decide what level of availability you can afford to maintain. To decide what level of
availability you need, consider the following questions:
Do you have any applications that require 100% availability? In most cases, you can
achieve a high level of availability by implementing sound processes and systems
management practices. The closer you need to be to continuous availability, the more of an
investment you must make. Before you make that kind of investment, you should be sure
that you require that level of availability.
Along with knowing how much downtime is acceptable to you, you need to consider how
that downtime might occur. For example, you might think that 99% availability is acceptable
if the downtime is a series of shorter outages that are distributed over the course of one

9-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty year, but you might think differently about 99% availability if the downtime is actually a
single outage that lasts three days.
You also need to consider when a downtime is acceptable and when it is not. For example,
your average annual downtime goal per year might be nine hours. If that downtime were to
occur during critical business hours, it might have an adverse effect on the bottom line
revenue for your company.
It used to be that customers and business partners accessed your business from 9 a.m. to
5 p.m., so it was realistic to expect that your system only had to be available during those
hours. However, the Internet and a diverse global marketplace have changed that
expectation; customers and business associates might expect to have access to your
company’s data at any time of the day or night. Your working hours might be hours or even
days different from your global business partner or customer. You must determine what
your customer expectations are, and what is realistic with regard to those expectations, as
you determine what level of availability you will maintain.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Types of outages
IBM i

IBM Power System with IBM i 24x365.


No time for downtime
© Copyright IBM Corporation 2012

Figure 9-6. Types of outages OL1914.1

Notes:
Availability is measured in terms of outages, which are periods of time when the server is
not available to users.
During a planned outage (also called a scheduled outage), you deliberately make your
system unavailable to users. You might use a scheduled outage to run batch work, back up
your server, or apply fixes.
An unplanned outage (also called an unscheduled outage) is usually caused by a failure.
You can recover from some unplanned outages (such as disk failure, system failure, power
failure, program failure, or human error) if you have an adequate backup strategy.
However, an unplanned outage that causes a complete system loss, such as a tornado or
fire, requires you to have a detailed disaster recovery plan in place in order to recover.
Your backup window is the amount of time that your server can be unavailable to users
while you perform your backup operations. Your backup window is a scheduled outage that
usually occurs in the night or on a weekend when your server has less traffic.

9-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty There are several levels of availability. These levels differ in the type and duration of
outages that they tolerate. These levels are as follows:
• Highly available: The server delivers an acceptable or agreed-upon level of service
during its scheduled period of operation. The goal is to have the server available when
the customer needs it.
• High availability: The server delivers an acceptable or agreed-upon level of service
during its scheduled period of operation. The goal is to have no unplanned outages;
there may be some planned outages.
• Continuous operations: The server delivers an acceptable or agreed-upon level of
service 24 hours per day, 365 days per year. The goal is for the server to operate
without any planned outages; there may be some unplanned outages.
• Continuous availability: The server delivers an acceptable or agreed-upon level of
service 24 hours a day, 365 days a year. The goal is to have no planned or unplanned
outages.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Failure types (1 of 2)
IBM i

• Disk failure
– Usually data on failed unit lost
– Recover an ASP of failed unit
• System failure (hardware failure other than disk)
– Usually causes abnormal end
– Possible problems:
• Files partially updated
• Access paths incomplete
• Damage to objects in use
• Relationships between files might be partially validated
– Long IPL

© Copyright IBM Corporation 2012

Figure 9-7. Failure types (1 of 2) OL1914.1

Notes:
Disk failure
If a disk unit on your system fails, in most cases the data on that disk unit is destroyed.
This requires recovering all data in the auxiliary storage pool (ASP) that contains the
failed unit.
The single-level storage architecture makes the IBM Power System with IBM i a very
productive system to program and to manage. However, the architecture makes
recovering from a disk failure more difficult. The system spreads information across all
the disk units in an ASP to provide good performance and storage management. If a
unit in an ASP is lost, you cannot determine what data was on that unit because objects
are spread across the ASP. You must recover all the data in the ASP.
Independent disk pools (also called independent auxiliary storage pools) enable you to
prevent unplanned outages because the data on them is isolated from the rest of your
server. If an independent disk pool fails, your server can continue to operate.

9-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The disk protection tools, mirrored protection and device parity protection are designed
to reduce the recovery time if a disk unit fails or, in some cases, to eliminate the need
for the recovery of data.
System failure
A system failure means that some part of your system hardware, other than the DASD
subsystems, fails. Some system failures, such as processor problems, cause your
system to stop without warning. This is called an abnormal end.
When your system ends abnormally, the following problems can occur:
- Files may be partially updated.
- Access paths for files may be incomplete.
- Objects that are in use may be damaged.
- Relationships between files may be partially validated.
Long IPL
When you restart (IPL) your system after the failed component is repaired, the system
analyzes the possible damage, rebuilds or recovers access paths, tries to verify file
relationships, and attempts to synchronize files to transaction boundaries. The first IPL
after the system ends abnormally can take a long time.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Failure types (2 of 2)
IBM i

• Power failure
– Can cause abnormal end
– Same problems as system failure
• Program or user error
– Incorrect (damaged) data
– Correct data or restore files
• Complete system loss
– Natural disasters, such as fire and flood

© Copyright IBM Corporation 2012

Figure 9-8. Failure types (2 of 2) OL1914.1

Notes:
Power failure
Loss of power also causes your system to end abnormally. You may experience the
same types of problems that occur with a system failure. Many systems are equipped
with a feature called System Power Control Network. This feature provides a function
called Continuously Powered Main Store. If your system has this feature, a battery
provides sufficient power to shut down the system and maintain the contents of memory
for up to two days after a power loss. In many cases, this can significantly reduce the
amount of time the system requires to perform an initial program load (IPL) after a
power loss.
Program or user error
Sometimes programs are not adequately tested before they are put into production, or a
condition occurs that was not anticipated by the software developers. A program error
can cause incorrect information in some of your data files.

9-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty People using the system can make mistakes, too. An operator might run a month-end
program twice. A data entry person might enter the same batch of orders twice. A
system manager might delete a file by mistake.
When these types of errors occur, you need to correct or restore the data that has been
damaged.
Complete system loss
A fire, flood, or other natural disaster could destroy your entire system. To rebuild your
entire system, you should have a complete set of save tapes and documentation stored
offsite at a secure, accessible location.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Power Systems with IBM i hardware features


(1 of 5)
IBM i

Power subsystem
– Redundant power supplies
– Dual line cords
– Redundant cooling fans
– Dedicated UPS monitoring interface

© Copyright IBM Corporation 2012

Figure 9-9. IBM Power Systems with IBM i hardware features(1 of 5) OL1914.1

Notes:
Power subsystem
Redundant power supplies
Cooling fans are options available for IBM Power Systems with IBM i. Some models of
the system can be ordered with dual line cords.
These features allow power to be supplied from more than one source, with one power
source acting as a backup in the event of a disruption to the alternate power source.
Dedicated UPS interface
The IBM Power System with IBM i provides a program interface to monitor and manage
the switch to a UPS source in the event of a power outage. The system sends a
message (that can be monitored for) when it detects power loss. A power handling
program can monitor for power-related messages and manage the switchover to a
UPS.

9-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i hardware features
(2 of 5)
IBM i

Disk subsystem
– RAID 5 / RAID 6 protection
– Mirroring protection
– Concurrent maintenance
– Add disk concurrently

© Copyright IBM Corporation 2012

Figure 9-10. IBM Power Systems with IBM i hardware features (2 of 5) OL1914.1

Notes:
Disk subsystem
RAID-5
Device parity protection (RAID-5) is a hardware availability function that protects data
from loss due to a disk unit failure or because of damage to a disk. The overall goal of
device parity protection is to provide high availability and to protect data. To protect
data, the disk controller or input/output processor (IOP) calculates and saves a parity
value for each bit of data. Conceptually, the disk controller or IOP computes the parity
value from the data at the same location on each of the other disk units in the device
parity set. When a disk failure occurs, the parity value and values of the bits in the
corresponding locations on the other disks are used to reconstruct the data. The system
continues to run while the data is reconstructed.
RAID-6
If more than two disk units fail, you must restore the data from the backup media.
Logically, the capacity of two disk units is dedicated to storing parity data in a parity set.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

However, in practice the parity data is spread among multiple disk units. The minimum
number of disk units in a parity set is 4. The maximum number of disk units in a parity
set is 18. When a RAID-6 parity set is started, all of the disk units contain parity.
Restoring data to a disk pool that has disk units with device parity protection may take
longer than a disk pool that contains only unprotected disk units. The Reed Soloman
algorithm and the hardware finite field multiplier, are used to create the stripes of parity
data in a RAID set. These features enhance performance and functionality.
Mirrored protection
Mirrored protection is an availability function that protects data from being lost due to
failure or because of damage to a disk-related component. Data is protected because
the system keeps two copies of data on two separate disk units. When a disk-related
component fails, the system continues to operate without interruption. The mirrored
copy of the data is used until the failed component is repaired. Mirroring can be
extended to include mirroring the disk IOPs and the busses that the disk units are
attached to so the disk subsystem can continue to function even if a disk IOP or a bus
fails.
Concurrent maintenance
The IBM Power System with IBM i disk subsystem allows maintenance to be performed
on a disk drive that is part of a mirrored pair or a RAID set while the system remains
operational. Disks can be added concurrently, meaning disk capacity can be increased
without disruption to system operations. Because the system manages storage
automatically, newly added drives are immediately available for use. There is no
requirement to partition the drives or move data to them in order for the system to utilize
the drives. The system manages all space as one virtual address. Other than
configuring the disks as new hardware devices, special setup is not required to make a
new disk operational.

9-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i hardware features
(3 of 5)
IBM i

I/O subsystem
– Hot pluggable PCI cards
– Dynamic hardware resource reallocation (Vary cmd)
– Redundant HSL loops
– IOP reset

© Copyright IBM Corporation 2012

Figure 9-11. IBM Power Systems with IBM i hardware features (3 of 5) OL1914.1

Notes:
I/O subsystem
Hot pluggable PCI cards
Hot plugging is made possible by the existence of a power control to individual cards
slots. PCI IOPs or IOAs can be added, removed, or replaced while the system remains
active.
Dynamic hardware resource reallocation
Each hardware device on the IBM Power System with IBM i has a device description
associated with it.
The description contains the name of the specific hardware component that the
hardware resource is associated with. If a hardware device fails and there is a backup
device for it installed in the system, the device description can be modified to point to
the backup device. It can then be substituted for the failing device.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Redundant HSL loops


High Speed Link (HSL) is a new fibre bus structure introduced for IBM Power Systems
with IBM i. HSL is a 1 Gigabyte per second bus that includes a redundant path
capability. If a system bus cable is broken or unplugged, I/O traffic is routed through an
alternate path, therefore, avoiding a system outage.
IOP reset
The IBM Power System with IBM i I/O architecture uses intelligent I/O processors
(IOPs) to control hardware adapters. Should a failure occur in one of these IOPs, it can
be reset (or rebooted) with the system VARY command. This avoids the need to IPL the
system to recover from an I /O error.

9-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i hardware features
(4 of 5)
IBM i

Memory
– Chipkill technology
– Error detection and correction
– Memory scrubbing

© Copyright IBM Corporation 2012

Figure 9-12. IBM Power Systems with IBM i hardware features (4 of 5) OL1914.1

Notes:
Memory
IBM Power Systems with IBM i utilize memory that represents Chip Kill technology. If a
segment of memory fails, the IBM Power System with IBM i simply makes unavailable the
range of addresses, including the defective address or addresses. A message is sent to the
system operator and the hardware error logs are updated with data related to the failure.
Therefore, the system can remain active should a part of main storage fail. Maintenance
can be deferred, which allows the system to tolerate memory failures without bringing the
system down. The system also performs a background scrub of memory, to detect and
correct single- and double-bit errors.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Power Systems with IBM i hardware features


(5 of 5)
IBM i

Hardware service
– Automatic failure notification

© Copyright IBM Corporation 2012

Figure 9-13. IBM Power Systems with IBM i hardware features (5 of 5) OL1914.1

Notes:
Hardware service
Automatic failure notification
With IBM Power Systems with IBM i running Service Director, the system phones home
to a service machine when it detects key hardware component failures. A customer can
optionally choose to have a repair engineer dispatched automatically when a hardware
failure is logged. There are many cases recorded where a service engineer comes to a
customer’s premises in response to a hardware problem detected by Electronic Service
Agent, and the customer is not even aware of the problem because the system was
able to continue operations.

9-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i software features
(1 of 6)
IBM i

IBM i and system software availability feature:


– Journaling
• Tables (files)
• Data areas
• Data queues
• IFS (stream files)
• Remote journaling
• SMAPP
– Commitment control

© Copyright IBM Corporation 2012

Figure 9-14. IBM Power Systems with IBM i software features (1 of 6) OL1914.1

Notes:
Database: DB2 Universal Database for IBM Power Systems with IBM i
Journaling
IBM Power Systems with IBM i journaling was initially introduced to record changes
made to database files. In the event of a system outage, the journal is used to
reconstruct the file based on changes recorded in the journal receiver.
IBM Power Systems with IBM i journaling has evolved over time, as has the style of
computing that the system supports. Journaling support is enhanced to include byte
stream files (Integrated File System files), data areas, and data queues.
Remote journaling was introduced to the system at V4R2. With remote journaling,
journal receiver entries are replicated to a backup or remote system. Remote journaling
can be set up to run in synchronous or asynchronous mode. When remote journaling is
synchronous, a database update for the source IBM Power Systems with IBM i is not
completed until the target system makes the journal entry in its receiver. Remote
journaling can be used in conjunction with database replication for high availability.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Commitment control
Some applications involve multistep transactions to update the database. It is
imperative that you complete all steps within the transaction before you commit the
database update. The IBM Power SYstem with IBM i provides commitment control for
this transaction environment. Commitment control is an application-level function that
defines the transaction boundary. It is used in conjunction with database journaling. In
the event of a system failure, commitment control uses journal entries to roll back an
entire transaction. Therefore, a partial update to database files is avoided. An example
of the need for commitment control is a financial application that moves funds between
accounts. In order for the transaction to be considered complete, the debit and credit of
the accounts involved must both be reflected in the database.

9-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i software features
(2 of 6)
IBM i

IBM i and system software availability feature:


– ASPs, iASPs
– HSM
– Automated storage management
– Online disk balancing

© Copyright IBM Corporation 2012

Figure 9-15. IBM Power Systems with IBM i software features (2 of 6) OL1914.1

Notes:
Auxiliary storage pools (ASPs)
IBM Power Systems with IBM i single-level storage treats all storage as one large virtual
address space (this includes main store memory as well as disk). There is no concept
of a disk volume or data set partition. However, the system provides the capability to
separate this contiguous address space into smaller disk pools to make system backup
and recovery faster and to provide Hierarchical Storage Management facilities. These
pools are called auxiliary storage pools.
Conceptually, each ASP on the IBM Power System with IBM i is a separate pool of disk
units for single-level storage. The system spreads data across the disk units within an
ASP. If a disk failure occurs, you need to recover only the data in the ASP that contains
the failed unit. The user of ASPs can reduce system backup time. To do this, create an
ASP to include individual applications and data. A single ASP can then be backed up
without impacting business operations while other applications that operate from
different ASPs stay online.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Introduced with V5R1, independent ASPs (IASPs) take the concept of ASPs further by
making the ASP switchable between systems in a cluster. At V5R1, IASPs can contain
only IFS objects. At V5R3, IASPs can contain almost all IBM Power Systems with IBM i
objects. See the IBM Power Systems with IBM i Information center for more
information.
Hierarchical storage management
Hierarchical storage management (HSM) is a set of APIs supplied with IBM i. Beginning
with V4R4, the IBM Power Systems with IBM i Backup Recovery Media Services
(BRMS) licensed program offers an HSM component. BRMS provides automated
backup and recovery support for database and IFS files. It also provides automation for
system recovery. HSM moves data across a hierarchy of storage, allowing data that is
not heavily used to move to less costly storage. Retrieval of the data is transparent to
users and programs. When the object is referenced, BRMS retrieves it for the user or
program. HSM also helps reduce system back up time, as seldom used data is moved
out of the system ASP and can be saved outside the backup window used for daily
saves of critical business data.
Automated storage management
The IBM Power System with IBM i has long been known for its low cost of ownership. A
contributing factor is that the IBM Power Systems with IBM i server does not need a
database administrator (DBA) to track storage utilization and worry about moving data
around to balance or enhance disk subsystem performance.
Automated storage management is also an availability feature in that the database does
not need to be made unavailable to perform this type of maintenance. IBM i storage
management automatically spreads data across all available disk arms to balance disk
arm utilization. It also automatically allocates additional storage as files, libraries, and
other objects grow. There is no need to take the database or a file offline to extend its
size.
Online disk balancing
If a large number of disk drives are added at once, run the Start ASP Balance
(STRASPBAL) CL command to redistribute data across the disk arms and rebalance
arm utilization. There is no need to partition data sets or to move data between volumes
as required with other databases to balance performance.
You need to select the method of balancing that you wish to use:
• Capacity balancing
• Usage balancing
• Hierarchical storage management (HSM) balancing
Before using usage balancing or HSM balancing, you must run the Trace ASP Balance
(TRCASPBAL) command. This command starts a trace function that collects statistics on
the data in the ASPs that you wish to balance. Data that is used often is referred to as
high use or hot data. Data that is not used often is referred to as low use or cold data.

9-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i software features
(3 of 6)
IBM i

IBM i and system software availability feature:


– Save-while-active
– Save changed objects
– Parallel save and restore
• Multiple object
• Multiple tape drives
– BRMS: Backup and recovery and tape automation
– Online Domino backup

© Copyright IBM Corporation 2012

Figure 9-16. IBM Power Systems with IBM i software features (3 of 6) OL1914.1

Notes:
Save and restore
IBM i provides a very comprehensive set of save and restore capabilities. These
capabilities include:
Save-while-active
Save-while-active provides a means to save an object to tape while the system remains
active. Any application using a file or library being saved while the IBM Power System
with IBM i is active, must temporarily stop processing before the save can occur.
Save-while-active then establishes a checkpoint image of the object and begins the
save to tape while the application resumes execution.
An advantage to save-while-active is that the entire system does not need to be brought
down for back up. We recommend that you end all subsystems to ensure any database
updates are written from memory to disk before the save is initiated.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save changed objects


IBM i keeps a description for every object that exists on the system. Within this
description, there is a time stamp that records the last time the object is changed and
when it is last backed up. IBM i save commands use this time stamp to provide the
ability to save only objects that have been changed since the last save to tape. This
reduces the amount of data saved and the time required to perform a system backup.
Parallel save and restore
IBM i allows parallelism within the system save commands. A system with multiple tape
drives can initiate several save commands in parallel. Use the include and omit
parameters to direct saves for specific libraries to different tape drives. Use this same
approach to restore system objects using the restore procedures.
Backup Recovery and Media Services (BRMS)
BRMS provides an automated means to manage tape libraries and to set up system
save policies. Save policies can be set up for daily, weekly, and other schedules to
ensure critical enterprise data is saved to tape media. BRMS tracks which system
objects are saved and the date of the save, and reports objects that are not saved in the
operation. BRMS creates a recovery report, which lists the steps required to restore a
IBM Power System with IBM i in the event of an outage where the system must be
recovered from backup media. BRMS uses the parallel save and restore support
provided in IBM i.

9-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i software features
(4 of 6)
IBM i

IBM i and system software availability feature:


– Virtual IP
• Route fault tolerance
• Inbound/outbound
• Load balancing

© Copyright IBM Corporation 2012

Figure 9-17. IBM Power Systems with IBM i software features (4 of 6) OL1914.1

Notes:
TCP/IP
IBM Power Systems with IBM i support a full-function TCP/IP communications stack.
The support is built into TCP/IP to facilitate high-availability computing in a network
environment. A description of these functions follows.
Virtual IP
IBM Power Systems with IBM i support for virtual IP allows the system to assign an IP
address without designating it to a physical hardware device. All IP traffic can be routed
through this virtual address. Each virtual address can have more than one physical
communications adapter, system, or both behind it. This way, if a physical card adapter
or system fails, traffic can be rerouted to maintain availability. A client can be
transparently rerouted. There is no need to reestablish or reconfigure the link to the
alternate system. Virtual IP can also be used for load balancing and to direct sessions
across communications adapters in a system. This helps to evenly distribute traffic for
workload management.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Power Systems with IBM i software features


(5 of 6)
IBM i

IBM i and system software availability feature:


– No interfaces to OS kernel
• Highly virus resistant
• Security auditing

© Copyright IBM Corporation 2012

Figure 9-18. IBM Power Systems with IBM i software features (5 of 6) OL1914.1

Notes:
Security
With the well-known instances today of viruses and server hacking, to have a secure
server that is not vulnerable to attack is a key component of availability. IBM i has no
open interfaces to the system kernel, which means the IBM Power System with IBM i is
highly resistant to hacking and viruses. The IBM Power System with IBM i provides
security auditing and uses system journaling support to log security entries. System
security auditing can log activities with user profiles, objects on the system, and jobs.

9-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i software features
(6 of 6)
IBM i

• IBM i and system software availability feature


– Immediate PTF apply
– No IPL required

© Copyright IBM Corporation 2012

Figure 9-19. IBM Power Systems with IBM i software features (6 of 6) OL1914.1

Notes:
System software maintenance
To achieve higher levels of availability when applying PTFs, the IBM Power System with
IBM i adopts a philosophy to applying PTFs immediately (if possible), and not requiring
an IBM Power System with IBM i to IPL for the PTF to take effect.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: LPAR and HMC concepts and


overview

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 9-20. Topic 2: LPAR and HMC concepts and overview OL1914.1

Notes:
LPAR is short for logical partitioning
HMC is short for Hardware Management Console

9-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

PowerVM virtualization
IBM i

• PowerVM
– PowerVm Express
– PowerVm Standard Edition
– PowerVM Enterprise Edition
• POWER Hypervisor
– Firmware sitting between hosted Operating Systems and server hardware
• Controls hardware I/O and management for partitions
– Always installed and activated
• Regardless of configuration
• Dynamic Logical Partitioning
• Shared processor pools
• Micro-partitioning
• Integrated Virtualization Manager
– Combines partition management and Virtual I/O Server (VIOS)
• VIOS allows sharing of physical resources amongst multiple partitions
– Managed from a single point of control (IVM partition)
• Does not require a Hardware Management Console (HMC)
© Copyright IBM Corporation 2012

Figure 9-21. PowerVM virtualization OL1914.1

Notes:
PowerVM
PowerVM is a set of comprehensive systems technologies and services designed to
enable the management of resources in a consolidated, logical view. PowerVM is the
virtualization solution for AIX, IBM i and Linux environments on IBM POWER technology.
There are three versions of PowerVM, suited for various purposes:
PowerVM Express is an economical introduction to more advanced virtualization features
at a highly affordable price. It provides the Integrated Virtualization Manager, the Virtual I/O
Server and Shared Dedicated Capacity. It runs in an appliance-style partition that is not
intended to run end-user applications. System administrators can login and manage the
system through a VIOS command line interface.
PowerVM Standard Edition is supported on all POWER processor-based servers and
includes features designed to allow increased system utilization. It provides an HMC
interface, dual Virtual I/O Servers, multiple shared processor pools and shared (main)
storage pools.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

PowerVM Enterprise Edition includes all the features of PowerVM Standard Edition plus
two new capabilities called Active Memory Sharing and Live Partition Mobility.
POWER Hypervisor
The POWER Hypervisor is firmware that sits between hosted operating systems and
server hardware. It provides access between the physical hardware resources and the
logical partitions that use them. It also monitors the Service Processor on behalf of the
server and all of its partitions
Integrated Virtualization Manager
The Integrated Virtualization Manager (IVM) is a hardware management solution (part of
the VIOS product) that enables an administrator to configure a single server using a
browser-based, GUI interface or a command line interface. The tight relationship between
VIOS and IVM enables the administrator to manage a partitioned system without an HMC.
Micro-Partitioning
Micro-partitioning technology allows you to allocate fractions of processors to a logical
partition. An LPAR using fractions of processors is also known as a shared processor
partition or micro-partition. Micro-partitions run over a set of processors called a
shared-processor pool.
Shared-processor pools
Shared-processor pools allow a system administrator to create a set of micro-partitions
with the purpose of controlling the processor capacity that can be consumed from the
physical shared pool. Micro-partitions are created and then identified as members of either
the default shared-processor pool or a user-defined shared-processor pool. If certain
micro-partitions in a shared-processor pool do not use their capacity entitlement, the
unused capacity is ceded and other micro-partitions within the same shared-processor pool
are allocated the additional capacity.
Dynamic Logical Partitioning
Dynamic logical partitioning allows selected resources, such as processors, memory and
I/O components to be added or deleted from logical partitions while the partitions are
executing.
Hardware Management Console
The Hardware Management Console (HMC) is a hardware appliance that you can use to
configure and control one or more managed systems. You can use the HMC to create and
manage logical partitions and activate Capacity Upgrade on Demand. Using service
applications, the HMC communicates with managed systems to detect, consolidate, and
send information to service and support for analysis. The HMC also provides terminal
emulation for the logical partitions on your managed system. You can connect to logical
partitions from the HMC itself, or you can set up the HMC so that you can connect to logical
partitions remotely through the HMC.

9-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

What is logical partitioning?


IBM i

IBM power-based
servers To independent partitions
running IBM i

Partition 1 Partition 2 Partition 3

From a single
footprint

• Up to a maximum of 254 LPARs


• Max depends on which POWER technology is
installed (POWER4 versus POWER5, POWER6, and
POWER7 up to 1000 LPARs)

© Copyright IBM Corporation 2012

Figure 9-22. What is logical partitioning? OL1914.1

Notes:
The introduction of faster more powerful processor cores may result in the capacity of a
single processor core to be more than what is required by a single IT organization. Also, an
organization may have the need for multiple independently operating environments to
support different functions. Logical partitioning is a technique for sub-dividing a single IBM
Power System with IBM i into multiple entities.
Partition
When a single IBM Power System with IBM i is subdivided into multiple entities, each
functioning under an separate instance of an operating system, those independent
operating environments are called partitions. The system resources are allocated to the
partitions. Applications running on a partitioned system do not have to be redesigned for
the partitioned environment.
On POWER5, POWER6 and POWER7 based hardware, a primary partition is not required.
There is a service processor (SP) provided which controls the base operations of the IBM
Power System with IBM i for all partitions. The service processor is powered up
immediately when the IBM Power System with IBM i, is plugged into a power source. A

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Hardware Management Console (HMC) is required in order to interface with the service
processor for management of all partitions.
On POWER4 based hardware, a primary partition is required to handle the added
responsibility of partition management. This partition management function is integrated
into the Licensed Internal Code of the primary partition, and includes creating and deleting
partitions as well as adding and removing resources. The LIC hypervisor provides
additional functions for all secondary partitions that include:
• Virtual operations panels for setting IPL modes and source, powering up/down and
forcing service functions like main storage dumps
• Virtual service processor for secondary partitions
Independent operating environment
Each partition runs its own operating system which may or may not match operating
systems in other partitions on the same system. Each partition may be started and stopped
independently of other partitions. An operator can perform the following functions on
independent partitions:
• Run applications
• Perform a secondary partition IPL
• Power on or off the secondary partition
• Dump the main storage of the secondary partition
• Apply fixes to the secondary partition
• Perform system backups of the secondary partition
Note that POWER4 systems have a limit of 32 logical partitions.

9-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Allocating resources on an LPAR system


IBM i

Whole Dedicated Shared processor Partial


processors
processors processors pool
LPAR1 LPAR2 LPAR 3 LPAR4

1 2 3.33 0.85 0.82

Processors

Virtual
Ethernet Memory

Dynamic reallocation

I/O adapters

Common resources

I/O devices

© Copyright IBM Corporation 2012

Figure 9-23. Allocating resources on an LPAR system OL1914.1

Notes:
Resources
Resources are the system components that are configured into partitions.
The maximum number of partitions is related to the type of POWER system and the total
amount of resources on the system. For example, a system with 8 processors can be
configured with a total of no more than 80 partitions (if there are sufficient resources). If a
system has enough resources, the upper limit of the number of partitions is 254 on
POWER5 and POWER6 systems versus 32 on a POWER4 system.
Minimum amount of resources
Each IBM i partition must be configured with at least 128 MB of memory, one tenth of a
physical processor, and enough I/O devices to provide a load source (boot resources),
have access to a console and have the ability to load code.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Memory
Memory is allocated in multiple MB segments (the smallest being 16 MB). The exact size is
dependant on the model and the total amount of memory on the managed server. A
partition may be as small as 128 MB or as large as all of the installed memory.
Processing units
Processing power is configured in processing units equivalent to 1/100 of a physical
processor. A dedicated processor = 1.00 processing units. A partition can be configured
with as little as .10 processing unit or as much as the equivalent to all of the available
installed physical processors.
I/O slots
I/O resources are allocated to partitions at the slot level. At a minimum, you must configure
a partition with enough I/O resources to include the load source disk (boot resources) and
at least access to a console.
5250 CPW (IBM i partitions only) – also known as OLTP
Your system has a certain amount of interactive performance based on the type of system
and the number of processors. The 5250 emulation refers to how much the user must
interact with (and respond to prompts from) the computer. You can contrast this with batch
where no user intervention is required. Given the amount of interactive performance on
your system, you need to determine what percentage will be available for each partition.
The combined total of all partitions’ settings cannot exceed 100% - of the available 5250
CPWs. This resource was known as Interactive Performance on the POWER4-based
iSeries servers.
Virtual devices
Other devices can be configured to be shared between partitions. Each partition may
configure virtual I/O slots which can be configured with a virtual adapter instance. These
virtual adapters may be an Ethernet interface, a SCSI, or serial devices.

9-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Power Systems and operating systems


IBM i

IBM i Linux AIX 5L

TIMI
Open firmware Open firmware
SLIC

POWER Hypervisor

Power Systems hardware

© Copyright IBM Corporation 2012

Figure 9-24. Power Systems and operating systems OL1914.1

Notes:
A partition is the allocation of system resources to create logically separate systems within
the same physical footprint.
A logical partition is when the isolation is implemented with firmware.
• Although a partition might be logical, it can also be physical (resources).
• It provides configuration flexibility.
The POWER Hypervisor is a layer of firmware associated with the service processor of the
hardware. It provides the support necessary for logically partitioning the hardware.
The POWER Systems hardware supports one of the following operating systems in each
partition:
• IBM i
• AIX 5L
• Linux

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The AIX and Linux operating systems interface through Run-Time Abstraction Services
(RTAS), while the IBM i has System License Internal Code (SLIC) and the Technology
Independent Machine Interface (TIMI).

9-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

POWER Hypervisor functions


IBM i

• The POWER Hypervisor is firmware that provides:


– Virtual memory management
• Controls internal operations and I/O access
• Manages memory
– Virtual hardware support: Processors, Ethernet, SCSI, serial, and
virtual OptiConnect
– Security and isolation between partitions
• Partitions are allowed access only to resources that are allocated to them
(enforced by the POWER Hypervisor).

LPAR 1 LPAR 2 LPAR 3 LPAR 4


Security and isolation
barriers, the POWER
POWER Hypervisor Hypervisor is
System hardware independent of any OS
(memory, processors, devices)
© Copyright IBM Corporation 2012

Figure 9-25. POWER Hypervisor functions OL1914.1

Notes:
Introduction to the POWER Hypervisor
Partitions are isolated from each other by firmware (underlying software) part of which is
the POWER Hypervisor.
Virtual memory management by the POWER Hypervisor
There is no program access permitted between partition memory and I/O memory.
Software exceptions and crashes are contained within a partition. The POWER Hypervisor
controls the page tables used by partitions to ensure a partition only has access to its own
physical memory segments. It uses a physical memory offset value for each partition so
that the operating IBM i instances in each partition can continue to use memory address
zero as its starting point.
Virtual console support
The POWER Hypervisor provides input/output streams for a virtual console device that can
be presented on the HMC.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security and isolation between partitions


Besides managing virtual memory, the POWER Hypervisor also ensures that a partition
may only access devices allocated to it. It also clears memory, reinitializes processors,
resets processor registers, and resets I/O devices when devices are allocated to a partition
(statically or dynamically).

9-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Software licensing
IBM i

• Licensing
– Is per operating system
– Is based on processing power or is user-based for some entry-level
servers
– Is affected by partial processor feature
• Third-party application provider licenses might differ
Other software

Operating systems
IBM i, Linux, AIX 5L

IBM hardware
© Copyright IBM Corporation 2012

Figure 9-26. Software licensing OL1914.1

Notes:
Software licenses on a partitioned system
Unique software resources exist and operate on hardware that is assigned to each
partition. These software resources include separate copies of Licensed Internal Code,
IBM i, and other licensed operating systems and programs. Additionally, language feature
codes, security, user data, most system values, and software release and fixes also known
as program temporary fixes (PTFs) remain unique for each partition.
If you use shared processors and take advantage of sub-processor allocations, IBM rounds
up to the nearest whole number in calculating the appropriate software licenses and IBM
will not charge you for more software licenses than the total number of physical processors
on your server. Planning through the System Planning Tool (SPT) will give you the required
number of licenses necessary.
If you plan to run different operating systems (for example, IBM i and AIX 5L) on the same
server, then you need licenses for each individual operating system and the licenses are
based on processing power. For example, on an eight processor system, you might have
licenses for four processors for IBM i and four processors for AIX 5L. There are license

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

keys to manage licenses. If you reconfigure your partitions so that, for example, you have
4.5 processors in the partition running IBM i and your licenses only allow four processors,
you will receive out of compliance messages. Either contact IBM to purchase more
licenses or reconfigure the partition to use less processing power to stop these messages.
For third-party software, you will have to discuss with the vendor how to license packages
on a partitioned system.

9-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Why would I use logical partitions?


IBM i

• Mixed production and test


environments
• Server consolidation
• Diverse workloads
• Departmental systems
• Different system names, Partition Partition Partition
languages, and time zones
• Need to support interactive and
e-business intelligence workloads
• Mixed operating systems
– IBM i (different versions)
– AIX 5L
– Linux
© Copyright IBM Corporation 2012

Figure 9-27. Why would I use logical partitions? OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

LPAR allows for consolidation


IBM i

• From many smaller systems to one


(or fewer) smaller systems
– Smaller footprint
– Save on IT real estate
Tape
– Resource allocation flexibility
• Time-share common resources
– Tape
– CD/DVD CD

– Communications adapters
• Global consolidation
– Independent partition time zones
– Multiple national languages
Partition-1 Partition-2 Partition-3 Partition-4
• Operating systems flexibility Japan USA Argentina UK

– Choice of operating system


RGRESS O
O
RDEMEP
O

– Application selection flexibility


IBM i AIX IBM i Linux
• Systems landscape 7.1 6.1

– Development, test, production, and so on


© Copyright IBM Corporation 2012

Figure 9-28. LPAR allows for consolidation OL1914.1

Notes:
Consolidation
Using partitions gives you the ability to reallocate expensive resources and manage them
all with one interface (the HMC). You can reallocate processors, memory, or any I/O
adapter (and thus device) by reconfiguring the partitions or by using dynamic partition
operations. All of the resources are located within one system, potentially reducing the
amount of floor space needed.
Applications that were running on different systems with different operating systems can
now be brought on to a single Power System – and less frequently is used resources
maybe switched between partitions to reduce costs.
Each partition can have its own instance of a supported operating system (AIX, Linux, or
IBM i) and therefore have its own version level, language support, local time, and so on.
Many customers utilize smaller development systems to develop, test, and migrate
applications. These smaller systems may not be the same hardware, have the same
software, devices, or infrastructure as the “real”, production system. These issues can be

9-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty largely avoided by utilizing a partition on the same system as the production applications
for development and testing. This also protects the production partition from the activities
on the test partition. Once the testing is complete, the resources used for the development
partition can be reallocated to the production partition.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How does LPAR work on POWER5, 6, and 7?


IBM i

On these systems, the interface has been moved to the HMC.


– Includes the POWER Hypervisor
– Improves fault tolerance and lowers partition management costs
– No longer uses a primary partition
– Supports IBM i, AIX 5L, and Linux
– Supports up to 254 partitions (up to 1000 with POWER7)
– Provides automatic processor balancing with shared uncapped
partitions

© Copyright IBM Corporation 2012

Figure 9-29. How does LPAR work on POWER5, 6, and 7? OL1914.1

Notes:
Since there is a service processor (SP) which controls the base operations of the IBM
Power System with IBM i across all partitions, a primary partition is not required. A
Hardware Management Console (HMC) is required in order to interface with the service
processor for management of all the partitions.
POWER5 and POWER6 systems can support up to 254 maximum logical partitions.
Multiple operating systems are supported across the partitions. These partitions could be
IBM i, AIX 5L, and Linux-based operating systems.
Another advantage POWER5 and POWER6 partitioning has over POWER4 is the ability to
balance processor usage between partitions by using uncapped partitions.

9-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How does LPAR work on POWER4?


IBM i

IBM
power-
based
servers
running
IBM i

Independent logical partitions

CPW
IBM i
Partition Processor LS
Processor
LPAR 2 = memory UNIT 1

Memory

Workload CPW IBM i


interactive
Partition Processor LS

LPAR 1 = memory UNIT 1

Disks

Logically dividing
IBM i
system resources
IBM i
CPW

Primary = Processor
memory
LS
UNIT 1

Hypervisor
Workstations
Communication lines
Tape drives
Other hardware resources Available alternate IPL device
for each LPAR

© Copyright IBM Corporation 2012

Figure 9-30. How does LPAR work on POWER4? OL1914.1

Notes:
When an IBM Power System with IBM i is partitioned, the resources within the system are
assigned to create complete logical systems. POWER4 hardware does not make use of an
HMC. POWER4 systems require that the first LPAR is defined as the primary partition
which performs the duties that are now done by the Hypervisor. Basically, the primary
partition is used to manage and drive this physical system and all of the logical partitions
that are set up on this server.
Alternate IPL device
The media in the alternate IPL device is what the system uses to start from when you
perform a D- source IPL. The device can be a tape drive or an optical device. The alternate
IPL device loads the Licensed Internal Code contained on the removable media instead of
the code on the load source.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Partition console
Each logical partition must have a console attached to it through an IOP. The console is the
first workstation that the system activates in the partition. The system assumes that this
console will always be available for use.
Load source resource
Each logical partition must have one disk unit designated as the load source. The load
source resource is the IOP with the load source that contains the Licensed Internal Code
and the configuration data for the logical partitions. The system always identifies this disk
unit as unit number one.
Additional information can be found in:
http://publib.boulder.ibm.com/infocenter/powersys/v3r1m5/index.jsp
http://www-03.ibm.com/systems/i/

9-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

HMC and SDMC appliances


IBM i

• Intel-based PC appliance
– Required for configuration and management of partitions
– Available for POWER5, POWER6, and POWER7 systems
• Main HMC/SDMC applications are:
– Server and partition management
– Licensed internal code maintenance
• HMC/SDMC code maintenance
– Independent of managed system or operating systems
• Licensed internal code update flexible service processor (FSP)
– HMC management
• HMC/SDMC users
• Configuration
HMC
– Service applications
– System manager security
© Copyright IBM Corporation 2012

Figure 9-31. HMC and SDMC appliances OL1914.1

Notes:
An appliance is used here to describe a component which has a range of fixed functions
already included prior to delivery to the customer. Additional unsupported applications
cannot be installed nor can the HMC firmware be altered.
The Hardware Maintenance Console (HMC) is a dedicated desktop or rack-mounted
workstation that provides a graphical user interface (GUI) for configuration and operating
logical partitions on LPAR-capable eServer POWER5, POWER6, or POWER7 servers.
The Systems Director Management Console (SDMC) is the newest hardware and software
appliance that provides the same functionality as the HMC but for POWER6 or POWER7
servers only. It is IBM’s strategic product that will allow management of multiple systems,
multiple platforms (i, z, p, Power-based blades) and multiple virtual systems (LPARs) with
one hardware device. It also has the capability of running as a virtualized SDMC on System
x hardware.
An HMC or SDMC is required for many functions, including logical partition (LPAR)
management, capacity on demand (CoD) management, and as a single point for service

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

error reporting for the HMC, SDMC, the service processor and – if desired – logical
partitions.

9-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

HMC/SDMC and managed system


IBM i

Graphic representation of relationships between:


– HMC/SDMC
– Service processor
– Hypervisor

Virtual Server (Partitions): When active SDMC

Hypervisor: OS-independent
Non-volatile RAM

Processors
Service
processor Virtual servers consist of different
Mem regions Virtual elements (look at colors):
Server •Processors
I/O slots
(LPAR) Managed
•Memory
allocation system
tables •I/O slots

© Copyright IBM Corporation 2012 •Some part of Hypervisor

Figure 9-32. HMC/SDMC and managed system OL1914.1

Notes:
The HMC/SDMC and service processor
The HMC/SDMC provides the administrator a GUI method of managing virtual servers
(partitions or LPARs).
The Service Processor (SP) in turn provides the interface to the Hypervisor, which is
operating system and virtual server (partition) independent.
The POWER Hypervisor is the interface through which the SDMC is able to control the
allocation of appropriate resources necessary for virtual servers (partitions) on a managed
system.
The virtual server (partition) configuration information is recorded in the NVRAM on the
managed system.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Managed system without HMC/SDMC


IBM i

© Copyright IBM Corporation 2012

Figure 9-33. Managed system without HMC/SDMC OL1914.1

Notes:
Integrated Virtualization Manager
The Integrated Virtualization Manager (IVM), a component of PowerVM Editions, can be
used to manage your Virtual I/O Server (VIOS) and client virtual servers. The IVM provides
a web-based system management interface called the Advanced System Management
Interface (ASMI). The ASMI, accessed using a browser on a PC attached to a managed
server, can be used to manage an unpartitioned server. The ASMI can also be used to
create a partition in which VIOS runs. This partition is called the management partition.
Once this partition is created, you can then configure a physical Ethernet adapter on the
server so that you can connect to the IVM from a computer with a web browser.
Partitioning with the Integrated Virtualization Manager
In the above figure, the VIOS is in its own partition, and the client logical partitions are
managed by the VIOS logical partition. The browser on the PC connects to the IVM over a
network and it (IVM) can be used to create and managed the logical partitions.

9-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Power Systems management: Summary


IBM i

Power Systems
Rack-mount
ASMI only IVM only Desktop HMC
HMC
ƒ No LPAR ƒ Entry-level LPAR ƒ Basic desktop, ƒ “Stackable”, with
ƒ Limited CoD controls from IVM, worldwide support, shared flat
ƒ Basic service based on AIX VIO long production panel/keyboard
functions Server (VIOS) cycle drawer, well suited for
ƒ Limited CoD ƒ Full function LPAR clusters
ƒ Limited service controls ƒ Full function LPAR
functions ƒ Full service functions controls
ƒ Virtual OS consoles ƒ Full service functions
ƒ Redundant HMC ƒ Virtual OS consoles
optional ƒ Redundant HMC
optional

ASMI / TTY Browser


to to
FSP directly VIOS
© Copyright IBM Corporation 2012

Figure 9-34. Power Systems management: Summary OL1914.1

Notes:
This figure summarizes the Power Systems management techniques available to
administrators. ASMI management allows limited server management and no partitions.
IVM and HMC/SDMC provide more functional server management and partitions.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Hardware Management Console


IBM i

• For POWER5, POWER6, and POWER7 systems, the


Hardware Management Console (HMC) is required for:
– Virtual console windows for partitions
– LPAR configuration and operation management
– Capacity on demand (CoD) management
– Service tools

• PC-based console
– Closed custom appliance
– Connects to service processor over a private or open network

© Copyright IBM Corporation 2012

Figure 9-35. Hardware Management Console OL1914.1

Notes:
HMC description
Officially, the name of the PC-based console is called the “IBM Hardware Management
Console for IBM Power Systems with IBM i”. It is available in a desktop or a rack-mount
model. The user can only access the management application and no additional
applications may be installed. A second HMC may be connected to a single managed
system for redundancy. The HMC is required for POWER5 and POWER6 systems running
LPARs.
Remote access to the HMC functions
Remote access to the HMC application is provided by using WebSM. The WebSM client
runs on Microsoft Windows PCs and on Linux and AIX 5L workstations. In addition, there
are extensive HMC command-line controls accessible through the use of the Secure Shell
(SSH).

9-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty HMC is independent from the managed system and its partitions
The managed system refers to the IBM Power System with IBM i being managed by the
HMC. While the HMC is necessary for some functions, such as configuring LPARs, it will
not affect the operational status of any partitions if something goes wrong. The partition
configuration information is not only kept on the HMC but also kept in Non-Volatile RAM
(NVRAM) on the managed system, so if the HMC were to crash, the partitions would
continue to run. In fact, you can remove the HMC, replace it with another, (after contacting
your service provider) then download the partition data from the NVRAM on the managed
system and not affect the running of the partitions.
Service errors focal point
If a hardware error occurs, that error may be reported by multiple partitions. To prevent
confusion, the HMC is also used as a service focal point for error reporting. An application
on the HMC serves as a filter for errors to ensure IBM service calls are placed only once
per actual hardware error. Alternatively, a partition configured as the service partition may
collect system errors and report them to IBM.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

HMC appliance
IBM i

• Integrated, custom HMC software


– Provides GUI interface
– Is a set of special HMC commands
• Remotely accessible
• Support for *multiple managed systems
– Up to 64 managed systems -- 254 Desktop
partitions 7310-C04
• Active partitions that can continue to function
without an HMC
– The ability to change resource configuration
is lost
• Redundant capability
Desktop Rack-mount
• HMC connection options
7042-C06
– Private network 7310-CR3
7042-CR6
– Open network
* 64 if small tier servers; 32 if large tier servers
© Copyright IBM Corporation 2012

Figure 9-36. HMC appliance OL1914.1

Notes:
HMC is not used on POWER4 systems. An HMC is used on POWER5, POWER6 and
POWER7 systems.
An HMC is required on systems with:
• Logical partitions
• Capacity on demand
• Bulk power assemblies (high-end 595)
• Redundant service processors (570 and 595 only)
• Concurrent Firmware Maintenance (CFM)
While the HMC is necessary for some functions, it does not affect the operational status of
any partitions if something goes wrong. The partition configuration information is not only
kept on the HMC but also kept in Non-Volatile RAM (NVRAM) on the managed system, so
if the HMC were to crash, the partitions would continue to run.

9-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

HMC 7310 models


IBM i

• 7310-C06 (desktop) • 7310-CR3 (rack-mounted)


– Intel Pentium processor (3 GHz) – Intel XEON processor (3 GHz)
– 1 GB of system memory – 1 GB of system memory
– 40 GB minimum hard disk – 40 GB minimum hard disk
– DVD-RAM for backup – DVD-RAM for backup
– Two integrated serial ports – One integrated serial port
– One graphics port – One graphics port
– One integrated 10/100/1000 Mbps – Two integrated 10/100/1000
Ethernet port – Mbps Ethernet ports
– Six USB ports – Three USB ports
– Two PCI slots – Two PCI slots

© Copyright IBM Corporation 2012

Figure 9-37. HMC 7310 models OL1914.1

Notes:
The HMC 7310 is available as two standard models.
The desktop has a standard single integrated Ethernet port, while the rack-mounted model
has two Ethernet ports in the standard configuration. At a minimum, one Ethernet port on
the HMC is required to connect to the service processor of a logically partitioned System i
managed system.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

HMC 7042 models


IBM i

• 7042-C06 (desktop) • 7042-CR6 (rack-mounted)


– Dual-core Intel Xeon 3050, 2 MB cache, – Dual-core Intel Xeon 5130, 4 MB cache,
2.13 GHz processor, and 1066 MHz 2.00 GHz, and 1333 MHz front-side bus
front-side bus – 1 GB of system memory
– 1 GB of system memory – 80 GB HDD
– 80 GB HDD – DVD-RAM media: 4.7 GB single-sided
– DVD-RAM media: 4.7 GB single-sided DVD-RAM, type 2 media
DVD-RAM, type 2 media – External modem
– Modem – One integrated serial port
– Two integrated serial ports – Two video ports
– One graphics port – Two integrated dual 10/100/1000 Mbps
– One integrated 10/100/1000 Mbps Ethernet ports
Ethernet port – Four USB ports, two front and two rear
– Six USB ports, two front and four rear – One PCI-x with 133 MHz riser
– Three 32-bit PCI slots – Optional external USB diskette drive
– Integrated diskette drive

© Copyright IBM Corporation 2012

Figure 9-38. HMC 7042 models OL1914.1

Notes:
Information on the modem of the HMC 7040 models: The number of available PCI slots in
the configuration and the availability of a homologated internal modem for the ship-to
country, determine whether an internal modem is shipped. If an internal modem is not
shipped, an external modem is shipped if there is an homologated modem available for the
ship-to country.

9-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

HMC interface
IBM i

© Copyright IBM Corporation 2012

Figure 9-39. HMC interface OL1914.1

Notes:
HMC interface
The HMC application is split into two window panes. The navigation pane on the left side
allows you to access the individual applications. The content pane on the right side gives
access to the application options.
In the visual above, the example shows the HMC Management application which allows a
menu of options to work with the attached Managed System.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

HMC user interfaces and access


IBM i

• Local GUI (on HMC)


– Starts automatically whenever the HMC is started (browser-based since HMC V7)
– Requires user log in prior to access
• Remote GUI (on network PC)
– Uses an installable stand-alone remote client application (WebSM client)
• Windows (NT, XP) or Linux
• Downloadable as an installable application directly from the HMC through web browser
– Also supported from one HMC to another or from AIX 5L
– Can be SSL secured through public/private key files
• Generate on the HMC, and transfer to client systems
• Local command line (on HMC)
– Launched from a right-click menu option on the HMC desktop
– Restricted to a set of supported HMC commands
• Remote command line (on network PC)
– Accessed through encryption-protected Secure Shell (SSH)
– Can set up and exchange key files to avoid password prompts
• Very useful for automation and scripting without human intervention

© Copyright IBM Corporation 2012

Figure 9-40. HMC user interfaces and access OL1914.1

Notes:
You can use local or remote access and interfaces in order to manage your systems.

9-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Remote access to the HMC (browser-based
since V7)
IBM i

© Copyright IBM Corporation 2012

Figure 9-41. Remote access to the HMC (browser-based since V7) OL1914.1

Notes:
It is recommended that the HMC be connected to the managed systems through a private
network. HMCs may typically be placed inside the machine room where managed systems
are located, so you might not have easy physical access to the HMC. To access the HMC
through the network, one of the HMC Ethernet ports must be configured for an open
network. There are three options for accessing HMC functions remotely.
Another remote HMC
Each HMC has the ability to connect to another HMC and access its functions. You must
log in to the second HMC. To connect to another HMC from an HMC, use the Console >
Add host menu option, then enter the hostname or IP address of the remote HMC. The
second HMC appears in the navigation pane of the HMC interface. Click its name to log in.
From there you have all the capabilities that your login account allows on that HMC.
WebSM client
You can install WebSM client software on a Windows PC, an AIX workstation, or on a Linux
workstation. From WebSM you may connect to any HMC and access its functions. You

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

must log in to the HMC both to install the remote client and to access the HMC each time.
Linux:
SSH connection
You can use a secure shell (SSH) connection directly to the HMC. When you log in, you are
given a restricted shell. Most partition management commands can be executed using this
restricted shell command line. The SSH access feature is disabled by default. You need to
enable SSH to use the facility, and you can enable this from the HMC.
Virtual terminal
Virtual terminal gives you the ability to assume the console role for your IBM i partitions
from the HMC to a 5250 session configured on your PC.

9-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

The big picture recap


IBM i

Managed system

IBM i Linux Unassigned


resources

Partition 1 Partition 2 Ethernet HMC


POWER Hypervisor
Non-volatile RAM

Service
Processors Processor
Memory Ethernet
LPAR
I/O Slots
allocation
tables

© Copyright IBM Corporation 2012

Figure 9-42. The big picture recap OL1914.1

Notes:
Introduction
This picture brings together several concepts that have been covered already. Partitions
are independent operating environments and their resources are managed by the POWER
Hypervisor.
• NVRAM is used on the managed system to keep track of the LPAR configuration.
• The LPAR configuration is managed and also kept on the HMC.
• The HMC is connected to the managed system through the Flexible Service Processor
(FSP). The FSP is a separate, independent processor that provides hardware
initialization during system load, operation monitoring of environmental and error
events, and maintenance support.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Advanced HMC features


IBM i

• Dynamic resource allocation


• Advanced processor concepts
• Virtual I/O
• Capacity on demand

© Copyright IBM Corporation 2012

Figure 9-43. Advanced HMC features OL1914.1

Notes:
Introduction
This page lists the advanced partition features covered in the rest of this unit.

9-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Dynamic partitioning
IBM i

• Dynamic partitioning (DLPAR) is the ability to add, remove, or


move resources between partitions without restarting the
partitions.
• Resources:
– Processors, memory, and I/O slots that are not required
– Virtual I/O
• Security and isolation between LPARs is not compromised.
– A partition sees its own resources plus other available resources.
– Resources are reset when moved.
• Applications might or might not be DLPAR-aware.

DLPAR allows you to react to


changing resource needs.
© Copyright IBM Corporation 2012

Figure 9-44. Dynamic partitioning OL1914.1

Notes:
Dynamic partitioning
Dynamic partitioning refers to the fact that you can switch resources between partitions
without shutting down the partitions. The opposite of dynamic partitioning is static
partitioning, where new configurations are only used when a partition is reactivated.
DLPAR operations do not weaken the security or isolation between LPARs. Partitions only
see resources in its own partition, any potential connectors for additional virtual resources
that may have been configured, and any resources not currently allocated.
Resources are reset when moved from one partition to another. Processors are
reinitialized, memory regions are cleared, and adapter slots are reset.
DLPAR operations
You can add, remove, and move resources between partitions. This can be accomplished
from the HMC application or through HMC command-line commands.
With virtual devices, you may add or delete them, but you cannot move them from one
partition to another. You can, however, dynamically change the configuration that specifies

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

what type of virtual adapter it is. Other partition options which can be reconfigured
dynamically will be covered later in this course.
DLPAR resources
The resources include memory, processing units, and not required I/O slots. A required slot
or adapter is one that a partition has defined as essential to its operation and is thus
unavailable for movement as long as the partition is operational.
For virtual devices, you may add and remove, but not move resources between partitions.
These operations will be covered in a future unit in this course.
Applications may not be DLPAR-aware
Most applications are unaware of the underlying resource specifics and that works just fine.
But some applications and utilities, particularly monitoring tools, may inhibit some DLPAR
operations if they bind to processors or pin memory. Many resource-aware applications
have been rewritten in recent years to allow DLPAR. Check with your sales representative
about your application.

9-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How DLPAR works


IBM i

HMC
HMC command

Partition A Partition B

POWER Hypervisor
© Copyright IBM Corporation 2012

Figure 9-45. How DLPAR works OL1914.1

Notes:
Introduction
The visual illustrates these points:
The DLPAR request originates at the HMC.
• The request is made over the TCP/IP network to the POWER Hypervisor.
• Partition A and partition B communicate about the DLPAR operation through a task
running on both partitions.
• DLPAR will not work if the network is down:
- Between the HMC and the Managed System
- Between the HMC and the IBM i, AIX or LINUX partition

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Processor concepts
IBM i

LPAR LPAR LPAR Virtual

Shared

Dedicated

Inactive
(CoD)

Deconfigured

Physical
(installed)

© Copyright IBM Corporation 2012

Figure 9-46. Processor concepts OL1914.1

Notes:
Introduction
This visual summarizes the various concepts concerning POWER5 and POWER^
processors. Along the bottom are whole, physical processors installed in the computer
system. These are configured in various ways into the three partitions.
Processing units, partial processors, and logical processors
Shared processor partitions are allocated in processing units rather than physical
processors. A processing unit is the equivalent to 1.00 physical processor. 1.00 processing
unit is (more or less) equivalent to one dedicated processor.
The terms micro-partitioning and partial processors refer to the ability to allocated less than
a whole physical processor to a partition.
Virtual processors
If you were to allocate 2.00 processing units to a partition, what is actually allocated is the
equivalent of the execution time or capacity of two whole processors. A virtual processor

9-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty defines the number of real processors in the shared pool that this partition can run jobs (or
threads) on simultaneously.
Shared versus dedicated processors
Dedicated processors are physical processors that are allocated to a partition and are
dedicated to that partition. Other partitions cannot use any time slices on that processor
while that partition is active. Shared processors are whole processors that live in the
shared pool – now the default. Partitions use processing units from that pool as needed
within configuration guidelines.
Inactive, Capacity on Demand (CoD) processors aka Capacity Upgrade on Demand
(CUoD)
Inactive processors may be added as a dedicated or shared processor through the
activation of a CoD license key. CoD is an option that can be purchased. There is more on
this in a few moments.
Deconfigured
A physical processor may be automatically deconfigured from the system due to detected
errors.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Micro-partitioning
IBM i

• Time-sliced sub-processor allocations are dispatched


according to demand and entitled capacity.
Physical
processors

Partition 1
P P P P Partition 2
t=0 Partition 3
Partition 4
Partition 5
Partition 6
Partition 7

Shared processing pool


© Copyright IBM Corporation 2012

Figure 9-47. Micro-partitioning OL1914.1

Notes:
Micro-partitioning
Micro-partitioning is defined as the ability to create a partition and allocate less than a full
processor to it. Processing power may be allocated to partitions using dedicated
processors or shared processors. For shared processors, partitions may allocate
processing power in processing units which are equivalent to 1/100 of the execution
capacity of a physical processor. At a minimum, a partition must have processing units
equivalent to 1/10 of a processor.
The visual above shows seven partitions each time-slicing on four physical processors
which are part of the shared processing pool. “t” shows the time scale. Each partition gets a
percentage of the execution dispatch time on the processors in the pool, based on its
capacity assignment. Do not worry. We will come back to this later. This page is here to
give you some basic terminology until we reach the advanced processor topic later in this
course.

9-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Virtual I/O
IBM i

• Each partition has virtual I/O slots.


– This is configurable for each partition.

• Slots can have a virtual adapter instance.


– This can be Ethernet, serial, or SCSI.

• It can be dynamically added or removed just like physical I/O


slots.
– It cannot be dynamically moved to another partition.
– The configuration of what is in the slot can be redefined without a
restart of the partition.

© Copyright IBM Corporation 2012

Figure 9-48. Virtual I/O OL1914.1

Notes:
Virtual I/O basics
Each partition, by default, has two virtual Serial I/O slots (which are already used by system
functions – HMC console and debugging) and cannot be used or modified by the end user.
Additional slots can be configured and populated with a virtual adapter instance which
allows partitions to share devices. It also provides virtual Ethernet connections between
partitions on the same IBM Power System with IBM i.
Virtual adapters interact with the operating system like any other adapter card, except that
they are not physically present. Virtual adapters are recorded in IBM Power System with
IBM i inventory and management utilities.
As with physical I/O adapters, a virtual I/O adapter must first be varied off from the
operating system to perform a DLPAR remove operation.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Virtual Ethernet
Virtual Ethernet provides the same function as using a 1 GB Ethernet adapter and is
implemented through high-speed, inter-partition, in-memory communication. Each partition
can connect to multiple networks through one or more adapters (using a virtual switch).
Virtual serial
The virtual serial option is typically used for virtual console access.
Virtual SCSI
The virtual SCSI option provides access to block storage devices in other partitions such as
device sharing. It uses the client/server model where the server exports disks, logical
volumes, or other SCSI-based devices, and the client sees the imported device as a
standard SCSI device.

9-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Virtual I/O example


IBM i

Client Server
partition partition
Physical
Virtual Virtual Virtual Proxy Physical network
Ethernet Ethernet ARP Ethernet
switch

POWER Virtual Disk


NWSD
Hypervisor
Client Server Device
adapter adapter mapping
Virtual SCSI
DMA
buffer

SCSI, SSA, FC physical


or logical disks
© Copyright IBM Corporation 2012

Figure 9-49. Virtual I/O example OL1914.1

Notes:
Client/server relationship
Virtual I/O devices provide for sharing of physical resources, such as adapters and
devices, among partitions. Multiple partitions can share physical I/O resources and each
partition can simultaneously use virtual and physical I/O devices. When sharing adapters,
the client/server model is used to designate partitions as users or suppliers of adapters. A
server must make its physical adapter available and a client must configure the virtual
adapter.
If a server partition providing I/O for a client partition fails, the client partition might continue
to function depending on the significance of the hardware it is using. For example, if the
server is providing the paging volume for another partition, a failure of the server partition
will be significant to the client. However, if the shared resource is a tape drive, a failure of
the server partition will have only minimal effects on the client partition.
Currently, only IBM i partitions can be server partitions on POWER5 Servers. AIX can be
either a client or a server, whereas Linux can only be a client.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Virtual SCSI
Virtual SCSI devices provide the ability for a partition to use storage I/O (disk, CD, and
tape) devices that are owned by another partition. For example, one partition may provide
disk storage space to other partitions. Disk unit, CD, and tape devices on an IBM Power
System with IBM i are based on the SCSI protocol.
Virtual serial adapters
For IBM i, the virtual serial adapter provides for a 5250 console connection to the HMC and
allows for an internal debugging connection through the HMC and to the partition. For
Linux, the virtual serial adapter provides a character console to either the HMC or an IBM i
partition.
Virtual Ethernet
There are two features to Virtual Ethernet. One is the inter-partition virtual switch to provide
support for connecting up to 4096 LANs. LAN IDs are used to configure virtual Ethernet
LANs and all partitions using a particular LAN ID can communicate with each other. The
other feature is a function that bridges networks together without using TCP/IP routing.
This function allows the partition to appear to be connected directly to the external network.
The connections to the physical networks are through routing partitions and this implies a
trusted environment for the routing partition. The benefits to using this feature include not
needing a physical adapter for each partition and it removes some network load.

9-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Capacity on demand
IBM i

• Capacity Upgrade on Demand (CUoD)


– Permanent activation of processors or memory

• Trial CoD
– No charge 30-day activation of processors or memory resources

• On/off CoD
– Ability to activate processor or memory resources temporarily

Add reserve
• Reserve CoD resources
– Processors only
– Prepaid for certain number of days

© Copyright IBM Corporation 2012

Figure 9-50. Capacity on demand OL1914.1

Notes:
Introduction to CoD
CoD is a list of features which may be purchased. The four main bullets in the visual above
list the four purchasing options. These options are managed from the HMC and require a
license key to activate.
Capacity CUoD requires a purchase agreement. Once processors or memory are added,
there is no ability to turn off the capacity.
Trial CoD is available for 30 days at no additional cost to allow testing and emergency relief
while the customer processes the purchase of permanent CUoD resources.
On/Off CoD provides temporary additional processor or memory resources. Activity is
reported to IBM and there must be an On/Off Capacity agreement.
Reserve CoD adds reserve processor capacity to the shared processor pool if the base
shared pool capacity is exceeded. There must be a prepaid debit agreement for a set
number of days.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Partitioning concepts summary


IBM i

Part#1 Part#2 Part#3 Part#4 Part#5 Part#6 Part#7-11


Usei thisIBM
IBM layout
i for all your
Linux IBMdrawing
i AIX 5Lneeds
IBM i LAN
IBM i
PPPPPP PPPP P
PPPPPP PPP P PPPPPP
MMMMM MMMM MMM MMM M MM M M M M M
A A
AAAAAA AAAAA AAA AAAA AA AAA
Virtual LAN
Virtual I/O
O O
O O O
O O O
IBM i IBM i Linux IBM i AIX 5L IBM i S S
S S S S
S S S
Kernel Kernel Kernel Kernel Kernel Kernel
OptiConnect Virtual Ethernet
POWER Hypervisor

© Copyright IBM Corporation 2012

Figure 9-51. Partitioning concepts summary OL1914.1

Notes:
Introduction
This visual illustrates a system with eleven partitions. It shows the basic components of a
system running logical partitions such as the HMC, the POWER Hypervisor, a virtual LAN,
partial processors, virtual I/O, and dedicated versus shared processing pool.
In the visual, the P=processors, M=memory, and A=adapters are in I/O slots.
Virtual OptiConnect
The visual above shows one new concept, the virtual OptiConnect. OptiConnect is a
POWER5 system option which provides high-speed partition-to-partition communication for
PCI-based models. No additional hardware is required. To use the OptiConnect feature,
you need to install the separately priced OptiConnect, software.

9-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

LPAR configuration process


IBM i

1 Gather partition requirements through existing data or modeling.

2 Plan resources for partitions (SPT).

3 Set up HMC.

4 Power on and set up managed system.

5 Create and configure partitions.

6 Activate partitions and install operation systems.

7 Configure and test service applications.

© Copyright IBM Corporation 2012

Figure 9-52. LPAR configuration process OL1914.1

Notes:
Introduction
These are the overall steps for configuring partitions on a new POWER5 and POWER6
LPAR-capable system.
Step 1: Plan for usage model and applications
If you have already purchased a POWER5 or POWER6 system you have probably already
completed Step 1 as part of the system sizing process. As part of this step you should have
some idea about how to divide up the applications into partitions. You should also plan for
future needs such as partitions for development and testing.
Step 2: Plan resources for partitions
Planning the resource allocations for partitions is the most important step in the
configuration process because it will hopefully eliminate errors and multiple
reconfigurations later in the process. Planning is crucial because with multiple partitions the
configuration information becomes quite complex very quickly. This is particularly true for
the network configuration of your partitions and the HMC.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

You should plan for the “normal” operation of the application in a partition and for best case
and worst case scenarios. It is important to document all configurations and keep the
records up to date.
Step 3: Set up the HMC
Once the hardware has been delivered, set up the HMC. The HMC can (and should) be set
up and ready to go long before the managed IBM Power System with IBM i is even
powered on. Since the HMC has its own operating system it can be configured
independently of any other hardware.
Step 4: Power on and set up the HMC managed system
The managed IBM Power System with IBM i is a term used to describe a single IBM Power
System with IBM i with one or more partitions. For new managed systems and HMCs, the
HMC must be configured to support the managed system. Then, when you power on the
managed system from the HMC for the FIRST time consider the Auto Start rather than the
Partition Standby power on option. This option will allow you to insure all your hardware is
operating correctly before configuring additional partitions.
Step 5: Create and configure partitions
You must plan, create, and configure each logical partition. Configuring a partition consists
of allocating resources and setting other configuration options.
Step 6: Activate partitions and install operating systems
At this point you can activate each partition and install an operating system – if necessary.
Step 7: Configure and test service applications
Since IBM cannot predict how a particular system might be divided into separate operating
system environments, you may need to alter the configuration of the service applications,
such as Service Agent and Service Focal Point.

9-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Where can I find more information on LPAR?


IBM i

• Education:
– AS530/OV530: Logical Partitioning (LPAR) on IBM Power Systems
with IBM i

• Available links and manuals:


– http://www-03.ibm.com/systems/power/software/i/virtualization.html
– http://publib.boulder.ibm.com/eserver/ibmi.html

• www.redbooks.com:
– SG24-6251: LPAR Configuration and Management
– SG24-6209: Capacity Planning for Logical Partitioning

© Copyright IBM Corporation 2012

Figure 9-53. Where can I find more information on LPAR? OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Clustering

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 9-54. Topic 3: Clustering OL1914.1

Notes:

9-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Clustering: What is a cluster?


IBM i

• A cluster is a collection of interconnected


complete computers, used as a single,
unified computing resource.
• Some of the attributes of a cluster are:
– High availability/continuous availability
– Simplified single system management
– Scalability/flexibility
– High-speed interconnect
communications
– Shared resources
– Workload balancing
– Single system image

© Copyright IBM Corporation 2012

Figure 9-55. Clustering: What is a cluster? OL1914.1

Notes:
Starting at V4R4 the System i family of systems was enhanced with Continuous Availability
Clustering. The definition of a cluster is a group of independent systems working together
as a single system.
IBM Power Systems with IBM i clustering lets you efficiently group your systems together to
set up an environment that provides availability that approaches 100% for your critical
applications and your critical data. Clustering also provides simplified systems
management and increased scalability to seamlessly add new components as a
customer’s business grows.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Types of clusters (1 of 4)
IBM i

• Separate servers
– Each system has a copy
of the disks.
– Data is replicated from a
source system to one or
more target systems.
– Local access to the data
for updates is only
available at the source
system.
– Servers can be in different
Replicated
locations to withstand objects
single site disaster.

© Copyright IBM Corporation 2012

Figure 9-56. Types of clusters (1 of 4) OL1914.1

Notes:
A separate server cluster is also known as a replication solution.
In this solution, each of the systems in the cluster has a copy of the data located on
different disk units. Changes made to data and objects on one system are replicated to the
second system using an HABP replication product. With this solution, both copies of the
data are available and may be in use. It is usually advisable for one of the copies of the
data to be used for read-only operations like queries. Also, the distance between the
systems can be quite large. Therefore, this cluster can provide high availability and disaster
recovery.

9-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Types of clusters (2 of 4)
IBM i

• Switchable DASD
– Disk drives can be switched
from one system to another.
– Local access to the data is
only available from the owning
system.
– There is a single set of disk
drives for all systems.
– It is not necessary to replicate
data between systems that
can own the switchable
devices.
– This is susceptible to site
IASP
disaster.

© Copyright IBM Corporation 2012

Figure 9-57. Types of clusters (2 of 4) OL1914.1

Notes:
One form of high availability for an IBM Power System with IBM i cluster, is switched disks.
The independent disk pools reside on a single set of disk units. If the disks are switched
between systems, they are located in expansion towers on HSL loops connecting the
systems. In a switched disk environment, the disks are owned by one of the systems or
partitions in the cluster. The distance between systems is limited, and, as a result, switched
disks are not a good disaster recovery solution.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Types of clusters (3 of 4)
IBM i

• Cross site mirrors


– Each system has a copy of the
disks.
– Disk writes are replicated by the
IBM Power System with IBM i
operating system from one
location to another.
– Only the production copy is
available for use.
– Servers can be in different
locations to withstand single
Mirrored
site disaster. disk writes
IASP1 IASP1

© Copyright IBM Corporation 2012

Figure 9-58. Types of clusters (3 of 4) OL1914.1

Notes:
Cross site mirror (XSM) clusters are similar to replication solutions.
Changes written to disk units in an independent disk pool are intercepted and sent to a
backup location. When the change is received at the backup location, it is written into a
different set of disk units. The practical distance between the XSM sites makes this solution
acceptable for disaster recovery. The main differences between XSM and a replication
solution are:
• An HABP replication product is not required
• Changes are always written in the same order on both sets of disks.
• Only the production copy of the disk pool is available.

9-86 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Types of clusters (4 of 4)
IBM i

• System storage copy


services through Peer-to-
Peer Remote Copy (PPRC)
– Each system has a copy of the
disks.
– Disk writes are replicated by
IBM TotalStorage from source
disks to target disks.
– Only the source copy is
available for use.
– Servers can be in different PPRC disk
locations to withstand single writes
IASP1 IASP1
site disaster.

© Copyright IBM Corporation 2012

Figure 9-59. Types of clusters (4 of 4) OL1914.1

Notes:
Another disk solution is provided with IBM external storage through Copy Services
functions called metro and global mirroring.
In this solution, a change will be written to one set of external disk units and copied to a
second set of disk units by the storage subsystem. There is no IBM Power System with
IBM i involvement in the replication. The target of the copy of the operation may be local
(metro mirroring) or remote (global mirroring). Nearly all installations of this solution are
implemented using the Copy Services Toolkit provided by the Custom Technology Center
and supported by the IBM Power System with IBM i Technology Center.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Elements of a cluster (1 of 5)
IBM i

Cluster

Administrative
domain CRG CRG
Cluster node
A A

Device
domain

CRG
C
CRG CRG CRG
B B C

Recovery Cluster
domain resource
group
Cluster resources
(for example, switched disk with IASP)

© Copyright IBM Corporation 2012

Figure 9-60. Elements of a cluster (1 of 5) OL1914.1

Notes:
A cluster is a collection of systems or partitions that are logically linked together.

9-88 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Elements of a cluster (2 of 5)
IBM i

Cluster

Administrative Cluster node


domain CRG CRG
A A

Device
domain

CRG
C
CRG CRG CRG
B B C

Recovery Cluster
domain resource
group
Cluster resources
(for example, switched disk with IASP)

© Copyright IBM Corporation 2012

Figure 9-61. Elements of a cluster (2 of 5) OL1914.1

Notes:
A cluster node is a system or partition that is in a cluster. A partition or system can be a
node in only one cluster.
The three types of roles a node can have in a recovery domain are:
Primary node
The cluster node that is the primary point of access for the resilient cluster resource.
• For a data CRG, the primary node contains the principle copy of a resource.
• For an application CRG, the primary node is the system on which the application
is currently running.
• For a device CRG, the primary node is the current owner of the device resource.
If the primary node for a CRG fails, or a manual switchover is initiated, all CRG objects
fail or switch over to a backup node.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup node
The backup node is the cluster node that takes over the role of primary access if the
present primary node fails or a manual switchover is initiated. For a data CRG, this
cluster node contains a copy of that resource which is kept current with replication.
Replicate node
The replicate node is a cluster node that has copies of cluster resources, but is unable
to assume the role of primary or backup. Failover or switchover to a replicate node is
not allowed. If you ever want a replicate node to become a primary, you must first
change the role of the replicate node to that of a backup node.

9-90 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Elements of a cluster (3 of 5)
IBM i

Cluster

Administrative
domain CRG CRG Cluster node
A A

Device
domain

CRG
C
CRG CRG CRG
B B C

Recovery Cluster
domain resource
group
Cluster resources
(for example, switched disk with IASP)

© Copyright IBM Corporation 2012

Figure 9-62. Elements of a cluster (3 of 5) OL1914.1

Notes:
Cluster resources are resilient and may be relocated between nodes in a cluster. Selecting
data or applications to be made resilient is similar to planning a save/restore strategy to be
used for disaster recovery.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Elements of a cluster (4 of 5)
IBM i

Cluster

Administrative
domain CRG CRG Cluster node
A A

Device
domain

CRG
C
CRG CRG CRG
B B C

Recovery Cluster
domain resource
group

Cluster resources
(for example, switched disk with IASP)

© Copyright IBM Corporation 2012

Figure 9-63. Elements of a cluster (4 of 5) OL1914.1

Notes:
A Cluster resource group is an object that describes and manages cluster resources.

9-92 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Elements of a cluster (5 of 5)
IBM i

Cluster
Administrative
domain Cluster node
CRG CRG
A A

Device
domain

CRG
C
CRG CRG CRG
B B C

Recovery Cluster
domain resource
group
Cluster resources
(for example, switched disk with IASP)

© Copyright IBM Corporation 2012

Figure 9-64. Elements of a cluster (5 of 5) OL1914.1

Notes:
An Administrative domain is a collection of nodes that is used to replicate objects between
them. For example, if the user profiles in three nodes in the Administrative Domain should
remain the same, whenever a change is made to the user profile on one of the nodes in the
Administrative domain, the user profile is copied to the other nodes.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Clustering: Backup example


IBM i

Example 1

HABP Replication

Production system Backup system

Example 2 Backup of production


data available for
backups, queries,
business intelligence,
HABP Replication and so forth

Order entry Warehouse and


distribution
Backup of warehouse
and distribution data Backup of order entry
available for fail-over data available for fail-
and backups over and backups
© Copyright IBM Corporation 2012

Figure 9-65. Clustering: Backup example OL1914.1

Notes:
In example one, the backup system can be used to take the backups of the production IBM
Power System with IBM i in order to reduce the down time associated with the backup
window on the production system. Time and resource consuming queries for business
intelligence-like activities can also be performed on the backup system, this technique
avoids a performance impact on the production system.
In example two, both systems are production machines and cross-backup of each other
using HABP in both directions. Each machine can work as a fail-over for the workload
running on the other system.

9-94 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Clustering: Topology example


IBM i

Up to 128 nodes - local and remote


Dual hub
OptiConnect 170 LAN 170

530 740

750 750

H H 720
U U
B B
520 750 T1 WAN

520 T1 WAN
Ethernet LPAR
LAN 520 ATM WAN
520
520

520 520

© Copyright IBM Corporation 2012

Figure 9-66. Clustering: Topology example OL1914.1

Notes:
Up to 128 nodes can be configured and be part of a single cluster. In the given example
there are no clients shown.
First, this example shows the combination of different systems with the different roles they
can perform.
Secondly, this example also shows how the systems can be connected using different
topologies. The systems in the middle ring are connected through OptiConnect in a dual
hub configuration. This means two systems are connected with a dedicated hub tower and
the other systems are connected as satellites to both of the hubs. The other systems are
connected together with different types of communication interfaces and protocols.
Third, this example shows a configuration with redundant communications paths. The best
way to avoid a cluster from getting partitioned is to configure redundant communications
paths between all of the nodes on the cluster. A redundant communications path means
that you have two lines configured between two nodes in a cluster. If a failure should occur,
the second communication path can take over to keep the communications running
between the nodes, thereby minimizing conditions that could put one or more of the nodes

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

in the cluster into a partition situation. One thing you want to keep in mind when configuring
these paths is if both of your communications lines go into the same adapter on a system,
these lines are still at risk if this single adapter fails.

9-96 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Where can I find more information on clustering?


IBM i

• Education:
– AS541/OV541: IBM Power HA for i, Clustering and Independent Disk
Pools Implementation

• Available links and manuals:


– IBM i Cluster Technology
– http://publib.boulder.ibm.com/eserver/ibmi.html

• www.redbooks.ibm.com:
– SG24-7994: PowerHA SystemMirror for IBM i Cookbook

© Copyright IBM Corporation 2012

Figure 9-67. Where can I find more information on clustering? OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 4: Integration of IXA/IXS/xSeries


server

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 9-68. Topic 4: Integration of IXA/IXS/xSeries server OL1914.1

Notes:

9-98 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power System with IBM i and Windows
servers
IBM i
IBM power-based servers
• IBM Power Systems with IBM i running IBM i

– Enterprise-wide support
• Commercial applications
• Database
• Reliability
• Availability
• Scalability
External
• And others LAN

• Microsoft Windows servers


– Windows NT Server 4.0
– Windows 2000 Server and Advanced Server
– Windows 2003 Standard, Enterprise, and web editions
– Red Hat Enterprise Linux 3.0 AS or ES Edition Windows
server

© Copyright IBM Corporation 2012

Figure 9-69. IBM Power System with IBM i and Windows servers OL1914.1

Notes:
90% of the customers who have a server in the IBM Power Systems with IBM i family
also have Windows servers installed. IBM Power Systems with IBM i customers have
Windows products installed not only on client PCs but also on Windows servers. Our
customers have Windows products installed more than any other operating
environment.
ISVs and IBM are delivering complementary applications with Windows servers. With
complementary applications, part of the application is on IBM Power Systems with IBM
i OS and part of the application is on the Windows client. It takes a heterogeneous
server environment to deliver these applications with the IBM Power System with IBM i.
Windows is a popular choice for the application portion of the application working with a
back-end application.
Customers want to consolidate servers. Mainframe, UNIX, Windows, and IBM Power
System with IBM i customers are looking to consolidate servers to take advantage of
the cost savings that can be received. Pulling together IBM Power Systems with IBM i
and Windows servers is one way to consolidate servers.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Depending on which specific server (IXA or IXS or Integrated xSeries server) is


installed, the IBM Power System with IBM i server will determine which Windows server
(Windows NT or Windows 2000 or Windows 2003 Server) will be supported.

9-100 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Benefits of IBM Power Systems with IBM i/
Windows server integration
IBM i

• Server management
– Management IBM i and Windows servers IBM Power System with
IBM i
• User administration
– IBM i users, groups, passwords synchronized with Windows
• Virtual Ethernet
– Communicate more securely over 1 Gbps virtual Ethernet
connections
• Dynamic virtual storage
Windows server
– Up to 31 TB per Windows server
on Integrated
• Backups xSeries
– Consolidate IBM i and Windows backups Server
• Testing
External
– Logical servers allow testing with the production image and LAN
hardware
• Hot spare
– Easily switch production environment to another server
• Improve Windows server uptime and stability
– Update IBM Power System with IBM i device drivers automatically
from IBM Power Systems with IBM i
• Reduce total cost of ownership
– IBM Power Systems with IBM i warranty and maintenance cover Windows
integrated xSeries servers
server
© Copyright IBM Corporation 2012

Figure 9-70. Benefits of IBM Power Systems with IBM i/ Windows server integration OL1914.1

Notes:
Server management: Manage IBM i and Windows servers from one interface. This can
save on operations costs.
User administration: IBM i users, groups, passwords synchronized with Windows
accounts. Reduces the help desk calls for passwords being reset.
Virtual Ethernet: Communicate more securely over 1 Gbps Virtual Ethernet connections.
There is no extra hardware to buy or install. It runs between Windows servers or to a
partitioned IBM Power System with IBM i.
Dynamic virtual storage: Three is up to 31 TB per Windows server. Use drives as needed
to stay ahead of storage constraints.
Backups: Consolidate IBM i and Windows backups to cut down on multiple methods,
multiple media and training costs.
Testing: Logical servers allow testing with the production image and hardware to better
represent your true production environment. Testing cuts down on the surprises when
moving to new fix levels or application updates.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Hot spare: Easily switch the production environment to another server. Recover from
hardware problems quickly, but utilize the hot spare hardware for other applications while it
is not needed as a hot spare.
Enhanced reliability: IBM Power System with IBM i disk drives with RAID-5 and mirroring
options can improve uptime and consolidate storage. Increase business recovery
protection with the backup of the combined IBM i and Windows servers.
Improved Windows server uptime and stability: Update device drivers automatically
from IBM i. Windows device drivers are from a single supplier, single configuration,
integrated testing/support. Fixes to device drivers are deployed through IBM i PTFs. It is
simple to manage distribution across an entire network.
Reduced total cost of ownership: The IBM Power System with IBM i warranty and
maintenance covers Integrated xSeries Servers.

9-102 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

What are we integrating?


IBM i

• Windows server applications


– Infrastructure servers
• File/print servers
• Web servers
• Firewall
• Others
– Application servers
• Exchange/SQL server, and so on
• Thin client environment
– Citrix metaframe
– Run heavy Windows client application on server; send user interface
to the client
• Complementary applications
– Client/server applications
© Copyright IBM Corporation 2012

Figure 9-71. What are we integrating? OL1914.1

Notes:
The opportunities for integration include:
Windows server: The IXS is a Windows NT and 2000 server. The xSeries servers that
support the IXA are Windows 2000 servers. As a result, both of these offerings support
the various Windows server applications including File/Print, IIS, Exchange, and SQL
Server.
Thin client environment:
Citrix metaframe: This Citrix product supports running the heavy Windows client
application on server (IXS or direct attach with IXA) and sending the user interface
to the client. In this environment, a new Windows application can be used by older,
smaller, and even non-Windows clients.
Run the heavy Windows client application on a server, and send the user interface
to the client.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Complementary application support: Applications require IBM i and Windows servers.


Both IBM and ISVs are using Windows NT/2000 to deliver complementary applications
on the IBM Power System with IBM i.

9-104 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Integrated xSeries server: I/O device sharing


IBM i

Communications

Disk

Tape drive
ed
CD drive grat
e
Int eries Communications
xS rver
Se

© Copyright IBM Corporation 2012

Figure 9-72. Integrated xSeries server: I/O device sharing OL1914.1

Notes:
A PC-based server has an Intel processor and PC memory on a motherboard, combined
with a LAN adapter, disk, and CD-ROM drives.
The Integrated xSeries Server for the IBM Power IBM i family has an Intel processor and
PC memory, but these are packaged on a motherboard to fit inside the IBM Power System
with IBM i. Once inside the IBM Power System with IBM i, device drivers are provided to
share the IBM Power System with IBM i disks, CD-ROM, DVD, and tape drives. LAN
adapters cannot be shared between IBM Power Systems with IBM i and Windows: a
separate LAN adapter and TCP/IP address are required for each system.
The Integrated xSeries Server is designed to run Windows server and can also run Citrix
MetaFrame which is used with Windows 2000 to connect IBM network stations. The IXS
requires a monitor, keyboard, and mouse to be attached as a Windows console.
Hot plug PCI provides concurrent maintenance for LAN adapters on all IBM Power
Systems with IBM i and for the Integrated xSeries Server board on selected IBM Power
Systems with IBM i servers. An Integrated xSeries Server must be varied off to perform
concurrent maintenance on either the server board or the LAN adapter.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Announced with the POWER5, there is a new and improved version of the Integrated
xSeries Server that has been optimized and sized to fit Central Electronics Complexes
(CEC).

9-106 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Typical IXS installation


IBM i

IBM Power Systems with IBM i disk drives

IBM Power
Systems with
IBM i
IBM Power Systems with
IBM i

IBM i
Console

© Copyright IBM Corporation 2012

Figure 9-73. Typical IXS installation OL1914.1

Notes:
1. First you need a compatible IBM Power System with IBM i. See the Hardware
requirements section for compatibility information.
2. The IBM i console, from which you connect to the IBM Power System with IBM i using
IBM Systems Director Navigator for i or the character-based interface, is shown to
clarify the distinction between it and the Windows console.
3. Depending upon the type of IXS adapter, there are different ways to provide network
connectivity. Some types of IXSs can “take over” adjacent PCI slots therefore allowing
the IXS to control an IBM Power System with IBM i network card. See the Hardware
requirements for information about which network cards are supported. You can install
up to three network cards in this way. Other types of IXSs have integrated network
controllers and do not support network cards in adjacent slots.
4. An integrated server does not have its own hard disk drive. IBM i emulates hard disk
space for it to use from IBM Power System with IBM i hard disk drives.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

5. The IXS card itself is an Intel processor with its own RAM, mounted on a PCI board and
plugged into an IBM Power System with IBM i expansion slot. The IXS physically
occupies two slots.
6. A typical IBM Power System with IBM i will have a network card.
7. A Windows console allows you to interact with the integrated server. A Windows
console will consist of a monitor, a keyboard, and a mouse directly attached to the IXS
card.

9-108 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IXA xSeries adapter: Disk access


IBM i

Disks IBM Power System with IBM i xSeries

High-speed link for disk access

Integrated
Systems management xSeries
and power control Adapter

• IXA attaches n-way IBM xSeries servers to IBM Power Systems with IBM i
– xSeries server models supported
– http://www-03.ibm.com/systmes/i/advantages/integratedserver/ixa/ servermodels/index.html
• Retains features and value of Integrated xSeries server
– Uses IBM i storage consolidation and systems management
– Has processors, memory, and ServerProven adapters but no disk drives
• Complementary application support
• Server consolidation

© Copyright IBM Corporation 2012

Figure 9-74. IXA xSeries adapter: Disk access OL1914.1

Notes:
The Integrated xSeries Server extends IBM Power Systems with IBM i integration with
Windows server to IBM xSeries high-performance Intel servers for companies with core
applications running on the IBM Power System with IBM i and complementary applications
running on Windows server and for companies looking to consolidate their Windows
servers.
A PCI-based Integrated xSeries Adapter is placed in the xSeries server to connect to the
IBM Power System with IBM i through the High-Speed Link. The IXA provides the power
control for the server and also links the xSeries server to disks in the IBM Power System
with IBM i.
Which xSeries server can attach to an IBM Power System with IBM i, is based on which
server within the IBM Power Systems with IBM i family of you have installed. The xSeries
server is a standard model containing processors, memory, and ServerProven adapters
but no disk drives. All the disks for the xSeries server are housed in the IBM Power System
with IBM i and managed in the same way as for the current Integrated xSeries server

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

models. All the current storage management and other integration features of the current
Integrated xSeries server are maintained.
The Integrated xSeries Adapter connection interfaces directly with the xSeries’ service
processor. The integration provided between IBM Power Systems with IBM i and direct
attach xSeries servers is an IBM technology initiative and is not designed to support OEM
Intel servers.
Key opportunities for the IXA include:
• Server consolidation: Consolidating multiple Windows servers with IBM Power
Systems with IBM i storage, server, and user management
• Complementary application support: Application requires IBM i and Windows
servers
Notes: Why direct attach offering?
We are offering the Integrated xSeries Adapter that supports the direct attachment of
selected xSeries servers to offer enhanced:
• Scalability: The IXA supports xSeries servers with up to four processors. These
servers are able to support larger workloads and more users than the one processor
Integrated xSeries Server.
• Availability of PCI slots: Since the direct attach xSeries server is a standard, the
xSeries server has PCI slots available for the customer to use. Some customers use
these slots to attach devices like CD-ROM towers and modem towers. The Integrated
xSeries Server does not have PCI slots.
• Performance currency: The IXA is installed in standard xSeries servers. As these
servers offer faster processors (for example, 550, to 700, to 900 MHz) we are able to
connect these servers to IBM Power Systems with IBM i with little to no development
work. As IBM introduces new xSeries servers, Rochester tests them with the IXA and
announces which models are supported. The IBM Power System with IBM i web site at
http://www-03.ibm.com/systems/i/advantages/integratedserver/ includes a list of the
xSeries servers we have tested and support. The Integrated xSeries Server is a product
that is specifically designed by Rochester to fit inside the IBM Power System with IBM i.
It takes time and resources to develop a faster version of the IXS.
• Leverage xSeries marketing, channels, and development: The xSeries servers are
offered by the standard xSeries channels at normal prices. As a result, the IXA offering
leverages xSeries marketing, channels, and development.
Notes: Planning considerations
The maximum number of xSeries servers that can be directly attached to IBM Power
Systems with IBM i depends on the model of the IBM Power System with IBM i.
The actual number of xSeries servers that can be attached to an IBM Power System with
IBM i and offer a good performing environment depends on many factors, including:
• How busy the IBM Power Systems with IBM i server are

9-110 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • The speed and quantity of the xSeries servers


• What type of applications will run on the xSeries server
• How many other components are on the HSL loop and the workload they are driving on
the loop
Planning considerations for the amount of CPW used by a directly attached xSeries server,
the impacts to the disk subsystem, and the impacts to the HSL loop are published on the
IBM Power Systems with IBM i Windows integration web site:
http://www-03.ibm.com/systems/i/advantages/integratedserver/.
HSL connection
• xSeries servers do not impact the number of I/O towers supported on an HSL loop.
• It is recommended that the xSeries server is installed on a separate HSL loop if one is
available. If not, install the xSeries server in the middle (behind I/O towers), if possible,
on HSL loops.
• With HSL OptiConnect and Independent ASPs, the switchable tower must be adjacent
to a tower owned by the alternate CEC.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Shared devices
IBM i

Devices on IBM Power


System with IBM i

DASD

IBM Power
System with
Tape drive
IBM i

CD-ROM drive xSeries

© Copyright IBM Corporation 2012

Figure 9-75. Shared devices OL1914.1

Notes:
One advantage to using Windows servers on one or more Integrated xSeries Servers is the
ability to use IBM Power System IBM i devices. You can use IBM Power Systems with IBM
i optical drives, tape drives, and printers from your Windows server.

9-112 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i SAN for
Windows servers
IBM i

Windows servers

• IBM Power Systems with IBM i SAN for multiple Windows servers.
– SAN: Storage, fabric, and management
• Consolidation provides simplified management.
• Consistent hardware and device drivers can improve Windows stability.

© Copyright IBM Corporation 2012

Figure 9-76. IBM Power Systems with IBM i SAN for Windows servers OL1914.1

Notes:
The IBM Power Systems with IBM i are the only systems in the world that have an
automated storage management system. The IBM Power Systems with IBM i customers do
not employ storage specialists. Optimized arm utilization, caching, paging, data placement,
and RAS are an implicit part of IBM i. Single Level store means that main store and disk are
a logical continuum. Main store is literally the cache for the disk, and therefore, from the
beginning, it has been the business of the storage management system to manage the
retrieval and location of data between main store and disk in a manner that continually
optimizes system performance on the fly.
Today, SAN vendors are selling such functions as disk striping for better arm utilization.
This has always been an inherent part of the IBM Power System with IBM i storage
management architecture. There is the expert cache which monitors logical to physical I/O
and takes advantage of the ubiquitous logical address space activity in concert with the
physical data access activity to dynamically optimize the retrieval and retention of data
from a disk in a main store based on current and future temporal and spatial data and
address locality. Bottom line, the IBM Power System with IBM i invented the automatic
transmission of storage and has been optimizing it for over a decade.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The IBM Power System with IBM i can be used to provide a flexible storage area network
(SAN) to consolidate the disk requirements of multiple Windows servers. While full
Windows storage capability is maintained, the IBM Power System with IBM i provides the
value of its advanced storage management facilities and reliability.
IBM Power Systems with IBM i disk storage is allocated to Windows by creating a storage
space object or virtual disk space from the IBM Power System with BM i pool of disk
resources. Up to 32 storage spaces can be created and linked to each Integrated xSeries
server or direct attached server through the IXA. Each storage space can be between 1 MB
and 64 GB in size (up to V5R2) or up to 1 TB starting with V5R3, for a maximum of up to 2
TB per server. Multiple storage spaces can be linked together using a volume set using the
Windows disk administrator utility. By using IBM Power System with IBM i disks, Windows
server files are protected by the IBM Power System with IBM i RAID-5 / RAID-6 and
mirroring. Windows storage spaces can either be located in the IBM Power System with
IBM i disk pool, or separated from IBM Power System with IBM i applications and data on
specific drives in a user auxiliary storage pool.
The IBM Power System with IBM i disk provides the storage, the HSL and bus connections
provide the fabric, and IBM i provides the management for the IBM Power System with IBM
i storage area network. IBM Systems Director Navigator for i provides one management
environment to back up and restore IBM i and Windows objects.
Consistent hardware device drivers for IBM Power Systems with BM i disk, tape, and LAN
adapters can improve the stability of Windows servers. Stability is enhanced since IBM
tests the combinations of these device drivers working with Windows and IBM i. With
standard PC servers and the 100s of possible devices, it is impossible to test all the various
combinations that a customer might implement.
Hot spare can offer protection from planned and unplanned outages of the directly attached
xSeries servers or the Integrated xSeries servers.

9-114 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Microsoft Cluster Service


IBM i

• Shared drive cluster


– Dynamically switch storage spaces C
Microsoft
between Windows servers D Cluster C

– Up to four IXS or IXA server nodes D


IXS or IXA
File
per cluster IXS or IXA
Web
– Sixteen new 1 MB to 64 GB shared
Mail
storage spaces IXS or IXA
DB
• Availability improvements IXS or IXA
App C
– Planned or unplanned outages C 1-16 shared D
• Requirements D storage spaces

– Windows 2000 Advanced Server for IBM i


two-node support
– Microsoft .Net Enterprise for four-
node support*
* Planned for fourth quarter 2002, dependent on Microsoft delivery
© Copyright IBM Corporation 2012

Figure 9-77. Microsoft Cluster Service OL1914.1

Notes:
Support for installing and configuring the Windows Cluster Service on the IBM Power
System with IBM i Integrated Windows servers was added in V5R2.
Windows 2000 Advanced Server supports a two-node cluster while Windows.NET
Enterprise Server supports four-node clusters. Datacenter versions of Windows are not
supported.
The Integrated Windows Server solution uses a virtual Fibre Channel bus to share the
virtual disk devices between the nodes of a cluster.
In addition, the new support for Virtual Ethernet enables high-performance; secure
communication for the internal node-to-node communication between clustered nodes.
Availability Improvements: Planned or unplanned outages can be handled by this support.
Support is available only for Windows servers that have an Integrated xSeries Server or
Adapter with a resource type of 2890, 2892, or 2689; running either Windows 2000
Advanced Server or Windows.NET Enterprise Server.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Environment flexibility
IBM i

• One IXS/IXA can quickly support


different operating environments.
– Test Windows service packs during non-
production times.
Storage space
– Test different Windows server products. Windows Server
– Give developers their own server for off NWSD
hours work.
– Test an application in a number of Windows
NWSD
environments. Server SP n-1
– Recover a failed server. Windows
NWSD Server

Windows Server
NWSD SP n

NWSD: Network server description

© Copyright IBM Corporation 2012

Figure 9-78. Environment flexibility OL1914.1

Notes:
One IXS/IXA can quickly support different operating environments by the use of different
network storage spaces. You just link the one you need to:
• Test Windows service packs during non-production times
• Test different Windows server products
• Give developers their own server for off-hours work
• Test an application in a number of environments
• Recover a failed server

9-116 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Hot spare
IBM i

• This is the solution for planned and unplanned xSeries server outages.
• Link NWSD to hot spare.
– IXS/IXA
• Boot Windows server.
• xSeries servers need to have the same configuration.
One IXS/IXA can be a
hot spare backup.
Windows Server
NWSD

Windows
NWSD
Server

Windows
NWSD Server SPn

© Copyright IBM Corporation 2012

Figure 9-79. Hot spare OL1914.1

Notes:
In order for Windows server to recognize disk drives (network server storage spaces), you
must link them to your network server description (NWSD). You must create a disk drive
before you can link it. After you create and link a new disk drive, it appears as a new hard
drive on Windows server. It must be formatted before you can use it.
Imagine a recovery scenario where a server fails and you unlink its network storage space
and link it to another server. If you have the Windows server hardware standing by for this
scenario, it is considered a hot spare. You can have it available for any of your other
servers in case of their failure.
The hot spare server needs to have the same configuration as the server it is intended to
replace.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solution for planned and unplanned IBM Power


Systems with IBM i server outages
IBM i

A Disk tower B
IASP
storage
HSL loop spaces HSL loop

Windows
server #1
NWSD
Integrated C:,D:,E:,F: Integrated
NWSD
xSeries xSeries
server Windows server
server #2
C:,D:,E:,F: NWSD
NWSD
Windows, applications, and data

• Support for Windows disks in independent ASP


– Server A is running with IXS A and direct attached xSeries server A.
– Take IBM Power System with IBM i A offline. The disk tower switches to IBM Power-
based servers running IBM i B. Manually link NWSDs to B resource names; then reboot
Windows servers. Windows servers are back online on B.
– xSeries servers need to have the same configuration.
© Copyright IBM Corporation 2012

Figure 9-80. Solution for planned and unplanned IBM Power Systems with IBM i server outages OL1914.1

Notes:
Support for Windows disks in Independent ASP is incorporated in the product. You can
create your network storage spaces in IASPs and recover them as follows:
• Server A is running with IXS A and direct attached xSeries server A.
• Take IBM Power System with IBM i A offline. The disk tower switches to IBM Power
System with IBM i B. Manually link NWSDs to B resource names, then reboot Windows
servers. Windows servers are back online on B.
• xSeries servers need to have the same configuration.

9-118 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

For more information


IBM i

• IBM Power System with IBM i Windows Integration web site:


– http://www-03.ibm.com/systems/i/advantages/integratedserver/
• Product information
• Service information (PTFs)
• Library
• IBM Power System with IBM i InfoCenter:
– http://publib.boulder.ibm.com/eserver/ibmi.html
• Articles on Windows Servers on the IXS/IXA
• Select: Network Operating Systems....Windows server on IBM Power Systems
with IBM i
• Redbooks: www.redbooks.ibm.com
– SG24-6056: Consolidating Windows 2000 Servers in iSeries
– SG24-6222: Direct Attach xSeries for the IBM eServer iSeries Server: A Guide to
Implementing xSeries Servers in iSeries
– SG24-2164: AS/400 - Implementing Windows NT on the Integrated Netfinity
Server

© Copyright IBM Corporation 2012

Figure 9-81. For more information OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 5: Additional topics

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 9-82. Topic 5: Additional topics OL1914.1

Notes:

9-120 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Alternate installation device


IBM i

• Without
– Installation and recovery from the devices attached to the first system
bus (connected to service processor IOP)
• With
– Installation and recovery from devices attached to the first system
bus, only enough LIC to perform an IPL with IPL-type D
– Continues using media in an alternate installation device, such as:
• SAVSYS tapes
• User-created distribution tapes with LIC and possibly operating system,
licensed programs, and data
– Might improve performance

© Copyright IBM Corporation 2012

Figure 9-83. Alternate installation device OL1914.1

Notes:
Previously, installation and recovery operations were only supported from the first system
bus which is connected to the server processor IOP. Alternate Device Installation allows
the use of a combination of devices supported from the first system bus and on additional
buses. It supports installation and recovery from tape media, such as SAVSYS tapes or
distribution tapes you created that contain Licensed Internal Code, and may contain the
operating system, licensed programs, and data.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Uninterruptible power supply


IBM i

• Benefits
– Continue operations during brief
power interruption
– Provide orderly shutdown and
avoid lengthy recovery (IPL)

12
11 1
10 2
9 3
8 4
7 5
6

Without:
Objects might be damaged; recovery
time might be significant.

© Copyright IBM Corporation 2012

Figure 9-84. Uninterruptible power supply OL1914.1

Notes:
The loss of system utility power can cause major problems for an IBM Power System with
IBM i. If the IBM Power System with IBM i is not protected against the loss of power and
power is lost, the IBM Power System with IBM i immediately shuts down (abnormal
shutdown), resulting in the loss of the contents of main memory, possible damaged objects,
and significantly increasing the amount of time required for an IPL. The system may
attempt to automatically restart and reconstruct information after power is returned,
depending upon how the QPWRRSTIPL system value is set.
Continuously Powered Main store and an uninterruptible power supply (UPS) can help
prevent the occurrence of an abnormal shutdown.
• The Continuously Powered Main store (CPM) feature is available on certain IBM Power
Systems with IBM i. CPM is part of the System Power control Network (SPCN) feature.
Once a power loss is detected, the Battery Backup Unit (BBU) provides power to the
system for a brief 30 seconds. If power has not been restored, after the initial 30
seconds, the BBU supplies another 90 seconds of power to allow the CPM feature to
become enabled. Once CPM has been enabled, the system automatically performs a

9-122 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty controlled shutdown with the BBU providing enough power to maintain the contents of
main memory for up to 48 hours. Once the power is restored, the contents of main
memory will be written to auxiliary storage and the system performs an IPL.
• The UPS feature provides a source of power for the IBM Power System with IBM i if
utility power is interrupted. It allows for continuous operations during brief power
interruptions and permits a controlled shutdown of the system for longer power
interruptions. The capacity of a UPS should be sized to meet the system requirements.
Power is not normally supplied to devices such as workstations. Applications can be
programmed to recognized this situation and end in an orderly fashion.
The UPS and CPM features can be used in conjunction with each other. For example, if the
UPS falls below a specific level of charge, a weak battery condition signal is sent from the
UPS. A typical setting for the weak battery condition signal is when there is only two
minutes of power remaining. If this signal is received prior to the value specified in the
QUPSDLYTIM system value, the system automatically enters the CPM mode.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

UPS: System values


IBM i

QUPSMSGQ QUPSDLYTIM QPWRRSTIPL

QSYSOPR *CALC '1'

The system If utility power is


determines restored, should
when to save the system
main storage automatically
Messages and power
related to IPL?
down.
uninterruptible
power supply

QSYSOPR Power System with


message Timer IBM i
queue

© Copyright IBM Corporation 2012

Figure 9-85. UPS: System values OL1914.1

Notes:
QPWRRSTIPL, Power Restore IPL system value, controls what happens if the system ends
when utility power is interrupted and then restored at a later time.
• 0 does not allow an automatic IPL after a power failure.
• 1 does an automatic IPL after a power failure.
The default is 0.
QUPSDLYTIM, Uninterruptible Power Supply Delay Time system value, controls the length
of time that the system waits before saving main storage and powering the system down. If
utility power is restored prior to the delay time, the system resets the times. If the delay time
is exceeded, the system saves main storage and begins to perform a controlled shutdown.
• *BASIC or *CALC Performs a controlled shutdown after the default 45 seconds.
• 0 - 99999 specifies a delay time in seconds before the system powers down.
• *NOMAX is used when a user supplied program is controlling the system or a generator
is providing unlimited UPS power.

9-124 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty QUPSMSGQ, Uninterruptible Power Supply Message Queue system value, determines the
message queues the power supply message are sent to. Messages generated are sent to
the specified message queues in addition to the QSYSOPR message queue.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

UPS: When power fails


IBM i

• The UPS/battery power is


used.
• The system checks
QUPSDLYTIM QUPSMSGQ.
• The operator or program
executes PWRDWNSYS.
180
• At QUPSDLYTIM, the IBM Special
Power System with IBM i
initiates QUICK POWER
DOWN.

© Copyright IBM Corporation 2012

Figure 9-86. UPS: When power fails OL1914.1

Notes:

9-126 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

UPS: Time line of QUPSDLYTIM function


IBM i

Utility power
goes off

Time UPS can run


Actions by operator
or program:

Save of
Safety
Run PWRDWNSYS margin main storage Safety
controlled margin
shutdown
QUPSDLYTIM

Time

UPS active QUPSDLYTIM Controlled shutdown


time-out completes

© Copyright IBM Corporation 2012

Figure 9-87. UPS: Time line of QUPSDLYTIM function OL1914.1

Notes:
Worst case calculation for time to save storage and shut down the system:
(2.816 *(ms size in MB)) + 30 = # of seconds
There are basically two power failure scenarios:
• Power failure with UPS - When the system detects a power failure, the UPS provides
the system utility power until power is restored, an operator or program issues a
PWRDWNSYS or a controlled shutdown is initiated. The UPS can be powered by a
generator or by batteries. Backup power from a generator is the most desirable as it
provides virtually unlimited power, as long as it stays running.
• Power failure with no power protection - If the system does not have a UPS, the system
will stop immediately, resulting in the loss of the contents of main memory, possible
damaged objects, and significantly longer IPL on restart.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

UPS: Power loss controlled shutdown


IBM i

• Utility power lost


• UPS and QUPSDLYTIM expires
• Jobs signaled to end at next instruction boundary
• Main storage written to disk (while running on UPS)
• System powered off
• Utility power returns
• IPL is normal for LIC, abnormal for IBM i

© Copyright IBM Corporation 2012

Figure 9-88. UPS: Power loss controlled shutdown OL1914.1

Notes:
Usually a job reaches the next instruction boundary shortly. However, some long-running
instructions, such as those that build access paths or create programs, may not complete
in the time that is allowed.
If unsuccessful, the next IPL is abnormal for the LIC.

9-128 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

UPS: Power handling program


IBM i

• Must allocate message queue in QUPSMSGQ


• Can operate under uninterruptible power supply
• Take actions:
– Send messages to users.
– End batch jobs and subsystems.
– Change system values.
– Issue PWRDWNSYS before the system goes into a power loss controlled
shutdown.

© Copyright IBM Corporation 2012

Figure 9-89. UPS: Power handling program OL1914.1

Notes:
Additionally, in some cases, users may prefer to customize how their IBM Power System
with IBM i is shutdown. In these instances, a Power-handling program may be used to
control system activity during a power interruption when used in conjunction with a power
protection device (UPS or generator). A power-handling program allows:
• Sending specific messages to interactive users
• Pending batch jobs and subsystems in preparation for powering down
• Dynamically changing the system values that control the uninterruptible power supply
handling
• Issuing the PWRDWNSYS command to power down the system
For more information on power-handling programs, suggest that students review the
information available on the IBM Power Systems with IBM i Information Center under the
Availability subsection of Systems Management, titled control Server Shutdown.

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Availability: Dual systems


IBM i

• For installations with high-availability requirements: Redundant


systems, redundant data
• Requires two systems: One primary, and one backup
• Database changes sent to backup system through the journal
receiver
• User program updates backup database from the journal
receiver

© Copyright IBM Corporation 2012

Figure 9-90. Availability: Dual systems OL1914.1

Notes:
Dual systems are intended for installations with high-availability requirements. This
involves maintaining some or all data on two systems. This allows the secondary (backup)
system to take over critical applications if the primary system fails.
There are several methods commonly used to maintain the data on both systems. Journal
entries from the primary system are transmitted to the secondary system. A user-written
program then receives the journal entries and uses them to update the files and other
journal objects. Another method is to make use of remote journaling support which enables
the primary system to send the journal entries to a duplicate journal receiver on the
secondary system. A third common method is to copy the journals from the primary system
to tape and load them on the secondary system. A user-written program then updates the
files on the secondary system.

9-130 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (1 of 3)
IBM i

1. True or False: Whenever there is a disk failure on the system, this will
force a full recovery of all data.

2. Which of the following is a hardware availability function designed to


protect data from loss due to two disk unit failures or because of
damage to two disks?
a. RAID 5
b. RAID 6
c. Mirroring
d. Concurrent maintenance support

3. Which of the following provides a means to save an object while the


system remains active and users are working with the data?
a. Parallel save
b. Save of all user data
c. Save changed objects
d. Save-while-active

© Copyright IBM Corporation 2012

Figure 9-91. Checkpoint (1 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-131
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (2 of 3)
IBM i
4. The maximum number of partitions supported on POWER4-based hardware is _____.
The maximum number of partitions supported on POWER5 and POWER6-based hardware is ____ .
The maximum number of partitions supported on POWER7-based hardware is _____.
a. POWER4 = 32 POWER5 and POWER6 = 254 POWER7=1000
b. POWER4 = 64 POWER5 and POWER6 = 128 POWER7=512
c. POWER4 = 128 POWER5 and POWER6 = 64 POWER7=254
d. POWER4 = 254 POWER5 and POWER6 = 32 POWER7=128
e. POWER4, 5, and 6 support the same number of partitions, but POWER7 supports 1000.

5. Which of the following are resources that can be allocated to an LPAR? Select all that apply.
a. Only whole processors
b. Memory
c. I/O adapters
d. Disk drives
e. Operating system software

6. Which of the following is not supported in an IBM Power System with IBM i partition?
a. AIX
b. Linux
c. IBM i
d. Windows server software

© Copyright IBM Corporation 2012

Figure 9-92. Checkpoint (2 of 3) OL1914.1

Notes:

9-132 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (3 of 3)
IBM i
7. True or False: Each LPAR requires a separate license from IBM for the OS installed in that LPAR.

8. Which of the following is one of the supported type of clusters that can be set up?
a. Separate servers
b. Switchable DASD
c. Cross site mirrors
d. System storage copy services
e. Hot site immediate switchover

9. A ____ is a system or partition that is in a cluster.


a. Separate server
b. Switchable DASD server
c. Cross site mirror
d. Cluster node

10. Which of the following cannot be shared on an IBM Power System with IBM i and
integrated xSeries server?
a. Tape drive
b. DASD
c. Memory
d. CD-ROM drive

© Copyright IBM Corporation 2012

Figure 9-93. Checkpoint (3 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 9. IBM Power Systems with IBM i: Availability overview 9-133
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Explain the concept of availability
• Describe the different types of failures that can occur
• Describe hardware and software availability features
• Explain the concept of logical partitioning (LPAR)
• List some of the reasons to implement LPAR
• Explain the functions served by a Hardware Management Console
(HMC)
• Explain the concept of clustering
• List the different types of clustering that can be implemented
• Explain the different ways an xSeries can be integrated with the IBM
Power System with IBM i
• Describe the consequences for a company if the IBM Power System
with IBM i are not available to perform normal business

© Copyright IBM Corporation 2012

Figure 9-94. Unit summary OL1914.1

Notes:

9-134 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 10. Disk management

What this unit is about


As the amount of disk increases, so does the potential for a disk
failure. To reduce or prevent system recovery time, the IBM Power
System with IBM i provides you with the ability to manage the
resources on disk.

What you should be able to do


After completing this unit, you should be able to:
• Explain the concept of disk pools
• List the different types of auxiliary storage pools (ASPs) that can be
configured
• Explain some of the benefits of implementing the different types of
ASPs
• Explain the concepts of device parity and mirrored protection
• Explain the difference between RAID-5 and RAID-6 protection
• Describe the different levels at which mirrored protection can be
implemented
• Describe how to find the correct procedure for disk configuration
and recovery
• Describe the disk unit functions of IBM i Navigator
• Describe the effects of an abnormal system end and the recovery
procedure

How you will check your progress


• Checkpoint questions

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Explain the concept of disk pools
• List the different types of auxiliary storage pools (ASPs) that can be
configured
• Explain some of the benefits of implementing the different types of ASPs
• Explain the concepts of device parity and mirrored protection
• Explain the difference between RAID-5 and RAID-6 protection
• Describe the different levels at which mirrored protection can be
implemented
• Describe how to find the correct procedure for disk configuration and
recovery
• Describe the disk unit functions of IBM i Navigator
• Describe the effects of an abnormal system end and the recovery
procedure

© Copyright IBM Corporation 2012

Figure 10-1. Unit objectives OL1914.1

Notes:

10-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Concepts and overview of


auxiliary storage pools

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 10-2. Topic 1: Concepts and overview of auxiliary storage pools OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Types of disk pools (1 of 2)


IBM i

System User

Basic Independent

Secondary
Secondary UDFS

Primary

© Copyright IBM Corporation 2012

Figure 10-3. Types of disk pools (1 of 2) OL1914.1

Notes:
A disk pool, also referred to as an auxiliary storage pool (ASP), is a software definition of a
group of disk units on your system. This means that a disk pool does not necessarily
correspond to the physical arrangement of disks. Conceptually, each disk pool on your IBM
Power System with IBM i is a separate pool of disk units for single-level storage. The
system spreads data across the disk units within a disk pool. If a disk failure occurs, you
need to recover only the data in the disk pool that contained the failed unit.
There are two main categories of disk pools: the system disk pool and user disk pools.
There are two types of user disk pools: basic and independent. Independent disk pools are
further divided into primary, secondary, and UDFS disk pools.

10-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Types of disk pools (2 of 2)


IBM i

• System ASP
– ASP# 1
– IBM i operating system
• Basic
– ASP# 2-32
– Also known as user or dependent ASPs
• Independent (IASP)
– ASP# 33-255
– User-defined file system (UDFS) (V5R1)
– Primary (QSYS.LIB objects) (V5R2 and up)
• Secondary
• Disk pool, IASP, and database can be used interchangeably

© Copyright IBM Corporation 2012

Figure 10-4. Types of disk pools (2 of 2) OL1914.1

Notes:
System disk pool
The system automatically creates the system disk pool (disk pool one) which contains disk
unit one and all other configured disks that are not assigned to a user disk pool. The
system disk pool contains all system objects for the IBM i licensed program and all user
objects that are not assigned to a basic or independent disk pool.

Note

You can have disk units that are attached to your system but are not configured and are not
being used. These are called nonconfigured disk units.

User disk pools


You can create a user disk pool by grouping a set of disk units together and assigning that
group to a disk pool. User disk pools can contain libraries, documents, and certain types of

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

objects. User disk pools exist in two forms: basic disk pools and independent disk pools. In
a clustered environment independent disk pools can be switched between systems without
having to perform an IPL, allowing for continuously available data.
Basic disk pools
A basic disk pool is used to isolate some objects from the other objects that are stored in
the system disk pool. Basic disk pools are defined by the user. Data in a basic user pool is
always accessible whenever the server is up and running. You can configure basic disk
pools with numbers two through 32.
Independent disk pool
The terms independent auxiliary storage pool (ASP) and independent disk pool are
synonymous. An independent disk pool is a collection of disk units that can be brought
online or taken offline independent of the rest of the storage on a system, including the
system disk pool, basic user disk pools, and other independent disk pools. You can
configure independent disk pools with numbers 33 through 255. An independent disk pool
can be either of the following:
• Switchable among multiple systems in a clustered environment
• Privately connected to a single system
The benefits, in both multisystem clustered environments and single-system environments,
can be significant. For example, in a clustered environment, the use of independent disk
pools can provide disk storage that is switchable amongst servers in the cluster, providing
continuous availability of resources. In a single-system environment, independent disk
pools could be used to isolate infrequently used data that does not always need to be
present when the IBM Power System with IBM i is operational.
Contrast basic and independent disk pools
Basic disk pools and independent disk pools, also called auxiliary storage pools (ASPs),
are both useful to group disk units containing certain information together; however, they
have some inherent differences:
• When the server IPLs, all of the disk units configured to a basic disk pool must be
accounted in order for the server to continue the IPL. Independent disk pools are not
included in the IPL. When you vary on the independent disk pool, the node then verifies
that all disk units are present.
• When an unprotected disk unit in a disk pool fails, it typically stops all normal
processing on the server until it can be repaired. The total loss of a disk unit in a basic
disk pool requires lengthy recovery procedures to restore the lost data before the server
can IPL and resume normal operations.
• The data in a basic disk pool belongs to the attaching node and can only be directly
accessed by that system. In an independent disk pool, the data does not belong to the
node, but it belongs to the independent disk pool. You can share the data in the
independent disk pool between nodes in a cluster by varying it off of one node and
varying it on to another node.

10-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • When you create a basic disk pool, you assign the disk pool a number. When you
create an independent disk pool, you name the disk pool and the system assigns a
number.
• If a basic disk pool fills up, it can overflow excess data into the system disk pool.
Independent disk pools cannot overflow. If they did, they would lose their
independence. When the independent disk pool nears its threshold, you need to add
more disk units or delete objects to create more storage space.
• When you make restricted changes to disk configuration in a basic disk pool, you must
have your server restarted to Dedicated Service Tools (DST). In an offline independent
disk pool, you do not have to have your server in DST mode to start or stop mirroring,
start device parity protection, start compression, remove a disk unit, and so on.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk pool groups


IBM i

• Made up of:
– A primary disk pool
The system database is
– Zero or more secondary disk pools referred to as *SYSBAS.
• Groups logically connect disk System ASP
pools
– Vary them on and off together
Basic 2-32 iASP# 33-255
– Switch them together
• Share the same database
– Similar as system ASP and basic Pool groups for multiple databases
ASPs UDFS
– For example:
• Primary independent ASP for libraries Primary Primary Primary
and database files
• Secondary independent ASP for
journals and journal receivers Secondary Secondary

• Do not overflow
– If a disk pool fills, no more data can
Secondary
be added, but the system keeps
running.

© Copyright IBM Corporation 2012

Figure 10-5. Disk pool groups OL1914.1

Notes:
Independent disk pools may be grouped together. The disk pool group will have a primary
disk pool and zero or more secondary disk pools. Disk pools in a disk pool group:
• Function as a single entity
• Are varied on and off together
• Are treated as a single high availability resource by cluster resource services.
The objects in a disk pool group also share a single data base which by default, has the
same name as the primary disk pool.
Probably the most common usage of a disk pool group is to provide a primary disk pool for
data and secondary disk pool for journal receivers.
Finally, unlike basic disk pools, independent disk pools do not overflow. Secondary disk
pools will not overflow to a primary disk pool, and a primary disk pool will not overflow to the
system ASP.

10-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System auxiliary storage pool


IBM i

Logically one container


SYSTEM ASP (ASP1)

Customer Master file


• Disk failure
– What is lost?
– What needs to be restored?
– How long will it take?
© Copyright IBM Corporation 2012

Figure 10-6. System auxiliary storage pool OL1914.1

Notes:
Protection from disk drive failure does not mean prevention of disk drive failure.
Remember that a disk drive is a spinning mechanical piece of equipment, and is subject to
failure. Sometimes, warnings are given (for example, noise, data error reads and writes,
error logs, and so forth), but other times the disk unit fails without any warning.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

ASP benefits
IBM i

• Data protection
– Isolate effects of a disk failure

• Improved performance
– High use objects
– Separate files and journal receivers

• Separate by availability and recovery requirements


– Different disk protection techniques by ASP
– Different target recovery times for recovering access paths

© Copyright IBM Corporation 2012

Figure 10-7. ASP benefits OL1914.1

Notes:
User ASPs can improve performance when extensive journaling operations are off-loaded
to user ASPs.
Journaling operations work most productively if active journal receivers can be placed in
separate user ASPs to reduce disk contention.

10-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System ASP (ASP1)


IBM i

• Automatically created
• Load source (unit one) and all units not in user ASPs
• System objects and objects not in user ASPs
• Abnormal end if full
– Threshold percent: QSYSOPR Message
– QSTGLOWLMT: Low limit of available storage
– QSTGLOWACN: Action when QSTGLOWLMT reached
• QSYSOPR message or critical message
• Call registered (ADDEXITPGM) exit programs
• ENDSYS or PWRDWNSYS
• If ASP1 lost, addressability of objects in user ASPs lost
– RCLSTG or restore entire system
– If RCLSTG, QDFTOWN will own all objects

© Copyright IBM Corporation 2012

Figure 10-8. System ASP (ASP1) OL1914.1

Notes:
QSTGLOWLMT
The auxiliary storage lower limit specifies the percent of available storage remaining in the
system ASP when the auxiliary storage lower limit is reached. The QSTGLOWACN system
value specifies the action associated with this limit. The percent of storage currently used in
the system ASP is viewed with the Work with System Status (WRKSYSSTS) command.
*ALLOBJ and *SECADM special authorities are required to change the system value
QSTGLOWLMT.
A change to this system value takes effect immediately. The shipped value is 5.
Lower limit
0 - 100
Specify the percentage of storage to remain available.
QSTGLOWACN

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The auxiliary storage lower limit action specifies the action to take when the available
storage in the system ASP is below the lower limit for auxiliary storage.
*ALLOBJ and *SECADM special authorities are required to change the QSTGLOWACN system
value.
A change to this system value takes effect immediately. The shipped value is *MSG. See the
Work Management Book, SC41-5306, for additional information if you want to change the
QSTGLOWACN system value.
Action
*MSG
Send message CPI099C to QSYSMSG and QSYSOPR message queue. This message is
also sent for the other actions.
*CRITMSG
Send critical message CPI099B to the user who is specified in the service attribute to
receive critical messages.
*REGFAC
Submit a job to call exit programs registered for the QIBM_QWC_QSTGLOWACN exit
point.
*ENDSYS
End the system to the restricted state.
*PWRDWNSYS
Power down the IBM Power System with IBM i immediately and restart it.

10-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM Power Systems with IBM i Navigator: Storage
System Values
IBM i

© Copyright IBM Corporation 2012

Figure 10-9. IBM Power Systems with IBM i Navigator: Storage System Values OL1914.1

Notes:
Maximum system disk pool usage: Specifies the maximum percent of used storage
allowed in the system disk pool (also known as auxiliary storage pool). If the maximum is
met, the action specified for the When maximum usage is reached system value is taken.
You should know the following about this system value:
Special authority: All object (*ALLOBJ) and security administrator (*SECADM)
Default value: 95%
Changes take effect: Immediately
Lockable: No
System value: QSTGLOWLMT

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

User ASPs (ASP2-ASP32)


IBM i

• Library user ASP (preferred type)


– Library or folder in ASP first
– Most object types allowed

• Non-library user ASP


– Only journals, journal receivers, and save files
– Library in system ASP1

• Overflows to ASP1 if filled up


– Threshold percent: QSYSOPR message
– Protection lost; recovery actions required

© Copyright IBM Corporation 2012

Figure 10-10. User ASPs (ASP2-ASP32) OL1914.1

Notes:
Library user disk pools
Library user disk pools, contain libraries and user-defined file systems (UDFS). IBM
recommends that you use library user disk pools because the recovery steps are easier
than with non-library user disk pools. There are several factors to consider when using
library user disk pools.
Non-library user disk pools
Non-library user disk pools contain journals, journal receivers, and save files whose
libraries are in the system disk pool.
If you are assigning access path recovery times for individual disk pools, you should set the
target recovery time for a non-library user disk pool to *NONE. A non-library user disk pool
cannot contain any database files and cannot, therefore, benefit from system-managed
access-path protection (SMAPP). If you set an access path recovery time for a non-library
user disk pool to a value other than *NONE, this causes the system to do extra work with no

10-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty possible benefit. System-managed access-path protection describes how to set access
path recovery times.
• Refer to the Information Center for specific procedures to manage ASPs (also known as
disk pools).

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Additional ASP considerations


IBM i

• Objects exist within an ASP.


• They are logical group of units, not a physical grouping or
hardware function.
• Additional disk units might be required.
• Should be protected by device parity protection or mirrored
protection.
• Journals and their files must be in the same ASP.
• Physical files and dependent logical files must be in the same
ASP.
• They can contain SQL schemas.
• Configuring and setting threshold requires DST/SST.

© Copyright IBM Corporation 2012

Figure 10-11. Additional ASP considerations OL1914.1

Notes:
An ASP is a logical grouping of disk units, not a physical grouping or a hardware function.

10-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Sample configuration
IBM i

• ASP 1: (System ASP)

• ASP 2: Libraries with save files

• ASP 3: Libraries with journal receivers

• ASP 4: Libraries with database files and journals

• ASP 5: Document library with folders and documents

© Copyright IBM Corporation 2012

Figure 10-12. Sample configuration OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Benefits of independent disk pools


IBM i

• Single-system environment
– Isolate low-use data with ability to bring online only when needed.
– Reduce system start time.
– Manage save/restore by independent disk pool.
– Reclaim storage by independent disk pool.
– Divide data between multiple databases.
– Isolate data associated with specific applications or associated with specific
groups of users.
– Consolidate data on small systems to independent disk pools on a larger system,
for example, in the case of multiple branch offices.
– Perform application maintenance that does not affect entire system.
• Multisystem clustered environment
– Keep data available to an application even in the event of a single system outage,
either scheduled or unscheduled.
– Eliminate the process of replicating data from one system to another.
– In some situations, isolate disk unit failures within the independent disk pool.
– Achieve high availability and scalability.

© Copyright IBM Corporation 2012

Figure 10-13. Benefits of independent disk pools OL1914.1

Notes:
There are two environments in which the use of independent disk pools can be beneficial: a
multi-system clustered environment and a single-system environment.
Single-system environment
In a single-system environment, where an independent disk pool is privately connected to a
single server, independent disk pools can be taken offline, or made unavailable,
independent of other disk pools because the data in the independent disk pool is
self-contained. The independent disk pool can also be brought online or made available
while the IBM Power System with IBM i is active, without having to perform an IPL. Using
independent disk pools this way can be very useful, for example, if you have large amounts
of data that are not needed for normal day-to-day business processing. The independent
disk pool containing this data can be left offline until it is needed. When large amounts of
storage are normally kept offline, you can shorten processing time for operations such as
IPL and reclaim storage.

10-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Multisystem clustered environment


In a multisystem clustered environment, where the servers are members of an IBM Power
Systems with IBM i cluster and an independent disk pool is associated with a switchable
device in that cluster, independent disk pools can be switched between systems without
having to perform an initial program load (IPL). The independent disk pool can be switched
because the independent disk pool is self-contained. This can be a significant advantage
as it allows for continuous availability of data, the primary benefit of independent disk pools.
New V5R3, a multisystem environment also gives you the opportunity to perform
geographic mirroring (cross-site mirroring XSM). Geographic mirroring allows you to
maintain two identical copies of an independent disk pool at two sites that are
geographically separated. By having a second copy of critical data at a remote location,
you ensure greater protection and availability; for example, in the case of a natural disaster.
If you configure the independent disk pools to be switchable, you increase your options to
have more backup nodes to allow for failover and switchover of independent disk pools
between systems at the same site, in addition to switchover and failover to a system at
another site.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IASPs in a single system environment


IBM i

© Copyright IBM Corporation 2012

Figure 10-14. IASPs in a single system environment OL1914.1

Notes:
The graphic above shows an example of multiple databases which reside in independent
disk pools. Here, we have independent disk pools for the Payroll data, Order entry data,
and data for Companies 1, 2, and 3.
In this example, the actual application code could reside in the System ASP or another disk
pool (either a User ASP or another IASP). A typical use of independent disk pools such as
the ones shown in this example, would be for Server Consolidation of multiple branch office
or store systems. Corporate data could reside in the other independent disk pools.
Segmenting your databases in this manner can allow greater control and flexibility.

10-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IASPs in a multisystem environment


IBM i

Server A Server B Server C Server D

Dev CRG Dev CRG


1 1
Dev CRG Dev CRG 2
2

Switchable
towers Drives
Drives Drives
Drives
IASP A4
IASP A1 IASP B3
IASP A2

Device domain

© Copyright IBM Corporation 2012

Figure 10-15. IASPs in a multisystem environment OL1914.1

Notes:
Above is an example of a switchable disk pool which consists of two system units and four
expansion units.
The lower three expansion units are owned by the system unit on the left of the diagram
and the upper expansion unit is owned by the system unit on the right. The lower three
expansion units are switchable disk pools and are normally used by the system on the left.
In the event of an outage, either planned or unplanned, these three expansion units can be
switched to the backup system on the right. This can be done manually in the case of a
planned outage (for example, in the event of a system software upgrade) or automatically
by Cluster Resource Services in the event of an unplanned outage such as a hardware
failure on the system unit.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Concepts and overview of device


parity protection: RAID-5 and RAID-6

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 10-16. Topic 2: Concepts and overview of device parity protection: RAID-5 and RAID-6 OL1914.1

Notes:

10-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Device parity protection (1 of 2)


IBM i

How can I keep the system


running while the drive is being Implement device
replaced and data rebuilt? parity protection
(RAID-5 and
RAID-6).

© Copyright IBM Corporation 2012

Figure 10-17. Device parity protection (1 of 2) OL1914.1

Notes:
RAID - Redundant Array of Independent Disks

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Device parity protection (2 of 2)


IBM i

PS1 PS1 DS1 DS1


DS2 PS2 DS2 DS2
DS3 DS3 PS3 DS3
DS4 DS4 DS4 PS4

Rebuild

PS = Parity sector
DS = Data sector
© Copyright IBM Corporation 2012

Figure 10-18. Device parity protection (2 of 2) OL1914.1

Notes:
One of the earliest forms of protection was check summing. Here is a brief overview.
All the units are in ASP1 and are check summed. If one of the disk units fails, the system
stops with an SRC error code displayed. The failed unit must be replaced. When the IBM
Power System with IBM i is IPLed, the system rebuilds the lost data during storage
management recovery. The advantage of check summing is that the data is not lost if only
one disk unit fails. One of the disadvantages is the system stops if there is a failure in the
set, and there is a performance and resource cost.
RAID-5 Device parity works similarly to check summing and is intended to prevent data
from being lost if a single disk unit failure occurs. RAID-6 will provide protection if two disk
units fail. In many cases, this protection can prevent the system from stopping when a disk
unit fails, and may allow concurrent maintenance.
Device parity protection is a hardware availability function that protects data from being lost
because of a disk unit failure or because of damage to a disk. To protect data, the disk
input/output adapter (IOA) calculates and saves a parity value for each bit of data.

10-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Conceptually, the IOA computes the parity value from the data at the same location on
each of the other disk units in the device parity set.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

RAID-5 and RAID-6


IBM i

RAID-5 RAID-6
One additional disk drive Two additional disk
Protection
per RAID array drives per RAID array

Minimum size array Three disks Four disks

Maximum size
18 disks 18 disks
array
#5709/5726/5727/5728
Supporting disk (CEC), #5703, #2757/5581,
#5737/0648/5776
IOAs #2780/5580, #5737/0648,
#4778, and so forth

Supporting IBM i Lots of releases V5R3 or later

Performance Similar to 5703 running


Known
implication RAID-5

© Copyright IBM Corporation 2012

Figure 10-19. RAID-5 and RAID-6 OL1914.1

Notes:
Device parity protection, like checksum, is a hardware function that protects data from
being lost because of a disk unit failure or damage to a disk. Calculating and saving a parity
value for each bit of data protects data. There are two levels of protection offered, RAID-5
and RAID-6.
RAID-5
RAID-5 protects against the failure of a single disk unit. Logically, the capacity of one disk
unit is dedicated to storing parity data in a parity set. In practice, the parity data is spread
among multiple disk units depending upon the number of disk units in the parity set and the
level of the disk I/O adapter. Internal disk units of different technology (that is, different
feature numbers), but of the same capacity, can be RAID-5 protected.
RAID-6
RAID-6 protects against the failure of two disk units. Logically, the capacity of two disk units
is dedicated to storing parity data. In practice, the parity data is spread among multiple disk

10-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty units. The minimum number of disk units in a parity set is four and the maximum is
eighteen. When a RAID-6 parity set is started, all the disk units contain parity data.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Device parity protection benefits


IBM i

• Lost data is automatically reconstructed after a disk failure.

• System continues to run after one disk failure with RAID-5 or


after up to two disk failures with RAID-6 protection.

• Failed disk units can be replaced without stopping the system.

• It reduces the number of damaged objects when disks fail.

• One or two disk units of capacity stores parity data in parity


set.

© Copyright IBM Corporation 2012

Figure 10-20. Device parity protection benefits OL1914.1

Notes:

10-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Device parity protection on input/output adapters


IBM i

• It provides high availability through device parity protection for disk units
capable of device parity protection.

• When parity is started, the IOAs create parity sets.

• A parity set can only tolerate one or two disk failures.

• Additional disks can be included into a parity set after it is started.

• All devices in a parity set must be the same capacity.

• Starting at V5R2 and later IOA, you have the ability to choose how you
want the parity set to be optimized.

© Copyright IBM Corporation 2012

Figure 10-21. Device parity protection on input/output adapters OL1914.1

Notes:
Beginning with V5R2 IOAs, the minimum number of disk units in a parity set is three; the
maximum number of disk units in the parity set is 18. With IOAs developed prior to V5R2,
the minimum number of disk units in a parity set is four; the maximum number of disk units
in the parity set is 10.
Parity data requires space equal to the size of one disk per device parity set. If a device
parity set is started with four to seven disks, the parity data is spread over four disks. If
eight or more disks are in the device parity set when you start it, the parity data is spread
over eight disks.
You can include additional disks into a device parity set after you start it. You can exclude
disks that do not have parity data from a device parity set without stopping device parity
protection.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Note

If possible, start device parity protection before adding disk units to an auxiliary storage
pool (ASP). This significantly reduces the time it takes to configure the disk unit.

You can optimize according to availability, capacity, performance, or a balanced version. A


parity set optimized for availability offers a greater level of protection because it allows a
parity set to remain functional in the event of a single SCSI bus failure on the IOA. The
parity set is formed from at least three disk units of equal capacity each attached to a
separate bus on the input/output adapter (IOA). If you optimize by capacity, the IOA tends
to create parity sets with a greater number of disk units. You can increase space used for
storing user data, but performance may not be as high. If you optimize for performance, the
IOA tends to create a parity set with fewer disk units. This should contribute to faster read
and write operations, but might also dedicate slightly more disk capacity to storing parity
data.
To change the parity set optimization for all new parity sets that are created, use the
following steps. This change stays in effect until you change it again. If you need to start
parity, you can also change the parity set optimization as part of the start parity process.
1. Expand Disk Units.
2. Right-click Parity Sets and select Change Optimization.

10-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Device parity protection limitations


IBM i

• RAID-5
– Single disk unit failures
• Performance decrease during data reconstruction
– Multiple unit failures (more than one)
• System becomes unusable
• ASP data must be restored
• RAID-6
– Two disk unit failures
• Performance decrease during data reconstruction
– Multiple unit failures (more than two)
• System becomes unusable
• ASP data must be restored
• BUS, IOP, IOA failures
– System outages might result
• Restore operations might take longer
• Might decrease performance
• Not supported for load source attached to a 6502 or 6512 IOP or to
older type units without the high availability option

© Copyright IBM Corporation 2012

Figure 10-22. Device parity protection limitations OL1914.1

Notes:
How device parity protection affects performance
Device parity protection requires extra I/O operations to save the parity data. This could
cause a performance problem. To avoid this problem, some IOPs contain a nonvolatile
write cache that ensures data integrity and provides faster write capability. The IBM Power
System with IBM i is notified that a write operation is complete as soon as a copy of the
data is stored in the write cache. Data is collected in the cache before it gets written to a
disk unit. Because of the cache, performance is generally about the same on protected and
unprotected disk units.
Applications that have many write requests in a short period of time, such as batch
programs, can adversely affect performance. A single disk unit failure can adversely affect
the performance for both read and write operations.
The additional processing that is associated with a disk unit failure in a device parity set
can be significant. The decrease in performance is in effect until both the failed unit is
repaired (or replaced) and the rebuild process is complete. If device parity protection
decreases performance too much, consider using mirrored protection.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk unit failure in a device parity protection configuration


The write-assist device is suspended when a disk unit failure occurs in a subsystem with
device parity protection. If the write-assist fails, it is not used again until the repair operation
is completed. The performance advantage of the write-assist device is lost until the disk
unit is repaired.
The subsystems with device parity protection are considered to be exposed until the
synchronization process completes after replacing the failed disk unit. During the time the
disk is considered exposed, additional I/O operations are required.
Read operations on a failed disk unit
To get the data that was contained on a failed disk unit, device parity protection must read
each disk unit in the device parity set that contains the failed disk unit. Because the read
operations can be overlapped, the performance impact may be small.
Because a failed disk unit with device parity protection may contain only a small portion of
user data, it is possible that only a few users are affected by the decrease in performance.
Write operations on a failed disk unit
The impact of a failed disk on write operations depends on which disk failed and to which
disk data is to be written.
Input-output operations during a rebuild process
I/O operations during the rebuild (synchronization) process of the failed disk unit may not
require additional disk I/O requests. This depends on where the data is read from or written
to on the disk unit that is in the synchronization process. For example:
• A read operation from the disk area that already has been rebuilt requires one read
operation.
• A read operation from the disk area that has not been rebuilt is treated as a read
operation on a failed disk unit. See Read Operations on a Failed Disk Unit, for more
information.
• A write operation to the disk that has already been rebuilt requires normal read and
write operations (two read and two write operations).
• A write operation to the disk area that has not been rebuilt is treated as a write
operation to a failed disk unit. Refer to Write Operations on a Failed Disk Unit, for more
information.

Note

The rebuild process takes longer when read and write operations to a replaced disk unit
are also occurring. Every read request or every write request interrupts the rebuild process
to perform the necessary I/O operations.

10-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Using both device parity protection and mirrored protection


Device parity protection is a hardware function. Auxiliary storage pools and mirrored
protection are software functions. When you add disk units and start device parity
protection, the disk subsystem or IOP is not aware of any software configuration for the
disk units. The software that supports disk protection is aware of which units have device
parity protection.
These rules and considerations apply when mixing device parity protection with mirrored
protection:
• Device parity protection is not implemented on ASP boundaries
• Mirrored protection is implemented on ASP boundaries

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New disk protection


IBM i

RAID-5 RAID-6
plus plus
write cache write cache
RAID-5 protection protection

Good BETTER
Better Best
(but exposed cache)

This protects against single This protects against This protects against two
disk drive failure (per array). single disk drive failure disk drive failures (per
(per array). array).

It also protects against It also protects against


extended outage due to extended outage due to
loss of write cache. loss of write cache.

© Copyright IBM Corporation 2012

Figure 10-23. New disk protection OL1914.1

Notes:
The auxiliary write cache is a level protection against one or two points of failure. Where
RAID-5 protects against a single disk drive failure per array and RAID-6 protects against
two disk drive failures per array, this option protects against the failure of the loss of the
write cache on the disk I/O adapter. By combining the RAID-5 or RAID-6 protection with the
write cache protection, you now have good protection against an extended outage.

10-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 3: Concepts and overview of


mirrored protection

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 10-24. Topic 3: Concepts and overview of mirrored protection OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Mirrored protection: Introduction


IBM i

Is there anything that could


make the system even
more available?
Implement mirrored
protection!

© Copyright IBM Corporation 2012

Figure 10-25. Mirrored protection: Introduction OL1914.1

Notes:
Mirrored protection is a software availability function that protects data from being lost
because of failure or because of damage to a disk-related component. Data is protected
because the system keeps two copies on two separate disk units. When a disk-related
component fails, the system may continue to operate without interruption by using the
mirrored copy of the data until the failed component is repaired.
When you start mirrored protection or add disk units to an ASP that has mirrored
protection, the system creates mirrored pairs using disk units that have identical capacities.
The overall goal is to protect as many disk-related components as possible. To provide
maximum hardware redundancy and protection, the system attempts to pair disk units that
are attached to different input/output adapters, input/output processors, and buses.
If a disk failure occurs, mirrored protection is intended to prevent data from being lost.
Mirrored protection is a software function that uses duplicates of disk-related hardware
components to keep your system available if one of the components fails. It can be used on
any model of the IBM Power Systems with IBM i and is a part of the licensed internal code.

10-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Different levels of mirrored protection are possible, depending on what hardware is
duplicated. You can duplicate:
• Disk units
• Disk I/O adapters
• Disk I/O processors
• A bus

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Mirroring definitions
IBM i

• Without mirroring, one unit equals one actuator

I/O Adapter

Unit 1 Unit 2 Unit 3 Unit 4

• With mirroring one unit equals two actuators (a mirrored pair)

I/O Adapter

Unit 1 Unit 2
© Copyright IBM Corporation 2012

Figure 10-26. Mirroring definitions OL1914.1

Notes:
Mirrored pair: This is two storage units that contain the same data and are referred to by
the system as one unit. A mirrored unit is a storage unit that is half of a mirrored pair.
The system remains available during the failure if a failing component and the hardware
components that are attached to it are duplicated.

10-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Mirrored protection: Benefits and considerations


IBM i

• Benefits
– Disk units (and data) duplicated
– Continue to run, without restore, after disk failure
– Concurrent or deferred maintenance
– Better performance than device parity protection
– Easy and fast to start and stop
• Considerations
– Continue to run after multiple disk failures but not both units in
mirrored pair
– Synchronization after replacing failed disk affects performance
– Possible increased IPL time after abnormal end to synchronize data
– Additional hardware

© Copyright IBM Corporation 2012

Figure 10-27. Mirrored protection: Benefits and considerations OL1914.1

Notes:
Deferred maintenance: Wait until the system can be powered down.
Concurrent maintenance: Replace or repair the failed unit while the IBM Power System
with IBM i is in use (for example, 9406 Models).
Mirrored protection: Benefits
With the best possible mirrored configuration, the system continues to run after a single
disk-related hardware failure. On some system units, the failed hardware can sometimes
be repaired or replaced without having to power down the system. If the failing component
is one that cannot be repaired while the IBM Power System with IBM i is running, such as a
bus or an I/O processor, the system usually continues to run after the failure. Maintenance
can be deferred, the system can be shut down normally, and a long recovery time can be
avoided.
Even if your IBM Power System with IBM i is not a large one, mirrored protection can
provide you valuable protection. A disk or disk-related hardware failure on an unprotected
system leaves your system unusable for several hours. The actual time depends on the

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

kind of failure, the amount of disk storage, your backup strategy, the speed of your tape
unit, and the type and amount of processing the system performs. If you or your business
cannot tolerate this loss of availability, you should consider mirrored protection for your
system, regardless of your system's size.
Mirrored protection: Costs and limitations
The main cost of using mirrored protection is in additional hardware. To achieve high
availability and prevent data loss when a disk unit fails, you need mirrored protection for all
the ASPs. This normally requires twice as many disk units. If you want continuous
operation and prevention of data loss when a disk unit, I/O adapter, or I/O processor fails,
you need duplicate disk I/O adapters and I/O processors. A model upgrade can be done to
get nearly continuous operation and to prevent data loss when any of these failures occur,
as well as the failure of a bus. If bus 1 fails, the system cannot continue to operate.
Because bus failures are rare, and bus-level protection is not significantly greater than I/O
processor-level protection, you may not find a model upgrade to be cost-effective for your
protection needs.
Mirrored protection has a minimal effect on performance. If the buses, I/O processors, and
I/O adapters are more heavily loaded on a system with mirrored protection than they are on
an equivalent system without mirrored protection, then the performance of the two systems
should be approximately the same.
In deciding whether to use mirrored protection on your system, you must evaluate the cost
of potential downtime against the cost of additional hardware, over the life of the system.
The additional cost in performance or system complexity is usually negligible. For
concurrent maintenance and higher availability on systems with mirrored protection, other
disk-related hardware may be required.
Limitations
Although mirrored protection can keep the system available after disk-related hardware
failures occur, it is not a replacement for save procedures. There can be multiple types of
disk-related hardware failures, or disasters (such as flood or sabotage) that require backup
media.
Mirrored protection cannot keep your system available if the remaining storage unit in the
mirrored pair fails before the first failing storage unit is repaired and mirrored protection is
resumed. If two failed storage units are in different mirrored pairs, the IBM Power System
with IBM i is still available and normal mirrored protection recovery is done because the
mirrored pairs are not dependent on each other for recovery. If a second storage unit of the
same mirrored pair fails, the failure may not result in a data loss. If the failure is limited to
the disk electronics, or if the service representative can successfully use the Save Disk Unit
Data function to recover all of the data, no data is lost.
If both storage units in a mirrored pair fail causing data loss, the entire ASP is lost and all
units in the ASP are cleared. You must be prepared to restore your ASP from the backup
media and apply any journal changes.

10-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty When starting the mirrored protection operation, objects that are created on a preferred
unit may be moved to another unit. The preferred unit may no longer exist after mirror
protection is started.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk-level mirrored protection


IBM i

Bus

Input/output
processor

I/O Adapter (IOA)

Disk Disk
unit unit

© Copyright IBM Corporation 2012

Figure 10-28. Disk-level mirrored protection OL1914.1

Notes:
Disk unit-level protection
Mirrored protection always provides disk unit-level protection because the storage units are
duplicated. If your main concern is protection of data and not high availability, then disk
unit-level protection may be adequate. The disk unit is the most likely hardware component
to fail, and disk unit-level protection keeps your system available after a disk unit failure.
Concurrent maintenance is often possible for certain types of disk unit failures with disk
unit-level protection.
Some details about disk-level protection:
• The level of mirrored protection determines whether the system keeps running when
different levels of hardware fail. Mirrored protection always provides disk unit-level
protection which keeps the system available for a single disk unit failure. To keep the
system available for failures of other disk-related hardware requires higher levels of
protection.

10-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • The level of mirrored protection also determines if concurrent maintenance can be done
for different types of failures. Certain types of failures require concurrent maintenance
to diagnose hardware levels above the failing hardware component. For example, to
diagnose a power failure in a disk unit requires resetting the I/O processor to which the
failed disk unit is attached. Therefore, IOP-level protection is required. The higher the
level of mirrored protection, the more often concurrent maintenance is possible.
• The level of protection you get depends upon the hardware you duplicate. If you
duplicate disk units, you will have disk unit-level protection. If you duplicate unit I/O
adapters as well, you have IOA-level protection. If you duplicate input/output
processors, you have IOP-level protection. If you duplicate buses, you have bus-level
protection. Mirrored units will always have at least disk unit-level protection. Because
most internal disk units have the I/O adapter packaged along with the disk unit, they will
have at least IOA-level protection.
• During the start mirrored protection operation, the system pairs the disk units to provide
the maximum level of protection for the system. When disk units are added to a
mirrored ASP, the system pairs only those disk units that are added without rearranging
the existing pairs. The hardware configuration includes both the hardware and how the
hardware is connected.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IOA-level mirrored protection


IBM i

Bus

IOP

I/O Adapter I/O Adapter

Disk Disk
unit unit

© Copyright IBM Corporation 2012

Figure 10-29. IOA-level mirrored protection OL1914.1

Notes:
This visual details the concept of I/O adapter level protection.
IOA-level protection: Determine if you want IOA-level protection based on the following:
• To keep your system available when a IOA fails
• To concurrently repair a failed disk unit or IOA
• To use problem recovery procedures in preparation for isolating a failing item or to verify
a repair action, the I/O adapter must be dedicated to the repair action. If any disk units
that are attached to the IOA do not have IOA-level protection, then this part of
concurrent maintenance is not possible
To achieve IOA-level protection, all disk units must have a mirrored unit attached to a
different IOA. Most internal disk units have their IOA packaged as part of the disk unit, so
internal disk units generally have at least IOA-level protection.

10-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IOP-level mirrored protection


IBM i

Bus

IOP IOP

I/O Adapter I/O Adapter

Disk Disk
unit unit

© Copyright IBM Corporation 2012

Figure 10-30. IOP-level mirrored protection OL1914.1

Notes:
This visual details the concept of IOP (input/output processor) level protection.
Input/Output processor-level protection: Determine if you want IOP-level protection
based on the following:
• To keep your system available when an I/O processor fails
• To keep your system available when the cable attached to the I/O processor fails
• To concurrently repair certain types of disk unit failures or cable failures
For these failures, concurrent maintenance needs to reset the IOP. If any of the disk
units are attached to the IOP, then you do not have IOP level protection. This means
that concurrent maintenance is not possible.
To achieve I/O processor-level protection, all disk units that are attached to an I/O
processor must have a mirrored unit attached to a different I/O processor. On many
systems, I/O processor-level protection is not possible for the mirrored pair for unit 1.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Bus-level mirrored protection


IBM i

Bus1 Bus2

IOP IOP

I/O Adapter I/O Adapter

Disk Disk
unit unit
© Copyright IBM Corporation 2012

Figure 10-31. Bus-level mirrored protection OL1914.1

Notes:
This visual details the concept of bus-level protection.
Bus-level protection: Bus-level protection may allow the system to run when a bus fails.
However, bus-level protection is often not cost-effective because of the following:
• If bus 1 fails, the IBM Power System with IBM i is not usable.
• If a bus fails, disk I/O operations may continue, but so much other hardware is lost, such
as work stations, printers and communication lines, that from a practical standpoint, the
IBM Power System with IBM i is not usable.
• Bus failures are rare compared with other disk-related hardware failures.
• Concurrent maintenance is not possible for bus failures.
To achieve bus-level protection, all disk units that are attached to a bus must have a
mirrored unit attached to a different bus. Bus-level protection is not possible for unit 1.

10-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Remote DASD mirroring


IBM i

• Can mirror LSU, other


DASD, or both Mirror Mirror
• System cannot IPL from DASD LSU SEU
remote bus
• Provides bus-level
protection
• Note: Fiber optics distance Bus 2
limitations apply:
– 500 meters for high speed bus
(1063 Mbps) Remote location
– 200 meters for low speed bus MFIOP
(266 Mbps) Bus 1 SEU

DASD
Bus 3

LSU = Load Source Unit LSU


SEU = System Expansion Unit

© Copyright IBM Corporation 2012

Figure 10-32. Remote DASD mirroring OL1914.1

Notes:
Standard DASD mirroring support requires that both disk units of the load source mirrored
pair (unit 1) are attached to the Multi-function I/O processor (MFIOP). This allows the
system to IPL from either load source in the mirrored pair and allows the system to dump
main storage to either load source if the system ends abnormally. However, since both load
sources must be attached to the same I/O Processor (IOP), the best mirroring protection
possible for the load source mirrored pair is IOA-level protection. To provide a higher level
of protection for your system, you can use remote load source mirroring and remote DASD
mirroring.
Remote DASD mirroring support, when combined with remote load source mirroring,
mirrors the DASD on local optical buses with the DASD on optical buses that terminate at a
remote location. In this configuration, the entire system, including the load source, can be
protected from a site disaster. If the remote site is lost, the system can continue to run on
the DASD at the local site. If the local DASD and system unit are lost, a new system unit
can be attached to the set of DASD at the remote site, and system processing can be
resumed.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Remote DASD mirroring, like standard DASD mirroring, supports mixing


device-parity-protected disk units in the same ASP with mirrored disk units; the device
parity DASD can be located at either the local or the remote site. However, if a site disaster
occurs at the site containing the device parity DASD, all data in the ASPs containing the
device parity DASD is lost.
Remote mirroring support makes it possible to divide the disk units on your IBM Power
System with IBM i into a group of local DASD and a group of remote DASD. The remote
DASD are attached to one set of optical buses and the local DASD to another set of buses.
The local and remote DASD can be physically separated from one another at different sites
by extending the appropriate optical buses to the remote site. The distance between the
sites is restricted by the distance an optical bus may be extended.
Remote load source mirroring
Remote load source mirroring support allows the disk units of the load source to be on
different IOPs or system buses, which provides IOP-level or bus-level mirrored protection
for the load source. However, in such a configuration, the system can only IPL from or
perform a main storage dump to the load source attached to the MFIOP. If the load source
on the MFIOP fails, the system can continue to run on the other disk unit of the load source
mirrored pair, but the IBM Power System with IBM is not able to IPL or perform a main
storage dump until the load source attached to the MFIOP is repaired and usable.
Using remote load source mirroring with local DASD
Remote load source mirroring can be used to achieve IOP-level or bus-level protection of
the load source mirrored pair, even without remote DASD or buses on the system. There is
no special setup required, other than to ensure that a disk unit of the same capacity as the
load source is attached to another IOP or bus on the system. If you want to achieve
bus-level protection of all mirrored pairs in an ASP, you should configure your system so
that no more than one half of the DASD of any given capacity in that ASP are attached to
any single bus. If you want to achieve IOP-level protection of all mirrored pairs in an ASP,
you must have no more than one half of the DASD of any given capacity in the ASP
attached to any single IOP.
After the system hardware is configured correctly, enable remote load source mirroring and
start mirroring for the ASPs you wish to protect. Use the normal start mirroring function.
There is no special start mirroring function for remote load source support. The system
detects that remote load source mirroring is enabled and automatically pairs up disk units
to provide the best level of protection possible. It is not possible to override or influence the
pairing of the disk units other than by changing the way the hardware of the IBM Power
System with IBM i is connected and configured. Normal mirroring restrictions that concern
total ASP capacity, an even number of disk units of each capacity, and such things, apply.

10-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Advantages and disadvantages of remote
mirroring
IBM i

• Advantages
– IOP-level or bus-level protection for the load source
– Protection against site disaster

• Disadvantages
– Only able to IPL from one DASD of the load source mirrored pair
– If IPL load source fails
• Cannot dump main storage
• Cannot use CPM

© Copyright IBM Corporation 2012

Figure 10-33. Advantages and disadvantages of remote mirroring OL1914.1

Notes:
Continuously powered main store (CPM) is a feature on the PowerPC base 9406 Models.
This feature provides power to the main storage cards in the event of an abnormal system
termination. It may help reduce IPL time after a system crash.
Remote DASD mirroring advantages
• Remote DASD mirroring can provide IOP-level or bus-level mirrored protection for the
load source.
• Remote DASD mirroring allows the DASD to be divided between two sites, mirroring
one site to another, to protect against a site disaster.
Remote DASD mirroring disadvantages
• A system that uses remote DASD mirroring is only able to IPL from one DASD of the
load source mirrored pair. If that DASD fails and cannot be repaired concurrently, the
system cannot be IPLed until the failed load source is fixed and the remote load source
recovery procedure is performed

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• When remote DASD mirroring is active on a system and the one load source the
system can use to IPL fails, the system cannot perform a main storage dump if the
system ends abnormally. This means that the system cannot use the main storage
dump or continuously-powered main store (CPM) to reduce recovery time after a
system crash. It also means that the main storage dump is not available to diagnose the
problem that caused the system to end abnormally.

10-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Mirroring performance
IBM i

• There is equal or better performance for reads.

• There is a slight decrease in performance for writes.

• IPL after abnormal end might be longer if synchronization is


necessary.

• You will notice a decrease in performance while mirroring is


first being started and while a failed disk is being replaced.

• Machine pool: Increase size approximately 12 KB per GB of


mirrored storage.

• Maintain ratio of disk units to I/O processors.


© Copyright IBM Corporation 2012

Figure 10-34. Mirroring performance OL1914.1

Notes:
Mirroring and performance: When mirrored protection is started, most systems show little
difference in performance; in some cases, mirrored protection can improve performance.
Generally, functions that do mostly read operations see equal or better performance with
mirrored protection. This is because read operations have a choice of two storage units to
read from, and the one with the faster expected response time is selected. Operations that
do mostly write operations (such as updating database records) may see slightly reduced
performance on a system that has mirrored protection because all changes must be written
to both storage units of the mirrored pair. Thus, restore operations are slower.
In some cases, if the system ends abnormally, the system cannot determine whether the
last updates were written to both storage units of each mirrored pair. If the IBM Power
System with IBM i is not sure that the last changes were written to both storage units of the
mirrored pair, the system synchronizes the mirrored pair by copying the data in question
from one storage unit of each mirrored pair to the other storage unit. The synchronization
occurs during the IPL that follows the abnormal system end. If the system can save a copy
of main storage before it ends, the synchronization process takes just a few minutes. If not,

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

the synchronization process can take much longer. The extreme case could be close to a
complete synchronization.
Mirrored protection normally requires additional disk units and input/output processors.
However, in some cases, you may need additional hardware to achieve the level of
performance that you want. Use the following information to decide how much extra
hardware you may need:
• Processing unit requirements
Mirrored protection causes a minor increase in central processing unit usage
(approximately 1% to 2%)
• Main storage requirements
If you have mirrored protection, you need to increase the size of your machine pool.
Mirrored protection requires storage in the machine pool for general purposes and for
each mirrored pair. You should expect to increase your machine pool by approximately
12 KB for each 1 GB of mirrored disk storage (12 KB for 1 GB DASD, 24 KB for 2 GB
DASD, and so forth).
During synchronization, mirrored protection uses an additional 512 KB of memory for
each mirrored pair that is being synchronized. The system uses the pool with the most
storage.
• I/O processor requirements
To maintain equivalent performance after starting mirrored protection, your system
should have the same ratio of disk units to I/O processors as it did before. To add I/O
processors, you may need to upgrade your system for additional buses.
Because of the limit on buses and I/O processors, you may not be able to maintain the
same ratio of disk units to I/O processors. In this case, system performance may be
reduced.

10-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Concurrent maintenance
IBM i

• Replace or repair failing hardware while the system runs.

• Mirroring level <----> level of concurrent maintenance.

• SST: Disk support tools are available.

• ECS is available to report a problem.

• Some repairs require active units to be suspended.


– You can choose to defer maintenance.

• Some repairs require the system to be powered off (deferred


maintenance).

© Copyright IBM Corporation 2012

Figure 10-35. Concurrent maintenance OL1914.1

Notes:
ECS - Electronic Customer Support
Concurrent maintenance is the process of repairing or replacing a failed disk-related
hardware component while using the system.
On systems without mirrored protection, the IBM Power System with IBM i is not available
when a disk-related hardware failure occurs and remains unavailable until the failed
hardware is repaired or replaced. However, with mirrored protection the failing hardware
can often be repaired or replaced while the IBM Power System with IBM i is being used.
Concurrent maintenance support is a function of system unit hardware packaging. Mirrored
protection only provides concurrent maintenance when the hardware and packaging of the
system support it. The best hardware configuration for mirrored protection also provides for
the maximum amount of concurrent maintenance.
It is possible for the system to operate successfully through many failures and repair
actions. For example, a failure of a disk head assembly will not prevent the system from
operating. A replacement of the head assembly and synchronization of the mirrored unit

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

can occur while the system continues to run. The greater your level of protection, the more
often concurrent maintenance can be performed.
On some models, the system restricts the level of protection for unit 1 and its mirrored unit
to only IOA-level protection. See Mirrored Protection - Configuration Rules in Information
Center for more information.
Under some conditions, diagnosis and repair can require active mirrored units to be
suspended. You may prefer to power down the system to minimize the exposure of
operating with less mirrored protection. Some repair actions require that the system be
powered down. Deferred maintenance is the process of waiting to repair or replace a failed
disk-related hardware component until the system can be powered down. The IBM Power
System with IBM i is available, although mirrored protection is reduced by whatever
hardware components have failed. Deferred maintenance is only possible with mirrored
protection or device parity protection.

10-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Mirrored protection planning


IBM i

• Decide which ASP or ASPs to protect.

• Determine disk storage capacity requirements.

• Determine the level of protection you want for each mirrored ASP.

• Determine the extra hardware you need for mirrored protection.

• Determine the extra hardware you need for performance.

• Order your hardware.

• Plan the installation of your system and the configuration of new units.

• Install the new hardware.


© Copyright IBM Corporation 2012

Figure 10-36. Mirrored protection planning OL1914.1

Notes:

Note

Before performing this procedure, we strongly recommend that you read the appropriate
sections of the backup and recovery guide.

Deciding which ASPs to protect


Mirrored protection is configured by auxiliary storage pool, because the ASP is the user's
level of control over single-level storage. Mirrored protection can be used to protect one,
some, or all ASPs on a system. However, multiple ASPs are not required in order to use
mirrored protection. Mirrored protection works well if all disk units on a system are
configured into a single ASP (the default on the IBM Power SYstem with IBM i). In fact,
mirroring reduces the need to partition auxiliary storage into ASPs for data protection and
recovery. However, ASPs may still be preferable for performance and other reasons.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

To provide the best protection and availability for the entire system, all ASPs in the system
should have mirrored protection.
If the system has a mixture of some ASPs with and some ASPs without mirrored
protection, a disk unit failure in an ASP without mirrored protection severely limits the
operation of the entire system. Data can be lost in the ASP in which the failure occurred. A
long recovery may be required.
If a disk fails in a mirrored ASP, and the system also contains ASPs that are not mirrored,
data is not lost. However, in some cases, concurrent maintenance may not be possible.
The disk units that are used in user ASPs should be selected carefully. For best protection
and performance, an ASP should contain disk units that are attached to several different
I/O processors. The number of disk units in the ASP that are attached to each I/O
processor should be the same (that is, balanced).
Determining the disk units that are needed
A mirrored ASP requires twice as much auxiliary storage as an ASP that is not mirrored,
because the system keeps two copies of all the data in the ASP. Also, mirrored protection
requires an even number of disk units of the same capacity so that disk units can be made
into mirrored pairs. On an existing system, it should be noted that it is not necessary to add
the same types of disk units already attached in order to provide the required additional
storage capacity. Any new disk units may be added as long as sufficient total storage
capacity and an even number of storage units of each size are present. The system will
assign mirrored pairs and automatically move the data as necessary.
The process of determining the disk units that are needed for mirrored protection is similar
for existing or new systems. You should do the following:
Plan how much data each ASP contains.
Plan a target percent of storage used for the ASP (how full the ASP is).
Plan the number and type of disk units needed to provide the storage that is required. For
an existing ASP, you can plan a different type and model of disk unit to provide the required
storage. You must ensure an even number of each type of disk unit and model.
After planning for all ASPs is completed, plan for spare units, if desired.
Once you know all of this information, you can calculate your total storage needs.
Determining the level of protection that you want
The level of mirrored protection determines if the system keeps running when different
levels of hardware fail. The level of protection is the amount of duplicate disk-related
hardware that you have. The more mirrored pairs that have higher levels of protection, the
more often your IBM Power System with IBM i is usable when disk related hardware fails.
You may decide that a lower level of protection is more cost effective for your system than
a higher level. The levels of protection, in order from lowest to highest, are as follows:
1. Disk unit-level protection

10-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty 2. IOA-level protection


3. Input/Output processor-level protection
4. Bus-level protection
5. Expansion-unit level protection
6. Ring-level protection
When determining what level of protection is adequate, you should consider the relative
advantages of each level of protection with respect to the following:
• The ability to keep the system operational during a disk-related hardware failure
• The ability to perform maintenance concurrently with system operations
- To minimize the time that a mirrored pair is unprotected after a failure, you may want
to repair failed hardware while the IBM Power System with IBM i is operating
During the start mirrored protection operation, the system pairs the disk units to provide the
maximum level of protection for the system. When disk units are added to a mirrored ASP,
the system pairs only those disk units that are added without rearranging the existing pairs.
The hardware configuration includes both the hardware and how the hardware is
connected.
Determining the hardware that is needed for mirroring
In order to communicate with the rest of the system, disk units are attached to I/O adapters,
which are attached to I/O processors, which are attached to buses. The number of each of
these types of disk-related hardware available on the system directly affects the level of
protection that is possible.
To provide the best protection and performance, each level of hardware should be
balanced under the next level of hardware. That is, the disk units of each device type and
model should be evenly distributed under their I/O adapters. The same number of I/O
adapters should be under each I/O processor for that disk type. The I/O processors should
be balanced among the available buses.
To plan what disk-related hardware is needed for your mirrored system, you must plan the
total number and type of disk units (old and new), that are needed on the system, as well
as the level of protection for the system. It is not always possible to plan for and configure a
system so that all mirrored pairs meet the planned level of protection. However, it is
possible to plan a configuration in which a very large percentage of the disk units on the
system achieve the desired level of protection.
When planning for additional disk-related hardware, you need to do the following:
• Determine the minimum hardware that is needed for the planned disk units to function -
plan for one disk unit size at a time.
• Plan the additional hardware needed to provide the desired level of protection for each
disk unit type.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Determine the extra hardware needed for performance


Mirrored protection normally requires additional disk units and input/output processors.
However, in some cases, you may need additional hardware to achieve the level of
performance that you want.
Use the following information to decide how much extra hardware you may need:
Processing unit requirements
Mirrored protection causes a minor increase in central processing unit usage
(approximately 1% to 2%).
Main storage requirements
If you have mirrored protection, you need to increase the size of your machine pool.
Mirrored protection requires storage in the machine pool for general purposes and for
each mirrored pair. You should expect to increase your machine pool by approximately
12 KB for each 1 GB of mirrored disk storage (12 KB for 1 GB DASD, 24 KB for 2 GB
DASD, and so forth).
During synchronization, mirrored protection uses an additional 512 KB of memory for
each mirrored pair that is being synchronized. The system uses the pool with the most
storage.
I/O processor requirements
To maintain equivalent performance after starting mirrored protection, your system
should have the same ratio of disk units to I/O processors as it did before. To add I/O
processors, you may need to upgrade your system for additional buses.
Because of the limit on buses and I/O processors, you may not be able to maintain the
same ratio of disk units to I/O processors. In this case, system performance may be
less.
Planning your installation
You must work with your IBM marketing representative to plan for the installation of
mirrored protection on your system. The marketing representative helps you determine
whether your IBM Power System with IBM i is balanced and meets standard configuration
rules. The system must be configured according to the standard rules in order for the
mirrored pairing function to pair up storage units to provide the best protection possible
from the hardware that is available. Your marketing representative also helps you plan for
the new units that are needed to add for each ASP.
If you are planning to start mirrored protection on a new system, that IBM Power System
with IBM i is already configured according to standard configuration rules. If you are using
an older system, it may not follow the standard rules. However, wait until after attempting to
start mirrored protection before reconfiguring any hardware.

10-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Mirrored failure scenario


IBM i

• Storage management detects unrecoverable disk failure.

• System does not shut down.

• Protection is lost only on that mirrored pair.

• Storage management suspends failing device of mirrored pair.

• Message is sent to QSYSOPR.

• Repair or replace failing device.

• Mirroring is resumed automatically for replaced units.

• If necessary, resume mirrored protection for repaired or suspended


units.

© Copyright IBM Corporation 2012

Figure 10-37. Mirrored failure scenario OL1914.1

Notes:
If one storage unit of a mirrored pair fails, the system suspends mirrored protection to the
failed mirrored unit. The system continues to operate using the remaining mirrored unit.
The failing mirrored unit can be physically repaired or replaced.
After the failed mirrored unit is repaired or replaced, the system synchronizes the mirrored
pair by copying current data from the storage unit that has remained operational to the
other storage unit. During synchronization, the mirrored unit to which the information is
being copied is in the resuming state. Synchronization does not require a dedicated system
and runs concurrently with other jobs on the system. System performance is affected
during synchronization. When synchronization is complete, the mirrored unit becomes
active.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Mirroring versus device parity protection


IBM i

Availability Performance Cost

Mirrored
Mirrored Device parity
1 protection
protection protection
(*see note)

Device parity Device parity Mirrored


2
protection protection protection

© Copyright IBM Corporation 2012

Figure 10-38. Mirroring versus device parity protection OL1914.1

Notes:
When mirrored protection is started, most systems show little difference in performance; in
some cases, mirrored protection can improve performance. Generally, functions that do
mostly read operations see equal or better performance with mirrored protection. This is
because read operations have a choice of two storage units to read from, and the one with
the faster expected response time is selected. Operations that do mostly write operations
(such as updating database records) may see slightly reduced performance on a system
that has mirrored protection because all changes must be written to both storage units of
the mirrored pair. Thus, restore operations are slower.
With both device parity protection and mirrored protection, the system continues to run
after a single disk failure when using RAID-5 or two disk failures when using RAID-6. With
mirrored protection, the system may continue to run after the failure of a disk-related
component, such as an IOA or an IOP.
When a second disk failure occurs such that the system has two failed disks (and you are
not using RAID-6), the IBM Power System with IBM i is more likely to continue to run with
mirrored protection than with device parity protection.

10-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Device parity protection requires up to 25% additional disk capacity for storage of parity
information. The actual increase depends on the number of disk units that are assigned to
a device parity set. A system with mirrored protection requires twice as much disk capacity
as the same system without mirrored protection because all information is stored twice.
Mirrored protection may also require more buses, IOPs, and disk IOAs, depending on the
level of protection that you want. Therefore, mirrored protection is usually a more
expensive solution than device parity protection.
Usually, neither device parity protection nor mirrored protection has a noticeable effect on
system performance. In some cases, mirrored protection actually improves system
performance.
The restore time to disk units protected by device parity protection is slower than the
restore time to the same disk devices without device parity protection activated, because
the parity data must be calculated and written.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Comparison of disk protection tools


IBM i

Device parity Mirrored User Independent


What is needed?
protection protection ASPs disk pool
Protect from data loss due to See
Yes Yes See note 2
disk-related hardware failure note 2

Maintain availability Yes Yes No Yes4

Help with disk unit recovery Yes Yes Yes4 Yes2

Maintain availability when


No Yes1 No No2
disk IOA fails
Maintain availability when
No Yes1 No No5
disk I/O processor fails
Maintain availability when
No Yes1 No No5
disk I/O bus fails

Site disaster protection No Yes3 No No5

Ability to switch data between


No No No Yes
systems

© Copyright IBM Corporation 2012

Figure 10-39. Comparison of disk protection tools OL1914.1

Notes:
1. It depends on hardware used, configuration, and level of mirrored protection.
2. Configuring disk pools can limit the loss of data and the recovery to a single disk pool.
3. For site disaster protection, remote mirroring is required.
4. In a clustered environment, an independent disk pool can help maintain availability.
5. When using geographic mirroring, independent disk pools can provide site disaster
protection.

10-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Full disk protection


IBM i

• System remains operational with no data loss for one disk


(RAID-5) or two disk (RAID-6) failures.

• Use device parity protection for hardware that is capable.

• Use mirrored protection for all ASPs.

• Assign user ASPs as desired.


– Performance
– Backup requirements

© Copyright IBM Corporation 2012

Figure 10-40. Full disk protection OL1914.1

Notes:
Full protection method: Single ASP
A simple and safe way to manage and protect your auxiliary storage is to do the following:
• Assign all disk units to a single auxiliary storage pool (the system ASP).
• Use device parity protection for all disk units that have the hardware capability.
• Use mirrored protection for the remaining disk units on the system.
With this method, your system continues to run if a single disk unit fails. When the disk is
replaced, the system can reconstruct the information so that no data is lost. The system
may also continue to run when a disk-related hardware component fails. Whether your
system continues to run depends on your configuration. For example, the system will
continue to run if an IOP fails and all of the attached disk units have mirrored pairs that are
attached to a different IOP.
When you use a combination of mirrored protection and device parity protection to fully
protect your system, you increase your disk capacity requirements. Device parity protection
requires up to 25% of the space on your disk units (depending upon how many disk units

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

and whether you are implementing RAID-5 or RAID-6) to store parity information. Mirrored
protection doubles the disk requirement for all disks that do not have the capability for
device parity protection.
Full protection: Multiple ASPs
You may want to divide your disk units into several auxiliary storage pools. Sometimes,
your overall system performance may improve by having user ASPs. For example, you can
isolate journal receivers in a user ASP. You can also place history files or documents that
seldom change in a user ASP that has lower performance disk units.
You can fully protect a system with multiple ASPs by doing the following:
• Use device parity protection for all disk units that have the hardware capability.
• Set up mirrored protection for every ASP on the system. You can set up mirrored
protection even for an ASP that has only disk units with device parity protection. That
way, if you add units that do not have device parity protection in the future, those units
are automatically mirrored.

Note

You must add new units in pairs of units with equal capacity.

Before configuring this level of protection, be sure that you know how to assign disk units to
ASPs.

10-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Partial disk protection: Multiple ASPs


IBM i

• Divide critical application and data into different ASPs.


– Critical: ASP1 (load source, security, configuration, library addresses)
– Critical business applications
– Critical: ASPs with journal receivers
– Not critical: ASPs with infrequently changing data (history data,
programs)
• Protect critical ASPs with device parity protection and mirrored
protection.
• The system continues to run for single disk failure in protected
ASP.
• With an unprotected disk failure:
– System might become unusable and abnormally end
– Possible long recovery
– Must restore data in ASP with failed disk
© Copyright IBM Corporation 2012

Figure 10-41. Partial disk protection: Multiple ASPs OL1914.1

Notes:
Sometimes, full protection (using a combination of device parity protection and mirrored
protection) may be too costly. If this happens, you need to develop a strategy to protect the
critical information on your system. Your objectives should be to minimize the loss of data
and to reduce the amount of time that critical applications are not available. Your strategy
will probably involve dividing your IBM Power System with IBM i into user ASPs and
protecting only certain ASPs. Note, however, that if the IBM Power System with IBM i is not
fully protected and an unprotected disk unit fails, serious problems can occur. The entire
system can become unusable, end abnormally, require a long recovery, and data in the
ASP that contains the failed unit will have to be restored.
Before configuring this level of protection, be sure that you know how to assign disk units to
ASPs.
The following list has suggestions for developing your strategy:
• If you protect the system ASP with a combination of mirrored protection and device
parity protection, you can reduce or eliminate recovery time. The system ASP, and
particularly the load source unit, contain information that is critical to keeping your

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

system operational. For example, the system ASP has security information,
configuration information, and addresses for all the libraries on the system.
• Think about how you can recover file information. If you have on-line applications and
your files change constantly, consider using journaling and placing journal receivers in a
protected user ASP.
• Think about what information does not need protection, probably because it changes
infrequently. For example, history files may need to be on-line for reference, but the
data in the history files may not change except at the end of the month. You might place
those files in a separate user ASP that does not have any disk protection. If a failure
occurs, the system becomes unusable, but the files can be restored without any loss of
data. The same may be true for documents.
• Think about other information that may not need disk protection. For example, your
application programs may be in a separate library from the application data. Probably,
the programs change infrequently. The program libraries might be placed in a user ASP
that is not protected. If a failure occurs, the system becomes unusable, but the
programs can be restored.
Two simple guidelines can summarize the previous list:
1. To reduce recovery time, protect the system ASP.
2. To reduce loss of data, make conscious decisions about which libraries must be
protected.

10-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Cross-site mirroring (XSM)


IBM i

© Copyright IBM Corporation 2012

Figure 10-42. Cross-site mirroring (XSM) OL1914.1

Notes:
Geographic mirroring provides the ability to replicate changes made to the production copy
of an independent auxiliary storage pool (IASP) to a mirror copy of that IASP. As data is
written to the production copy of an IASP, the operating system mirrors that data to a
second copy of the IASP through another IBM Power System with IBM i. This process
keeps multiple identical copies of the data.
The example given in the foil is a very simple configuration with XSM implemented
between two cluster nodes. Two physical sites A and B have a IBM Power Systems with
IBM i installed. Each of the servers have two IASPs configured on switchable hardware
(Tower level on individual systems – IOP level between partitions). Since XSM works under
clustering topology only, the hardware used for configuring the IASPs must be recognized
as resilient (switchable hardware). Both servers have two IASPs one of them in production
on each site, the other one serving as a mirrored copy of the production IASP of the other
site. If one of the IBM Power Systems with IBM i servers should fail, the mirrored copy on
the other site can then be brought in production. It is obvious that both nodes need to be
made part of the same recovery domain.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How does it work?


The data replication from one IASP to another IASP in geographical mirroring is based on
storage management functions. This is a logical mirroring type and it implies that changes
are guaranteed to be made in the same order on the target as they were made on the
source.
Although IBM i storage management was never under the users control, a number of
attributes can be defined and changed by the user. The modes of operation are as follows:
• Synchronous mode: The client waits until the operations are complete on both the
source and target servers. The mirror copy is always eligible to become the production
copy. If performance is acceptable, this is the safest mode.
• Asynchronous mode: The client must wait until the operations are complete on the
source server and have been received by the target server for processing, meaning that
the target can have a number of pages to process or updates pending. The mirror copy
cannot become the production copy until all pending updates are complete.
When geographic mirroring is active, changes to the production copy data are transmitted
to the mirror copy across TCP/IP connections. Up to four TCP/IP interfaces are allowed.
Any physical communication fabric is allowed. Depending on the load and provided
bandwidth, the data port services for XSM will select the TCP/IP interfaces in a round robin
fashion.
When the user sets the attributes for geographic mirroring, they can specify the
synchronization priority. If the synchronization priority is set to high, the system uses more
resources for synchronization, which results in a faster completion time. The mirror copy is
eligible to become a production copy faster, protection is resumed sooner. However, high
priority can cause degradation to the applications involved. It is recommended that you try
high priority first, if the degradation to performance is not tolerable, priority can be lowered.

10-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Cross-site mirroring: General


IBM i

• Independent from local DASD protection


– Unprotected, RAID-5/RAID-6, and mirroring possible
• Mirrored IASP size and where to start
– No need for the same size
– Start configuration from server owning smallest size IASP
– Swap roles when still empty as required
– Threshold value
• Good housekeeping required
– Changes of user dependent objects in *sysbas
– XSM in combination with high availability business partner software
• All pools in a disk pool group switch together
• Planning required
– Example: Bounded IP routes
© Copyright IBM Corporation 2012

Figure 10-43. Cross-site mirroring: General OL1914.1

Notes:
XSM can be configured between two IASPs that have their own DASD protection
mechanism. The protection can be different on both sites and does not even have to exist.
XSM on unprotected DASD in IASP is not recommended when striving for high availability.
Any allowed combination of RAID-5 / RAID-6, mirrored or unprotected DASD in the IASP is
supported under XSM.
In this same sense the storage size of the IASP on the target can be different from the size
of the source IASP under geographical mirroring. When configuring XSM, the user should
start XSM from the site with the smallest IASP. Once configured, the user can then swap
roles if required. Messages regarding the threshold value for the storage are issued as
soon as one of the IASP storage units reaches its threshold value. Messages arrive in the
operator message queue of the production site for either one of the geographical mirrored
IASPs. There are size restrictions for the initial setup.
When cluster nodes owning geographical mirrored IASPs are switching roles, there is a
need for synchronized objects in the system based auxiliary storage pool if there are

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

application dependant changes. It may be required to keep these objects synchronized by


using a replication mechanism such as remote journaling or HABP software.
Even for applications that have no changing object (in system-based ASPs) dependencies,
good housekeeping is required. Changes made, for example, to user profiles must be
applied to both cluster server nodes. Strict discipline and good practices are essential for a
switch or failover to be fast and with minimal interruption for the users.
Planning is essential for success.

10-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Cross-site mirroring considerations


IBM i

• Dependencies
– IASP state synchronized automatically
• Example: Production is available; mirrored copy is varied on.
– No concurrent operations or data access on mirrored copy when varied on
– IBM Power System with IBM i Navigator shows pending
• Recovery time out
– Time before XSM suspends
– Consider redundant communication paths
• Performance
– Input/Output intensive work
– Read to write ratio
– Asynchronous compared to synchronous
– Main storage
• Consequences of detaching and attaching a mirrored IASP copy
– Resynchronization time depends on size and on communication bandwidth.
– Most environments are not suitable for backup to tape operation.
– Create a different device description before using a detached mirrored copy.
© Copyright IBM Corporation 2012

Figure 10-44. Cross-site mirroring considerations OL1914.1

Notes:
When the production IASP is made available, the geographical mirrored copy is
automatically brought to an active state. Once geographical mirroring is started, the
mirrored copy is not accessible for the user.
Recovery Time Out is the time the user can specify (during the setup of XSM) for how long
the application can wait and the server can try to recover the connection with the remote
copy. Once the time limit is reached, cross-site mirroring is suspended. If mirroring is
suspended, the system performs a full synchronization, this means that the XSM copy is
zeroed out and completely rewritten during the resume phase. This can be a very
time-consuming process and may have a severe impact on the performance of the
applications using the data in the production pools. If the user makes the production copy
unavailable during the resume process, the resume function is stopped automatically and
restarted from the point where it was stopped when the production copy is made available
again. When choosing the recovery time or value, the user has to decide between blocking
the applications using the data in the disk pool group for a certain amount of time, or for
allowing full synchronization after the automatic suspend of geographic mirroring.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Where read operations are only performed on the local or production IASP and there is no
impact on performance at all with XSM, every write operation has to be performed on the
geographical mirrored copy too, be it in a synchronous or asynchronous way. As depicted
earlier, the user can influence the impact on performance by changing the replication
methodology or priority. However, geographical mirroring always uses server resources,
consumes memory and processor cycles. Testing showed a CPU overhead between 15%
and 20% with XSM active. It is highly recommended that you provide additional main
storage for the server to be able to handle the data port services requests without
interfering with application paging.
Before making a detached mirror copy available, creating a second device description for
the independent disk pool that differentiates it from the production copy is the only way to
avoid problems. A separate device description for the mirror copy prevents two instances
of the same database in the network. You may then use this second mirror copy device
description to make the XSM copy available for operations.

10-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 4: Disk configuration and


recovery

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 10-45. Topic 4: Disk configuration and recovery OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk configuration and protection procedures


IBM i

SD

cts
e
SD

DA

ac

bje
AS
DA

sp
e

ro

old
rD
ov

top
e
re

sfe
lat

sh
m

sfe
igu

t/s
lcu
re

an

re

ar
an
nf

d/

Th
Ca

Tr

St
Co

Ad

Tr
Mirrored protection ASPs
Disk compression LPARs
Device parity protection

Backup and Recovery manual


Select appropriate checklist
#1 #2 #3
1 1 1
2 ...
2 .2 .
3 . .
4 . .

© Copyright IBM Corporation 2012

Figure 10-46. Disk configuration and protection procedures OL1914.1

Notes:
The IBM Power Systems with IBM i Systems Management Recovering Your System
(SC41-5304-09) manual has detailed checklists for procedures involving disk configuration
and protection. The checklists can be found starting on page 395, in the section titled Part
6: Disk configuration and protection.
Note that many of the checklists will require the use of either the System Service Tools
(SST) or Dedicated Service Tools (DST).

10-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Recovery of disk failure or disk errors (1 of 2)


IBM i

n?
tio

n?
ec

tio

l?
?
d?

ot

ed

fu
ec
pr
ile

s
ur
ot

es
y
fa

fig
rit

pr

cc
it

pa

on
un

ed

su
c
ice

or
h

p
Ps
hic

m
irr
v
De

AS

Pu
M
W

Backup and Recovery manual

1 Select Disk recovery checklist


#1
1
2
#2
1
2 ...
3
4

© Copyright IBM Corporation 2012

Figure 10-47. Recovery of disk failure or disk errors (1 of 2) OL1914.1

Notes:
For disk failure or disk errors, first recover the disk, then recover the data. To recover the
disk select the appropriate checklist. The checklist selection will depend on the following:
• Which disk unit failed
• Whether device parity protection or mirrored protection was active
• Whether the ASPs are configured
• Whether or not the failed disk could be pumped
If a disk unit must be replaced, a service representative normally tries to copy the
information from the disk unit when it is replaced. This procedure is sometimes referred to
as a pump. If the service representative is able to perform a full pump then none of the data
is lost. On the other hand, if only a partial pump can be performed then some of the data
will be lost. There will be some situations when a pump cannot be performed at all, in which
case the data on the system will have to be manually restored.
The recovery checklists are very specific procedures to guide you through recovery.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Recovery of disk failure or disk errors (2 of 2)


IBM i

ta

al
da
d?

ply ourn
re

ve
ve

ns
u over
sa

j
?
co

to s or

tio
to
re

m rec
op
ed

BJ
ap
g
ein

o
us

en
ug r t
G
sb

re VCH
e

ro the
rs
ur

ive

h
SP

ed

he
SA
ce
oc
lA

W
Pr
Al

th
Backup and Recovery manual
Select checklist to recover user data

2 #1
1
2
3
#2
1
2 ...
4

© Copyright IBM Corporation 2012

Figure 10-48. Recovery of disk failure or disk errors (2 of 2) OL1914.1

Notes:
After the disk is recovered, then the next step is to recover the user data.
To recover user data select the appropriate checklist. The checklist depends on the
following:
• Whether all ASPs are being recovered
• The procedure used to save the data
• Whether there are SAVCHGOBJs or journal receivers to apply
• Whether you want to use menu options to recover

10-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

DASD management
IBM i

• Application administration
required: Service tools
server DST authority for:
– Complete DASD
management
– DST support (subset)
– View and add disk units
– Disk balancing
– Create and manage ASPs
and disk units
– Create and manage
independent ASPs (disk
pools equal private pools)
– Compression
© Copyright IBM Corporation 2012

Figure 10-49. DASD management OL1914.1

Notes:
Many DASD management functions including defining user ASPs, viewing the disk
hardware configuration details and disk balancing and compression are available in IBM
Power Systems with IBM i Navigator. Starting with version 5, many of the commonly used
disk management functions available under the traditional Start Service Tools (STRSST
command) interface are now supported in IBM Power Systems with IBM i Navigator. Some
additional disk management functions available when your IBM Power System with IBM i is
started or changed to DST (dedicated service tools) mode are also supported since V5R1
through the Configuration and Service > Hardware > Disk units functions.
Here is a quick summary of the DASD management functions.
View and manipulate large disk configurations
This includes the ability to view subsets of all disk units, view disk units in a physical and
logical hierarchical layout, and sort the disk units by various criteria such as size, resource
name, or associated I/O processor.
Use a graphical view to see where all the disk units on your system are located

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

From the graphical view, you can perform all the same actions on a disk unit that you can
perform from the list of all disk units in the IBM i Navigator window. These actions include
start or stop compression, include the disk unit in a parity set (or exclude it), add a disk unit
to a disk pool (or remove it), replace a disk unit, rename a disk unit, and more.
Wizards provide streamlined disk maintenance procedures for performing the functions
listed here. Note that on an LPAR system, you would be defining the disk units through the
LPAR 5250 Dedicated Service Tools (DST) interface or through the IBM i Navigator Logical
Partition interface, if you are authorized to do this.

10-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Application administration: Disk units


IBM i

© Copyright IBM Corporation 2012

Figure 10-50. Application administration: Disk units OL1914.1

Notes:
You must have the appropriate service authority to administer disk units. Before you even
see the Disk Units branch under Hardware, your system administrator must have first
enabled Disk Units to be managed. The DASD management support ships with a no
access default for each system.
To enable, view, and work with (manage) disk units, your system administrator must have
done the following for your connection system. The following steps need to be done only
once:
• The user to be authorized must have *SERVICE Special Authority.
• Install the Configure and Service Installable function for IBM i Navigator. This is
selectable under Custom Install or gets automatically installed when you select Full
Install.
• Right-click the IBM Power System with IBM i and select Application Administration.
• Click Host Applications.
• Expand IBM i.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Expand Service.
• Check Disk Units authorization as you have previously determined.
Each client work station that requires access to Disk Unit management must also have:
• Configure and Service function for IBM i Navigator installed
• Service Tools authorization: When clicking Disk Units, a Service Tools Security window
appears requesting an explicit Service Tools Server user ID and password.
• The DST user profile, password, and user profile authorizations are specified through
the Dedicated Service Tools (DST) interface using either a 5250 console or Operations
Console device.

10-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Steps to allow Navigator users to access DST


IBM i

• While in IPL – DST mode or in run time DST mode:


– Sign on to Service Tools Security.
– Define additional service tools user profiles.
– By default a profile is created with no privileges. (Grant those
privileges that will be assigned to this user.)
• Add the following Service Table entry:
ADDSRVTBLE
SERVICE('as-sts')
PORT(3000)
PROTOCOL('tcp')
TEXT('Service Tools Service')
ALIAS('AS-STS')
– End TCP (ENDTCP), and then start TCP (STRTCP).

© Copyright IBM Corporation 2012

Figure 10-51. Steps to allow Navigator users to access DST OL1914.1

Notes:
Service Tools user profiles are shipped with IBM i are QSECOFR, 111111, 222222, and
QSRV. Each has different levels of authority (privileges). The standard recommendation is
that the system administrator create a specific DST user profile, with specific privileges
assigned, for each user who will have authority to sign on through DST or SST. This way,
the capabilities of the QSECOFR service tools profile are not compromised.
Note the service tools, user profiles, and associated passwords are separate and
independent of IBM i user profiles and associated passwords. For example, IBM i user
profiles QSECOFR and JIMC passwords are SCY1OFR and myos4usr. Service tools user
profiles QSECOFR and JIMC (you created this) have passwords of sts1sofor and back2you.
Attempting to sign on to DST with the IBM i user ID and password (user ID = JIMC;
password=myos4usr) three times successively disables your service tools user profile.
If you have not previously performed the Add Service Tools Entry command as shown and
then stopped and started TCP/IP, when selecting either Disk Units or Logical Partitions
under IBM i Navigator, an error screen is displayed that indicates there is no server
listening on an IP port.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

For more information in this area, refer to the release appropriate document: Configuring
the service tools server for i5/OS. In the V7R1Information Center, you can find this
document by visiting:
http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/index.jsp
Click Security -> Service tools -> Managing service tools in the Navigation bar. The
document is near the bottom.

10-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk unit management: Sign-on


IBM i

• The Navigator disk management user must have application


administration and disk management authorization.
• The Navigator disk management user must have service tools
user profile/authority.

© Copyright IBM Corporation 2012

Figure 10-52. Disk unit management: Sign-on OL1914.1

Notes:
Assuming that Application Administration has specified Disk Units can be managed, and
your workstation has Configuration and Service installed, you see a Disk Units branch at
the bottom of the Configuration and Service-Hardware tree structure.
To perform disk unit functions click the + character to the right of Disk Units. This expands
the Disk Units sub-branches but before you can do any function you must sign on with a
Service Tools security user profile and password as shown on this foil.
The Service Tools user profile and password and proper authorizations are specified
through the Dedicated Service Tools (DST) interface options available to the system
console device (twinax 5250, Operations Console Direct Attach, or new for V5R1,
Operations Console LAN Attach). The DST configuration for the Service Tools user profile
used here must be explicitly granted the capabilities to manage disk units.
Similarly, for the IBM i Navigator user to do Logical Partitioning or Cluster Management
functions the Service Tools user profile must be granted authority to do these functions as
well as generally be enabled through IBM i Navigator Application Administration.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The Service Tools user profile and password/authorizations are separate and independent
of IBM i user profile password/authorizations. That is, user JIMC may be defined under
Service Tools security but need not be defined under IBM i. If the user ID is defined both
under IBM i and Service Tools security, the password and specific authorizations are
completely independent.

10-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 10-53. Disk properties: General OL1914.1

Notes:
Starting with V5R3, you can use IBM i Navigator to gather information about a specific disk
unit. Only newer generation disk units return meaningful logs. This function should be used
under the direction of your next level of support during maintenance activities.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk properties: Status and Capacity


IBM i

• Status: Activity, Protection, Percent busy, and so on


• Capacity: Total capacity, Used space, and Percent used

© Copyright IBM Corporation 2012

Figure 10-54. Disk properties: Status and Capacity OL1914.1

Notes:

10-86 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk properties: Physical Location


IBM i

© Copyright IBM Corporation 2012

Figure 10-55. Disk properties: Physical Location OL1914.1

Notes:
This System i Navigator screen shows the physical location of disk drives within the system
rack.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Adding Disk Units


IBM i

© Copyright IBM Corporation 2012

Figure 10-56. Adding Disk Units OL1914.1

Notes:
This System i Navigator screen shows how you request the Add Disk Unit wizard by
right-clicking the All disk units container and then clicking Add Disk Unit.

10-88 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Add Disk Unit wizard (1 of 8)


IBM i

• The Welcome page explains the tasks that the wizard helps you with.
– Add disk units to an existing disk pool.
– Create a new disk pool and add disk units to it.
– Include nonconfigured disk units in a device parity set.
– Start device parity protection.

© Copyright IBM Corporation 2012

Figure 10-57. Add Disk Unit wizard (1 of 8) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Add Disk Unit wizard (2 of 8)


IBM i

• Choose disk storage pool


– This page displays the disk pools that are currently defined on the system.
• You can add a disk unit to one of these disk pools, or you can click New Disk Pool to
create a new disk pool.
– When you click Next, you can select from a list of available disk units.

© Copyright IBM Corporation 2012

Figure 10-58. Add Disk Unit wizard (2 of 8) OL1914.1

Notes:

10-90 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Add Disk Unit wizard (3 of 8)


IBM i

• Add to Disk Pool: Mirrored disk pairs


– This page displays a list of available disk pairs that can be added to a
mirrored set.

© Copyright IBM Corporation 2012

Figure 10-59. Add Disk Unit wizard (3 of 8) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Add Disk Unit wizard (4 of 8)


IBM i

• Select the disk unit to be added at this time, and click Add.
– Add to Disk Pool: Single disks for RAID

© Copyright IBM Corporation 2012

Figure 10-60. Add Disk Unit wizard (4 of 8) OL1914.1

Notes:

10-92 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Add Disk Unit wizard (5 of 8)


IBM i

• Disk balancing
– Choosing Yes, balance disk pools moves data so that each disk unit
in the disk pool has an equal percentage of used and unused space*.

* Subset of functions is available through STRASPBAL command.


© Copyright IBM Corporation 2012

Figure 10-61. Add Disk Unit wizard (5 of 8) OL1914.1

Notes:
The Balance pane offers you the choice to balance the capacity of the disk pool.
If you select Yes, balance disk pools, the system moves data so that each disk unit in the
disk pool has an equal percentage of used and unused space. Balancing the capacity of
the disk pool avoids a situation where several disk units contain the majority of the data and
the newly added disk units contain very little data. This situation leads to poor system
performance.
Select No, do not balance disk pools if you do not want to balance the capacity of the
disk pool at this time.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Add Disk Unit wizard (6 of 8)


IBM i

• Continue Adding
– Selecting No, I am done adding Disk Units takes you to the summary screen.
– Selecting Yes, I want to add Disk Units to a Disk Pool brings you back to the
add disk screen.

© Copyright IBM Corporation 2012

Figure 10-62. Add Disk Unit wizard (6 of 8) OL1914.1

Notes:

10-94 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Add Disk Unit wizard (7 of 8)


IBM i

• Summary
– This page displays the complete configuration and reflects all
of your choices so far.

© Copyright IBM Corporation 2012

Figure 10-63. Add Disk Unit wizard (7 of 8) OL1914.1

Notes:
The Summary pane displays the complete configuration and reflects all the choices you
have made so far. The list shows the disk units that are associated with each disk pool and
the projected capacity of each disk unit. The projected capacity shown for the disk unit
reflects the fact that compression is started when a disk unit is included in a device parity
set.
When you click Finish, a status dialog shows the progress of the operations. Depending on
the type, model, and size of each unit being added, the operations may take more than an
hour.
The Status page displays the progress of each operation you have selected: starting
device parity protection, including disk units in device parity sets, and adding disk units.
The time it takes to complete each operation depends on the type, model, and size of each
unit being added.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Add Disk Unit wizard (8 of 8)


IBM i

• Add Disk Unit Status


– This window displays the progress of each operation you
have selected.

© Copyright IBM Corporation 2012

Figure 10-64. Add Disk Unit wizard (8 of 8) OL1914.1

Notes:

10-96 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk pool: Graphical view


IBM i

• Manage Disk Units Graphical


View by:
– All Disk Units
– Disk Pools
– I/O Processor
– Parity Set
– Mirrored Pairs
– Nonconfigured Disk Units
– Active Disk Units
– Empty Slots
– Print Disk configuration
– All valid sides of the Tower Tool
Tip

© Copyright IBM Corporation 2012

Figure 10-65. Disk pool: Graphical view OL1914.1

Notes:
Before you change the disk configuration of your server, it is important to know exactly
where the existing disk units are located in relation to disk pools, I/O adapters, and frames.
The graphical view of IBM i Navigator eliminates the process of compiling all this
information by providing a graphical representation of how your server is configured. You
can use the graphical view to perform any function that is possible through the Disk Units
list view of IBM i Navigator, with the added benefit of being able to see a visual
representation.
If you right-click any object in the table, such as a specific disk unit, disk pool, parity set, or
frame, you see the same options as in the main IBM i Navigator window. You can choose
how to view the hardware in the Disk Unit Graphical View window.
For example, you can select to view by disk pools, and then select a disk pool in the list to
display only those frames that contain the disk units that make up the selected disk pool.
You can select Show all frames to see all frames whether or not they contain disk units in
the selected disk pool. You can also select Show device positions to associate disk unit

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

names with the device position where they are inserted. You can right-click any highlighted
blue disk unit in the graphical view and select an action to perform on the disk unit.
For example, you can select to start or stop compression on a disk unit, include the disk
unit in a parity set (or exclude it), or rename the disk unit. If the disk unit has mirrored
protection (that is, it is one of a mirrored pair), you can suspend or resume mirroring on the
disk unit. If you right-click an empty disk unit slot, you can start the Install Disk Unit Wizard.
All valid sides of a tower are shown. If a tower can have disk units on the Front and Back,
then both views of the same tower are shown. If Show all towers is checked off, then only
the view that has an item with a hit to the view by field is shown.
When right clicked, the context menu for a disk unit is displayed. You can then select from
a list of actions to perform on the disk unit. For example, you can select:
• Start or Stop Compression on a disk unit
• Include the disk unit in a parity set (or exclude it)
• Rename the disk unit
If the disk unit has mirrored protection (that is, it is one of a mirrored pair), you can suspend
or resume mirroring on the disk unit.
When Ctrl-click is done on multiple disk units, these multiple disk units can be selected,
and actions can be performed on them at once (add, remove, clear). Doing a Ctrl-A allows
a user to select all disk units easily in the list.

10-98 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk pool properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 10-66. Disk pool properties: General OL1914.1

Notes:
This System i Navigator screen shows general information for disk pools by right-clicking
Disk pools and selecting Properties.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disk pool properties: Threshold and Capacity


IBM i

© Copyright IBM Corporation 2012

Figure 10-67. Disk pool properties: Threshold and Capacity OL1914.1

Notes:
This System i Navigator screen shows the threshold and capacity information of disk pools
graphically.

10-100 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disk pool properties: Balance / Trace


IBM i

© Copyright IBM Corporation 2012

Figure 10-68. Disk pool properties: Balance / Trace OL1914.1

Notes:
This System i Navigator screen shows the balance and trace information of disk pools.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New Disk Pool wizard (1 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 10-69. New Disk Pool wizard (1 of 2) OL1914.1

Notes:
If you choose to create a new disk pool while your IBM Power System with IBM i is active,
consider the following points:
You cannot start mirrored protection while the IBM Power System with IBM i is active. The
new disk pool is not fully protected unless all of the disk units have device parity protection.
You cannot remove existing disk units from one disk pool and create a new disk pool while
your IBM Power System with IBM i is active, since the system must rewrite data when it
removes disk units from an existing disk pool. This can be done only through the Dedicated
Service Tools (DST).
The system considers the size of an auxiliary storage pool (ASP) to determine the size of
the SMAPP journal receiver for that ASP. When you perform an IPL, the system checks to
see if your ASP configuration has changed. The system does the following:
If any disk units have been added or removed from an existing ASP, the system may
change either the size of the SMAPP receiver or the placement of the receiver.

10-102 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty If any new ASPs are in the configuration and do not have any access path recovery times
assigned for SMAPP, the system assigns a recovery time of *NONE for that ASP. If you
remove an ASP from your configuration and later add it back, the access path for that ASP
is set to *
, even if that ASP previously had a recovery time for access paths.
If all user ASPs have been removed from your configuration so that you have only the
system ASP, the system access path recovery time is set to the lower of the following
values:
• The existing system access path recovery time
• The current access path recovery time for ASP1
- If the current access path recovery time for ASP 1 is *NONE, the system access path
recovery time is not changed.
When you add disk units to your disk configuration while your IBM Power System with IBM
i is active, the system does not consider those changes in making SMAPP storage
decisions until the next time you perform an IPL. The system uses the size of the ASP to
determine the threshold size for SMAPP receivers. If you add disk units, the system does
not increase the threshold size for the receivers until the next IPL. This means that the
frequency of changing SMAPP receivers will not go down until you perform an IPL.
When you create a new user ASP while your IBM Power System with IBM i is active, you
should add all of the planned disks to the ASP at the same time. The system uses the initial
size of the new ASP to make storage decisions for SMAPP. If you later add more disk units
to the ASP, those disk units are not considered until the next IPL. When you create a new
user ASP, the access path recovery time for that ASP is set to *NONE. You can use the
EDTRCYAP command to set a target recovery time for the new ASP, if desired.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New Disk Pool wizard (2 of 2)


IBM i

• Use the New Disk Pool dialog to select the basic numerical identifier for
your new disk pool from a list of all available numerical identifiers.

© Copyright IBM Corporation 2012

Figure 10-70. New Disk Pool wizard (2 of 2) OL1914.1

Notes:

10-104 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Independent disk pools (1 of 2)


IBM i

• Need IOP and disk devices unassigned to system ASP or


existing user/independent ASP on node one.
• Assign a meaningful name.

© Copyright IBM Corporation 2012

Figure 10-71. Independent disk pools (1 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Independent disk pools (2 of 2)


IBM i

• Let the wizard find the available disk devices.


• Add the devices to the pool.
• Specify balancing, compression, and protection (RAID or
mirroring).

© Copyright IBM Corporation 2012

Figure 10-72. Independent disk pools (2 of 2) OL1914.1

Notes:
The left side of this visual shows the available disks. Click Add to add them to the pool.
Along the way you specify what kind of protection and if disk balancing, compression, or
both are to be used. If you select to do balancing it is done now.
If you select Protect Disk Pool then, if it is an IASP, when the Add Disk wizard is finished,
a Start Mirroring dialog appears prompting you to Start or Cancel.
If the disk pool is the System ASP or a user (not an IASP) ASP, then a dialog is presented
telling you, Your pool is now ready for you to perform Start Mirroring. When you choose to
continue mirroring, it will be started.
Please note that mirroring can take quite a long time, the more disks and the more storage
per disk, the longer it takes.
Mirroring does not require an IPL for IASPs. For system and user ASPs, the user can only
start mirroring at DST. The system performs a forced IPL as part of the Start Mirroring
function.

10-106 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 5: Abnormal system end

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 10-73. Topic 5: Abnormal system end OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Abnormal system end


IBM i

• Causes of an abnormal end:


– Power failure
– Disk failure
– Failure of critical IBM i program

• What might not have been finished:


– Changed pages written to auxiliary storage
– Closing of files and access paths
– End of programs at natural points

© Copyright IBM Corporation 2012

Figure 10-74. Abnormal system end OL1914.1

Notes:
The following list describes the circumstances that can cause your system to stop
unexpectedly and what happens when it does.
• Power failure with uninterruptible power supply: When the system loses normal
power, the uninterruptible power supply system takes over and keeps the system
running. The system detects this change and sends a message to your
power-monitoring program. Your program can decide whether to keep the system
running until power returns or to begin an orderly shutdown.
• Power failure with continuously powered main store: If your system has this
feature, a battery provides sufficient power to shut down the system and maintain the
contents of memory for up to two days after a power loss. In many cases, this can
significantly reduce the amount of time the system requires to perform an initial program
load (IPL) after a power loss. This continuously powered main store feature can also
take control if the uninterruptible power supply system can no longer maintain power.
The system automatically restarts when power is restored. You may see the Disk
Configuration Error Report display.

10-108 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Power failure with no protection: If your system does not have an uninterruptible
power supply or the continuously powered main store feature and the power fails, your
system stops immediately. The contents of main memory are lost. The system must
reconstruct information when power returns. This can be very time-consuming. Whether
the system starts automatically depends on how you have set the QPWRRSTIPL system
value.
• Disk failure with device parity protection or mirrored protection: In many cases,
the system can continue running without full disk protection until the failed unit is
replaced.
• Disk failure without disk protection: This is like a power failure without protection.
The system stops immediately. The system must reconstruct information about jobs
that were running and files that were open after the disk is repaired or replaced.
• Failure of a critical operating system program: The system will stop immediately,
just as it does if an unprotected power failure or disk failure occurs. The system
attempts to copy the contents of main memory so that the problem can be analyzed.
This is called a main storage dump. When the system stops, you see the Main
Storage Dump Manager Occurred display.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restart after abnormal end


IBM i

• Actions taken by the system:


– Close files that were in use.
– Rebuild access paths that were open.
– Verify file constraints.
– Generate disk configuration error report if disks are inaccessible.
– For serious software problems, prompt to copy main storage dump.
• Normal IPL:
– System determines when to rebuild and verify.
• Attended IPL (refer to Backup and Recovery manual for
specific procedure):
– Edit Rebuild of Access Paths display.
– Edit Check Pending Constraints display.
• Recover from damaged objects and unreadable sectors (see
Backup and Recovery manual for specific procedures).
© Copyright IBM Corporation 2012

Figure 10-75. Restart after abnormal end OL1914.1

Notes:
When your system starts, it checks to ensure that it can access all of the disk units that are
configured. If it cannot access one or more disk units, you are shown the Disk
Configuration Error Report display:
Disk Configuration Error Report
Type option, press Enter.
5=Display Detailed Report

Option Error
_ Missing disk units in the configuration
Following a temporary power outage you may see the display because power has been
restored to the processor but not to the peripheral devices. Wait to respond to the display
until power is restored to all the disk units. The system's ability to access all the disk units
when the IBM Power System with IBM i is starting, particularly if you have the continuously
powered main store feature, is important for a successful recovery. If disk units are not

10-110 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty available, the system may not be able to recover changed pages of memory. This can
lengthen the time it takes to perform the IPL.
This screen may also be presented:
• After abnormal termination, if the IBM Power System with IBM i is unable to activate all
the DASD on the re-IPL
• During any IBM Power System with IBM i IPL that has a similar problem, even if normal
system shutdown had taken the system down last
If your system encounters a serious software problem, you are shown the Main Storage
Dump Manager Occurred display:
Main Storage Dump Manager Occurred
S/N xxxxxxxx

The system has failed. Report the following information to


your IBM service representative.

Function 11 . . . . . : A1D03000
Function 12 . . . . . : 69B0015F
Function 13 . . . . . : 0000308F
Function 14 . . . . . : 3FFFDE00
Function 15 . . . . . : 0C211008
Function 16 . . . . . : 00000000
Function 17 . . . . . : 00000000
Function 18 . . . . . : 00D5A400
Function 19 . . . . . : 00CDA400
Type/Model/Feature . . : 9401 150 2270

Warning: The Main Storage Dump (MSD) must be copied for service.
Failure to copy the Main Storage Dump will limit
the ability to diagnose the failure.
Press Enter to copy the MSD for service or view the MSD.
F3=Exit F12=Cancel
Follow the instructions for your service provider in responding to this display. In most
cases, you should make a copy of the main storage dump, either to tape media or to
auxiliary storage (disk), to assist with diagnosing the problem.
The IBM i Service Functions book has more information about the Main Storage Dump
Manager function.
When you have solved whatever problem caused your system to stop, you must start it
again. In some cases, you start the initial program load (IPL) yourself. In other cases, such
as a power loss, the system starts automatically. When you start your system again after it
ends abnormally, the system tries to put things back in order. It closes files that were in use,

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

rebuilds access paths that were open, and verifies file constraints. This process can take a
long time.
If you want the system to determine when to rebuild and verify, perform a normal
(automatic) IPL to restart your system. If you want to view and change the schedules for
rebuilding access paths and verifying referential constraints, follow the steps in the Backup
and Recovery manual.

10-112 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Edit Rebuild of Access Paths


IBM i

© Copyright IBM Corporation 2012

Figure 10-76. Edit Rebuild of Access Paths OL1914.1

Notes:
The Edit Rebuild of Access Paths display shows the names of the file members that have
immediate or delayed maintenance access paths that are not valid.
The display allows you to rebuild the access path for a given member of the file. The
access path for a file member is marked as not valid when the system ends abnormally and
the file member is in use.
Files with journaled access paths and files with rebuild maintenance of the access path are
not shown on the Edit Rebuild Access Path display.
When a sequence value is selected and the Enter key is pressed, the status field is
updated to show the current rebuild condition of the access path.
If you see More... on the lower right side of your display, there is more information to
view. Press Page Down (or Roll Up) to move toward the end of the information. Press Page
Up (or Roll Down) to move toward the beginning of the information.
If you see Bottom instead of More..., you are at the end of the information.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The following sequence values can be selected:


1-99=Rebuild sequence
Rebuild during IPL (number less than IPL Threshold)
If the sequence value is a number less than or equal to the IPL threshold value, the access
path is rebuilt during the IPL. This recovery option ensures that the file's access path is
rebuilt before the job uses the file. Note that rebuilding access paths during the IPL causes
the IPL to run longer.
Rebuild after IPL (number greater than IPL Threshold)
If the sequence value is a number greater than the IPL threshold value, the access path is
rebuilt after the IPL is completed. Jobs cannot use a file whose access path is rebuilt after
the IPL, until the rebuilding of the access path for the file is complete. However, jobs not
using a file whose access path is rebuilt after the IPL, can begin running immediately after
the IPL is complete.
*OPN=Rebuild at open
The access path is rebuilt when the file is next opened. If the access path has unique keys,
rebuilding the access path at open time prevents some applications from adding and
updating records to the file until the rebuild of the access path is complete.
*HLD=Hold the rebuild
The access path is rebuilt when the sequence value is changed to 1-99 or *OPN.
Sequence
The sequence in which access paths are rebuilt is determined by the values assigned to
them. The possible values include: whole numbers ranging from 1 through 99, *OPN, and
*HLD. One (1) represents the highest priority path and is rebuilt first. Whether paths with
values 1 through 99 are rebuilt before or after the IPL is determined by the value specified
on the THRESHOLD parameter. *OPN designates a value of 100, which means the access
path is rebuilt the next time the file is opened, and *HLD designates a value of 200, which
means the access path is not rebuilt until the value has been changed to *OPN or to a
number ranging from 1 through 99.
Status
The status values are:
RUN
The access path is being rebuilt.
READY
The access path is waiting to be rebuilt according to its sequence number.
WAIT
The access path is rebuilt when the required locks are obtained.

10-114 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
HELD
The access path is rebuilt when the user changes the sequence to *OPN or to a value
ranging from 1 through 99.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Edit Check Pending Constraints


IBM i

© Copyright IBM Corporation 2012

Figure 10-77. Edit Check Pending Constraints OL1914.1

Notes:
You can define required attributes for physical files on the system. These are referred to as
referential constraints or simply constraints. When you perform an IPL after the system
ends abnormally or when you restore database files, the system checks the validity of file
constraints. Refer to the DB2 UDB for IBM i Database Programming document for more
information about using referential constraints.
If database constraints are marked for verification, you are shown the above display.
The Edit Check Pending Constraints display shows a list of constraints in check pending.
The display includes the status, constraint name, file name, library name, the estimated
time to verify the constraint, the current elapsed time since verification started, and
constraint type.
If you see More... on the lower right side of your display, there is more information to
view. Press Page Down (or Roll Up) to move toward the end of the information. Press Page
Up (or Roll Down) to move toward the beginning of the information.
If you see Bottom instead of More..., you are at the end of the information.

10-116 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Sequence Entry Field


In this field, you can enter a relative sequence number from one through 99 specifying the
order in which the constraints will be verified. You can also enter *HLD to hold the constraint
for verification at a later time.
Status
The status values are:
RUN
The constraint is being verified.
READY
The constraint is waiting to be verified according to its sequence number.
NOTVLD
The access path associated with the constraint is not valid.
HELD
The constraint is not to be verified. Change the Seq column to a value from one through
99 to change this state.
WAIT
The constraint is verified when the required locks are obtained.
CHKPND
An attempt was made to verify the constraint but it is still in check pending.
Constraints
These three columns identify the constraint name, the file associated with the constraint,
and library in which the file resides.
The display only shows the first five characters of the constraint name. If the name is longer
than five characters, a greater than sign (>) to the right indicates the name is longer. Press
F22 to see the entire constraint name.
Verify Time
This column shows the estimated time required to verify the constraint, on a dedicated
system.
Elapsed Time
This column shows the elapsed time already spent verifying the constraint whose status is
RUN.
Function Keys
F1=Help
Provides additional information about using the display or a specific field on the display.

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

F3=Exit
Exits the current task and returns to the display from which the task was started.
F5=Refresh
Re-displays the list showing any new constraints and removes constraints that no
longer belong in the list. Shows changes in state and check pending.
F11=Display type
Shows the list again, but with different information.
F12=Cancel
Returns to the previous menu or display.
F13=Repeat all
Changes the sequence value for constraints of the same sequence value group (1-99,
*HLD) and status condition (RUN, HELD, and so on). The change is applied to the
constraints that follow the selected constraint in the display list that have the same
sequence value and status condition as the selected constraint.
F15=Sort by
Sorts the constraints by status, constraint name, file, library, ascending verify time, or
descending verify time.
F16=Repeat position to
Repeats the previous position to operation.
F17=Position to
The list is positioned to a specified constraint name. If the name is not found, the list
begins with the entry displayed immediately before your request. You can also enter
*TOP or *BOT to position the list to the beginning or to the end.
F22=Display constraint name
Displays the entire constraint name. Use this key to show the entire name when a
greater than sign (>) appears to the right of the constraint name.

10-118 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (1 of 3)
IBM i

1. True or False: The terms disk pool and IASP are terms that are not
interchangeable.

2. The maximum number of basic ASPs you can create is ____, and the
maximum number of IASPs you can create is ____.
a. 32 and 255
b. 64 and 128
c. 128 and 64
d. 255 and 32
e. The number is the same for both

3. ________ is a hardware function that protects data from being lost


because of one disk unit failure or damage to the disk drive.
a. Mirroring
b. RAID-5
c. RAID-6
d. IASPs

© Copyright IBM Corporation 2012

Figure 10-78. Checkpoint (1 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (2 of 3)
IBM i

4. ______ is a type of disk protection that is implemented through software.


a. RAID-5
b. RAID-6
c. Mirroring
d. ASPs

5. Mirroring can be implemented at which of the following levels?


a. Disk
b. IOA
c. IOP
d. Bus
e. All of the above

6. True or False: The ability to access and manage disk units is a function that is
automatically available when you install IBM i Navigator.

© Copyright IBM Corporation 2012

Figure 10-79. Checkpoint (2 of 3) OL1914.1

Notes:

10-120 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (3 of 3)
IBM i

7. True or False: The OS security officer user ID and password are different from the
service tools security officer user ID and password.

8. Which of the following is not usually the cause of an abnormal system end?
a. Power failure
b. Disk failure
c. User error
d. Failure of critical IBM i program

9. True or False: During a normal IPL, after there has been an abnormal end, the
system determines which access paths need to be rebuilt.

10. True or False: During an attended IPL, after there has been an abnormal end, the
user is not presented with any options for rebuilding access paths.

© Copyright IBM Corporation 2012

Figure 10-80. Checkpoint (3 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 10. Disk management 10-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Explain the concept of disk pools
• List the different types of auxiliary storage pools (ASPs) that can be
configured
• Explain some of the benefits of implementing the different types of ASPs
• Explain the concepts of device parity and mirrored protection
• Explain the difference between RAID-5 and RAID-6 protection
• Describe the different levels at which mirrored protection can be
implemented
• Describe how to find the correct procedure for disk configuration and
recovery
• Describe the disk unit functions of the IBM i Navigator
• Describe the effects of an abnormal system end and the recovery
procedure

© Copyright IBM Corporation 2012

Figure 10-81. Unit summary OL1914.1

Notes:

10-122 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 11. Backup and recovery strategy using


save/restore

What this unit is about


The save and restore procedures are the foundation for a backup and
recovery plan. A knowledge of how to save the system, in order be
able to restore that part of the system that is in error is critical to a
disaster recovery plan.
If it would never be necessary to restore, there would be no need to
make a save!
This unit does not discuss other facilities available for ensuring system
integrity. These are discussed in another unit.

What you should be able to do


After completing this unit, you should be able to:
• List the different types of failures that can occur on the system
• List the different media types that can be used for backup of your
data
• Perform the steps required to set up and use a virtual tape drive
• Explain which commands are used to save which types of data
• Explain the difference between the SAVSYS and SAVSYSINF
command
• Identify the procedures used to save and restore different types of
system information

How you will check your progress


• Checkpoint questions
• Lab exercise

References
http://publib.boulder.ibm.com/iseries > i 7.1 > Systems
management > Backup and Recovery

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• List the different types of failures that can occur on the system
• List the different media types that can be used for backup of
your data
• Perform the steps required to set up and use a virtual tape
drive
• Explain which commands are used to save which types of data
• Explain the difference between the SAVSYS and SAVSYSINF
command
• Identify the procedures used to save and restore different
types of system information

© Copyright IBM Corporation 2012

Figure 11-1. Unit objectives OL1914.1

Notes:

11-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Overview of the save/restore


capabilities

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-2. Topic 1: Overview of the save/restore capabilities OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How important is save/restore?


IBM i

It is the foundation on which your


disaster recovery plan is built.

Your company

Disaster Disaster
recovery recovery
plan plan

Save/restore

© Copyright IBM Corporation 2012

Figure 11-3. How important is save/restore? OL1914.1

Notes:
The method that you use to back up your server depends upon your backup strategy. If you
do not have a strategy, review the information in Planning a Backup and Recovery
Strategy. After reviewing the information, determine how you should save your data.
The save and restore commands are the foundation for a backup and recovery plan. A
knowledge of how to save the system, in order be able to restore that part of the system
that is in error is critical to a disaster recovery plan.
If it would never be necessary to restore, there would be no need to make a save!
Think of the data on your computer as company assets, the same as inventory and fixed
assets. It has value to the company and it would be difficult to do business if it were lost.
Save and restore is the foundation upon which all recovery plans are built.

11-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Uses for the save and restore capabilities


IBM i

• Recover from program or system failure.

• Save system storage.

• Exchange information between systems.

• Store infrequently used objects offline.

• Note: Normally, objects are frequently saved and infrequently


restored.

© Copyright IBM Corporation 2012

Figure 11-4. Uses for the save and restore capabilities OL1914.1

Notes:
The Save commands (SAVxxx) allow you to copy data from the system to off-line media,
virtual media, or a savefile, so that it can then be restored if needed. These commands can
also be used for exchange of information between like systems and to archive information
no longer needed on a daily basis.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Failures that can occur


IBM i

• Six general types:


– Disk failure
– System failure
– Power failure
– Program failure
– Human error
– Complete system loss

• Objective: Get your applications back online as soon as


possible.

© Copyright IBM Corporation 2012

Figure 11-5. Failures that can occur OL1914.1

Notes:
This visual lists the different types of losses which may occur on a system:
• Disk failure: Loss of a disk unit (if not any form of RAID protection is active)
• System failure: Hardware failure other than DASD
• Power failure: Loss of power
• Program failure: Anomalies in programs
• Human error: Problems created by personnel mistakes
• Complete system loss: Due to fire, flood, tornado, or other natural disasters

11-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 2: Media used to back up your


system

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-6. Topic 2: Media used to back up your system OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Managing tapes
IBM i

• Tape management
– Rotating tapes
– Naming and labeling tapes
– Preparing tapes and tape drives
– Verifying tapes
– Storing tapes
– Monitoring tapes for errors

© Copyright IBM Corporation 2012

Figure 11-7. Managing tapes OL1914.1

Notes:
Since tapes are the prevalent method of saving and recovering your system data, you
should institute a tape management process because managing your tapes is an important
part of your save operation. If you cannot easily locate tapes that are correct and
undamaged when you need to do a recovery, the time spent creating the save tape was
wasted.
Make decisions about your procedures for managing tapes, write down those decisions,
and monitor the procedures regularly.
Tape management requires the following:
Rotating tapes: An important part of a good save procedure is to have more than one set
of tapes. When you perform a recovery, you may need to go back to an old or previous set
of saved tapes. If you discover that your most recent set of backup tapes is damaged, or if
you discover that a programming error has damaged the data on the most recent backup
tapes, you may have to use a previous version or a previous set of the backup tapes.

11-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Naming and labeling tapes: As a standard practice all tapes should always be labeled to
assist the system operator in loading the correct tape to perform a save. Use
easy-to-identify labels to define what information is contained on the tape and which tape
set it is part of.
Preparing tapes and tape drives: Tape drives need regular cleaning as the heads collect
dust which may cause data errors. Also, before you can use a tape it must be initialized
with the Initialize Tape (INZTAP) command.
Verifying that the correct tapes are loaded: This can be done manually by the system
operator or by the system with the VOL parameter (on the save or restore commands)
which specifies a list of volume identifiers that can be used to perform the requested
operation. The system ensures that the tapes that are loaded by the operator are the
correct volumes and in the order specified on the command. If an error occurs, a message
is sent to the operator requesting the correct tape volumes. At that point, the operator can
either load the tape being called for, or select the option to override the request and use the
tape that is currently loaded.
Storing tapes: Tapes should be stored in a safe but accessible location away from where
the system is located. Off-site storage is highly recommended to avoid problems due to site
loss.
Monitoring for tape errors: You can determine if a tape is wearing out by printing the error
log. Use the Print Error Log (PRTERRLOG) command and specify TYPE(*VOLSTAT). If you
suspect that a tape has problems and you want to check the integrity of saved information,
use the Display Tape (DSPTAP) or the Duplicate Tape (DUPTAP) command. These
commands read the entire tape and detect objects on the tape that cannot be read.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Tape and tape library system


IBM i

• Various sizes and capacities are available.


– ½ inch, ¼ inch, and 8 mm
– Data compression/compaction (selected models)
• Support for parallel tape operations is:
– Available on systems that are at V4R4 and higher
– Available through a set of APIs (since V5R4)
– Supported as a part of standard operations in Backup Recovery and Media
Services (BRMS)
– Allows use of more than one media device simultaneously
• Two categories of hardware are available.
– Automated tape devices: Automatic cartridge loader and tape libraries
• Combination of hardware and software
• Allows for storing, cataloging, and loading tapes
• Supported by Backup Recovery and Media Services (BRMS)
– Single tape devices

© Copyright IBM Corporation 2012

Figure 11-8. Tape and tape library system OL1914.1

Notes:
The system offers many different types of tape drives to meet a variety of requirements for
cost, capacity, and performance. In most cases, you can attach enough tape drives with
sufficient capacity to save your entire system without operator intervention.
For more information, refer to IBM i Information Center web site.
Single tape devices
Single tape devices enable you to enjoy the benefits of tape media with your IBM i server.
They are excellent for smaller companies that may not have much data to back up or to
retrieve. (LTO4 Cartridge capacity = 800 GB uncompressed, LTO5 Cartridge capacity = 1.5
TB!) If a full backup of your server fits on a single tape, you can perform unattended
backups with a single tape device. However, once your backup exceeds one tape,
someone needs to be present to switch the tapes in the drive as the backup runs.
Automatic cartridge loaders
Automatic cartridge loaders provide automation solutions for small to medium size
environments. Automatic cartridge loaders can hold multiple cartridges and perform

11-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty unattended backups. Though they have fewer automation capabilities than tape libraries,
you can use tape management software to support automated, centrally scheduled,
policy-managed backup and storage operations. There are two ways that you can use tape
cartridges with an automatic cartridge loader:
Tape libraries
Tape libraries can help you perform unattended save and restore operations, archival and
retrieval operations, spool archiving, and other tape-related tasks. Tape libraries are often
used with some form of automation software, and are capable of supporting multiple
systems across different platforms and large quantities of cartridges. In these
environments, a media management application often maintains the cartridge inventory
and handles most of the tape library tasks. However, you can also use tape libraries
without a media management application. In these environments the tape library can still
support some automated tape functions.
Automated tape devices
Automated Tape Library Systems are a combination of hardware and software that allow
you to store, catalog, and load large numbers of tapes without operator intervention. This
function is supported by Backup Recovery and Media Services (BRMS).
For further information, refer to Backup and Recovery (subtopic of Systems Management)
in the System i Information Center.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Tape library: Operating modes


IBM i

• Most tape library devices support three basic modes of


operation:
– Manual mode
• When a tape library is in this mode, it behaves like a stand-alone tape
device, and all cartridges must be manually loaded. Refer to Using a
Tape Resource as a Stand-alone Device for more information on using a
tape library as a stand-alone device.
– Automatic cartridge loader mode
• In this mode, the tape library behaves like a stand-alone tape device with
an automatic cartridge loader. When a cartridge is unloaded, the next
cartridge is automatically loaded until all cartridges have been used.
– Library mode
• When a tape library is in this mode, tape automation is available
(also known as random mode).

© Copyright IBM Corporation 2012

Figure 11-9. Tape library: Operating modes OL1914.1

Notes:
You can use IBM i navigator, IBM Systems Director Navigator for i, or 5250 emulation
(WRKCFGSTS command) to determine the status for your stand-alone tape device.
Occasionally, it may be necessary to use the tape resources in a tape library without the
benefit of the automation. An example of this would be when you perform an alternate IPL.
Another example would be when the tape library automation is disabled. Using the tape
resource in this fashion is referred to as stand-alone mode. In stand-alone mode, the tape
resource operates like other tape devices that are not in a tape library. Most tape libraries
provide modes or commands to move media to a tape resource. Refer to the operator
information for your tape library for the different operating modes available. When
automation is not used, the tape library operates as an automatic cartridge loader for the
tape device and loads cartridges individually or sequentially in the device.
Tape automation with BRMS
The combination of the BRMS software and a tape library provides a total solution for all
your tape automation requirements. When using tape automation and BRMS, you can
design and carry out a solution that shows the results in the following ways:

11-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Reduction in operational costs


• Less manual intervention required to operate tape units because most tape operation is
automated and unattended
• Improved system availability
• Reduction in time for tape mounting and backup times, BRMS enables you to
streamline your backups
• Reduction in capital cost
• Archiving and retrieving functions enable you to increase the quantity of on line
(on-disk) data that can be moved to less expensive tape media
• Improve service
• Faster and more accurate responses to your tape-related requests, greater control of
your tape management operation
• Reduction in management cost
• Automation and simplification of day-to-day operations, such as tape and disk capacity
management
For more detailed information on BRMS, refer to the Backup Recovery and Media Services
articles in the Information Center, and the Backup Recovery and Media Services web site.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator: Manage tapes and tape libraries


IBM i

Right-click

© Copyright IBM Corporation 2012

Figure 11-10. IBM i Navigator: Manage tapes and tape libraries OL1914.1

Notes:
You can manage Stand Alone Tape drives, Virtual Tape drives and Tape Libraries with IBM
i Navigator.
Configuration and Service > Hardware > Tape Devices > Stand-Alone Devices >
right-click the tape device you can choose.
• Make Available: Makes the tape device available
• Make Unavailable: Makes the tape device unavailable
• Reset: If you click OK on the Confirm Reset dialog, you will reset the tape device as
well as the I/O processor and all devices attached to the I/O processor. You cannot
reverse this action.
• Format: Initialize a tape in the tape device.
• Display Volume Labels: Displays information about the files on the tape
• Duplicate: Copies the contents of a tape or set of tapes to another tape or set of tapes

11-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Print Tape:


- Volume labels: Prints volume located on the tape
- Print save/restore information located on the tape
- Print selected tape volume contents
• Properties: Displays the properties of the selected item. Among other things there is a
Capabilities Tab. If you choose this tab you find the supported densities and
capabilities.
Configuration and Service > Hardware > Tape Devices > Tape Libraries and right-click
the device to choose an option.
• Make Available
• Make Unavailable
• Reset: Resets the tape library I/O processor, and all the attached devices
• Eject Cartridges: Ejects cartridges from the tape library
• Properties
You can use green screen (5250 emulation session) commands to perform all of these
functions. You see some of these commands on the next page.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Systems Director Navigator for i:


Manage tapes and tape libraries (1 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-11. IBM Systems Director Navigator for i: Manage tapes and tape libraries (1 of 3) OL1914.1

Notes:
You can manage Stand Alone Tape drives, Virtual Tape drives and Tape Libraries with IBM
Systems Director Navigator for i.
Configuration and Service > Show All Configuration and Service Tasks > Tape
Devices [»] > Stand-Alone Devices > Select [»] at the tape device of your choice.
• Make Available: Makes the tape device available
• Make Unavailable: Makes the tape device unavailable
• Reset: If you click OK on the Confirm Reset dialog, you will reset the tape device as
well as the I/O processor and all devices attached to the I/O processor. You cannot
reverse this action.
• Format: Initialize a tape in the tape device.
• Display Volume Labels: Displays information about the files on the tape
• Duplicate: Copies the contents of a tape or set of tapes to another tape or set of tapes
• Print Tape:

11-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty - Volume labels: Prints volume located on the tape


- Print save/restore information located on the tape
- Print selected tape volume contents
• Properties: Displays the properties of the selected item. Among other things there is a
Capabilities Tab. If you choose this tab you find the supported densities and
capabilities.
Configuration and Service > Hardware > Tape Devices > Tape Libraries and right-click
the device to choose an option.
• Make Available
• Make Unavailable
• Reset: Resets the tape library I/O processor, and all the attached devices
• Eject Cartridges: Ejects cartridges from the tape library
• Properties
You can use green screen (5250 emulation session) commands to perform all of these
functions. You see some of these commands on the next page.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Systems Director Navigator for i:


Manage tapes and tape libraries (2 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-12. IBM Systems Director Navigator for i: Manage tapes and tape libraries (2 of 3) OL1914.1

Notes:
You can manage Stand Alone Tape drives, Virtual Tape drives and Tape Libraries with IBM
Systems Director Navigator for i.
Configuration and Service > Hardware > Tape Devices > Stand-Alone Devices >
Select [»] at the tape device of your choice.
• Make Available: Makes the tape device available
• Make Unavailable: Makes the tape device unavailable
• Properties Reset: If you click OK on the Confirm Reset dialog, you will reset the tape
device as well as the I/O processor and all devices attached to the I/O processor. You
cannot reverse this action.
• Format: Initialize a tape in the tape device.
• Display Volume Labels: Displays information about the files on the tape
• Duplicate: Copies the contents of a tape or set of tapes to another tape or set of tapes

11-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Print Tape:


- Volume labels: Prints volume located on the tape
- Print save/restore information located on the tape
- Print selected tape volume contents
• Properties: Displays the properties of the selected item. Among other things there is a
Capabilities Tab. If you choose this tab you find the supported densities and
capabilities.
Configuration and Service > Hardware > Tape Devices > Tape Libraries and right-click
the device to choose an option.
• Make Available
• Make Unavailable
• Reset: Resets the tape library I/O processor, and all the attached devices
• Eject Cartridges: Ejects cartridges from the tape library
• Properties
You can use green screen (5250 emulation session) commands to perform all of these
functions. You see some of these commands on the next page.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Systems Director Navigator for i:


Manage tapes and tape libraries (3 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-13. IBM Systems Director Navigator for i: Manage tapes and tape libraries (3 of 3) OL1914.1

Notes:
Properties
General: General information as is stored in the device description
Options: Vary – on at system restart, Make device private when made available, Unload
cartridge when made unavailable, message queue selection.
Capabilities: Shows what densities, read/write, optimum / maximum block sizes,
compaction and Worm capability the device has.
Location and Logical address shows resource information.

11-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Devices: Tapes and tape libraries


IBM i

WRKCFGSTS

WRKMLBSTS

© Copyright IBM Corporation 2012

Figure 11-14. Devices: Tapes and tape libraries OL1914.1

Notes:
You can view the status of all the configuration objects by using the Work with
Configuration Status (WRKCFGSTS) command. This interactive command shows the
following:
Status of each configuration object:
Attachments of configuration objects
Status of jobs
Connection status
The WRKCFGSTS command shows a successful connection status as active (varied on). To
ensure that your configuration objects are properly configured, you should review the
network interface, line, controller, and device descriptions.
Also, you can use the Menu Tape (GO TAPE). Here are the following options for working
with tapes available:
1. Display tape information

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

2. Initialize a tape
3. Print contents of a tape
4. Save
5. Restore
6. Work with tape device status
7. Verify tape
70. Related commands
Tape library devices are configured with tape library device descriptions for the tape library.
There are also separate tape device descriptions for the tape resources. These tape device
descriptions are the devices that are used for stand-alone operation. To use the tape
resources in stand-alone mode, the resource must be available to the tape device
description. This is done by either deallocating the tape resource from the tape library or
varying off the tape library device. Once the tape resource is available, you can vary on the
tape device description, and issue commands to this device. The tape resource on the
WRKMLBSTS screen will now show a status of UNAVAILABLE / VARIED OFF. No tape
library functions operate for this tape resource. The tape resource needs to have cartridges
mounted manually, by a device mode, or by device operator panel commands.

11-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

INZTAP: Initialize Tape


IBM i

© Copyright IBM Corporation 2012

Figure 11-15. INZTAP: Initialize Tape OL1914.1

Notes:
The Initialize Tape (INZTAP) command is used to initialize magnetic tapes for use on the
system. This command is used to initialize a tape with a standard volume label for standard
label magnetic tape processing, or to initialize a tape with no labels for unlabeled magnetic
tape processing.
The only required parameter is the DEV parameter.
Specifies the name of the device in which the volume being initialized is placed. Specify the
name of the tape or media library device.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Virtual tape support


IBM i

• Key advantages
– Supported on all save/restore commands, virtual I/O, and APIs
(except SAVSTG)
– Can be faster than saving directly to tape
– Eliminates the following save file limitations
– Eliminates media error limitations
– Once checkpoint is reached, saves can be restarted
– Duplicate saves to media (DUPTAP or DUPMEDBRM)
– On-site and off-site storage

© Copyright IBM Corporation 2012

Figure 11-16. Virtual tape support OL1914.1

Notes:
Virtual Tape support was added at V5R4. Virtual tape support can help when you have an
amount of data to save during the same time period and do not have a large number of
tape devices to do the saves directly. Virtual tape support provides “extras” that are not
available with saves to a save file.
Virtual tape devices use virtual tape volumes that are created on a server's disk units. This
allows IBM i SAVxxx commands (except SAVSTG) to be used to back up data to virtual
tapes stored on disk rather than on actual tapes.
Key advantages
• Supported on all save/restore commands, virtual I/O, and APIs (except SAVSTG)
• Can be faster than saving directly to tape
- Similar performance to save files
- Best performance in separate ASP
• Eliminates the following save file limitations:

11-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty - One library per save file


- SAVSYS not supported on save file
- Parallel saves not supported on save file
- 1 TB size limitation on save file
• Eliminates media error limitations:
- Saves ending due to tape device or media errors
- Save-while-active checkpoint restriction
• Once checkpoint reached, saves can be restarted
• Duplicate saves to media (DUPTAP or DUPMEDBRM)
- Save when tape devices are available
- At your convenience
• On-site and off-site storage
- Keep virtual volumes on systems as needed
- Keep duplicated volumes off-site

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Virtual tape implementation


IBM i

CRTIMGCLG ADDIMGCLGE

(3) (4)

LODIMGCLG
(5)
CRTDEVTAP
(1)
WRKCFGSTS
(2)

© Copyright IBM Corporation 2012

Figure 11-17. Virtual tape implementation OL1914.1

Notes:
The objective is to save to virtual tapes that are really storage areas on the IBM i partition.
No physical tape devices need to be attached during the backup (or restore). The numbers
in this visual represent the steps for implementing IBM i virtual tape support:
1. Create a tape device description with a “virtual attribute.”
2. Vary on your virtual tape device (use the WRKCFGSTS command, option 8 - Work with
status, then option 1- Vary on) and insure that it is varied on before continuing.
3. Create a tape image catalog.
4. Add image catalog entries (up to 256) to the image catalogue. Entries represent a virtual
tape volume.

11-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

Take care of the image size of the entry! An entry can be created with the size VRT256K,
which indicates the virtual tape just can contain 256K of data.

5. The Load / Unload Image Catalog (LODIMGCLG) command is used to associate an


image catalog and its images to a virtual device.
After this, you can save to the virtual tape or restore from it. You can also copy the virtual
tape image catalog entry data to an actual tape device or “media,” for example, sending it
to a second system. If the catalog is in an Independent Auxiliary Storage Pool (IASP), the
IASP contents can be switched to another system or mirrored to a second IASP on another
system.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create a virtual tape device description (1 of 2)


IBM i

• Create with the CRTDEVTAP command


• Can change existing device description to become a virtual
tape device

© Copyright IBM Corporation 2012

Figure 11-18. Create a virtual tape device description (1 of 2) OL1914.1

Notes:

11-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create a virtual tape device description (2 of 2)


IBM i

• Create with IBM i Navigator

© Copyright IBM Corporation 2012

Figure 11-19. Create a virtual tape device description (2 of 2) OL1914.1

Notes:
Select: Configuration and Services > Hardware > Tape Devices. Right-click
Stand-alone Devices and select Create Virtual device.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create the image catalog for virtual tape support


IBM i

• CRTIMGCLG command
• Create using System i Navigator

© Copyright IBM Corporation 2012

Figure 11-20. Create the image catalog for virtual tape support OL1914.1

Notes:

11-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Create image catalog through System i Navigator


IBM i

© Copyright IBM Corporation 2012

Figure 11-21. Create image catalog through System i Navigator OL1914.1

Notes:
Select: Configuration and Services > Hardware > Tape Devices. Right-click Tape
Image Catalog and select Create Image Catalog.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Create new virtual volume using WRKIMGCLG


command or ADDIMGCLGE command
IBM i

© Copyright IBM Corporation 2012

Figure 11-22. Create new virtual volume using WRKIMGCLG command or ADDIMGCLGE command OL1914.1

Notes:
The WRKIMGCLG and ADDIMGCLGE commands and accompanying IBM i interfaces are
shown. These screens allow you to create a new virtual volume for a virtual tape drive.

11-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System i Navigator: Create new virtual volume


IBM i

© Copyright IBM Corporation 2012

Figure 11-23. System i Navigator: Create new virtual volume OL1914.1

Notes:
Allocate storage size parameter
When *IMGSIZ is specified, the full amount of storage is determined by the image size
parameter and is allocated at create time. When the default of *MIN is specified, the newly
created virtual tape volumes initially use 4 KB of storage and allocate additional storage as
needed until the image size is reached.

Note

For ASPs smaller than 100 GB, virtual tape does not allocate more than 95% of the ASP
storage. For ASPs larger than 100 GB, virtual tape does not allocate additional storage
once the amount of free space reaches 5 GB. It is recommended that *IMGSIZ be used
when you are not sure if there is enough free storage to support the image size.
New: Lesser of 5% or 5 GB storage remains allocated.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Tape volume name parameter


The tape volume name is equivalent to a cartridge ID label used by a tape library. It
uniquely identifies the volume, even when it is non-labeled format, so that it can be
automatically mounted when specified in a volume list. Duplicate volume names are not
allowed within the same image catalog.

Note

BRMS does not allow duplicate volume names in any catalog or physical drive.

The Tape Volume Name can be changed using the Initialize Tape (INZTAP) command.
Density parameter
The density parameter for the volume is used to control the optimum block size that the
volume uses.
Volumes with a density of *VRT256K use an optimum block size of 256 KB and are
compatible with 35xx type of devices and the newer QIC tape devices.
Volumes with a density of *VRT240K use an optimum block size of 240 KB and are
compatible with VXA and 8mm technology devices along with the 35xx and newer QIC
devices.
Volumes with a density of *VRT64K use an optimum block size of 64 KB and are
compatible with 3490F model 18 track media, VXA and 8mm technology devices, and with
the 35xx and newer QIC devices.
Volumes with a density of *VRT32K do not use an optimum block size and are compatible
with all devices.

Note

You should specify the largest compatible optimum block size to Maximize performance.

The density can be changed using the Initialize Tape (INZTAP) command.
Dependent catalog characteristics
Dependent catalog entries can be:
• Unloaded
• Loaded
• Mounted
• Reordered

11-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Snapshot of the referenced catalog


New reference catalog volumes not seen by dependent
LIC, OS, or PTF install not supported
LP install supported
DLTIMGCLG deletes dependent catalog if *KEEP parameter is *YES

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

LODIMGCLG command (using WRKIMGCLG)


IBM i

© Copyright IBM Corporation 2012

Figure 11-24. LODIMGCLG command (using WRKIMGCLG) OL1914.1

Notes:
The Load or Unload Image Catalog (LODIMGCLG) command is used to associate an image
catalog and its images to a virtual device. The status of the image catalog will be changed
based on the value specified for the Option (OPTION) parameter as follows:
*LOAD This causes the status of the image catalog to change to ready.
All image catalog entries that are in mounted or loaded status
are loaded in the specified virtual device. The allow save
attribute is set to not allow save for all image catalog files.
*UNLOAD This causes the status of the image catalog to change to not
ready. All image catalog entries are removed from the specified
virtual device. The allow save attribute is set to allow save for all
image catalog entries.
Only one image catalog can be associated with a virtual device. If the virtual device already
has an image catalog associated with it, you can use OPTION(*UNLOAD) to unload the
current image catalog.

11-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Load Image Catalog (using IBM i Navigator)


IBM i

© Copyright IBM Corporation 2012

Figure 11-25. Load Image Catalog (using IBM i Navigator) OL1914.1

Notes:
Select: Configuration and Services > Hardware > Tape Image Catalogs. At the right
pane, right-click the Image Catalog to load, and select Load Image Catalog.
At the popup screen select the virtual tape device the Image Catalog is to be connected to.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Virtual tape actions by IBM Systems Director


Navigator for i (1 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 11-26. Virtual tape actions by IBM Systems Director Navigator for i (1 of 2) OL1914.1

Notes:
At the IBM Systems Director Navigator for i window, open the IBM i management
pull-down. Select the entry Configuration and Service.
At the right pane, click Show all Configuration and Service tasks.

11-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Virtual tape actions by IBM Systems Director
Navigator for i (2 of 2)
IBM i

© Copyright IBM Corporation 2012

Figure 11-27. Virtual tape actions by IBM Systems Director Navigator for i (2 of 2) OL1914.1

Notes:
At the right pane, left click the [»] button next to Tape Devices.
At the pull-down menu, select the task you want to perform.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Optical storage
IBM i

• Optical device
– CD-ROM or DVD-ROM drive
– Optical media libraries
• Virtual optical storage
– Ability to duplicate to physical media
– Save cumulative PTF record
– Save to virtual optical
• Create a virtual optical device
• Vary on the device
• Create an image catalog
• Add a new image catalog entry
• Load the image catalog
• Initialize the new volume
• Run the save command
© Copyright IBM Corporation 2012

Figure 11-28. Optical storage OL1914.1

Notes:
Tape is the most common media that is used for save and restore operations. You can also
save your user data and your system data to optical media.
Optical media library devices allow you to archive information to optical media, and they
provide backup and recovery capability similar to tape media. The Optical Support book
provides more information about using optical media. If you want to substitute optical
media for tape in some of your existing procedures, you need to evaluate how to assign
saved objects to directories on the optical media and how to name the media.
Optical storage refers to any storage method that uses a laser to store and retrieve data
from media. Examples of this media are compact disk read-only memory (CD-ROM), digital
video disk read-only memory (DVD-ROM), digital video disk random access memory
(DVD-RAM), write-once read-many (WORM) optical cartridges, and erasable optical
cartridges.
Another option that you can use for optical storage is virtual optical storage. When you use
virtual optical storage, you create and use optical images that are stored on your disk units.

11-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Optical devices


Your server comes with a rack-mounted CD-ROM or DVD-ROM drive. As an option, you
can order a DVD-RAM drive as a feature to replace your internal drive or to have it in
addition to your internal drive. All optical drives are multi-user devices that multiple users
can access concurrently.
Optical media libraries
The System i server supports both directly-attached (SCSI) and LAN-attached optical
media library devices. These devices are an excellent alternative to storing data
traditionally kept on paper, diskette, microfilm, microfiche, and tape. Optical libraries are
high capacity, random access devices that provide fast access to a large amount of data. In
addition, optical storage provides permanent, long term archive characteristics unmatched
by other storage mediums.
Virtual optical storage
When you use virtual optical storage, you create virtual images, CD or DVD images, that
exist on your server disk units. You can use virtual images to perform a variety of tasks:
• Install software such as Licensed Internal Code, program temporary fixes (PTFs), IBM i,
and licensed programs
• Distribute software
• Perform backups
• Create distribution media for central site
• Create save licensed programs media
Ability to duplicate to physical media
When a save is complete to virtual optical, you can transfer it to physical media at any time.
You also have the capability to send the stream files from the virtual optical save to another
system using FTP. If you have multiple servers, your strategy could be to save each system
to virtual optical and then FTP the stream files to a single server where the save to physical
media could take place. You can save the virtual images to tape in optical format, or you
can use the Duplicate Optical (DUPOPT) command to save the image to optical media.
Save cumulative PTF record
If you receive fixes on CD-ROM, you can install your fixes from an image catalog. To
maintain a complete record of all of the fixes that you apply, you can save these virtual PTF
images to media. Then, in a recovery situation, you can restore all of the cumulative PTF
images and automatically install them from the image catalog.
Save to virtual optical
Perform the following steps to save data to virtual optical media.
1. Ensure that the server has enough disk space to hold all the virtual images you are
going to create for your save operation.
2. Create a virtual optical device.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

A virtual optical device is a device description that supports virtual optical storage, like
an actual optical device description supports actual optical storage. One to 35 virtual
optical device descriptions can be active at a time on the server.
CRTDEVOPT DEVD(virtual-device-name) RSRCNAME(*VRT) ONLINE(*YES)
TEXT(text-description)
3. Vary on the virtual optical device.
VRYCFG CFGOBJ(virtual-device-name) CFGTYPE(*DEV) STATUS(*ON)
4. Create an image catalog for your save operation.
An image catalog is an object that can contain up to 256 image catalog entries. Each
catalog is associated with one user-specified integrated file system directory. The
system recognized identifier for the object type is *IMGCLG.
CRTIMGCLG IMGCLG(catalog-name) DIR(catalog-path) CRTDIR(*YES)
TEXT(image-description)
5. Add a new image catalog entry with a size of 48 MB to 16 GB. If you are performing a
SAVSYS, the first volume must be at least 1489 MB to accommodate the Licensed
Internal Code. If you plan to save the full operating system, add a new image catalog
entry with a size of 4 GB. If you plan to duplicate image catalogs to physical media, then
ensure you select a virtual image size that matches the size of the media you plan to
write to.
An image catalog entry is a position within an image catalog that contains information
about a virtual image that is located in the image catalog directory.
ADDIMGCLGE IMGCLG(catalog-name) FROMFILE(*NEW) TOFILE(file-name)
IMGSIZ(*DVD4700) TEXT(text-description)
6. Load the image catalog.
This step associates the virtual optical device to the image catalog. Only one image
catalog at a time can be associated with a specific virtual optical device.
LODIMGCLG IMGCLG(catalog-name) DEV(virtual-device-name) OPTION(*LOAD)
7. Initialize the new volume.
INZOPT NEWVOL(volume-name) DEV(virtual-device-name) TEXT(volume text)
Use the WRKIMGCLGE (Work with image catalog entries) command to select the image
to be initialized or use the LODIMGCLGE (Load or unload image catalog entry)
command to continue to the next volume to be initialized.
LODIMGCLGE IMGCLG(catalog-name) IMGCLGIDX(1) OPTION(*MOUNT)
When you have completed initializing the new volumes, leave the first entry in mounted
status.
8. Run the save command for your desired save operation, listing the virtual optical device
in the DEV parameter.

11-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Exercise: Media devices and virtual tape


IBM i

At the end of the lab, you should be able to:


• Issue the commands to display what backup devices are
recognized by the OS
• Perform the steps necessary to create and load virtual tapes to
be prepared for a save operation
• Note: The student user ID and password has changed.
Specifics are in the student notes and in the lab exercise.

© Copyright IBM Corporation 2012

Figure 11-29. Exercise: Media devices and virtual tape OL1914.1

Notes:
Lab setup instructions
The student user ID and password that you will use for the reminder of the lab exercises
has changed. Use the following for the remainder of the lab exercises.
In all of the instructions in this workbook, replace lower case xx with the team number
assigned to you by the instructor.
User id: OL51xx
Password: OL51PWD
Current lib: OL51xx
Your password is set to expired, you will need to change it the first time you sign on.
Each team has its own team library named OL51xx. Any objects created by the team
should be placed in your team library. All output is directed to an output queue named
OL51 in the library OL51LIB.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Save operations

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-30. Topic 3: Save operations OL1914.1

Notes:

11-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAV commands and menu options


IBM i
Options from Commands
Save menu

Licensed Internal Code


22 i5/OS objects is QSYS SAVSYS

User profiles SAVSECDTA


23 Private authorities
Configuration objects SAVCFG

SAVSTG
IBM-supplied directories SAV (see notes)

i5/OS optional libraries


21 QHLPSYS QUSRTOOL SAVLIB
*IBM
Licensed program libraries
QRPG QCBL Qxxxxx SAVLIB
*NONSYS
IBM libraries with user data
QGPL QUSRSYS QS36F #Library SAVLIB
*ALLUSR
All user libraries

23 Documents and folders SAVDLO


Distribution objects
SAV
User objects in directories
© Copyright IBM Corporation 2012

Figure 11-31. SAV commands and menu options OL1914.1

Notes:
You can access the save commands either from the menu GO SAVE or CL commands.
Which method you use depends upon the type of save strategy you use. If you are using a
simple save strategy, the GO SAVE menu options 21, 22, or 23 probably suffice. The
graphic above depicts the parts of your system that are saved when you use options 21,
22, or 23 from the Save menu.
If you have chosen to use a medium, a save strategy, or both, there are additional steps to
consider when determining your SAV strategy. Draw a picture of your system similar to the
one above. In your picture, break the section called All User Libraries into smaller
segments that match the way you plan to save user libraries.
To determine how and when you plan to save each part of your system, review the System
i Backup and Recovery.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save menu (second screen)


IBM i

© Copyright IBM Corporation 2012

Figure 11-32. Save menu (second screen) OL1914.1

Notes:

Note

Option 20 - Define save system and user data defaults. Select this option to define the save
system and user data defaults. These defaults are used by SAVE options 21, 22, and 23.

Following are the commands the system runs for the menu options 21, 22, and 23. In
parentheses () following the description is the name of the program for the menu option.
You may want to change this program if you need different values than the system-supplied
default values for the program.

11-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Important

If you are using the Hardware Management Console (HMC), you must back up the HMC in
addition to using the GO SAVE: Option 21 to obtain a complete save of your system.

Save and Restore menu options that bring the system to restricted state have been
enhanced, in IBM i 7.1, to gracefully end TCP/IP servers, Host servers and TCP/IP before
ending to restricted state. Save menu options 21 (Save entire system), 22 (Save system
data only), 23 (Save all user data) and 40 (Save all libraries other than the system library)
and Restore menu options 21 (Restore entire system), 22 (Restore system data only), 23
(Restore all user data) and 40 (Restore all libraries other than the system library) now
include the following commands:
ENDTCPSVR
ENDHOSTSVR
DLYJOB JOB(300)
ENDTCP
DLYJOB JOB(300)
before the ENDSBS SBS(*ALL) OPTION(*IMMED) command is issued. This enhancement is
available through PTF SI35204 for IBM i 6.1

Option number Description and commands


21 Entire system (QMNSAVE):

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK OR *NOTIFY)
SAVSYS
SAVLIB LIB(*NONSYS) ACCPTH(*YES)
SAVDLO DLO(*ALL) SAVFLR(*ANY)
SAV DEV('/QSYS.LIB/tape-device-name.DEVD')
OBJ(('/*')('/QSYS.LIB' *OMIT)
('/QDLS' *OMIT))(1) UPDHST(*YES)
STRSBS SBSD(controlling-subsystem)

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Option number Description and commands


22 System data only (QSRSAVI):

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK or *NOTIFY)
SAVSYS
SAVLIB LIB(*IBM) ACCPTH(*YES)
SAV DEV('/QSYS.LIB/tape-device-name.DEVD')
OBJ(('/QIBM/ProdData')
('/QOpenSys/QIBM/ProdData'))
UPDHST(*YES)
STRSBS SBSD(controlling-subsystem)

23 All user data (QSRSAVU):

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK or *NOTIFY)
SAVSECDTA
SAVCFG
SAVLIB LIB(*ALLUSR) ACCPTH(*YES)
SAVDLO DLO(*ALL) FLR(*ANY)
SAV DEV('/QSYS.LIB/tape-device-name.DEVD')
OBJ(('/*')('/QSYS.LIB' *OMIT)
('/QDLS' *OMIT)(1)
('/QIBM/ProdData' *OMIT)
('/QOpenSys/QIBM/ProdData' *OMIT))
UPDHST(*YES)
STRSBS SBSD(controlling-subsystem)

11-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVE option 21: Entire system


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK OR *NOTIFY)
SAVSYS
SAVLIB LIB(*NONSYS) ACCPTH(*YES)
SAVDLO DLO(*ALL) SAVFLR(*ANY)
SAV DEV( ' /QSYS.LIB/TAPxx. DEVD' )
OBJ( ( ' / *' ) ( ' /QSYS.LIB' *OMIT)
( ' /QDLS' *OMIT) ) (1) UPDHST(*YES)
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.

© Copyright IBM Corporation 2012

Figure 11-33. SAVE option 21: Entire system OL1914.1

Notes:
SAVE Option 21 runs program QMNSAVE in QSYS. You may use RTVCLSRC to retrieve the
source and modify it.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVE option 22: System data only


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK OR *NOTIFY)
SAVSYS
SAVLIB LIB(*IBM) ACCPTH(*YES)
SAVDLO DLO(*ALL) SAVFLR(*ANY)
SAV DEV( ' /QSYS.LIB/TAPxx. DEVD' )
OBJ( ( ' / QIBM/ProdData' )
( ' /QOpenSys/QIBM/ProdData‘ ) )
UPDHST(*YES)
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.

© Copyright IBM Corporation 2012

Figure 11-34. SAVE option 22: System data only OL1914.1

Notes:
SAVE Option 22 runs program QSRSAVI in QSYS. You may use RTVCLSRC to retrieve the
source and modify it.

11-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVE option 23: All user data


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK OR *NOTIFY)
SAVSECDTA
SAVCFG
SAVLIB LIB(*ALLUSR) ACCPTH(*YES)
SAVDLO DLO(*ALL) SAVFLR(*ANY)
SAV DEV( ' /QSYS.LIB/TAPxx. DEVD' )
OBJ( ( ' / *' ) ( ' /QSYS.LIB' *OMIT)
( ' /QDLS' *OMIT) ) (1)
( ' /QIBM/ProdData' *OMIT )
( ' /QOpenSys/QIBM/ProdData' *OMIT) )
UPDHST(*YES)
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.


© Copyright IBM Corporation 2012

Figure 11-35. SAVE option 23: All user data OL1914.1

Notes:
SAVE Option 23 runs program QSRSAVU in QSYS. You may use RTVCLSRC to retrieve the
source and modify it.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How the system performs save processing


IBM i

Start
Preprocessing
Build save list Post processing
for library LIBA.
Copy the objects in
library LIBA to tape.

Build save list


for library LIBB.
Copy the objects in
library LIBB to tape.

Build save list


for library LIBC.
Copy the objects in
library LIBC to tape.

Build save list


for library LIBD.
Copy the objects in
library LIBD to tape.

© Copyright IBM Corporation 2012

Figure 11-36. How the system performs save processing OL1914.1

Notes:
The system performs a save by processing a list of objects (by library) to be saved, then
saving those objects to the media.

11-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Where to perform the save to?


IBM i

Tape
Disk
Physical or virtual = DEV(tape names)

Optical drive = DEV(OPTxx)

SAVLIB SAVFDTA(*YES) Tape


Disk SAVSAVFDTA
SNDNETF
Save file: DEV(*SAVF) SAVF(name)

© Copyright IBM Corporation 2012

Figure 11-37. Where to perform the save to? OL1914.1

Notes:
Normally, tape is the media of choice for save and restore operations. However, you can
use either tape, diskette, save files (SAVF), or optical media. Support for optical media is
provided so that you can archive information.
The chart below shows the types of media supported by the various SAVxxx commands.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Type of media
Command Tape Virtual optical Save file Optical media
SAVSYS Yes Yes 4 No Yes 1
SAVCFG Yes Yes Yes Yes
SAVSECDTA Yes Yes Yes Yes
SAVLIB Yes Yes Yes Yes 2
SAVOBJ Yes Yes Yes Yes
SAVCHGOBJ Yes Yes Yes Yes
SAVDLO Yes Yes Yes Yes 3
SAVSAVFDTA Yes Yes No Yes
SAVLICPGM Yes Yes 4 Yes Yes 1
SAVSTG Yes No No No
SAV Yes Yes Yes Yes
RUNBCKUP Yes No No No

1. You cannot run this command on an optical media library device.


2. You can specify SAVLIB LIB(*ALLUSR), SAVLIB LIB(*IBM), or SAVLIB LIB(*NONSYS)
when you use optical media. However, you need to initialize your optical media to the
*UDF format. You cannot use optical media that you initialized to *HPOFS format.
3. You can save document library objects (DLO) from more than one auxiliary storage pool
(ASP) to optical media with a single SAVDLO command. However, you need to initialize
your optical media to the *UDF format. You cannot use optical media that you initialized
to *HPOFS format.
4. In a disaster recovery situation you must have physical media of the Licensed Internal
Code and the operating system to begin your recovery.

11-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVLIB: Save Library


IBM i

© Copyright IBM Corporation 2012

Figure 11-38. SAVLIB: Save Library OL1914.1

Notes:
Saving Libraries:
Parameter LIB is a required parameter and you can choose between several special
values, generic names, or from one to 300 individual specified library names for saving
libraries.
• LIB(*NONSYS): User libraries, QGPL, QUSRSYS and LPP libraries are saved.
• LIB(*IBM): All IBM libraries are saved, see notes for exceptions.
• LIB(*ALLUSR): All user libraries are saved. Some IBM libraries that contain user data
are saved.
New support that was added at V5R3:
Save access paths
• When a save command (SAVLIB, SAVOBJ, SAVCHGOBJ, SAVRSTLIB, SAVRSTOBJ, or
SAVRSTCHG) is performed, the save access paths parameter value is determined by
this system value when ACCPTH(*SYSVAL) is specified.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• When ACCPTH(*YES) or ACCPTH(*NO) is specified, this system value is ignored. If


access paths are to be saved, the process that saves access paths increases the time
for the save operation and the amount of media that you use. However, by having the
access paths saved, you significantly reduce the amount of time it takes to recover a
system because the access paths do not need to be rebuilt.
Save libraries in a different order
• The order in which libraries are saved by SAVLIB LIB(*NONSYS), SAVLIB
LIB(*ALLUSR), and SAVCHGOBJ LIB(*ALLUSR) has changed. Libraries QSYS2, QGPL,
QUSRSYS, and QSYS2xxxxx (where xxxxx is an independent ASP number) are saved
first, if they are located on the ASPs specified by the ASPDEV parameter. Specifying one
of these libraries on the STRLIB parameter causes more libraries to be saved than in
previous releases.
New support that was added at V5R4:
Spooled file data
• When a save command (SAVLIB, SAVOBJ, SAVRSTLIB, or SAVRSTOBJ) is performed,
the save spool file data parameter determines if spool file data and attributes for output
queue objects are saved.
• *NONE
- No spooled file data is saved.
• *ALL
- For each output queue that is saved, all available spooled file data on the output
queue is saved.
Enhancements since IBM i 7.1:
- Prior to IBM i 7.1. database files containing more than 16MB of descriptive
information could not be saved. This restriction has been removed. This is the last
known limitation for database file save/restore.
- Supported save target (TGTRLS) releases are V7R1M0, V6R1M0 and V5R4M0.
- SAVLIB and SAVCHGOBJ of library QUSRSYS now includes performing RTVSYSINF
and saves the results. If recommended procedures are followed this information is
already saved, but often this data is inadvertently not saved and cannot be
recovered. This change ensures the system information is saved for later recovery if
needed. This enhancement is available through PTF SI34094 for V5R4 i5/OS and
PTF SI34095 for IBM i 6.1.
- The system name is now included in the headers of the various output files and
spoolfiles.
- Save and Restore menu options that bring the system to restricted state have been
enhanced to gracefully end TCP/IP servers.

11-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVOBJ: Save Object


IBM i

© Copyright IBM Corporation 2012

Figure 11-39. SAVOBJ: Save Object OL1914.1

Notes:
The Save Object (SAVOBJ) command saves a copy of a single object or a group of objects
located in the same library. When *ALL is specified for the Objects (OBJ) parameter,
objects can be saved from a list of libraries. When saving to a save file, only one library can
be specified. The system saves the specified objects by writing a copy of each object on
tape or optical media, or in a save file.
The objects are not affected in the system unless the command specifies that the storage
should be freed. However, the description of each object is changed with the date, time,
and place when it was last saved, unless *NO is specified for the Update history (UPDHST)
parameter.
Save access paths
When a save command (SAVLIB, SAVOBJ, SAVCHGOBJ, SAVRSTLIB, SAVRSTOBJ, or
SAVRSTCHG) is performed, the save access paths parameter value is determined by this
system value when ACCPTH(*SYSVAL) is specified.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

When ACCPTH(*YES) or ACCPTH(*NO) is specified, this system value is ignored. If access


paths are to be saved, the process that saves access paths increases the time for the save
operation and the amount of media that you use. However, by having the access paths
saved, you significantly reduce the amount of time it takes to recover a system because the
access paths do not need to be rebuilt.
Spooled file data
When a save command (SAVLIB, SAVOBJ, SAVRSTLIB, or SAVRSTOBJ) is performed, the
save spool file data parameter determines if spool file data and attributes for output queue
objects are saved.
*NONE
No spooled file data is saved.
*ALL
For each output queue that is saved, all available spooled file data on the output queue
is saved.

11-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVCHGOBJ: Save Changed Objects


IBM i

© Copyright IBM Corporation 2012

Figure 11-40. SAVCHGOBJ: Save Changed Objects OL1914.1

Notes:
This command is used to save only objects that have changed since a specified time.
Saving changed objects is often used to reduce the amount of media and to complete save
processing in a shorter period of time. For example, you might use the SAVLIB command
once a week and the SAVCHGOBJ command every day. The default for the SAVCHGOBJ is
from the last SAVLIB operation, so the media produced tends to grow during the week.

Note

The Reference date (REFDATE) parameter specifies a reference date. Any object that has
changed since that date is saved. The default is *SAVLIB. This setting allows running a
SAVLIB occasionally, say once a week, and then running SAVCHGOBJ to save only those
objects that have changed since the last *SAVLIB. This command should always be used
with the SAVLIB command in a save strategy.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save access paths


When a save command (SAVLIB, SAVOBJ, SAVCHGOBJ, SAVRSTLIB, SAVRSTOBJ, or
SAVRSTCHG) is performed, the save access paths parameter value is determined by this
system value when ACCPTH(*SYSVAL) is specified.
When ACCPTH(*YES) or ACCPTH(*NO) is specified, this system value is ignored. If access
paths are to be saved, the process that saves access paths increases the time for the save
operation and the amount of media that you use. However, by having the access paths
saved, you significantly reduce the amount of time it takes to recover a system because the
access paths do not need to be rebuilt.

11-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backing up spooled file data


IBM i

• Save/restore of spooled files


– Support was added to the OS at V5R4.
– There is a new SPLFDTA parameter on save/restore commands.
– Preserves spooled file data, spooled file identity, and attributes.
• Spooled file name
• Spooled file number
• Creation date and time
• Fully qualified job name
• Job system name
– Attributes might not be preserved.
• System 36 identifier
• Output queue name/library (restored to different output queue/library)
• ASP (output queue on different ASP)
• New expiration date (restore occurs after expiration date)
• New save/restore attributes of spooled file

© Copyright IBM Corporation 2012

Figure 11-41. Backing up spooled file data OL1914.1

Notes:
There is a new parameter (SPLFDTA) on save/restore commands
• SPLFDTA(*NONE) is default on saves
No spooled file data is saved.
• SPLFDTA(*ALL) supported on saves
For each output queue that is saved, all available spooled file data on the output
queue is saved.
• SPLFDTA(*NEW) is default on restores
For each output queue that is restored, spooled file data that was saved with the
output queue is restored, if it does not already exist on the system.
• SPLFDTA(*NONE) supported on restores
No spooled file data is restored

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New spooled files APIs


QSRSAVO and QSRRSTO APIs provide save/restore support with full capability to select and
subset spooled data.
• Include or omit by Output queue, Job name, Job number, User name, Spooled file
named, Spooled file number, Job system name, User-specified data, Form type, or
Create date/time ranges
• Set expiration date on spooled files
Spooled file backup considerations
Save and restore entire OUTQs
• No support to save/restore individual spooled files
Save and restore menu options
• Optionally save and restore all spooled files
Display save/restore media to see list of spooled files
• DSPTAP, DSPOPT, and DSPSAVF commands
• Similar to displaying members in a database file
Performance improvement
• Faster than existing methods to save/restore spooled files
• No requirement for
- Copying spooled file to database file
- Document library objects (DLOs)
• Spooled files saved and restored directly
BRMS uses new support
• No user interface changes to BRMS
• Internal system performance improvement

11-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

File systems: Save commands


IBM i
File system Save commands

Root (/) SAV

SAVSYS, SAVCFG,
QSYS..LIB SAVSECDTA,
(Library) SAVLIB, SAVOBJ
SAVCHGOBJ, SAV

QDLS
SAVDLO
(Document
library services) SAV

QOpenSys
SAV
(Open systems)

QNetware
(Novell NetWare) SAV

User-defined file
System (/dev QASPxx/) SAV

(Other file
systems) SAV
© Copyright IBM Corporation 2012

Figure 11-42. File systems: Save commands OL1914.1

Notes:
The SAV command is used to save objects in the Integrated File System (IFS). You must
include the SAV command to your save strategy to back up the objects in directories. This
is very important because IBM i Access, your configurations for DHCP, DNS, the HTTP
Server, and many other applications have objects in directories and also maybe users have
documents and other files stored in the IFS. Otherwise, objects in directories are not
backed up, and you cannot recover them if you do not use the SAV command.
You can reach directly to the IFS using green screen with the WRKLNK command or in IBM i
Navigator, or the IBM Systems Director Navigator for i, open the File System > Integrated
File System.
The following file systems cannot be saved using the SAVxxx commands:
• NFS
• QFileSvr.400
• QOPT - directory for the CD-ROM

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The Objects (OBJ) parameter on the SAV command supports the use of wildcard
characters and the directory hierarchy. When you have a specific subset of similar objects
within a directory subtree that you want to save, you can use the Name pattern (PATTERN)
parameter to further define the objects that are identified in the (OBJ) parameter.
Another feature that the SAV command offers is the Scan objects (SCAN) parameter for
purposes such as virus protection. If exit programs are registered with any of the integrated
file system scan-related exit points, you can specify whether objects will be scanned while
being saved. This parameter also allows you to indicate whether objects that previously
failed a scan should be saved.

11-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVSYSINF command
IBM i

• Performs a partial save of data saved by save system


(SAVSYS) command
• Cumulative save since last SAVSYS
• Restricted state note required
• Saves:
– Selected objects in library QSYS
– System reply list entries
– Certain system values
– Service attributes
– Network attributes
– Environment variables
– Certain PTFs

© Copyright IBM Corporation 2012

Figure 11-43. SAVSYSINF command OL1914.1

Notes:
• Save system information (SAVSYSINF) command performs a partial save of data saved
by save system (SAVSYS) command
• Cumulative save since last SAVSYS
• Restricted state note required with SAVSYSINF (SAVSYS requires restricted state)
• Saves:
- Selected objects in library QSYS: *DTAAR, *JOBD, *JRN, *CLS, *IGCTBL, *MSGF,
*JOBQ, *JRNRCV, *MSGQ (since last SAVSYS), *EDTD, *SBSD, *TBL, *CMD (since last
SAVSYS)
- System reply list entries
- Certain system values
• Some system values are not saved
• Not required for system recovery

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

- Service attributes
- Network attributes
- Environment variables
- PTFs for 5722SS1 and 5722999 applied (TEMP or PERM) since last SAVSYS
- All group PTFs
- All PTF cover letters
- Loaded PTFs if copied into *SERVICE
The SAVSYSINF command does not save the following:
• Licensed internal code
• QSYS library
• System values which cannot be changed, saved or are related to date/time or password
level
• Configuration objects (use SAVCFG)
• Security data (use SAVSECDTA)
Loaded PTFs are only saved if copied into *SERVICE area. This enables SAVSYSINF to
find the save files of the PTFs. The Copy PTFs (CPYPTF) service attribute specifies
whether to copy PTF save files into *SERVICE when PTFs are loaded from a tape or optical
device. Use the CHGSRVA CPYPTF(*YES) command to change the service attribute on your
system to copy PTF save files when loading PTFs from media.

Note

Since IBM i 7.1 SAVLIB and SAVCHGOBJ of library QUSRSYS now includes performing
RTVSYSINF and saves the results.

If recommended procedures are followed this information is already saved, but often this
data is inadvertently not saved and cannot be recovered. This change ensures the system
information is saved for later recovery if needed. This enhancement is available through
PTF SI34094 for V5R4 i5/OS and PTF SI34095 for IBM i 6.1.

11-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVSYSINF command considerations


IBM i
• Base SAVSYS required
– SAVSYSINF not a replacement for SAVSYS
• *ALLOBJ or *SAVSYS special authority required
• Cannot be used for:
– Restoring to another existing system
– System upgrades or migrations
• Intended for customers who:
– Cannot bring system to restricted state for SAVSYS
– Cannot take downtime for SAVSYS
• PTF save files must remain on system until next SAVSYS
– Do not run Delete Program Temporary Fix (DLTPTF) command unless
• Right before SAVSYS
• Right after SAVSYS
– Installing PTFS default is not to restore save files
• Change system default CPYPTF(*YES) or CHGSRVA command or
• Use CPYPTF(*YES) in INSPTF command consistently
• System recovery
– SAVSYS and SAVSYSINF need to be recovered
– RSTSYSINF additional step per backup and recovery checklists
– Increases time and complexity
© Copyright IBM Corporation 2012

Figure 11-44. SAVSYSINF command considerations OL1914.1

Notes:
It is recommended that a save of the entire system including a SAVSYS be done in
restricted state. This can be accomplished by performing a Go Save Option 21, a
combination of an Option 22 and 23, or by using the equivalent functions within BRMS.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVSYSINF backup strategy


IBM i

• After base SAVSYS, perform the following commands to save system


changes:
– SAVLIB LIB(*IBM)
– SAV OBJ(('/QIBM/ProdData')('/QOpenSys/QIBM/ProdData'))
UPDHST(*YES)
– SAVSYSINF
• The following are commands used to save user data:
– SAVSECDTA
– SAVCFG
– SAVLIB LIB(*ALLUSR)
– SAVDLO DLO(*ALL) FLR(*ANY)
– SAV OBJ(('/*') (*/QSYS.LIB' *OMIT) ('/QDLS' *OMIT))
UPHST(*YES)
• Here is an example SAVSYSINF command to save file:
– SAVSYSINF DEV(*SAVF) SAVE(QGPL/SAVF) CLEAR(*ALL)
OUTPUT(*OUTFILE) OUTFILE(QGPL/OUPUT)

© Copyright IBM Corporation 2012

Figure 11-45. SAVSYSINF backup strategy OL1914.1

Notes:
This slide shows a process for backing up save system information. The command
example saves the system information to the save file named SAVF in library QGPL. The
save file is cleared automatically. Information about what was saved is written to the first
member of the file name OUTPUT in library QGPL. The file and member are created if they
do not exist.

11-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Parameter: Save-while-active
IBM i

• Can be used with the following commands:


– SAV
• Save the integrated file system (IFS)
– SAVLIB
• Save one library or multiple libraries
– SAVOBJ
• Save one object or multiple objects
– SAVCHGOBJ
• Save changed object
– SAVDLO
• Save document library object (folders)

© Copyright IBM Corporation 2012

Figure 11-46. Parameter: Save-while-active OL1914.1

Notes:
You can use the save-while-active function, along with your other backup and recovery
procedures, to reduce or eliminate your outage for particular save operations. The amount
of time during the backup process that you cannot use the server is the save-outage time.
The save-while-active function allows you to use your server during all or part of the save
process, that is, save your server while it is active. This allows you to reduce or eliminate
your save-outage time. In contrast, other save functions allow no access, or only allow read
access, to the objects as you are saving them.

Note

IBM i no longer supports save while active and File Level Backup for Linux partitions.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save-while-active parameters
IBM i

© Copyright IBM Corporation 2012

Figure 11-47. Save-while-active parameters OL1914.1

Notes:
Synchronization
When you save more than one object, you must choose when the objects reach a
checkpoint in relationship to each other. This is synchronization. There are three kinds of
synchronization:
*SYNCLIB (Full synchronization): With full synchronization, the checkpoints for all of the
objects (across multiple libraries) occur at the same time. The checkpoints occur during a
time period in which no changes can occur to the objects. IBM strongly recommends that
you use full synchronization, even when you are saving objects in only one library.
*LIB (Library synchronization): With library synchronization, the checkpoints for all of the
objects within a specific library occur at the same time. Objects in a library can be saved
while they are in use by another job. All of the objects in a library reach a checkpoint
together and are saved in a consistent state in relationship to each other.

11-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *SYSDFN (System-defined synchronization): With system-defined synchronization, the


server decides when the checkpoints for the objects occur. The checkpoints for the objects
may occur at different times resulting in complex restore procedures.
SAVACT parameter has the following choices:
*NO Objects that are in use are not saved. Objects cannot be updated while being saved.
The Wait time SAVACTWAIT parameter has three elements:
• Element 1: Object locks: The default value is 120 seconds. For each object that is in
use, it specifies the amount of time to wait for the object to become available. If an
object remains in use for the specified time, the object is not saved.
• Element 2: Pending record changes: The default value is *LOCKWAIT. For each group
of objects that are checkpointed together, specifies the amount of time to wait for
transactions with pending record changes to reach a commit boundary. The Save active
(SAVACT) parameter determines which objects are checkpointed together. You use
*NOCMTBDY to save objects without waiting for commit boundaries.
• Element 3: Other pending changes The default value is *LOCKWAIT. For each library,
specifies the amount of time to wait for transactions with other pending changes to
reach a commit boundary. Other pending changes include the following:
- Data Definition Language (DDL) object level changes for that library.
- Any API commitment resource that was added without the option to allow normal
save processing.
If a commit boundary is not reached for a library in the specified time, the library is not
saved.
Checkpoint notification (SAVACTMSGQ): You can specify the checkpoint notification on
the SAVACTMSGQ parameter. The specified message queue receives a message after
checkpoint processing is complete. An operator or a job can monitor this message queue
and restart applications when checkpoint processing is complete.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save-outage time
IBM i

• The save-while-active function allows you to:


– Reduce your save-outage time
• End the applications
• Restart when the checkpoint is done
• No additional recovery procedure for restore
– Eliminate your save-outage time
• Not waiting to end the applications
• Protect objects with journaling and commitment control
• More complex and longer recovery procedure for restore
• SAVACTWAIT parameter specifies three wait time elements:
– Object locks
– Commit record changes
– Commit object changes
• Saving with partial transactions or without waiting for commitment
boundaries: SAVACTWAIT(30 *NOCMTBDY 30)
© Copyright IBM Corporation 2012

Figure 11-48. Save-outage time OL1914.1

Notes:
Reducing your save-outage time
Reducing your save-outage time is the easiest way to use the save-while-active function.
When you use this option, the restore procedure is the same as when you perform a
standard save. In addition, you can use the save-while-active function to reduce your
save-outage time without using journaling or commitment control. Unless you have no
tolerance for a save-outage time, you should use the save-while-active function to reduce
your save outage.
To reduce your save-outage time, you can end the applications that make changes to the
objects you are saving. You can restart the applications when the server has established a
checkpoint for application-dependent objects.
Eliminating your save-outage time
You can use the save-while-active function to eliminate your save outage. Use this option
only if you have no tolerance for a save-outage time. You should use the save-while-active
function to eliminate your save-outage time only for objects that you protect with journaling

11-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty or commitment control. In addition, you will have considerably more complex recovery
procedures. You should consider these more complex recovery procedures in your disaster
recovery plan.
Example: SAVACTWAIT at a V5R2 level SAVACT(*SYNCLIB) SAVACTWAIT(30)
Prior to V5R3, one could only specify one value designating the quantity of time to wait for
background blocking actions to clear out. However, even prior to V5R3 there were three
different varieties of actions which could block a classic SWA from reaching its Sync Point.
Thus the singular value, (30 seconds in our example), was used to influence all three
varieties of wait.
Example: SAVACTWAIT at a V5R3 level SAVACT(*SYNCLIB) SAVACTWAIT(15 30 35)
In order to give you more granular control over such wait-related activity in V5R3, IBM
enhanced the SAVACTWAIT parameter so that you can now specify a customized wait
value for each of the three varieties of blocking activities for which SWA might find himself
waiting.
Saving objects with partial transactions
Although there are three potential reasons for stopping a rapid save operation, the new
support (Ragged SWA) focuses on only one of the three: keeping a commitment control
transaction open for a long period of time.
Use of the *NOCMTBDY value is the key for instructing the SAVLIB command that you want
to capitalize on the new Ragged style of Save While Active.
Objects saved in this state cannot be restored on a release prior to V5R3. Extra information
consists of a list of the specific open transactions which are still in flight. The transactions
are identified by the journal sequence number corresponding to the SC flavored journal
entry associated with the beginning of each such open transaction.
Just because you give the SAVLIB command permission to capture a file in a ragged state,
if need be, does not mean that when SAVLIB is ready to process a particular file that it will
truly have in-flight transactions.
Only the files that were truly caught and saved in a so-called ragged state will be flagged as
ragged. The rest will appear as though they were saved with the classic SWA approach
(that is, in a clean state).
With a little detective work on your part (some from the job log, some from the specified
queries against your outfiles) you can find and list those files that were saved and restored
in a ragged state.
Since proper recovery of a ragged file is so dependent upon having the appropriate journal
receivers, once you being to employ nightly Ragged SWA saves, you need to take it upon
yourself to be sure you also have the discipline to save and also hang onto a sufficient set
of past journal receivers.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint processing
IBM i

© Copyright IBM Corporation 2012

Figure 11-49. Checkpoint processing OL1914.1

Notes:
How it works
IBM i objects consist of units of storage, which are called pages. When you use the
save-while-active function to save an object, the server creates two images of the pages of
the object:
• The first image contains the updates to the object with which normal server activity
works.
• The second image is an image of the object at a single point in time. The
save-while-active job uses this image to save the object to the media.
In other words, when an application makes changes to an object during a save-while-active
job, the server uses one image of the object&escape_backslash;xd5 s pages to make the
changes. At the same time, the server uses the other image to save the object to the
media. The image that the server saves does not have the changes you made during the
save-while-active job. The image on the media is as it existed when the server reached a
checkpoint.

11-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Checkpoints
The checkpoint for an object is the instant in time that the server creates an image of that
object. The image that the server creates at that instant in time is the checkpoint image of
the object. Creating a checkpoint image is similar to taking a photograph of a moving
automobile. The point in time that you took the photograph would equate to the checkpoint.
The photograph of the moving automobile would equate to the checkpoint image. When
the server has finished making the checkpoint image of the object, the object has reached
a checkpoint. Despite the name save-while-active, you cannot change objects while the
server obtains their checkpoint images. The server allocates (or locks) objects as it obtains
checkpoint images. After the server obtains the checkpoint images, you can change the
objects.
When more than one object is being saved, you can choose whether the checkpoint
images for the objects should be synchronized. With full synchronization, the checkpoints
for all of the objects occur at the same time (actually, during a time period in which no
changes can occur to the objects). With library synchronization, the checkpoints for all of
the objects in a library occur at the same time. With system-defined synchronization, the
checkpoints for the objects may occur at different times.
The amount of time that the system is unavailable to users during the backup process is
referred to as the save outage. The easiest and recommended way to use the
save-while-active function is to reduce your save outage by ending your applications that
change objects until after the checkpoint images have been obtained. You can choose to
have the save-while-active function send a notification when the checkpoint processing is
complete and it is safe to start your applications again. When the save-while-active function
is used in this way, the save outage can be much less than with normal save operations.
The image of the object saved to the media is the conceptual image of the object after
checkpoint processing is complete.
• Time #1 - Is the save preprocessing phase of the save-while-active function. At the end
of #1, the object has reached a checkpoint.
• Time #2 - Shows an update of the object while it is being saved.
- A request is made to update C1.
- A copy of the original page is made first.
- The change is made to the object.
- The original page copied is then part of the checkpoint image for the object.
• Time #3 - Shows two additional changes, C2 and C3, have been made to the object.
• Each changed page is marked so that additional changes to that page do not require
additional processing.
• Time #4 - (save post-processing) Shows that the copied pages for the checkpoint image
are no longer needed and are discarded.
• Time #5 - Shows the object on the system has the C1, C2, and C3 changes, but the
copy of the object saved to the media does not contain these changes.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVF: Saving using a save file


IBM i

RSTOBJ

*FILE
CUSTMAST *file Attr.PF SFxx *file Attr.SAVF
SAVOBJ SAVSAVFDTA
DEV(*SAVF) SAVF(SFxx)
SAVF(SFxx) DEV(TAP01) CUSTMAST
CUSTMAST
CUSTMAST

Once you have saved to save media:


CLRSAVF FILE(SAVE-FILE-NAME)

© Copyright IBM Corporation 2012

Figure 11-50. SAVF: Saving using a save file OL1914.1

Notes:
Using a save file allows you to save and restore objects without first placing save media
into your save media device. You can also use a save file to send objects from one IBM i
server to another over communications lines. You can use the save file as an online
container to save the contents of a single library to run overnight. The next day, save the
contents of the save file to storage media with the Save Save File Data (SAVSAVFDTA)
command. Objects saved to a save file can be restored directly from save media, using the
RSTLIB or RSTOBJ command.
If you save to save files or optical media, you also have three choices available for software
compression: low, medium, and high. If you choose a higher form of compression, your
save will take longer, but the resulting save data will usually be smaller.

11-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Considerations for using save files are:


• Performance
Performance can vary, depending on other disk activity. Save files can be created on or
moved to an ASP for improved performance and additional protection from system disk
device failures.
• Storage capacity
The maximum amount of data that a save file can contain is approximately 2 terabytes.
A message appears when the file is full. Specify data compression on the save
commands to reduce the space for the save file and the amount of media needed for
the SAVSAVFDTA command. 'SAVSAVFDTA command.
Preparing save files for use
When saving to a save file that already contains data, use the Clear Save File
(CLRSAVF) command or specify CLEAR(*ALL) on the save command, or reply to an
inquiry message sent during the save operation.
Saving the save file data: There are two ways to save the save file data:
With the SAVSAVFDTA command, only the data is saved. The description of the save
file object is not saved. The save date and time of the save file are not updated. When
you use the Save Object (SAVOBJ) or the Save Library (SAVLIB) command with
SAVFDTA(*YES) specified, both the object description and the data are saved. The save
date and time are updated for the save file.

Note

While you are saving save file data, other jobs cannot use the save file until the save
operation completes unless you are using the save-while-active function. Determining the
Contents of a Save File: You can use the Display Save File (DSPSAVF) command or the
List Save File API to determine the contents of a save file.

The DSPSAVF command displays the contents of a save file. The information includes a
description of each object saved and summary information.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVF: Save File Commands


IBM i

© Copyright IBM Corporation 2012

Figure 11-51. SAVF: Save File Commands OL1914.1

Notes:
Use the following CL commands with save files:
CRTSAVF: The Create Save File (CRTSAVF) command creates a save file that can be used
with save and restore commands to store data. The save file stores data that would
otherwise be written to save media. A save file can also be used as a container to send
objects to another System i user on the systems network architecture distribution services
(SNADS) network.
CHGSAVF: The Change Save File (CHGSAVF) command changes one or more of the
attributes of a save file, such as the maximum number of records.
OVRSAVF: The Override Save File (OVRSAVF) command overrides or replaces certain
attributes of a save file, or overrides any file with a save file.
DSPFD: The Display File Description (DSPFD) command displays the attributes of the save
file.
CLRSAVF: The Clear Save File (CLRSAVF) command clears the contents of a save file.

11-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty DSPSAVF: The Display Save File (DSPSAVF) command displays the save and restore
information in a save file, or the contents of the save file.
SAVOBJ - SAVLIB: You can use the Save file data (SAVFDTA) parameter on the Save
Object (SAVOBJ) or the Save Library (SAVLIB) command to save the description of the
save file. You can also save the data to tape, optical media, or another save file in a
different library.
SAVSAVFDTA: The Save Save File Data (SAVSAVFDTA) command writes the contents of a
save file to either tape, optical media, or diskette.
DLTF: The Delete File (DLTF) command deletes the save file object.
SNDNETF: Objects (such as programs or commands) must be saved in a save file before
they can be sent using the SNDNETF command.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Miscellaneous SAV commands


IBM i

• Save IFS objects (SAV) command


• Save Document Library Object (SAVDLO) command
• Save Storage (SAVSTG) command

© Copyright IBM Corporation 2012

Figure 11-52. Miscellaneous SAV commands OL1914.1

Notes:
The SAV command enables you to save the following data:
• A specific object
• A directory or subdirectory
• An entire file system
• Objects that meet search value
The Objects (OBJ) parameter on the SAV command supports the use of wildcard
characters and the directory hierarchy. When you have a specific subset of similar objects
within a directory subtree that you want to save, you can use the Name pattern (PATTERN)
parameter to further define the objects that are identified in the (OBJ) parameter. For
example, you could have a directory /MyDir that contains 100 subdirectories, Dir1 through
Dir100, that each contain 100 .jpg files, Photo1.jpg through Photo100.jpg, with
corresponding backup files, Photo1.bkp through Photo100.bkp. To save all of the .jpg files
in /MyDir, but omit the backup files, you could issue the following command:
SAV OBJ(('/MyDir')) PATTERN(('*.bkp' *OMIT))

11-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty When you use the SAV command to save the current directory SAV OBJ(’*’) and the
current directory is empty (it has no files or subdirectories), the system does not save
anything. The command does not save the one *DIR object that represents the current
directory. However, when you explicitly specify the directory by name SAV
OBJ(’/mydir’) you include the *DIR object in your save operation. The same applies to
the home directory.
Another feature that the SAV command offers is the Scan objects (SCAN) parameter for
purposes such as virus protection. If exit programs are registered with any of the integrated
file system scan-related exit points, you can specify whether objects will be scanned while
being saved. This parameter also enables you to indicate whether objects that previously
failed a scan should be saved.
When you use the SAV command, you can specify OUTPUT(*PRINT) to receive a report of
what the system saved. You can also direct the output to a stream file or to a user space.
The SAV command does not provide the option to create an output file.
Reference: http://publib.boulder.ibm.com/infocenter/iseries/ > i 7.1 > IBM i 7.1 Information
Center > Systems management > Backup and recovery > Backing up your system
IBM i provides the capability to store documents and folders in a hierarchy (documents
within a folder within another folder). Documents and folders are called document library
objects (DLOs).
The Save Document Library Object (SAVDLO) command is used to save one or more
documents. Documents are not affected by this unless you specify that storage is to be
freed or deleted. You can save a single document or more than one document with this
command.
The Save Storage (SAVSTG) command copies the Licensed Internal Code and all of the
disk unit data to tape. The tape that is produced is a sector-by-sector copy of all permanent
data on configured disk units.
You cannot restore individual objects from the save storage media. The save and restore
storage processes are intended for disaster backup and recovery and are to be used along
with the standard commands for saving and restoring. They are not intended for copying or
distributing to other systems.
There are some special considerations you should consider before running the SAVSTG
command:
• The save storage process can be run only when the system is in a restricted state
• The user must have save system (*SAVSYS) special authority to use the Save Storage
(SAVSTG) command
• The SAVSTG command causes the system to power down and starts the system again
as if PWRDWNSYS RESTART(*YES) was specified. An initial program load (IPL) of the
system occurs after the command completes. The save storage function implicitly
occurs during the IPL of the system from the dedicated service tools (DST) function.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Note

Logical partitioning (LPAR) users: If you are going to use this command on the primary
partition, be sure to power off all secondary partitions before running the command. In
order to save your entire system configuration, you must save each logical partition
individually.

11-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Using Operational Assistant


IBM i

• GO ASSIST
– Select 11 (Customize your system, users, and devices).
– Select 5 (Backup tasks).

© Copyright IBM Corporation 2012

Figure 11-53. Using Operational Assistant OL1914.1

Notes:
To access the Backup Tasks menu from Operational Assistant menu, select option 11
Customize your system, users, and devices then select option 5 Backup tasks or type GO
BACKUP on the command line. From the Backup menu, you can Run backup, Display
backup status, Set up backup, Initialize a tape, or Initialize a tape set.
To access the RunBackup menu from Operational Assistant, select option 10 Manage your
system, users, and devices then select option 2 Run a backup or type GO RUNBCKUP on
the command line. The Run Backup menu can also be accessed from the Backup Tasks
menu, option 1. The Run Backup menu allows you to Run daily backup, Run weekly
backup, Run monthly backup, Back up IBM-supplied libraries, or Back up the entire
system.
To access the SetUp Backup menu, select option 10 Setup backup from the Backup Tasks
menu or type GO SETUP from the command line. The Set Up Backup menu provides
options that enable you to change backup options, lists, and schedules.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator: Backup policies


IBM i

© Copyright IBM Corporation 2012

Figure 11-54. IBM i Navigator: Backup policies OL1914.1

Notes:
IBM i Navigator provides a graphical interface to the Operational Assistant backup
functions. You can display the information for each of the three IBM-supplied system
backup sets and change their properties by double-clicking the corresponding icon or by
displaying the icons properties page. This function is not intended for users with a complex
backup strategy, who use BRMS or who want to back up their entire system.
The BRMS support has been added through a plug-in since V5R1.
When BRMS is implemented at the system, and the BRMS plug-in is installed in IBM i
Navigator, a Backup Recovery and Media Services entry replaces the Backup entry at the
IBM i Navigator.
The same applies to IBM Systems Director Navigator for i.

11-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Automatic default backups


IBM i

Daily Weekly Monthly


Back up changes to user
libraries selected on Back up all user libraries. Back up all user libraries.
backup list.
Back up all folders.
Back up folders selected Back up security data.
Back up all folders.
on backup list. Back up configuration
data.

Back up all user Back up all user Back up all user


directories. directories. directories.

© Copyright IBM Corporation 2012

Figure 11-55. Automatic default backups OL1914.1

Notes:
Operational Assistant and System i Navigator have built-in defaults for backup that can be
tailored to save items daily, weekly and monthly.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup policies: General


IBM i

© Copyright IBM Corporation 2012

Figure 11-56. Backup policies: General OL1914.1

Notes:
This visual shows IBM i Navigator backup support. It offers a graphical interface to the
Operational Assistant (OA) backup function. You can display or change the settings for the
three IBM-supplied system backup sets:
• Daily
• Weekly
• Monthly
Since the backup function is based on Operational Assistant, the backup functions offered
by OA, (also through the IBM i Navigator or the IBM Systems Director Navigator for i) are
intended for customers that do not require any complex backup strategies. If a customer
requires a more complex backup strategy than perhaps implementing BRMS (Backup
Recovery and Media Services) may provide a better fit to implement the customer needs.

11-86 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup policies: What


IBM i

© Copyright IBM Corporation 2012

Figure 11-57. Backup policies: What OL1914.1

Notes:
On this settings page you can define what data should be backed up:
• All, none, or selected user libraries
• All, none, or selected folders
• All or no user directories in the Integrated File System
• OV/400 mail and calendars
• Security data
• Configuration data
• All selected data or changed data only
The save operation defined here always saves the access paths even though the native
save commands do not have this option enabled. Saving the access paths makes the
subsequent restore operation faster. You cannot disable the function under System i
Navigator or through OA.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The PC program code for System i Access for Windows is stored in User Directories in the
Integrated File System. This includes the PC code for the System i Navigator function. As
this code also includes applied PTFs, we recommend that you save user directories on a
regular basis even if you do not use them to store user data. In an emergency case when
restoring the code, you do not have to reapply PTFs for System i Access for Windows.

11-88 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup policies: When


IBM i

© Copyright IBM Corporation 2012

Figure 11-58. Backup policies: When OL1914.1

Notes:
The When tab provides check boxes to specify the backup schedule. This schedule affects
all three backup sets; therefore, only one backup set has to be changed. Reasonable
default settings for the backup schedule are provided, and in many cases, you might be
able to use the default settings. The Operational Assistant rules of when the three backup
sets can be run apply. For example, daily backups are automatically deselected on any day
of the week that is selected for weekly and monthly backup.
For the Monthly backup, you can specify:
• Day of week
• Time of day
• First, second, third, fourth, or last day of month (this means, that if you have selected
Saturday, the backup runs on the first, second, third, fourth, or last Saturday of the
month)

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

For the Weekly and Daily backup:


• Day (or days) of the week
• Time of day

11-90 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup policies: Where


IBM i

© Copyright IBM Corporation 2012

Figure 11-59. Backup policies: Where OL1914.1

Notes:
The Where panel has to be changed for each of the three backup sets. Use this pane to
define where the data is backed up.
All available tape hardware on your System i are automatically displayed, any of these
drives in the list can be used.
If different tape sets are being used for the daily, weekly, and monthly backup and it is
preferred that they are used rather than the mounted tape, they can be defined here. Up to
seven tape sets can be used in rotation (they are used in the specified order). The target
tape information radio button determines whether the mounted tape or one of the tape sets
is used (corresponds to option *ANY in the OA backup).
Check the Erase tape before backup option if the tape is to be cleared before it is used.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator summary


IBM i

• Allows you to perform daily, weekly, or monthly backups


• Provides the ability to display and change properties of the
three IBM-supplied system backup sets
• Not intended for complex save/restore strategies
• Provides support for individual tape drives, tape library
systems, and virtual tape drives

© Copyright IBM Corporation 2012

Figure 11-60. IBM i Navigator summary OL1914.1

Notes:

11-92 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IBM i Navigator BRMS options


IBM i

© Copyright IBM Corporation 2012

Figure 11-61. IBM i Navigator BRMS options OL1914.1

Notes:
If Backup Recovery and Media Services (BRMS) software is installed on the system then
you can download the plug-in for BRMS which completely replaces the Backup branch,
which is what was discussed in the last couple of visuals.
In this case, you will now have access to perform all of the BRMS functions through the
Navigator GUI.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM Systems Director Navigator for i


BRMS options
IBM i

© Copyright IBM Corporation 2012

Figure 11-62. IBM Systems Director Navigator for i BRMS options OL1914.1

Notes:
If Backup Recovery and Media Services (BRMS) software is installed on the system then
you can approach the BRMS functions using the IBM Systems Director Navigator for i.

11-94 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Save tips and hints


IBM i

• Determining what has been saved


• Determining what has not been saved
• Determining when an object was last saved
• Damaged objects
• Paralleled tape saves

© Copyright IBM Corporation 2012

Figure 11-63. Save tips and hints OL1914.1

Notes:
There are some tips and hints you may find useful:
Determining what has been saved: You can use the joblog to display what objects have
been saved or you can direct the output of the save operation to a printer
(OUTPUT(*PRINT)), a database file (OUTPUT(*OUTFILE)), a stream file, or a user space.
Determining what has not been saved: If an object cannot be saved, the system skips
that object and writes an entry to the job log. You can specify OUTPUT(*OUTFILE)
INFTYPE(*ERR) on the SAVLIB, SAVOBJ, and SAVCHGOBJ commands. This creates an
output file that only contains entries for those objects that were not saved. Also, you can
look in the history file with the command DSPLOG. It is easier to find messages from the
backup job if you have additional time and date from the backup time for the PERIOD
parameter (for example, DSPLOG PERIOD((060000 130803)).
Determining when an object was last saved: You can use the Display Object Description
(DSPOBJD) command to find out when an object was last saved in a library. For objects that
are stored in directories, you can use the output from the SAV command to maintain save
history information. To use the output, you must elect to retain the save history information

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

to either *PRINT or a stream file or user space path name on the OUTPUT parameter of the
SAV command.
Damaged objects: What the system does with damaged objects depends on when the
damage is detected.
Objects damaged before the save operation cannot be saved but the save operation
continues with the next object. The operation completes with an indication of how many
objects were saved and how many were not.
If an object is damaged by the save operation, the object is marked as damaged, the save
operation ends and diagnostic messages are sent.
If an object is damaged but the system does not detect it, the object is restored normally
and you may not be able to detect the damage until you try to use the object.
Parallel tape save operations: You can perform save operations while using more than
one tape device simultaneously. The data that is produced on the save media by these
parallel save operations have a save format that is referred to as parallel.
Data in parallel format is spread across a set of tape files, called media files. The entire set
of these media files is referred to as a parallel save/restore file. A media file is identified on
save (or restore) operations by the device (DEV), sequence number (SEQNBR), volume
identifiers (VOL), and file label (LABEL) parameters. These parameters only allow one
media file to be identified. However, a parallel save (or restore) operation uses more than
one media file. This problem is solved by using a media definition.
A media definition (*MEDDFN) allows more than one media file to be identified. A media
definition defines the devices, sequence numbers, and volume identifiers that should be
used by a parallel save operation.
The devices that you specify in a media definition must be compatible stand-alone tape
devices or tape media library devices. The tape volumes that you specify must have
compatible media formats.

11-96 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 4: Restore operations

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-64. Topic 4: Restore operations OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Relationship between save and restore commands


IBM i

Save Restore
SAVSECDTA RSTUSRPRF
RSTAUT

SAVCFG RSTCFG
SAVSYS Restore Licensed Internal Code (see
chapter 10 of Backup and Recovery)
Restore operating system (see chapter 11
of Backup and Recovery)
RSTUSRPRF
RSTCFG
RSTAUT

SAVDLO RSTDLO

SAV RST
SAVSYSINF RSTSYSINF
© Copyright IBM Corporation 2012

Figure 11-65. Relationship between save and restore commands OL1914.1

Notes:
A restore of the system requires the installation of the operating system and may also
include the installation of the licensed internal code (distributed on CD, labeled I_Base_01
provided by IBM or on the first volume of the most recent SAVSYS tapes). Installation of LIC
requires an IPL type D of the system. The installation of the operating system is performed
through options in the IPL or Install display which follows a manual IPL.
The next two graphics show which restore commands can be used, based on how the
objects were saved.

11-98 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restore overview
IBM i
Restore Parts of the system menu Procedure for restoring
Option on install Licensed
Licensed Internal Code Internal Code (LIC) screen

i5/OS objects in QSYS IPL or install the system menu

User profiles RSTUSRPRF


23
Configuration objects RSTCFG
22
IBM-supplied directories RST

i5/OS optional libraries


QHLPSYS QUSRTOOL RSTLIB
Licensed program libraries *IBM RSTLIB
QRPG QCBL Qxxxxx
21 *NONSYS
IBM libraries with user data
QGPL QUSRSYS QS36F #LIBRARY RSTLIB
User libraries *ALLUSR
LIBA LIBB LIBC LIBxxx
23
Filed documents and folders RSTDLO
Distribution objects
User objects in directories RST

Saved changes in libraries, RSTLIB, RSTOBJ,


documents, and directories RSTDLO, RST

Journaled changes APYJRNCHG

All Private authorities RSTAUT


© Copyright IBM Corporation 2012

Figure 11-66. Restore overview OL1914.1

Notes:
The graphic shows the menu options and commands that are available for restoring
information. It also shows the normal sequence for restoring information, working from top
to bottom.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restore menu (1 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-67. Restore menu (1 of 3) OL1914.1

Notes:
In order to have this menu displayed, the LIC and the operating system must be installed.

11-100 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

RESTORE option 21: System and user data


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


RSTUSRPRF USRPRF(*ALL)
RSTCFG OBJ(*ALL)
RSTLIB SAVLIB(*NONSYS)
RSTDLO DLO(*ALL) SAVFLR(*ANY)
RST DEV( ' /QSYS.LIB/TAPxx. DEVD' )
OBJ( ( ' / *' ) ( ' /QSYS.LIB' *OMIT)
( ' /QDLS' *OMIT) )
RSTAUT
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.

© Copyright IBM Corporation 2012

Figure 11-68. RESTORE option 21: System and user data OL1914.1

Notes:
RESTORE option 21 runs program QMNRSTE in QSYS. You can use RTVCLSRC to retrieve
the source and modify it.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restore menu (2 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-69. Restore menu (2 of 3) OL1914.1

Notes:
Additional restore options are displayed on this second of three RESTORE menus from the
IBM i menu interface.

11-102 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

RESTORE option 22: System data only


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


RSTUSRPRF USRPRF(*ALL)
RSTCFG OBJ(*ALL)
RSTLIB SAVLIB(*IBM)
RST DEV( ' /QSYS.LIB/TAPxx. DEVD' )
OBJ( ( ' /QIBM/ProdData ' )
( ' /QOpenSys/QIBM/ProdData ' ))
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.

© Copyright IBM Corporation 2012

Figure 11-70. RESTORE option 22: System data only OL1914.1

Notes:
RESTORE option 22 runs program QSRRSTI in QSYS.
If necessary, you can use the RTVCLSRC command to retrieve the source code for this
program and then make any necessary modifications.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

RESTORE option 23: All user data


IBM i

ENDSBS SBS(*ALL) OPTION(*IMMED)


RSTUSRPRF USRPRF(*ALL)
RSTCFG OBJ(*ALL)
RSTLIB SAVLIB(*ALLUSR)
RSTDLO DLO(*ALL) SAVFLR(*ANY)
RST DEV( ' /QSYS.LIB/TAPxx.DEVD ' )
OBJ( ( ' / * ' ) ( ' /QSYS.LIB' *OMIT)
( ' /QDLS ' *OMIT)
( ' /QIBM/ProdData ' *OMIT)
( ' /QOpenSys/QIBM/ProdData' *OMIT))
RSTAUT USRPRF(*ALL)
STRSBS SBSD (controlling subsystem)

Where xx is the name of the tape drive.

© Copyright IBM Corporation 2012

Figure 11-71. RESTORE option 23: All user data OL1914.1

Notes:
RESTORE option 23 runs program QSRRSTU in library QSYS. You can use RTVCLSRC to
retrieve its source, then modify it.

11-104 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restore menu (3 of 3)
IBM i

© Copyright IBM Corporation 2012

Figure 11-72. Restore menu (3 of 3) OL1914.1

Notes:
Additional restore options are displayed on the third of three RESTORE menus from the IBM
i menu interface. Also pictured is the menu that appears when option 70, Related
commands, is selected.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

What happens when you restore data?


IBM i

• What happens depends on:


– Whether the object already exists on the system
– The ALWOBJDIF parameter setting
– Whether the object was saved on another system

© Copyright IBM Corporation 2012

Figure 11-73. What happens when you restore data? OL1914.1

Notes:
An object on this system is like a container. The object has information about the container
itself, such as the owner of the object and the last time it was saved. This is the information
you see when you display the object description (DSPOBJD command). The object also has
contents, such as the records in a database file or the instructions in a program.
When you restore an object, the system takes different actions depending on the following:
• Whether the object to be restored already exists
• The allow object differences (ALWOBJDIF) parameter on the restore command
• Whether the object was saved on a different system (serial number of the processor)
With a few exceptions that relate to security, the contents of the object are always restored.
If the object exists, the system compares the object description information on the system
copy and the media copy and then makes decisions. For most information, the media
version of the information is restored. For security relevant information, such as the public
authority and the object owner, the system version is left unchanged. In a few cases, such

11-106 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty as the size of the object and the date it was restored, the system determines a value when
the object is restored.
The allow object differences (ALWOBJDIF) parameter on the restore commands is primarily
for security protection and integrity protection. For example, if system security is important
to you, you may want to take special action if someone attempts to restore an object whose
owner has been changed. If the member information about a database file does not match,
you may have problems with the integrity of your data. You can use the ALWOBJDIF
parameter to prevent this.
The default value for the ALWOBJDIF parameter is *NONE. This means that if important
differences exist between the media version and the system version of an object, you want
the system to take special action. Normally, you should use the default value. However,
when you are restoring your information to a different system, such as during a disaster
recovery, you should specify ALWOBJDIF(*ALL).
Since V5R3, you can specify a combination of up to four values on the ALWOBJDIF
parameter to allow specific types of differences for the restore operation: *FILELVL,
*AUTL, *OWNER, and *PGP. The *FILELVL value attempts to restore physical file data when
the file level ID or the member level ID of the physical file on the system is different than
that of the physical file on the save media. The *AUTL value allows differences in
authorization lists. The *OWNER value allows differences in object ownership. The *PGP
value allows differences in the primary group.
The advantage that ALWOBJDIF(*FILELVL *AUTL *OWNER *PGP) has over
ALWOBJDIF(*ALL) is that in addition to allowing all object differences, it attempts to
restore physical files when the file level ID or member level ID of the physical file on the
system is different than that for the physical file on the save media.
Since IBM i 7.1 a new value *COMPATIBLE has been added to the ALWOBJDIF (allow
object differences) parameter to make restores less confusing and less error prone for
database files.
Using ALWOBJDIF(*ALL) for database files is undesirable because: When a file-level
difference occurs, the original file is renamed and the saved file is restored. When a
member level difference occurs, the existing member is renamed and the saved member is
restored. Because of the duplicated files and members, system resources are wasted and
applications may produce unpredictable results. This leaves the user with a perplexing
choice between the renamed data or the restored data and leaves some clean up activities

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

to perform. For database objects, ALWOBJDIF(*COMPATIBLE) is equivalent to specifying


ALWOBJDIF(*AUTL *OWNER *PGP *FILELVL) which allows the following differences:
• All authorization list differences.
• All ownership differences.
• All primary group differences.
• File level differences where different file level and member levels are restored ONLY
when the format level identifiers of the file on media match format level identifiers of the
file on the system. In brief, the file formats must match.
• For non-database objects, ALWOBJDIF(*COMPATIBLE) performs like
ALWOBJDIF(*ALL) which allows all object differences to be restored.
The *COMPATIBLE value for the ALWOBJDIF parameter is supported on:
• RSTLIB (Restore Library) and RSTOBJ (Restore Object) commands.
• QSRRSTO (Restore object) API.
• Restore menu options which use RSTLIB and RSTOBJ commands.
• RSTLIBBRM (Restore Library using BRM), RSTOBJBRM (Restore Object using BRM)
and STRRCYBRM (Start Recovery using BRM) commands.
• SAVRSTLIB (Save Restore Library), SAVRSTOBJ (Save Restore Object) and
SAVRSTCHG (Save Restore Changed Objects) commands.
The restore menu options:
• 21 - Restore entire system,
• 22 - Restore system data only, and
• 23 - Restore all user data,
now default to ALWOBJDIF(*COMPATIBLE) when restoring to a different system.
The RSTLICPGM (Restore Licensed Program) command now internally uses
ALWOBJDIF(*COMPATIBLE), but does not include them on the command interface.

11-108 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Sequence for restoring data


IBM i

• Restore object sequence


– Journals before journaled files
– Journals before journaled receivers
– Physical files before logical files

© Copyright IBM Corporation 2012

Figure 11-74. Sequence for restoring data OL1914.1

Notes:
When related objects are in the same library, the system restores them in the correct order.
If related objects are in different libraries, you must restore them in the correct order to
perform additional recovery steps after they are restored.
You should restore objects in this sequence:
• Journals before journaled files: If you restore a journaled file when the journal is not
on the system, you must start journaling again after the journal is restored. Use the
STRJRNPF command or the STRJRNAP command.
• Journals before journal receivers: If you restore a journal receiver when the journal is
not on the system, you must associate the journal receivers with the journal after it is
restored. Use the WRKJRN command.
• Physical files before logical files: You cannot restore a logical file if the based-on
physical files are not on the system.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Putting your system in a restricted state


IBM i

• Sign off all users

• Enable notification

• End all subsystems

© Copyright IBM Corporation 2012

Figure 11-75. Putting your system in a restricted state OL1914.1

Notes:
Many recovery procedures require that your system have no other activity on it. When no
subsystems except the controlling subsystem are active on your system, it is in a restricted
state.
Use the End Subsystem (ENDSBS) command to put your system in a restricted state. You
specify how you want the subsystems to end with the Options parameter:
• *CNTRLD Allow active jobs to end themselves. If you specify *CNTRLD, you can use the
delay parameter to set a time for the system to wait before ending subsystems
immediately.
• *IMMED End the subsystem immediately. Use this option if there are no users on the
system and no batch jobs running.
To put your system in a restricted state:
• Ensure that all users are signed off and all jobs are ended
• Enter the following command to ensure you receive notification of the SBS ending:

11-110 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty -CHGMSGQ MSGQ(QSYSOPR) DLVRY(*BREAK) SEV(60)


• To end all subsystems, enter the following command:
-ENDSBS SBS(*ALL) OPTION(*CNTRLD) DELAY(600)
For the delay parameter, specify a number of seconds to allow your system time to bring
most jobs to a normal end. On a large, busy system, you may need a longer delay. A
message is sent that indicates that the procedure for ending subsystems is in progress. A
final message will be sent to the message queue QSYSOPR when the system is in a
restricted state. If this message is not received in the message queue from the system
operator, you can use the ENDSYS command.
The End System (ENDSYS) command ends most activity on the system and leaves the
system in a condition in which only the console is active in the controlling subsystem. This
is done so that the operator can do things like backing up the system or loading new
programs. This condition is called the restricted state and is required for operations like
saving the system or reclaiming storage. If two jobs are active in the controlling subsystem
at the console, neither of the jobs is forced to end. The End System (ENDSYS) command
cannot complete running until you end one of the jobs either by signing off in one job or by
ending one job from the other.
All active subsystems are notified that an end system operation is in process. No new jobs
or routing steps can be accepted by the subsystems. This command also specifies what
happens to all active work.
Interactive jobs that are transferred to a job queue by the Transfer Job (TFRJOB) command
are ended as part of subsystem ending. If an initial program load (IPL) occurs while either
a batch or interactive job is on a job queue (because of the TFRJOB command), that job is
removed from the job queue during IPL and its job log is produced.
Since IBM i 7.1 Save and Restore menu options that bring the system to restricted state
have been enhanced to gracefully end TCP/IP servers, '
Save menu options 21 (Save entire system), 22 (Save system data only), 23 (Save all user
data) and 40 (Save all libraries other than the system library) and
Restore menu options 21 (Restore entire system), 22 (Restore system data only), 23
(Restore all user data) and 40 (Restore all libraries other than the system library) now
include the following commands:
•ENDTCPSVR
•ENDHOSTSVR
•DLYJOB JOB(300)
•ENDTCP
•DLYJOB JOB(300)
before the ENDSBS SBS(*ALL) OPTION(*IMMED) command is issued.
This enhancement is available through PTF SI35204 for IBM i 6.1.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Recovery from an unsuccessful restore


IBM i

• Restore operation failures

– Restore operation error

Or

– Restore operation interrupted

© Copyright IBM Corporation 2012

Figure 11-76. Recovery from an unsuccessful restore OL1914.1

Notes:
A restore operation can be unsuccessful either because an error was encountered when
trying to restore an object or because the operation was interrupted. If the object existed on
the system before the restore operation, it may be damaged by the unsuccessful restore
operation.
An object is not restored when an error is encountered. The error is either recoverable or
not.
If an object cannot be restored and the error is recoverable, the following occurs:
• A diagnostic message is sent to the job log for each object that is not restored. The
message ID can vary, depending on why the object was not restored.
• Each object that is associated with the errors is not restored. However, other objects not
associated with the errors but involved in the same restore operation are restored.
• Only the save and restore status information for the objects that were successfully
restored is updated.

11-112 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • A count of the number of objects successfully restored and a count of the number of
objects not restored are sent to the user in a diagnostic message.
If the error is not recoverable, the following occurs:
• Diagnostic messages are sent to the job log for each object.
• The save and restore status information for each object is not updated.
• A diagnostic message that identifies the error condition is sent to the user.
• The restore command ends immediately. No other objects are restored.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Special considerations
IBM i

• Recovering LIC

• Restoring the operating system

• Starting the system after it ends abnormally

• Reclaiming storage

• Parallel restore operations

© Copyright IBM Corporation 2012

Figure 11-77. Special considerations OL1914.1

Notes:
Reference for detailed recovery procedures:
http://publib.boulder.ibm.com/infocenter/iseries > i 7.1 > IBM i 7.1 Information Center >
Systems management > Backup and recovery > Recovering your system
Recovering Licensed Internal Code: Licensed Internal Code is the layer of IBM i
architecture just above the hardware. You must have the Licensed Internal Code on your
machine before you can restore the operating system. You must use the control panel on
your system unit to start the recovery of the Licensed Internal Code.
Restoring the Operating System: There might be situation were you must reload the
operating system. Some situations when you may have to reload the OS are when:
• You encounter problems with the operating system, such as damaged objects
• The System i software support center recommends it
• You replaced a disk unit in the system ASP
• You are updating your system to a new version or a new release

11-114 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty You need to retrieve the latest SAVSYS tapes from your storage location. Or, if these are
unavailable, you need original installation media. It is preferable that you use \SAVSYS
tapes as installing from the original media places your system back in a state without any of
the previously installed PTFs and also resets a number of system values and passwords.
Starting the System after it ends abnormally: If your system stops without having time to
shut down normally, it is called an abnormal end. Your system might end abnormally for the
following reasons:
• A power failure
• A disk failure, if you do not have mirrored protection or device parity protection
• A failure in the processor
• Failure of a critical operating system program
• Operator action (forced power down)
You will need to determine what causes your system to abnormally shut down. Once you
have solved the problem that caused your system to stop, you must start it again. In some
cases, you start the initial program load (IPL) yourself. In other cases, such as a power
loss, the system starts automatically. When you start your system again after it ends
abnormally, the system tries to put things back in order. It closes files that were in use,
rebuilds access paths that were open, and verifies file constraints. This process can take a
long time. If you want the system to determine when to rebuild and verify, perform a normal
(automatic) IPL to restart your system. If you want to view and change the schedules for
rebuilding access paths and verifying referential constraints, follow the steps in System i
Backup and Recovery Guide
Reclaiming Storage: Use the reclaim storage procedure (RCLSTG command) to recover
the addressability of lost or damaged objects. This allows you to identify and then restore
those objects that were damaged. The RCLSTG command has two parameters, SELECT
and OMIT, that allow you to perform reclaim functions in one of the following ways:
• All reclaim functions are performed
• The database cross-reference table reclaim function is performed
• All reclaim functions are performed, except for the database cross-reference table
reclaim function
Parallel Restore Operations: You can perform restore operations while using more than
one tape device simultaneously. The data that you restore in this manner must have been
saved in parallel format. You can use the Restore Library (RSTLIB) or Restore Object
(RSTOBJ) commands in conjunction with a media definition to perform a parallel restore.
It is possible to restore from a parallel save if you are using fewer devices than the save
operation used. However, IBM does not recommend this. Whenever possible, the same
number of devices that were used during the save operation should be used during a
restore operation.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Save/restore
IBM i

At the end of the lab, you should be able to:


• Use the SAVLIB command and explain what the precheck
parameter is used to control
• Perform the save of your team library using both the *Yes and
the *No in the PRECHK parameter
• Perform a save using a virtual tape drive

© Copyright IBM Corporation 2012

Figure 11-78. Exercise: Save/restore OL1914.1

Notes:

11-116 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 5: LPAR save/restore


considerations

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-79. Topic 5: LPAR save/restore considerations OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Logical partitions: Overview


IBM i

• Logical partitioning is the ability to make a server run


as if it were two or more independent servers.
• Benefits:
– Consolidating servers
– Sharing resources
– Maintaining independent servers
– Creating a mixed production and test environment
– Merging production and test environments
– Running integrated clusters
• Tools:
– HMC
– Integrated Virtualization Manager (supported only on specific server
models)
– Virtual Partition Manager
© Copyright IBM Corporation 2012

Figure 11-80. Logical partitions: Overview OL1914.1

Notes:
Reference: Systems Hardware Information:
http://publib.boulder.ibm.com/infocenter/powersys/v3r1m5/index.jsp PDF file Power
Systems Logical partitioning
Logical partitioning is the ability to make a server run as if it were two or more independent
servers. When you logically partition a server, you divide the resources on the server into
subsets called logical partitions. You can install software on a logical partition, and the
logical partition runs as an independent logical server with the resources that you have
allocated to the logical partition.
Consolidating servers: A logically partitioned server can reduce the number of servers
that are needed within an enterprise. You can consolidate several servers into a single
logically partitioned system. This eliminates the need for, and expense of, additional
equipment.
Sharing resources: You can quickly and easily move hardware resources from one logical
partition to another as needs change. Technologies such as the Micro-Partitioning
technology allow for processor resources to be shared automatically among logical

11-118 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty partitions that use a shared processor pool. Similarly, the PowerVM Active Memory Sharing
technology allows for memory resources to be shared automatically among logical
partitions that use the shared memory pool. Other technologies, such as dynamic logical
partitioning, allow for resources to be manually moved to, from, and between running
logical partitions without shutting down or restarting the logical partitions.
Maintaining independent servers: Dedicating a portion of the resources (disk storage
unit, processors, memory, and I/O devices) to a logical partition achieves logical isolation of
software. If configured correctly, logical partitions also have some hardware fault tolerance.
Batch and 5250 online transaction processing (OLTP) workloads, which might not run well
together on a single machine, can be isolated and run efficiently in separate partitions.
Creating a mixed production and test environment: You can create a combined
production and test environment on the same server. The production logical partition can
run your main business applications, and the test logical partition is used to test software. A
failure in a test logical partition, while not necessarily planned, will not disrupt normal
business operations.
Merging production and test environments: Partitioning enables separate logical
partitions to be allocated for production and test servers, eliminating the need to purchase
additional hardware and software. When testing has been completed, the resources
allocated to the test logical partition can be returned to the production logical partition or
elsewhere as required. As new projects are developed, they can be built and tested on the
same hardware on which they will eventually be deployed.
Running integrated clusters: Using high-availability application software, your partitioned
server can run as an integrated cluster. You can use an integrated cluster to protect your
server from most unscheduled failures within a logical partition.
Tools
Hardware Management Console: The Hardware Management Console (HMC) is a
hardware appliance that you can use to configure and control one or more managed
systems. You can use the HMC to create and manage logical partitions and activate
Capacity Upgrade on Demand. Using service applications, the HMC communicates with
managed systems to detect, consolidate, and send information to service and support for
analysis. The HMC also provides terminal emulation for the logical partitions on your
managed system. You can connect to logical partitions from the HMC itself, or you can set
up the HMC so that you can connect to logical partitions remotely through the HMC.
Partition profile: A partition profile is a record on the Hardware Management Console
(HMC) that specifies a possible configuration for a logical partition. When you activate a
logical partition using a partition profile, the managed system attempts to start the logical
partition using the configuration information in the partition profile.
The Integrated Virtualization Manager is a browser-based system management interface
for the Virtual I/O Server. The Integrated Virtualization Manager provides you with the
ability to create and manage logical partitions on a single server. Virtual I/O Server is
software that provides virtual storage and shared Ethernet resources to the other logical
partitions on the managed system. Virtual I/O Server is not a general purpose operating

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

system that can run applications. Virtual I/O Server is installed on a logical partition in the
place of a general purpose operating system, and is used solely to provide virtual I/O
resources to other logical partitions with general purpose operating systems. You use the
Integrated Virtualization Manager to specify how these resources are assigned to the other
logical partitions.

Note

The Integrated Virtualization Manager is supported only on specific server models.

Virtual Partition Manager is a feature of IBM i that allows you to create and manage one
IBM i logical partition and up to four Linux logical partitions on a single IBM System i server.
You can use the Virtual Partition Manager to create logical partitions on any IBM System i
model that does not require a Hardware Management Console (HMC). To use the Virtual
Partition Manager, you must first install IBM i on a non-partitioned server. After you install
IBM i, you can initiate a console session on IBM i and use System Service Tools (SST) to
create and configure Linux logical partitions. IBM i controls the resource allocations of the
logical partitions on the server.

11-120 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

HMC: Backup
IBM i

© Copyright IBM Corporation 2012

Figure 11-81. HMC: Backup OL1914.1

Notes:
The Hardware Management Console (HMC), must be backed up in addition to saving the
individual logical partitions. Use this window to back up hard disk information on the
Hardware Management Console (HMC). a remote system mounted to the HMC file system
(such as NFS), or sent to a remote site using File Transfer Protocol (FTP). Back up the
HMC after you make changes to the HMC or to the information associated with logical
partitions. As a part of this reinstallation, you may be prompted to insert the back up media
to restore the HMC to the state that existed.

Note

Do not power off the HMC while a back up task is running. You cannot have more than one
instance of the back up task running. This includes any scheduled HMC backup
operations.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

HMC: Restore
IBM i

© Copyright IBM Corporation 2012

Figure 11-82. HMC: Restore OL1914.1

Notes:
Use this window to select the remote repository option to restore critical backup data for
this HMC. Click Next to continue.

11-122 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

LPAR save considerations


IBM i

• Each partition behaves functionally like a single system or


individual system.
• Each LPAR must be saved individually.
• LPAR configuration data cannot be saved using save
commands.
– Since POWER5, LPAR configuration data is maintained at the HMC.
– Reference: Recovering your system (SC41-5304), including
procedures for LPAR systems.
– (POWER4 systems are no longer covered in this course.)

© Copyright IBM Corporation 2012

Figure 11-83. LPAR save considerations OL1914.1

Notes:
Reference: Recovering your system: http://publib.boulder.ibm.com/infocenter/iseries > i 7.1
> IBM i 7.1 Information Center > Systems management > Backup and recovery >
Recovering your system
You can save all the partitions at the save time if sufficient hardware resources are
available in each partition.
The Hardware Management Console (HMC), must be backed up in addition to saving the
individual logical partitions.
Refer to the System i Information Center for more details.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Saving LPARs: Considerations


IBM i

• Each LPAR behaves as an


individual stand-alone system,
including LIC and operating
system (SAVSYS).

• You can perform saves of


different partitions on the same
system at the same time.
– Assuming each partition has the
resources, such as an available
First partition
tape drive.
– You could set up and use a
virtual tape drive.
Second partition

© Copyright IBM Corporation 2012

Figure 11-84. Saving LPARs: Considerations OL1914.1

Notes:

11-124 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

LPAR restoring: Considerations


IBM i

• The saved data off of a partition can be restored to:


– Same partition on the same system
– Another partition on the same system
– Another partition on another system
– A non-partitioned system

© Copyright IBM Corporation 2012

Figure 11-85. LPAR restoring: Considerations OL1914.1

Notes:
Restore commands and functions remain unchanged and must be used on a
partition-to-partition basis. Refer to the Recovering your system Guide.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Restore for LPARs


IBM i

• Restore is done on a partition-by-partition basis.


– There is no system-wide restore option for all LPARs.

• Restoring multiple partitions can be done in parallel.


– This is assuming necessary devices (for example, tape drives) are
available.

• Recovery for LPARs is a two-stage process:


– Step 1: Recover the partition (at HMC, be sure to activate the correct
profile).
– Step 2: Restore the system and user data for each LPAR.

© Copyright IBM Corporation 2012

Figure 11-86. Restore for LPARs OL1914.1

Notes:
Enhancements have been made in the Backup and Recovery Guide to include procedures
for recovering partition data.
Basically, you select an option to copy the configuration data from another load source disk
to the partition you are restoring. More on the next visual.

11-126 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

D: IPL of partition from HMC


IBM i

© Copyright IBM Corporation 2012

Figure 11-87. D: IPL of partition from HMC OL1914.1

Notes:
At the Servers pane, select the profile to be activated by checking the box. Left click the [»]
button, and select the properties option. At the Properties windows, at the Settings tab,
select D for IPL source, and select the desired keylock position (Normal or Manual) Press
OK, select the operations option, and select Activate.

Important

• Starting with POWER6 models, you can do an IPL-type D from a tape device attached
by a Fibre Channel interface only when it is attached to an adapter without an
input/output processor (IOP). For other system models and configurations, a tape
device attached by a Fibre Channel interface needs to be set up as an alternate
installation device.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• If you use an alternate installation device, you need to ensure that you set up the device
and that you enable the device. You also need to have the optical media or tape media
that contains the Licensed Internal Code and your save media.

11-128 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 6: Backup/recovery for


Windows servers

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 11-88. Topic 6: Backup/recovery for Windows servers OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup methods
IBM i

• IBM i centric backups • Windows centric backups


– Full system – Directory/file level
– Complete Windows server – Methods:
– Network storage space • Windows Backup Utility
– File-level backup • Tivoli Storage Manager
• Veritas Backup Exec V8.0
– File level through network build 3311 and earlier
storage spaces
• Computer Associates Arcserv
– Methods: 2000
• IBM i save/restore commands
• BRMS

© Copyright IBM Corporation 2012

Figure 11-89. Backup methods OL1914.1

Notes:
IBM i Centric backups
Because IBM i integration for Windows server combines two operating systems (Windows
NT 4.0, Windows 2000, or Windows .NET Server and IBM i), you can use IBM i, Windows
server utilities, or a combination of both to manage backups.
To back up Windows server on IBM i, you have these basic options:
• Doing a full system backup on IBM i
• A complete Windows server
• Backing up the network server description (NWSD) and the disk drives that are
associated with Windows server on IBM i
• Backing up individual Windows server files and directories by using the IBM i SAV and
RST commands
• IBM i NetServer

11-130 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Your recovery options depend on how you backed up your system, as well as what you
need to recover.
Methods:
• IBM i save/restore commands
• Backup Restore Media Services (BRMS) (can have an interface to TSM)

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-131
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save method comparison


IBM i

Save method Originated on Relative speed SAVF capability


System IBM i Fast 80-100 GB/hr
Server IBM i Fast 80-100 GB/hr
Network storage
IBM i Fast 80-100 GB/hr
space
Directory/file IBM i Medium 8-30 GB/hr
8-30 GB/hr
Directory/file Windows Medium
(online backup)

• The performance results for your system will vary, depending on the
configuration of your IBM i server and the load on the system. See:

http://www- 1.ibm.com/servers/eserver/iseries/windowsintegration/savbackupperf.html

© Copyright IBM Corporation 2012

Figure 11-90. Save method comparison OL1914.1

Notes:
This chart shows the alternatives for save methods, comparing their relative speed when
saved to SAVFs.
As you can see from the chart, the larger save options have been optimized over the file
level saves. That is mostly a factor of our system save heritage. There are times where the
file level saves are more appropriate for their specific recoverability.

11-132 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup considerations
IBM i

• Objects to save
• Available tape drives
• Formatting tapes
• Saving to SAVF
• Required state of the network server description (NWSD)

© Copyright IBM Corporation 2012

Figure 11-91. Backup considerations OL1914.1

Notes:
Now let's look at some things to consider when addressing the subject of backing up your
data. These include:
• Objects to save: We look at this next.
• Available tape drives: The tape drives on Power Systems with IBM i are available to the
Windows user. They are easily accessible and their speed, relative to PC devices,
makes them a great backup alternative.
• Formatting tapes: IBM i and Windows use different tape formats. Both formats can be
initialized on the System i tape drives. It is mostly a matter of formatting the tapes to the
applications that are going to access them.
• Saving to SAVF: The on-line SAVF method is recommended for its speed. Later, as time
permits, backups of the SAVFs to media is recommended.
• Required state of the Network Server Description (NWSD): Shut down the Windows
server to prevent users from updating files during the backup.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-133
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Objects to save
IBM i

• Configuration objects
– NWSD
– LIND
• Predefined network server storage spaces (C: and D:)
• User data and applications
– User-defined network server storage spaces (E: through Z:)
• Server message queue
• IBM i-based Windows server code
• PC-based Windows server code

© Copyright IBM Corporation 2012

Figure 11-92. Objects to save OL1914.1

Notes:
Treat a network server description, its predefined disk drives, and any user-defined disk
drives linked to it as a unit. Save and restore them at the same time. To Windows server,
they are a full system, and should be treated as such. Otherwise, Windows server may not
be able to reestablish items such as Windows server File System permissions.
Configuration objects: NWSD and LIND
These objects are stored in QSYS and are saved with the Full system save or the SAVCFG
command.
Network server storage spaces C: D:
The system and source drives, along with the user data on the user-defined network
storage spaces get saved with the SAV command as they are IFS objects.
User data and applications
User-defined network server storage spaces: User drives E: through Z: (as required)

11-134 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Server message queue:


An IBM i object, it can be saved with the SAVLIB or SAVOBJ commands. (only the
description! Not the contents)
IBM i based Windows server code:
Both of these last two are effectively available to you from the installation media and should
not need to be backed up on their own.
PC-based Windows server code

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-135
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Network storage spaces backup


IBM i

• Windows disks C: to Z:
• NWSD must be varied off before the save
• Full System i backup or
• SAV command
– ASP use alters the parameters on the commands
– That is, SAV DEV('/QSYS.LIB/WINBACKUP.LIB/MYSAVF.FILE')
OBJ('/QFPNWSSTG/<NWSD>1')
© Copyright IBM Corporation 2012

Figure 11-93. Network storage spaces backup OL1914.1

Notes:
Here we look at saving just the data content from the network storage spaces. The same
technique is used for both the predefined and the user-defined storage spaces (that is,
disks C: to Z:):
• The NWSD must be varied off before the save
• Located in /QFPNWSSTG directory of Integrated File System
• Full System i backup OR
• SAV command
- That is, SAV DEV('/QSYS.LIB/WINBACKUP/MYSAVF')
OBJ('/QFPNWSSTG/<NWSD>1')
- For storage spaces created in a user disk pool, use /QFPNWSSTG/stgspc and
also dev/QASPnn/stgspc.UDFS, where stgspc is the name of the network server
storage space and nn is the number of the user disk pool

11-136 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Device sharing
IBM i

Disk drives

CD-ROM drive IXA

CD-ROM drive
Tape drives

IXS

© Copyright IBM Corporation 2012

Figure 11-94. Device sharing OL1914.1

Notes:
Windows on IXS/IXA can use IBM i tape devices
Tape device must be varied off on IBM i and locked on Windows console using Tape
Devices in the Control Panel.
Same tape media cannot contain both IBM i and Windows backups.
Methods:
• Windows Server Backup Exec
• Tivoli Storage Manager (TSM)
• Veritas Backup Exec Version
• Arcserv 2000

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-137
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Allocate a tape device to a Windows server


IBM i

• From IBM i:
– Vary off the device.
– Command entry:
• WRKCFGSTS *DEV *TAP
– IBM i Navigator:
• Make Unavailable

• From Windows:
– Lock the device.

© Copyright IBM Corporation 2012

Figure 11-95. Allocate a tape device to a Windows server OL1914.1

Notes:
1. From the IBM i side, you need to vary off the device. You can do this with the
WRKCFGSTS *DEV *TAP command or from the IBM i Navigator interface (Make
Unavailable).
2. From the Windows console, using the IBM i Integration for Windows interface, you lock
the device by selecting it and either clicking the lock smart icon or selecting lock from
the right mouse menu.

11-138 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Reallocate a tape device to the IBM i


IBM i

• From Windows:
– Unlock the device.

• From IBM i:
– Vary on the device.
– IBM i Navigator:
• Make Available
– Command entry:
• WRKCFGSTS *DEV *TAP
© Copyright IBM Corporation 2012

Figure 11-96. Reallocate a tape device to the IBM i OL1914.1

Notes:
1. From the Windows console, using the System i Integration for Windows interface, you
unlock the device by selecting it and either clicking the unlock smart icon or selecting
unlock from the right mouse menu.
2. From the System i side, you need to vary on the device. You can do this with the
WRKCFGSTS *DEV *TAP command or from the System i Navigator interface (Make
Available).

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-139
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup and restore


IBM i

Object Object Save


Object type Object content
name location command
iSeries
Communication
NWSD, LINK QSYS descriptions for SAVCFG
objects
Windows server

Predefined Windows server


C: D: /QFPNWSSTG network server boot and system SAV
storage spaces * drive

E: to Z:
User storage User data and
User /QFPNWSSTG SAV
spaces * applications
specified

MSGQ
Server message Messages from
User User specified SAVOBJ
queue Windows server
specified

iSeries-based
QNTAP QSYS Library SAVLIB
integration code

NTAP plus /QIBM/ProdDa PC-based


IFS directory SAV
subdirectories ta/NTAP/* integration code

*ASP use alters the parameters on the save commands.

© Copyright IBM Corporation 2012

Figure 11-97. Backup and restore OL1914.1

Notes:
This table summarizes the information, what to save, and how to save objects that are
created and used by a Windows server.

11-140 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Displaying status of a Windows server


IBM i

Or issue WRKCFGSTS *NWS.

© Copyright IBM Corporation 2012

Figure 11-98. Displaying status of a Windows server OL1914.1

Notes:
There are two ways to check the status of a Windows server:
Through IBM i Navigator interface:
• Expand your system
• Expand Integrated Server Administration
• Click either (depending on what type of adapter is installed on your system)
- Servers or
- ISCSI Connections then Network Server Host Adapters
• The status for each of the servers on your system is shown on the right as Started or
Shutdown
Through the 5250 green screen emulation window, issue the WRKCFGSTS command:
• Use *NWS (Network Server) for the Type (CFGTYP) parameter
• This displays the status for each of the servers on your system as varied off or active

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-141
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Starting a Windows server (1 of 2)


IBM i

• IBM i
– Vary on the NWSD
– System i Navigator Start option or
– WRKCFGSTS *NWS, option 1

• Windows console
– Cannot vary on the NWSD from here

© Copyright IBM Corporation 2012

Figure 11-99. Starting a Windows server (1 of 2) OL1914.1

Notes:
From the IBM i
• Vary on the Network Server Description (NWSD)
• IBM i Navigator
OR
WRKCFGSTS
• Use *NWS (Network Server) for the Type (CFGTYP) parameter
• Option 1 to Vary the NWSD on
OR VRYCFG for the NWSD with the *ON option

Note

Windows console does not support an interface to do this.

11-142 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Starting a Windows server (2 of 2)


IBM i

Or issue WRKCFGSTS *NWS.

© Copyright IBM Corporation 2012

Figure 11-100. Starting a Windows server (2 of 2) OL1914.1

Notes:
To Start a Windows Server through IBM i Navigator interface:
• Expand your system.
• Expand Integrated Server Administration.
• Click either one of the following (depending on what type of adapter is installed on your
system):
- Servers
- ISCSI Connections then Network Server Host Adapters
• Locate your server in the right pane, then click Start.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-143
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Shutting down a Windows server


IBM i

• System i:
– Vary off NWSD.
• Navigator Shut Down option or
• Shut Down and Restart option or
• WRKCFGSTS *NWS, option 2
– Must be restarted from System i side.
• Windows console:
– Start > Shut Down > Restart option is fine for IXS or IXA
– Start > Shut Down > Shut Down is not fine for IXA (breaks high
speed link connection). It is fine for IXS.
– Neither option varies off the NWSD.
– Restart from console or System i.
• Always shut down Windows server before
the system enters restricted state.
© Copyright IBM Corporation 2012

Figure 11-101. Shutting down a Windows server OL1914.1

Notes:
Power System with IBM i
Vary off NWSD:
System i Navigator:
Expand your system.
Expand Network.
Expand Windows Administration.
Select Integrated xSeries Servers.
Right-click and select either Shut Down or Shut Down and Restart.
WRKCFGSTS Use *NWS (Network Server) for the Type (CFGTYP) parameter
Option 2 to Vary the NWSD off
OR VRYCFG for the NWSD with a *OFF option

11-144 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Windows console


Start > Shut Down > Restart option is fine for IXS or IXA
Start > Shut Down > Shut Down is not fine for IXA (breaks High Speed Link
connection), fine for IXS
Neither option varies off the NWSD
Restart from console or System i

Note

Always shut down Windows Server before the system enters restricted state or prior to
PWRDWNSYS.

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-145
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (1 of 3)
IBM i
1. True or False: Ideally, objects on your system should be saved frequently, while
they are only restored infrequently.

2. Which of the following is not one of the supported basic modes of operation for a
tape library?
a. Manual mode
b. Virtual mode
c. Automatic cartridge loader mode
d. Library mode

3. The command used to manage the status of your tape devices is _____.
a. WRKMLBSTS
b. WRKTAPSTS
c. WRKCFGSTS
d. MNGTAPSTS

4. The command used to manage the status of your tape library devices is _____.
a. WRKMLBSTS
b. WRKTAPSTS
c. WRKCFGSTS
d. MNGTAPSTS
© Copyright IBM Corporation 2012

Figure 11-102. Checkpoint (1 of 3) OL1914.1

Notes:

11-146 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (2 of 3)
IBM i

5. True or False: The SAVCHGOBJ command does not require


that any other command has been previously used if this
command is used in your save strategy.

6. True or False: The SAVSYSINF command is the new


command that is a replacement for the SAVSYS command.

7. The command parameter that allows you to save data while


users are still working with that data is _____.
a. ACTDTA
b. SYSDTA
c. ACTSAV
d. SAVACT

© Copyright IBM Corporation 2012

Figure 11-103. Checkpoint (2 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-147
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (3 of 3)
IBM i

8. True or False: The Restore menu option 21 will perform a


direct opposite of the Save menu option 21. Restore option
21 will restore the entire system.

9. True or False: It is possible to save all of the user data


across all of the LPARs on a system using one single
command.

10. True or False: You can use either IBM i or Windows server
utilities or a combination of both to manage backups of
integrated xSeries servers.

© Copyright IBM Corporation 2012

Figure 11-104. Checkpoint (3 of 3) OL1914.1

Notes:

11-148 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• List the different types of failures that can occur on the system
• List the different media types that can be used for backup of
your data
• Perform the steps required to set up and use a virtual tape
drive
• Explain which commands are used to save which types of data
• Explain the difference between the SAVSYS and SAVSYSINF
command
• Identify the procedures used to save and restore different
types of system information

© Copyright IBM Corporation 2012

Figure 11-105. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 11. Backup and recovery strategy using save/restore 11-149
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

11-150 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 12. Journal management

What this unit is about


Journal management is a very valuable and powerful tool which is an
integral part of the operating system. When used properly as part of a
comprehensive recovery plan, it significantly improves the ability of the
administrator to recover from many types of job and system failures.

What you should be able to do


After completing this unit, you should be able to:
• Describe how journal management can be used to recover data
lost during a failure
• Implement journal management on your IBM Power System with
IBM i as part of a comprehensive recovery plan
• List the advantages and considerations of journal management
• List the advantages and considerations of journaling access paths
• Describe remote journaling and how it can be used to replicate
data or to implement a hot backup environment on a remote
system

How you will check your progress


• Checkpoint questions
• Lab exercise

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe how journal management can be used to recover
data lost during a failure
• Implement journal management on your IBM Power System
with IBM i as part of a comprehensive recovery plan
• List the advantages and considerations of journal management
• List the advantages and considerations of journaling access
paths
• Describe remote journaling and how it can be used to replicate
data or to implement a hot backup environment on a remote
system

© Copyright IBM Corporation 2012

Figure 12-1. Unit objectives OL1914.1

Notes:

12-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Journal management


concepts

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-2. Topic 1: Journal management concepts OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Think about your most important data file


IBM i

Data file

• What if it disappeared?
$
• How would you get it back?
– RSTOBJ
– Rekey all data from last save plus data since last save
• How much time would it take?
• Do you need to shorten the recovery time for data files?
© Copyright IBM Corporation 2012

Figure 12-3. Think about your most important data file OL1914.1

Notes:

12-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Single-level storage
IBM i

ON

OFF

Volatile storage
Main memory N S

*PGM Magnetic storage Or solid state


disk drives disk drives
Delete
Update
Write 1
2
*JRNRCV
*JRN
Buffer Disk File A File A File A
I/O
3 4

Data file
© Copyright IBM Corporation 2012 scatter loading
Figure 12-4. Single-level storage OL1914.1

Notes:
Journal management enables you to recover the changes to an object that have occurred
since the object was last saved. You can also use journal management to provide an audit
trail or to help replicate an object. You use a journal to define what objects you want to
protect with journal management. The system keeps a record of changes you make to
objects that are journaled and of other events that occur on the system.
1. Journal management intercepts the database record (add, update or delete).
2. Journal entry is forced to the journal receiver on a disk with a force ratio of one.
3. The database record is given to database data management.
4. The data base record is written to disk
FRCRATIO(*NONE) is recommended for journaled files.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Journal objects
IBM i

Journaling data flow

PGMX PGMY

Object A Object B Object B Object C


change change change change

Journal
receiver

Object A change
Object B change
Object B change
Obj. A Obj. B Obj. C

© Copyright IBM Corporation 2012

Figure 12-5. Journal objects OL1914.1

Notes:
The system keeps a record of changes you make to objects that are journaled and of other
events that occur on the system. These records are called journal entries. You can also
write journal entries for events that you want to record, or for objects other than the object
that you want to protect with journaling.
Contents of a journal entry:
• Information identifying the type of change
• Information identifying the record that was changed
• After image of the record
• Before image of the record (optional) (this is a separate journal entry)
• Information identifying the job, the user, the time of change, and so forth
• Information that identifies whether the file was opened, closed, reorganized, cleared, or
saved
• The journal identifier of the object

12-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Objects that can be journaled


IBM i

• Ability to record changes into a journal of:


– Access paths
– Libraries
– Objects
• Data area (*DTAARA)
• Data queue (*DTAQ)
– Database physical files (*PF)
– IFS objects
• Stream files (*STMF)
• Directories (*DIR)
• Symbolic link (*SYMLNK)
– Note: IFS objects must be in the root (/), QOpensys, user-defined file
system

© Copyright IBM Corporation 2012

Figure 12-6. Objects that can be journaled OL1914.1

Notes:
An interface is available to start and stop the replication of byte stream files. The changes
to these objects are recorded in a local journal. With remote journal support, the changes
will also be transported to a backup system. The primary target is for those environments
needing synchronous replication of the objects for continuous availability. The targeted
usage represents an autonomous operation from the end user perspective. The overall
goal is to support replication, which is defined as trapping changes, recording those
changes, transporting changed data to a backup system, and then replaying the changes
on the backup system. This enhancement, in order to support synchronous or
asynchronous replication of a byte stream file, contains the following capabilities:
• Function to start replication and end replication
• Means of knowing which objects are being replicated
• Means of associating the recorded and transported changes with the appropriate object
hooks at relevant points to record and transport changes
• Transport mechanism

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Repository for recording the changes to the object


• Mechanism for selectively pulling the recorded changes out of the repository (so, for
example, they can be replayed against a replicate)
The start journaling function accepts a list of one or more file names (up to 50). Only the
byte stream file objects (*STMF) are supported and not support directories (*DIR) or file
attributes. It also supports only stream files that are in the root file system or its derivatives
(root, /QOpenSys, and user defined file systems).
There is no support for before images, RMVJRNCHG, CMPJRNCHG, APYJRNCHG, or
commitment control.
IFS functions recorded in the journal are: fsynch, save, restore, suspend, delete, write,
writev, and ftruncate.
If you journal one file that participates in a referential constraint, you must journal all the
related files. Referential constraints are not enforced when you apply or remove journaled
changes, but the referential integrity of those constraints is verified.
For a file that has a trigger program, if the trigger program only performs processing on
object types which can be journaled and applied, you must journal all of the objects
processed by the trigger program. If the trigger programs do additional work that must be
reconstructed during a recovery, consider using the API support for sending journal entries.
The function that allows for physical files to automatically start journal protection when
created was added at V5R3. A special data area can be created within the surrounding
library to serve as a triggering mechanism.
Physical files in libraries are now treated the same at creation time as SQL tables in
collections. Journaling is implicitly started by IBM i.
The surrounding library must contain a Data Area named QDFTJRN.
The identity of desired journal must reside in the data area.
• First 10 characters = Name of library housing the journal
• Second 10 characters = Name of the journal
• Third set of characters = *FILE

12-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display Journal Entries


IBM i

© Copyright IBM Corporation 2012

Figure 12-7. Display Journal Entries OL1914.1

Notes:
The Display Journal (DSPJRN) command allows you to convert journal entries (contained in
one or more receivers) into a form suitable for external representation. Output of the
command can be displayed or printed with the job's spooled printer output or directed to a
database output file. If the database output file exists, records may either replace or be
added to the current data in the indicated file member. The system creates the specified
database file and member if they do not exist. Database files created by the system have a
standard format. A warning message is sent and the records are truncated if any of the
entries are longer than the specified maximum record length of the output files.
The Display Journal display shows a list of the journal entries that you requested to be
displayed. Only basic information about the journal entry is shown on this display. From this
display you can request to see all of the information for a specific journal entry.
To see all of the information for a specific journal entry, type 5 next to the journal entries
that you want more information about, and press Enter.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display Journal Entry


IBM i

© Copyright IBM Corporation 2012

Figure 12-8. Display Journal Entry OL1914.1

Notes:
The Display Journal Entry display shows all of the information about a specific journal
entry. The journal entry shown is one that you requested on the Display Journal display.
Sequence - The journal sequence number
The sequence number is initially 1. Each journal entry is sequentially numbered without
any breaks until the Change Journal (CHGHRN) command resets the sequence number.
However, when journal entries are converted and displayed, there may be breaks in the
sequence numbers. The system uses some journal entries only internally and combines
some entries into one during conversion.
Incomplete data
Indicates whether this entry has entry specific data which is not being displayed for one of
the following reasons.
• The length of the entry-specific data exceeds 32,766 bytes.

12-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • The entry is associated with a database file that has one or more fields of data type
BLOB (binary large object), CLOB (character large object), or DBCLOB (double-byte
character large object)
The possible values are:
• No - This entry has all possible data
• Yes - This entry has incomplete data
The data which is not visible through this interface can only be accessed by using the
Retrieve Journal Entries (QjoRetreiveJournalEntries) API or by specifying ENTFMT
(*TYPEPTR) on the RCVJRNE command.
Entry-specific data
This is additional information about the entry. The contents of this field are dependent on
the kind of journal entry. If there is no entry-specific data for the kind of entry being shown,
the message No Entry specific data is shown in this field. The information shown in
this field is not formatted. For a description of the format of the entry specific data, see the
IBM Power Systems with IBM i Information Center.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

F10 = Display only entry details


IBM i

© Copyright IBM Corporation 2012

Figure 12-9. F10 = Display only entry details OL1914.1

Notes:
The Display Journal Entry Details display shows only the detail entry data for a specific
journal entry. The journal entry shown is one that you requested on the Display Journal
display.
If you see More... on the lower right side of your display, there is more information to
view. Press Page Down (or Roll Up) to move toward the end of the information. Press Page
Up (or Roll Down) to move toward the beginning of the information.

12-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 2: Steps to implement


journaling

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-10. Topic 2: Steps to implement journaling OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Implementing journaling
IBM i

• For example: Implementation of object journaling


1. Create the journal receiver.
CRTJRNRCV JRNRCV( )

2. Create the journal.


CRTJRN JRN( ) JRNRCV( )

3. Start journaling for selected objects.


STRJRNOBJ OBJ( ) JRN( )

4. Save the objects.

• That is it!

© Copyright IBM Corporation 2012

Figure 12-11. Implementing journaling OL1914.1

Notes:
The Create Journal Receiver (CRTJRNRCV) command creates a journal receiver. Once a
journal receiver is attached to a journal (with the Create Journal (CRTJRN) or Change
Journal (CHGJRN) command), journal entries can be placed in it. A preferred auxiliary
storage pool (ASP), and a storage space threshold value can be specified for the journal
receiver.
The Create Journal (CRTJRN) command creates a journal as a local journal with the
specified attributes, and attaches the specified journal receiver to the journal. Once a
journal is created, object changes can be journaled to it or user entries can be sent to it.
The journal state of the created journal is *ACTIVE.
The different types of objects that can be journaled and the commands that you will use
are:
• Start to Journal an Access Path (STRJRNAP) command is used to start journaling the
access paths for all members of a database file to a specified journal. Any new member
that is later added to the file also has its access path journaled.

12-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • Start to Journal a Library (STRJRNLIB) command is used to start journaling changes
(made to a library or list of libraries) to a specific journal, and optionally to start
journaling changes to objects within the library or list of libraries. Objects created in,
moved into, or restored into a journaled library may be automatically journaled to the
same journal the library is journaled to.
• Start to Journal an Object (STRJRNOBJ) command is used to start journaling changes
(made to an object or list of objects) to a specific journal. The object types which are
supported through this interface are Data Areas (*DTAARA) and Data Queues (*DTAQ).
• Start to Journal a Physical File (STRJRNPF) command is used to start journaling
changes made to a specific database physical file to a specific journal. Changes in new
members added to the file are also journaled.
• Start to Journal IFS Objects (STRJRN) command is used to start journaling changes
(made to an object or list of objects) to a specific journal. The object types which are
supported through this interface are Stream Files (*STMF), Directories (*DIR), and
Symbolic Links (*SYMLNK). Only objects of type *STMF, *DIR, or *SYMLNK that are in the
“root” (/), QOpenSys, and user-defined file systems are supported.
For more information about the possible journal entries which can be sent, see the Journal
management topic collection in the IBM i Information Center at
http://www.ibm.com/systems/i/infocenter/. Search for “journal entry finder”.
For more information about journaling, see the Journal management topic collection in the
IBM i Information Center at http://www.ibm.com/systems/i/infocenter/. Search for “journal
entry finder”.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Step 1: CRTJRNRCV command


IBM i

© Copyright IBM Corporation 2012

Figure 12-12. Step 1: CRTJRNRCV command OL1914.1

Notes:
It is recommended that the journal receiver name should be unique for your system, not
unique within a library. If you have two journal receivers with the same name in different
libraries and they both become damaged, RCLSTG renames both journal receivers when
they are placed in the QRCL library.
The Create Journal Receiver (CRTJRNRCV) command creates a journal receiver. Once a
journal receiver is attached to a journal (with the Create Journal (CRTJRN) or Change
Journal (CHGJRN) command), journal entries can be placed in it. A preferred auxiliary
storage pool (ASP), and a storage space threshold value can be specified for the journal
receiver.
Restrictions
• A Journal receiver cannot be created in library QTEMP.
• This command cannot be used to create a journal receiver for a remote journal.
• If the library to contain the journal receiver is on an independent ASP, then
ASP(*LIBASP) must be specified.

12-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Step 2: CRTJRN command


IBM i

© Copyright IBM Corporation 2012

Figure 12-13. Step 2: CRTJRN command OL1914.1

Notes:
The Create Journal (CRTJRN) command creates a journal as a local journal with the
specified attributes, and attaches the specified journal receivers to the journal. Once a
journal is created, object changes can be journaled to it or user entries can be sent to it.
The journal state of the created journal is *ACTIVE.
Restrictions
1. A journal cannot be created in the library QTEMP.
2. The specified journal receivers must be created before the running of this command
and they must be empty. That is, the receivers must not have been previously attached
to a journal or have been in the process of being attached to a journal.
3. This command cannot be used to create a remote journal. See the Add Remote Journal
(QjoAddRemoteJournal) API in the IBM Power Systems with IBM i Information
Center (Programming -> APIs).
4. If the library to contain the journal is on an independent ASP, then the journal receiver
specified must be located on an independent ASP that is in the same ASP group as the

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

journal's library. Likewise, if the library to contain the journal is not on an independent
ASP, then the journal receiver specified cannot be located on an independent ASP.
5. If the library to contain the journal is on an independent ASP, then ASP(*LIBASP)
must be specified.

12-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Step 3a: Access path command (STRJRNAP)


IBM i

© Copyright IBM Corporation 2012

Figure 12-14. Step 3a: Access path command (STRJRNAP) OL1914.1

Notes:
The Start Journal Access Path (STRJRNAP) command is used to start journaling the access
paths for all members of a database file to a specified journal. Any new member that is later
added to the file also has its access path journaled.
If a physical file is specified, journaling can be started for its access paths. When access
path journaling is started for a physical file, only the access paths for the physical file
members are journaled. Journaling for any logical file access paths is started only when
access path journaling is started for the logical file.
The journal entries created after running this command cannot be used in any apply or
remove journaled changes operation. These entries are used only to recover the access
path without rebuilding it after an abnormal system operation ending.
If you do not want the overhead of managing the access path journaling yourself, consider
taking advantage of the system-managed access-path protection support SMAPP which
will be covered later in this unit.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Step 3b: Library command (STRJRNLIB)


IBM i

© Copyright IBM Corporation 2012

Figure 12-15. Step 3b: Library command (STRJRNLIB) OL1914.1

Notes:
The Start Journal Library (STRJRNLIB) command is used to start journaling changes
(made to a library or list of libraries) to a specific journal, and optionally to start journaling
changes to objects within the library or list of libraries. Objects created in, moved into, or
restored into a journaled library may be automatically journaled to the same journal the
library is journaled to.
After journaling begins for the object, the user should save the journaled object to preserve
its journal attribute information. Also, the object must be saved because, for example,
journaled changes cannot be applied to a version of the object that was saved before
journaling was in effect.
Objects created, moved, or restored into the library that are eligible for journaling may
automatically start journaling to the same journal as the library. Which objects inherit the
journal state of the library and what journaling attributes they start journaling with are
determined by the inherit journaling attributes of the library.

12-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Step 3c: Object command (STRJRNOBJ)


IBM i

© Copyright IBM Corporation 2012

Figure 12-16. Step 3c: Object command (STRJRNOBJ) OL1914.1

Notes:
The Start Journal Object (STRJRNOBJ) command is used to start journaling changes
(made to an object or list of objects) to a specific journal. The object types which are
supported through this interface are Data Areas (*DTAARA) and Data Queues (*DTAQ).
Additionally, the user can specify that only the after image or both the before and the after
images of an object of type *DTAARA be journaled. Before images are necessary to remove
journaled changes using the Remove Journaled Changes (RMVJRNCHG) command.
After journaling begins for the object, the user should save the journaled object to preserve
its journal attribute information. Also, the object must be saved because, for example,
journaled changes cannot be applied to a version of the object that was saved before
journaling was in effect.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Step 3d: Physical file command (STRJRNPF)


IBM i

© Copyright IBM Corporation 2012

Figure 12-17. Step 3d: Physical file command (STRJRNPF) OL1914.1

Notes:
The Start Journal Physical File (STRJRNPF) command is used to start journaling changes
made to a specific database physical file to a specific journal. Changes in new members
added to the file are also journaled.
The user can specify that only the after image or both the before and after images of
records in the journaled physical file be journaled. Before images are necessary to remove
journaled changes using the Remove Journaled Changes (RMVJRNCHG) command. In
addition, the system will automatically capture the before images for a database file if the
file is opened under commitment control.
After journaling begins for the file, and after any new members are added to the file, the
user should run the Save Changed Object (SAVCHGOBJ) command with
OBJTYPE(*FILE) and OBJJRN(*YES) specified. The file must be saved because
journaled changes cannot be applied to a version of the file that was saved before
journaling was in effect.

12-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty When the file being journaled is a distributed file, the STRJRNPF command is also
distributed, if journaling was successfully started locally. Even if the distribution request
fails, the local file remains journaled.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Step 3e: IFS object command (STRJRN)


IBM i

© Copyright IBM Corporation 2012

Figure 12-18. Step 3e: IFS object command (STRJRN) OL1914.1

Notes:
The Start Journal (STRJRN) command is used to start journaling changes (made to an
object or list of objects) to a specific journal. The object types which are supported through
this interface are Stream Files (*STMF), Directories (*DIR), and Symbolic Links (*SYMLNK).
Only objects of type *STMF, *DIR or *SYMLNK that are in the “root” (/), QOpenSys, and
user-defined file systems are supported.
The user can specify that only the after image or both the before and the after images of an
object of type *DTAARA be journaled. Before images are necessary to remove journaled
changes using the Remove Journaled Changes (RMVJRNCHG) command.
After journaling begins for the object, the user should save the journaled object to preserve
its journal attribute information. Also, the object must be saved because, for example,
journaled changes cannot be applied to a version of the object that was saved before
journaling was in effect.

12-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IBM System i Navigator: Start journaling


IBM i

© Copyright IBM Corporation 2012

Figure 12-19. IBM System i Navigator: Start journaling OL1914.1

Notes:
There are two environments that you can use for journal management: IBM i Navigator and
the green screen 5250 emulation session. IBM i Navigator provides a graphical interface
for journaling that is easy to use and does not require the use of control language (CL)
commands. The green screen emulation interface requires the use of CL commands or
APIs, but has more functionality than IBM i Navigator.
The following is a list of journaling functions that are only available with the 5250 interface:
• Journal access paths.
• Specify a maximum receiver-size option.
• Specify that objects allow journal entries to have minimized entry-specific data.
• Specify the data that is included in the fixed-length portion of the journal entries.
• Specify the time to delay the next attempt to automatically attach or delete a new
journal receiver with system journal-receiver management.
• Specify journal caching.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Specify journal standby state.


• Compare journal entries.
• Apply journaled changes.
• Remove journaled changes.
• Display journal entries.
• Look at the journal to display all object types which are journaled to that journal.
• Change the journaling attributes for a journaled object without ending journaling.

12-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Save objects
IBM i

• When?
– Immediately after STRJRNxx or if a new member is added to the file

• Why?
– Checkpoint for recovery (F/MS journal entry)
• Restore damaged object
• Apply journaled changes from *LASTSAVE

• Must have the system assigned journal identifier (JID)


in every saved member used for recovery after a restore.

© Copyright IBM Corporation 2012

Figure 12-20. Save objects OL1914.1

Notes:
When you start journaling for a physical file, the system assigns a unique journal identifier
(JID) to every member. The JID is part of every journal entry for the file.
The JID is used to associate the journal entry with the file. If a file is saved before journaling
is started, it does not have a JID, and if the file is restored it does not have a JID.
It is critical to save a journaled file every time a member has been added to it.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 3: Journal receiver


considerations

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-21. Topic 3: Journal receiver considerations OL1914.1

Notes:

12-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Managing the receiver chain


IBM i

CHGJRN JRN(name) JRNRCV(*GEN) MNGRCV(*USER)


SEQOPT(*CONT or*RESET)

*PGM

RCV0001
Old
receiver
RCV0002
Current
receiver
*File

© Copyright IBM Corporation 2012

Figure 12-22. Managing the receiver chain OL1914.1

Notes:
The Change Journal (CHGJRN) command changes the journal receiver, the journal
message queue, the manage receiver attribute, the delete receiver attribute, the receiver
size options, the journal state, allowing minimized entry specific data, journal caching, the
journal receiver's threshold, the journal object limit, the journal recovery count, or the text
associated with the specified journal. The command allows one journal receiver to be
attached to the specified journal. This replaces the previously attached journal receiver.
The newly-attached journal receiver begins receiving journal entries for the journal
immediately.
The sequence numbering of journal entries can be reset when the receiver is changed. If
the sequencing is not reset, an informational message is sent indicating the first sequence
number in the newly attached receiver.
The Manage receivers (MNGRCV) parameter is used to specify how the changing of journal
receivers (detaching the currently attached journal receiver and attaching a new journal
receiver) is managed. You can specify a value for the MNGRCV parameter for both the
CRTJRN and the CHGJRN commands.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

For this parameter you can specify:


*USER
The user manages the changing of journal receivers by issuing the Change Journal
(CHGJRN) command to attach new receivers and detach old receivers.
*SYSTEM
• The system manages the changing of journal receivers. This function is called system
change-journal management.
• When an attached journal receiver reaches its size threshold, the system detaches the
attached journal receivers and creates and attaches new journal receivers. Message
CPF7020 is sent to the journal message queue when the journal receivers are
detached.
• Additionally, during an initial program load (IPL), the system performs a CHGJRN
command to create and attach new journal receivers and to reset the journal sequence
number of journals that are not needed for commitment control recovery for that IPL.
• Also, the system attempts to perform a CHGJRN command to reset the sequence
numbers when the journal receiver's sequence number exceeds 2,147,000,000.

12-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System change journal management


IBM i

• CRTJRN ... MNGRCV(*SYSTEM)


– Threshold: Receiver changed automatically and message sent
– IPL: Receiver changed automatically with sequence number reset

• CRTJRN ... MNGRCV(*SYSTEM) DLTRCV(*YES)


– Detached receiver automatically deleted as soon as it is not needed
for recovering access paths or rolling back uncommitted changes
– Caution: Journal receivers deleted automatically and without sending
the usual inquiry message that it has not been saved

• DLTRCV(*YES) uses
– Journaling for commitment control or explicit access path protection
– Journal receiver is being replicated through remote journal

© Copyright IBM Corporation 2012

Figure 12-23. System change journal management OL1914.1

Notes:
The Manage receivers (MNGRCV) parameter is used to specify how the changing of journal
receivers (detaching the currently attached journal receivers and attaching new journal
receivers) is managed. The possible values are *USER or *SYSTEM.
The Delete receivers (DLTRCV) parameter is used to specify whether the system deletes
journal receivers when they are no longer needed or leaves them on the system for the
user to delete after they have been detached by system change-journal management or by
a user-issued CHGJRN command.

Note

This parameter can be specified only if MNGRCV(*SYSTEM) is specified.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The possible values are:


*NO
The journal receivers are not deleted by the system. It is underlined because it is the
default value for this parameter.
*YES
The journal receivers are deleted by the system.
When the journal has the DLTRCV(*YES) attribute, the following conditions can prevent the
system from deleting the receiver. When one of these conditions occurs, the system sends
message CPI70E6 to the journal message queue, and then retries the delete operation
every 10 minutes until the operation is successful.
• A lock conflict occurs for either the journal receiver or its journal
• An exit program that was registered by way of the QIBM_QJO_DLT_JRNRCV exit point
indicates that a receiver is not eligible for deletion
• A journal has remote journals associated with it and one or more of the associated
remote journals do not yet have full copies of this receiver

Important

Use automatic deletion of journal receivers with care if you use save-while-active
operations to save objects before they reach a commitment boundary. Ensure that you
save the journal receivers before the system deletes them. If an object is saved before it
reaches a commitment boundary it can have partial transactions. To avoid data loss, you
must have access to the journal receivers that were attached during the save-while-active
operation when you restore the objects with partial transactions.

12-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Journal receiver chain


IBM i

J PR RCV0006

RCV0007
J NR RCV0008

J PR RCV0007

RCV0008
J NR RCV0009

© Copyright IBM Corporation 2012

Figure 12-24. Journal receiver chain OL1914.1

Notes:
PR stands for previous receiver.
NR stands for next receiver.
The PR and NR entries are automatically added when a receiver is created or changed.
They are used by the system to make recovery seamless across a journal receiver chain.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

WRKJRNA command
IBM i

© Copyright IBM Corporation 2012

Figure 12-25. WRKJRNA command OL1914.1

Notes:
The Work with Journal Attributes display shows the current attributes of this journal and the
names of the journal receivers that are currently attached to this journal, if any.
You can use function keys to display lists of objects associated with this journal. You can
request the following lists:
• F13 - Files journaled to this journal
• F14 - Access paths journaled to this journal
• F15 - Receivers that have been used or are being used by this journal
• F16 - Remote journal information

12-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

Some of these lists or options are not available when working with an internal system
journal (*INTSYSJRN for JRN).

The type of journal, the possible values are:


• *LOCAL - A local journal
• *REMOTE - A remote journal
Journal state
The journal state describes an attribute for a journal. The attribute value can be *ACTIVE,
*INACTIVE (remote journal only), or *STANDBY (local journal only). For a local journal,
*ACTIVE indicates that journal entries are currently allowed to be deposited into the
journal. *STANDBY indicates that most journal entries are not deposited.
The state of the journal, the possible values are:
• *ACTIVE: If this is a local journal, this means journal entries can be deposited to this
journal. If this is a remote journal, this means journal entries can be received from a
source journal.
• *INACTIVE: If this is a local journal, this means journal entries cannot be deposited to
this journal, unless they have been designated as journal entries which must be
deposited. See the 'Journal Entry Information' appendix in the IBM Power Systems with
IBM i Information Center for the journal entry designations. If this is a remote journal,
this means journal entries cannot be received from a source journal.
• *FAILED: If this is a remote journal, this means journal entries cannot be received from
a source journal due to a remote journal function failure, such as a communication line
failure. Before inactivating the remote journal by issuing the Change Remote Journal
(CHGRMTJRN) or the Change Journal (CHGJRN) command or by calling the Change
Journal State (QjoChangeJournalState) API, you may want to receive, retrieve, or
display any unconfirmed entries from the journal.
• *STANDBY: This is the state of a local journal after the Change Journal (CHGJRN)
command specifying JRNSTATE(*STANDBY) is used to not allow deposits into the local
journal. The local journal can also be in *STANDBY state after an IPL if the local journal
is in *STANDBY state when the system ends. Objects journaled to the local journal can
be restored or changed, but most journal entries are not deposited until the journal state
for the local journal is again changed to *ACTIVE. This can be performed by using the
Change Journal (CHGJRN) command specifying JRNSTATE(*ACTIVE).
• This value does not apply to local journals.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

F15 = Work with Receiver Directory


IBM i

© Copyright IBM Corporation 2012

Figure 12-26. F15 = Work with Receiver Directory OL1914.1

Notes:
The Work with Receiver Directory display shows a list of all journal receivers that are
associated with this journal, if any. The list of receivers is ordered from the oldest (first
attached) at the top of the list, to the newest (currently attached) at the bottom of the list.
You can make selections on the list to:
• 8 - Display the attributes of the selected receivers
• 4 - Delete the selected receivers
Number column
A number is associated with a journal receiver and assigned by the system which is relative
to all other receivers in the receiver directory at a given time. The first two digits identify the
journal chain number and the last three digits identify the receiver number within the chain.
A chain identifies a group of receivers that are contiguous allowing the system to process
entries across receivers within the same chain.

12-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The chain number starts with zero and is incremented sequentially each time a new chain
is needed. New chains are started when a damaged receiver is recovered by restoring a
partial version.
Status column
The status of the receiver can be one of the following:
ATTACHED: The receiver is currently attached to the journal.
ONLINE: The receiver is online. The receiver has not been saved and it has been
detached from the journal.
SAVED: The receiver was saved after it was detached. The receiver storage was not freed
when it was saved.
FREED: The receiver was saved after it was detached. The receiver storage was freed
when it was saved.
PARTIAL: The receiver status is partial for one of the following reasons:
• It was restored from a version that was saved while it was attached to the journal.
Additional journal entries may have been written that were not restored.
• It was one of a pair of dual receivers, and it was found damaged while attached to the
journal. The receiver has since been detached. This receiver is considered partial
because additional journal entries may have been written to the dual receiver.
• It is associated with a remote journal and it does not contain all the journal entries that
are in the associated journal receiver attached to the source journal.
DELETED: The receiver has been deleted. This status is shown after option 4 (Delete)
completes. If you refresh (F5) the list, deleted receivers are removed from the list.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 4: Determining the recovery


points

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-27. Topic 4: Determining the recovery points OL1914.1

Notes:

12-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Determine the best recovery points


IBM i

DSPJRN
*JRN
FILE(names)

RCVRNG *CURRENT
RCV00010
Start(*CURRENT/name)
End(name/*CURRENT) RCV0009

RCV0008
FROMENT(*FIRST/seq#)
Receiver saved
to tape
TOENT(*LAST/seq#)

© Copyright IBM Corporation 2012

Figure 12-28. Determine the best recovery points OL1914.1

Notes:
Before starting a recovery, use the DSPJRN command to examine the journal receiver
entries to find the best starting and stopping recovery points.
To recover an object by applying or removing journaled changes, the object must be
currently journaled. The journal entries must have the same journal identifier (JID) as the
object. To ensure the journal identifiers are the same, save the object immediately after
journaling is started for the object.
If you need to recover objects that were journaled to a journal that you deleted, restore the
journal from a saved copy or create a new journal with the same name in the same library.
Then restore the object and all the needed receivers before applying or removing journaled
changes with that journal. You can use an option on the Work with Journals display to
reassociate any journal receivers that are still on the system. To use the Work with Journals
display, use the Work with Journals (WRKJRN) command.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display Journal (1 of 5)
IBM i

© Copyright IBM Corporation 2012

Figure 12-29. Display Journal (1 of 5) OL1914.1

Notes:
The Display Journal (DSPJRN) command allows you to convert journal entries (contained in
one or more receivers) into a form suitable for external representation. Output of the
command can be displayed or printed with the job's spooled printer output or directed to a
database output file.
The contents of selected entries in the journal receivers may be converted for output. It is
also possible to selectively limit the entries that are displayed. If no journal entries satisfy
the selection or limitation criteria, an escape message is sent indicating that fact.
Gaps may exist in the sequence numbers of the entries converted. These occur because
some of the journal entries represent internal IBM Power System with IBM i information.
These entries are not converted.
It is possible to show journal entries whose journal sequence numbers are reset in the
chain of receivers being specified.
The FILE, JRNCDE, ENTTYP, JOB, PGM, USRPRF, CMTCYCID, and DEPENT parameters can
be used to specify a subset of all available entries within a range of journal entries.

12-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Journaled physical file (FILE)


This specifies a maximum of 300 qualified file names whose journal entries are converted
for output.
Journaled object (OBJ)
This specifies a maximum of 300 qualified object names (*FILE, *DTAARA and *DTAQ)
whose journal entries are converted for output.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display Journal (2 of 5)
IBM i

© Copyright IBM Corporation 2012

Figure 12-30. Display Journal (2 of 5) OL1914.1

Notes:
Objects (OBJPATH) specifies a maximum of 300 objects whose journal entries are
converted for output. Only objects whose path name identifies an object of type *STMF,
*DIR or *SYMLNK that are in the root (/), QOpenSys, and user-defined file systems are
supported. All other objects are ignored. This parameter is not valid for remote journals.
Either the FILE parameter may be specified, or one or more of the object parameters (OBJ,
OBJPATH, OBJFID, or OBJJID) may be specified, but not both.
Directory subtree (SUBTREE) specifies whether the directory subtrees are included in
determining the objects for which journal entries are converted for output.
Name pattern (PATTERN) specifies a maximum of 20 patterns to be used to include or omit
objects for which journal entries are converted for output.

12-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display Journal (3 of 5)
IBM i

© Copyright IBM Corporation 2012

Figure 12-31. Display Journal (3 of 5) OL1914.1

Notes:
Range of journal receivers (RCVRNG) specifies the starting (first) and ending (last) journal
receivers (the receiver range) that contain the journal entries being converted for output.
The system starts with the starting journal receiver (as specified by the first value) and
proceeds through the receiver chain until the ending receiver (as specified by the last
value) is processed.
Starting large sequence number (FROMENTLRG) specifies the first journal entry that is being
considered for conversion for external representation.
Starting date and time (FROMTIME) specifies the date and time of the first journal entry
being converted for external representation.
Ending large sequence number (TOENTLRG) specifies the last journal entry being
converted for external representation.
Ending date and time (TOTIME) specifies the creation date and time of the last journal entry
being converted for external representation.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Number of journal entries (NBRENT) specifies the total number of journal entries that are
being converted for output.

12-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display Journal (4 of 5)
IBM i

© Copyright IBM Corporation 2012

Figure 12-32. Display Journal (4 of 5) OL1914.1

Notes:
Journal codes (JRNCDE) specifies the journal codes for which journal entries are converted
for output.
Journal entry types (ENTTYP) specifies whether to limit the conversion of journal entries to
those of a specified entry type.
Job name (JOB) specifies that the journal entries being converted for external
representation are limited to the journal entries for a specified job. Only journal entries for
the specified job are converted for external representation.
Program (PGM) specifies that the journal entries being converted for external representation
are limited to the journal entries created by a specified program.
User profile (USRPRF) specifies that the journal entries being considered for conversion for
external representation are limited to the journal entries created for the specified user
profile name. The user name identifies the user profile under which the job was run that
deposited the journal entries.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Commit cycle large identifier (CCIDLRG) specifies the journal entries considered for
conversion based on their associated commit cycle identifier. A commit cycle consists of all
journal entries sharing the same commit cycle identifier.
Dependent entries (DEPENT) specifies whether the journal entries to be converted for
output include the journal entries recording actions:
• That occur as a result of a trigger program
• On records that are part of a referential constraint
• That will be ignored during an Apply Journaled Changes (APYJRNCHG) or Remove
Journaled Changes (RMVJRNCHG) operation
Output format (OUTFMT) specifies whether the entry-specific data portion of the journal
entry information appears in character format or hexadecimal format. This keyword is
ignored if *OUTFILE is specified for the Output (OUTPUT) parameter.
Include hidden entries (INCHIDENT) specifies whether hidden journal entries should be
returned. Hidden entries are generated and used by the system. When hidden entries are
returned, it will be possible to display all journal entries such that no sequence numbers will
be unaccounted for.

12-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Display Journal (5 of 5)
IBM i

© Copyright IBM Corporation 2012

Figure 12-33. Display Journal (5 of 5) OL1914.1

Notes:
File identifier (OBJFID) specifies a maximum of 300 file identifiers (FID) for which journal
entries are converted for output. FIDs are a unique identifier associated with integrated file
system related objects. This field is input in hexadecimal format. Only objects whose FID
identifies an object of type *STMF, *DIR, or *SYMLNK that are in the “root” (/), QOpenSys,
and user-defined file systems are supported. All other objects are ignored.
Object journal identifier (OBJJID) specifies a maximum of 300 journal identifiers for which
journal entries are converted for output. This field is input in hexadecimal format.
Hexadecimal zero is not valid. Either the FILE parameter may be specified, or one or more
of the object parameters (OBJ, OBJPATH, OBJFID, or OBJJID) may be specified, but not
both.
Output (OUTPUT) specifies whether the output from the command is shown at the
requesting work station, printed with the job's spooled printer output, or sent to the
database file specified on the File to receive output (OUTFILE) parameter.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Journal codes
IBM i

Selected entry classifications


Journal code Type Description

J PR Previous receiver
NR Next receiver
RS Receiver saved
__________________________________________

F JM Journaling started
MS Member saved
SS Save-while-active group saved

OP File opened
CL File closed
R PT Record added
UB Image before update
UP Image after update
DL Record deleted

U XX User entry
© Copyright IBM Corporation 2012

Figure 12-34. Journal codes OL1914.1

Notes:
Journal Code J - Journal or Receiver Operation
Journal Code F - Database File Member Operation
Journal Code R - Operation on Specific Record Journal entries
Journal Code U - User-Generated Entry
For more information about the Journal Code and the Entry Type, see the IBM Power
System with IBM i Information Center

12-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Recovery point example (1 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 12-35. Recovery point example (1 of 2) OL1914.1

Notes:
The DSPJRN command is used to examine the activity against your files, to determine at
what point the good data ends, and at what point the bad (erroneous or incomplete) data
begins. At this time, application knowledge is very helpful if not required.
This example deals with a banking application. Three files are journaled: a savings account
file, a checking account file, and a money market account file.
This example deals with a program that transfers money between checking and savings. A
complete transaction is an update of both SAVE and CHECK.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Recovery point example (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 12-36. Recovery point example (2 of 2) OL1914.1

Notes:
This second of two screens displaying journal entries illustrates how the DSPJRN command
can be used to view transactions in order to identify a recovery point for the journal files.

12-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

User-generated entries
IBM i

© Copyright IBM Corporation 2012

Figure 12-37. User-generated entries OL1914.1

Notes:
Instead of User Generated Entries perhaps a better name would be programmer entries,
because a programmer modifies the application program to include statements that cause
additional entries to be placed in the journal receiver.
The idea is to label the file activity more accurately or more completely. For example, when
a logical unit of works is finished, add an entry in the journal receiver to specify when the
process or the transaction had completed. This could be something as simple as a
message that says This step is complete.
User entries should make analysis of journal entries and file activity easier and faster.
This may be thought of as an alternative to commitment control.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Command to send a user entry


IBM i

© Copyright IBM Corporation 2012

Figure 12-38. Command to send a user entry OL1914.1

Notes:
Use the Send Journal Entry (SNDJRNE) command or the Send Journal Entry (QJOSJRNE)
API to add your own entries to a journal. The system places these entries in the journal’s
attached journal receiver along with the system-created journal entries.
Journal code: Cannot specify, always U
Entry type: Pick a two position entry type.
Entry data: This is entry-specific data. Specify up to 3000 characters, enclosed in
apostrophes. The entry can contain any information. The user may assign an entry type to
the journal entry and may also associate the journal entry with a specified physical file
member.

12-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

The Send Journal Entry (QJOSJRNE) Application Programming Interface (API) can also be
used to write a journal entry to a specific journal. Using this API may improve performance
and can provide additional functionality that is not available with this command.

Journaled physical file (FILE) specifies the name and library of a database physical file
and member with which this entry is associated.
Force journal entry (FORCE) specifies whether the journal receiver is forced to auxiliary
storage after the user entry is placed on it.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 5: Performing a recovery

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-39. Topic 5: Performing a recovery OL1914.1

Notes:

12-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Work with Journals


IBM i

© Copyright IBM Corporation 2012

Figure 12-40. Work with Journals OL1914.1

Notes:
The Work with Journals (WRKJRN command) display shows a list of journals you can work
with. You can select tasks to be performed on specific journals.
Option
Type the option you want.
2=Forward recovery
Select this option to reconstruct an object from a particular point by restoring a saved
version of the object and then applying journaled changes to the object in the same order
that they were originally made. This option is not valid for remote journals.
3=Backout recovery
Select this option to restore an object to a previous state by removing changes to the object
in the reverse order from which the changes were originally made. This option is not valid
for remote journals.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

5=Display journal status


Shows you the current status of the selected journal. You will be shown journal information
concerning:
• The last system end status
• Object synchronization status
• Journal and receiver damage
This option is not valid for remote journals.
6=Recover damaged journal
Select this option to recover a journal that has been damaged. Journaling will be ended
and restarted for all objects journaled to the journal. Existing journal receivers are
reassociated with the recovered journal, so it is not necessary to save and restore the
receivers to associate them again with the journal. This option is not valid for remote
journals.
7=Recover damaged journal receivers
Select this option to recover journal receivers that have been damaged. This option is not
valid for remote journals.
8=Work with journal attributes
Select this option to run the Work with Journal Attributes (WRKJRNA) command for this
journal.
9=Associate receivers with journal
Select this option to associate existing journal receivers with the journal.

12-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Forward recovery
IBM i

• Issue WRKJRN.
• Select option 2 (Forward recovery).
• Select option 2 (Apply journaled changes) (all PFs to recover).
– System deletes dependent LFs.
– System deletes PFs to be recovered.
– Prompts restore of PFs and allocates *EXCL until recovery complete.
– Prompts for restore of LFs.
– APYJRNCHG prompted with
FROMENT(*LASTSAVE) and TOENT(*LASTRST).
– Prompts for receivers not online.

© Copyright IBM Corporation 2012

Figure 12-41. Forward recovery OL1914.1

Notes:
When the recovery process is complete, the status field for the member indicates
RECOVERED (if the operation was successful). If the operation failed, the status field
remains unchanged, and messages appear indicating why the operation failed.
To perform forward recovery by entering the commands yourself, do the following:
1. Restore the files: RSTOBJ
2. Allocate the files: ALCOBJ
3. Restore receivers: RSTOBJ
4. APYJRNCHG...FROMENT(*LASTSAVE) TOENT(*LASTRST)
5. Deallocate the files: DLCOBJ

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Select option 2 to start forward recovery


IBM i

© Copyright IBM Corporation 2012

Figure 12-42. Select option 2 to start forward recovery OL1914.1

Notes:
Option 2 (Forward recovery) on the Work with Journals screen initiates a prompted
interface to restoring and recovering an object.

12-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Authority prompt
IBM i

© Copyright IBM Corporation 2012

Figure 12-43. Authority prompt OL1914.1

Notes:
You will be prompted with a message reminding you that proper authority is required in
order to proceed with the recovery. This was added for V5R4.
Message ID CPA6999 Severity 99
Message type Inquiry
Date sent 02/15/09 Time sent 17:01:14
Message . . . . : Ensure you have sufficient authority. (I C)
Cause . . . . . : A recovery option was chosen that may require multiple steps or involve
multiple objects. If this recovery were to fail, then additional recovery is more complicated.
To help ensure that the recovery is successful, ensure that you have sufficient authority to
the objects that will be involved and the commands that may be used.
Recovery . . . : If the forward recovery option was chosen, then the authority required by
the Apply Journaled Changes (APYJRNCHG) command will be needed to the objects
chosen for recovery and also to the APYJRNCHG command. If the objects are damaged,

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

then authority will be needed to delete the objects, to restore the objects, to the Restore
Object (RSTOBJ) command, and to the appropriate delete command for the objects.

12-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Forward recovery object type


IBM i

© Copyright IBM Corporation 2012

Figure 12-44. Forward recovery object type OL1914.1

Notes:
Select the object type of the journaled objects you wish to recover. The system will then
display the list of objects of that object type currently being journaled to the journal you
identified on the Work with Journals screen.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Work with Forward Recovery for Files


IBM i

© Copyright IBM Corporation 2012

Figure 12-45. Work with Forward Recovery for Files OL1914.1

Notes:
The Work with Forward Recovery display shows a list of the database file members that
you have specified for forward recovery. From this display, you can select the type of action
you want to perform with each member.
The options you can select are:
1=Add member to list causes the entry typed on the line above the existing members to
be added to the list. Once added to the list, the other options can be used on the new
member.
2=Apply journaled changes applies journaled changes and changes the status to
RECOVERED (if the apply operation was successful). If the apply operation was not
successful, messages appear indicating why, and the status remains the same. If any
required receivers are missing or damaged while running the APYJRNCHG command, the
system displays prompts for the restore procedures for the missing or damaged receivers.
This option can be used on an entry typed into the empty line above the list entries, if the
typed entry already exists in the list.

12-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty 3=Restore, use this option if any members have a status of NOT FOUND. This option
prompts you for the files to restore. Members that are restored successfully have a status
of RESTORE COMPLETE. Members that are not restored keep their old status. A
message is sent indicating that the restore did not complete successfully. All members that
are restored are included in the list of members to recover. This option can be used on an
entry typed into the empty line above the list entries, if the typed entry already exists in the
list.
4=Remove member from list causes the member to be removed from the recovery list.
This option can be used on an entry typed into the empty line above the list entries, if the
typed entry already exists in the list.
Status column shows the status of the member relative to it's recovery process. The
status of each member can change as the recovery process progresses.
The status definitions are:
Blank: The member and the journal objects are all usable and everything is synchronized.
None of the journal objects need to be recovered prior to continuing recovery of the
member.
Not synchronized: The journal receivers used for this member are damaged and will need
to be recovered before the member can be recovered. To recover a member with this
status, first go back to the Work with Journals menu (F3=Exit) and take the option to
recover damaged journal receivers.
Damaged: The member is damaged and will need to be restored as part of the recovery
process. The system ensures you go through the restore step as you continue the recovery
process.
Not found: The system cannot locate the specified database file. The system will ensure
that the file has been restored before proceeding with the recovery.
Different journal: The member is not journaled to the journal you are working with. You will
need to work with the correct journal to recover this database file. Use the Display File
Description (DSPFD) command to determine the correct journal.
Not journaled: The member is not journaled to any journal. It cannot be recovered.
Restore complete: When the recovery process requires a restore of the database file, this
status is shown once the restore has successfully completed. If a restore is unsuccessful,
messages will be displayed and the status remains unchanged.
Recovered: When the recovery completes successfully, this status is shown. If the
recovery is unsuccessful, messages are displayed and the status will remain unchanged.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backout recovery
IBM i

• Issue WRKJRN.

• Select option 3 (Backout recovery).

• Select option 2 (Remove journaled changes).


– RMVJRNCHG prompted
– Prompts for restore of receivers not online

© Copyright IBM Corporation 2012

Figure 12-46. Backout recovery OL1914.1

Notes:
To remove journaled changes with the Work With Journal (WRKJRN) command, select
option 3 (Backout recovery). The Work with Backout Recovery display shows a list of the
file members that are being journaled.
The same options on the Work with Forward Recovery display are available on the Work
with Backout Recovery display. However, the option to restore the file is not valid for
backout recovery. The status field that is shown on the Work with Backout Recovery
display is either blank or it indicates the same status as for forward recovery, except for
restore complete.

12-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Select option 3 to start backout recovery


IBM i

© Copyright IBM Corporation 2012

Figure 12-47. Select option 3 to start backout recovery OL1914.1

Notes:
Select the type of object you are recovering.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Authority prompt
IBM i

© Copyright IBM Corporation 2012

Figure 12-48. Authority prompt OL1914.1

Notes:
You will be prompted with a message reminding you that proper authority is required in
order to proceed with the recovery. This was added for V5R4.
Message ID CPA6999 Severity 99
Message type Inquiry
Date sent 02/15/09 Time sent 17:01:14
Message . . . . : Ensure you have sufficient authority. (I C)
Cause . . . . . : A recovery option was chosen that may require multiple steps or involve
multiple objects. If this recovery were to fail, then additional recovery is more complicated.
To help ensure that the recovery is successful ensure that you have sufficient authority to
the objects that will be involved and the commands that may be used.
Recovery . . . : If the forward recovery option was chosen, then the authority required by
the Apply Journaled Changes (APYJRNCHG) command will be needed to the objects
chosen for recovery and also to the APYJRNCHG command. If the objects are damaged,

12-66 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty then authority will be needed to delete the objects, to restore the objects, to the Restore
Object (RSTOBJ) command, and to the appropriate delete command for the objects.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backward recovery object type


IBM i

© Copyright IBM Corporation 2012

Figure 12-49. Backward recovery object type OL1914.1

Notes:
Select the type of object you are recovering.

12-68 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Work with Backout Recovery for Files


IBM i

© Copyright IBM Corporation 2012

Figure 12-50. Work with Backout Recovery for Files OL1914.1

Notes:
The Work with Backout Recovery display shows a list of the data file members you have
specified for backout recovery. From this display, you can select the type of action you want
to perform with each member.
The options you can select are:
1=Add member to list
This option causes the entry entered on the line above the existing members to be added
to the list. Once added to the list, the other options can be used on the new member.
2=Remove journaled changes
This option causes the Remove Journaled Changes (RMVJRNCHG) command prompt to be
shown with known values already assigned. You can then run the command to remove the
specified changes. This option can be used on an entry entered into the empty line above
the list entries, if the entry already exists in the list.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

4=Remove member from list


This option causes the member to be removed from the recovery list. This option can be
used on an entry entered into the empty line above the list entries, if the entry already
exists in the list.

12-70 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

APYJRNCHG command (forward recovery)


IBM i

JRN: name

FILE: *LIBL *CURLIB name/*ALL name

RCVRNG: Start: Name *LASTSAVE *CURRENT

End: Name *CURRENT

FROMENT: *LASTSAVE number *FIRST

TOENT: *LASTRST number *LAST

TOTIME: Date Time

TOJOBO: job-name

TOJOBC: job-name

CMTBDY: *NO *YES

OBJERROPT: *CONTINUE *END


© Copyright IBM Corporation 2012

Figure 12-51. APYJRNCHG command (forward recovery) OL1914.1

Notes:
The Apply Journaled Changes (APYJRNCHG) command applies the changes that are
journaled (for a particular member of a database file) to a saved version of the file to
recover the file after an operational error or some form of damage.
The journaled changes are applied from the specified starting point, either the point at
which a file was last saved or a particular entry on the journal, until the specified ending
point has been reached.
The ending point can be the point at which the file has had all changes applied, the file was
last restored, a specified entry has been reached, a specified time has been reached, or
the file was opened or closed by a job (the CMTBDY parameter is used for handling changes
that are still pending in the file).
A list of physical files and members can be specified. The journaled changes for physical
file members are applied in the order that the journal entries are found on the journal, which
is the same order in which the changes are made to the physical file members.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

The difference between APYJRNCHG and APYJRNCHGX, is that with APYJRNCHGX, you can
only specify database files and *ALL files in a library. However, the APYJRNCHGX command
can apply journal entries resulting from the following SQL statements:
• CREATE INDEX
• CREATE TABLE
• CREATE VIEW

Note

The values which are underlined are the defaults for the associated parameter.

12-72 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

RMVJRNCHG command (backout recovery)


IBM i

JRN: name

FILE: *LIBL name *CURLIB/name *ALL

RCVRNG: Start: *CURRENT name

End: name

FROMENT: *LAST number *LASTSAVE

TOENT: *FIRST number

TOJOBO: job-name

CMTBDY: *NO *YES

OBJERROPT: *CONTINUE *END

© Copyright IBM Corporation 2012

Figure 12-52. RMVJRNCHG command (backout recovery) OL1914.1

Notes:
The Remove Journal Changes (RMVJRNCHG) command removes the changes that have
been journaled for a particular member of a database file.
The journaled changes are removed from the file from the specified starting point to the
ending point. The journal entries are processed in reverse of the order in which they were
placed into the journal receiver, from the most recent to the oldest.
The starting point can be identified as the last journal entry in the specified journal receiver
range, the point at which a file was last saved, or a particular entry in the receiver range.
The ending point can be the first journal entry or a particular entry in the specified journal
receiver range, or the point at which a file was opened by a specified job. The CMTBDY
parameter can be used for handling changes that are pending in the file.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Operations that cause incomplete recovery


IBM i

Code Type Operation APYJRNCHG RMVJRNCHG

F AY Journal changes applied Ends Ends


F CR Member-cleared Cleared Ends
F EJ End journaling Ends Ignores
F IU File not synchronized Ends Ends
F JM Start journaling member Ignores Ends
F MD Member deleted Ignores Ends
F MF SAVxx STG(*FREE) Ends Ends
F MO Member changed Ends Ends
F MR Member restored Ends Ends

F RC Journaled changes removed Ends Ends

F RG Member reorganized Ignore Ends


F SA Start APYJRNCHG Ends Ends
F SR Start RMVJRNCHG Ends Ends

Examine count/RRN and flag of F/AY or F/RC.


© Copyright IBM Corporation 2012

Figure 12-53. Operations that cause incomplete recovery OL1914.1

Notes:
Some types of entries in the journal receiver cause the apply or remove process to possibly
stop. These entries are written by events that the system cannot reconstruct. Certain
illogical conditions, such as a duplicate key in a database file defined as unique, can also
cause processing to end.
Error handling: When the system encounters a journal entry it cannot process, it ends
apply processing either for that specific object or for the entire apply operation. You can
specify how the system behaves when it encounters a journal entry it cannot process with
the Object Error Option (OBJERROPT) parameter on the APYJRNCHG or APYJRNCHGX
command.
• If you specify OBJERROPT(*CONTINUE), the system ends apply processing for the
specific object that has an error, but it continues apply processing for the other objects
in the apply operation.
• If you specify OBJERROPT(*END), the system ends processing for the entire apply
operation.

12-74 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty The OBJERROPT parameter is also available for the Remove Journaled Changes
(RMVJRNCHG) command. Actions of applying or removing journaled changes by journal
code shows which entry types cause processing to end for an object.
After using APYJRNCHG or RMVJRNCHG, the journal receiver should be examined to see the
status or results of the operation. The journal receiver has an F/AY entry to hold the status
or results of an APYJRNCHG and likewise, an F/RC entry to hold the status or results of an
RMVJRNCHG. Look in the Count/PRN and flag fields of the entries.
Count/RRN
This field displays either the relative record number (RRN) of the record which caused the
journal entry to be written, or a count which is pertinent to the specific type of journal entry.
This field is blank except for the journal code/type combinations that follow:
F/AY
This is the number of journal entries applied by the Apply Journal Changes (APYJRNCHG)
command.
F/RC
This is the number of journal entries removed by the Remove Journal Changes
(RMVJRNCHG) command.
Flag
This field displays additional information for certain kinds of journal entries. This field is
blank except for the journal code/type combinations that follow:
F/AY, F/RC
This indicates the completion status.
• 0 - Apply or remove of journal changes completed normally
• 1 - Apply or remove of journal changes completed abnormally

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Illogical conditions that stop APYJRNCHG or


RMVJRNCHG
IBM i

• Attempts to do the following:


– To add a record to an existing relative record number
– To add a record beyond the next record position after the end of the
file
– To add a record that has a duplicate key
– To delete a deleted record
– To update a nonexistent record
• Examine count/RRN and flag of F/AY or F/RC

© Copyright IBM Corporation 2012

Figure 12-54. Illogical conditions that stop APYJRNCHG or RMVJRNCHG OL1914.1

Notes:
Most illogical conditions are caused by starting the apply journaled changes operation at
the wrong place in the journal with respect to the current contents of the file members.

12-76 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 6: Additional journaling topics

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-55. Topic 6: Additional journaling topics OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVCHGOBJ: Journaling considerations (1 of 3)


IBM i

SAVCHGOBJ....OBJJRN(*NO)

Weekly Daily
SAVIB LIB(LIBA LIBB) CHGJRN JRN(name) JRNRCV(*GEN)
SAVCHGOBJ OBJ(*ALL) LIB(LIBA LIBB) OBJJRN(*NO)
LIBA

FILEA
FILEB Changes
FILEC occur to FILEA
FILEA on
RCVR0001
Tuesday. FILEA
JRNA RCVR0002
RCVR0001 RCVR0003
FILEA
LIBB RCVR0002
RCVR0001
RCVR0001
RCVR0002
RCVR0003

Monday Tuesday Wednesday Thursday

© Copyright IBM Corporation 2012

Figure 12-56. SAVCHGOBJ: Journaling considerations (1 of 3) OL1914.1

Notes:
The Save Changed Object (SAVCHGOBJ) command saves a copy of each changed object
or group of objects located in the same library. When *ALL is specified on the Objects
prompt (OBJ parameter), objects can be saved from all user libraries or from up to 300
specified libraries. When saving to a save file, only one library can be specified. For
database files, only the changed members are saved.
Objects changed since the specified date and time are saved with the following exceptions:
• If OBJJRN(*NO) is specified, database files currently being journaled are not saved,
unless journaling was started after the specified date and time. This ensures that
changes made to a physical file before journaling starts are not lost because they were
not journaled in a journal receiver.
• Freed objects (programs, files, journal receivers, and so forth) are not saved.
• User-defined messages, job and output queue definitions, logical file definitions, and
data queue descriptions are saved, but the contents of those objects are not saved.
Logical file access paths are saved if ACCPTH(*YES) is specified.

12-78 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Specified objects that were changed and the libraries where they reside remain locked
during the save operation.
Saved objects can be restored with the Restore Object (RSTOBJ) command.
To determine the date and time that an object was changed, run the Display Object
Description (DSPOBJD) command with DETAIL(*FULL) specified. For database file
members that were changed, run the Display File Description (DSPFD) command.
Journaled objects (OBJJRN) specifies whether changes to objects currently being entered
in a journal as specified in the Start Journal Physical File (STRJRNPF) command are saved.
Reference date (REFDATE) specifies the reference date. Objects that have been changed
since this date are saved.
Reference time (REFTIME) specifies the reference time. Objects that have been changed
since this time on the specified date are saved.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SAVCHGOBJ: Journaling considerations (2 of 3)


IBM i

SAVCHGOBJ....OBJJRN(*YES)

Weekly Daily
SAVIB LIB(LIBA LIBB) CHGJRN JRN(name) JRNRCV(*GEN)
SAVCHGOBJ OBJ(*ALL) LIB(LIBA LIBB) OBJJRN(*YES)
LIBA

FILEA
FILEB Changes
FILEC
occur to
Changes
FILEB on
occur to
JRNA Wednesday.
FILEA on FILEA
Tuesday. FILEA FILEB
LIBB
FILEB
RCVR0001 FILEA
RCVR0001
RCVR0002 RCVR0001 RCVR0002
RCVR0003
RCVR0001 RCVR0002 RCVR0003

Monday Tuesday Wednesday Thursday

© Copyright IBM Corporation 2012

Figure 12-57. SAVCHGOBJ: Journaling considerations (2 of 3) OL1914.1

Notes:
By specifying OBJJRN(*YES) on the SAVCHGOBJ command, a user is requesting that the
journal objects should be saved as well as any other objects that have changed since the
last save. This will alter your restore strategy.

12-80 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SAVCHGOBJ: Journaling considerations (3 of 3)


IBM i

• Forward recovery after data loss on Friday:


1. Load SAVLIB tape
2. RSTLIB
3. Load SAVCHGOBJ tape for Thursday
4. RSTOBJ OBJ(*ALL)
5. APYJRNCHG
6. Rekey data since Thursday's SAVCHGOBJ tape

© Copyright IBM Corporation 2012

Figure 12-58. SAVCHGOBJ: Journaling considerations (3 of 3) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Which files should be journaled?


IBM i

• How much does the file change?

• How difficult would it be to reconstruct file changes?

• How critical is the file?

• How does the file relate to other files?


– All files in an application
– All files in a referential constraint network
– All files affected by trigger programs

• Not source files

© Copyright IBM Corporation 2012

Figure 12-59. Which files should be journaled? OL1914.1

Notes:
• High change volume files are good candidates.
• Files whose changes have no written records, such as those used for telephone order
entry are good candidates.
• Consider the effect on your business during a delay to reconstruct a file.
• If you journal one file, you should journal all files related to it.
• Do not journal source files, since when a member is updated, every record is
considered changed and therefore written to the journal.

12-82 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How should files be assigned to journals?


IBM i

• One journal: Simple management and recovery

• Application's files in same journal simplifies recovery

• Backup, security, or auditing requirements

© Copyright IBM Corporation 2012

Figure 12-60. How should files be assigned to journals? OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Should journal receivers be in a user ASP?


IBM i

• System ASP: Operating system and user objects


• Library user ASP (library is first object in ASP)
– *JRN must be in a library ASP with a journaled file
– *JRNRCV can be in different ASP
• Non-library user ASP (not recommended)
– First object in ASP is a journal, journal receiver, or save file

ASP2 ASP3
ASP1
User ASP User ASP
System ASP
Library user ASP Non-library user ASP

*LIB CUSTLIB *LIB LIBJRNB *JRNRCV JRCVB


*FILE *JRN JRNB
*FILE *SAVF ORDSAV

*LIB LIBJRNA
*JRNRCV
JRCVA
*JRN JRNA

*LIB SAVFLIB

© Copyright IBM Corporation 2012

Figure 12-61. Should journal receivers be in a user ASP? OL1914.1

Notes:
If you are journaling many active files to the same journal, the journal receiver can become
a performance bottleneck. One solution is to put the receiver in a user ASP. This also
provides additional protection.
The system spreads journal receivers across multiple disk units to improve performance.
The journal receiver may be placed across the ten fastest disk arms in the ASP. Journal
entries are written in a round robin technique with these arms.

12-84 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Restore considerations
IBM i

• Recommended restore sequence (automatic if all in the same


library):
1. Journals
2. Physical files
3. Logical files
4. Journal receivers

• RSTLIB LIB(name): All objects within library restored in


correct sequence

• RSTLIB LIB(*NONSYS *ALLUSR)


– Libraries restored in alphabetic sequence

© Copyright IBM Corporation 2012

Figure 12-62. Restore considerations OL1914.1

Notes:
When you restore a journal, the system creates a new journal receiver and attaches it. A
new receiver chain is started.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Other journal considerations


IBM i

• Before images:
– Backout recovery is possible.
– Deleted records can be recovered.
– CMPJRNIMG is more meaningful.
• Journaled files should have FRCRATIO(*NONE)
• *JRNRCV spread across 10 fastest disk arms in ASP
• Size of journal receivers:
– Access path journaled also?
STRJRNPF IMAGES(*AFTER *BOTH)
OMTJRNE(*NONE *OPNCLO)
CRTJRN RCVSIZOPT(*RMVINTENT *MINFIXLEN)

© Copyright IBM Corporation 2012

Figure 12-63. Other journal considerations OL1914.1

Notes:
Journal entries to be omitted (OMTJRNE) specifies the journal entries that are omitted. The
possible values are:
• *NONE: No journal entries are omitted.
• *OPNCLO: Open and close entries are omitted. Open and close operations on the
specified file members do not create open and close journal entries.
Receiver size options (RCVSIZOPT) specifies the options that affect the size of the
receivers attached to the journal. The possible values are:
• *NONE: No options affect the size of the journal entries attached to the receiver. All
journal entries placed on the receiver are permanent.
• *RMVINTENT: The size of the receivers attached to the journal are reduced by automatic
removal of the internal entries required only for initial program load (IPL) recovery when
these entries are no longer required.

12-86 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty • *MINFIXLEN: The size of the journal entries that are deposited into the attached journal
receivers is reduced by the automatic removal of the job, program, and user profile
information.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

File journaling summary


IBM i

Recovers damaged data file member

12
11 1
10 2
9 3
8
7
6
5
4
Decreases time required to do backup

Provides audit trail

15

Provides activity reporting

Aids debugging
© Copyright IBM Corporation 2012

Figure 12-64. File journaling summary OL1914.1

Notes:

12-88 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Exercise: Journal management


IBM i

At the end of the lab, you should be able to:


• Create
• Add
• Secure

© Copyright IBM Corporation 2012

Figure 12-65. Exercise: Journal management OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 7: Remote journaling

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-66. Topic 7: Remote journaling OL1914.1

Notes:

12-90 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Remote journal
IBM i

• Journal entries transported to a duplicate receiver on a backup


server running IBM i

• Used to replicate data remotely or provide a hot backup site

• IBM i operating system base support

• Transport done below machine interface for better


performance

© Copyright IBM Corporation 2012

Figure 12-67. Remote journal OL1914.1

Notes:
Remote journal management allows you to establish journals and journal receivers on a
remote system or to establish journal and receivers on independent disk pools that are
associated with specific journals and journal receivers on a local system.
The remote journaling function can replicate journal entries from the local system to the
journals and journal receivers that are located on the remote system or independent disk
pools after they have been established.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Remote journal: Hot backup


IBM i

Primary (local) system Backup (remote) system

Call to RCVJRNE
Receive
Applications exit program
.
and .
apply jobs .
Processing........
R

DB operation
C
V
J
Communications R
transport N
E

DB JRN and JRN and


DB files
files JRNRCVs JRNRCVs

© Copyright IBM Corporation 2012

Figure 12-68. Remote journal: Hot backup OL1914.1

Notes:
• Objects cannot be journaled to remote journals
• Cannot use SNDJRNE or API QJIOSJRNE to send entries to remote journal
How does it work?
• DB images transported in real time
• All transport managed below the MI (that is, in microcode)
• Memory to memory transfer - does not wait to reach a target disk
• If the communications line goes down, source applications keep executing
Four transport mechanisms:
• OptiConnect (Optical bus)
• TCP/IP
• SNA (APPC)
• ATM

12-92 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Note

All remote journal TCP connections use the TCP local port of 3777.

Two transport modes:


• Sync Transmission with confirmation
• Async Transmission (no confirmation)
The terms asynchronously maintained and synchronously maintained both describe a
remote journal function delivery mode for journal entry replication. If a journal is
asynchronously maintained, control is returned to the application generating the journal
entry on the source system without waiting for the journal entry to be replicated to the
remote journal. An asynchronously maintained remote journal might lag several journal
entries behind the total number of journal entries in the journal on the source system.
If a journal is synchronously maintained, control is not returned to the application
generating the journal entry on the local system until the journal entry is replicated to the
remote journal.
• Can broadcast up to 255 secondaries/target systems
• Can cascade without limit to other systems
• CHGJRN initiated from source, performed in lock-step on target
What happens when I crash/recover?
• Simply reconnect. The replication of journal entries to each of the associated remote
journals ends implicitly when the local system ends. To begin replicating journal entries
to the remote journal, you must inactivate the remote journal on the target system, then
activate it again. After an IPL or vary on operation, you are not required to reassociate
the desired remote journals with the journal on the source system.
• Catch-up phase begins
- Automatic journal receiver recalibration
- Fire-hose mode
• Catch-up for rates bulk transfer of JRN receiver:
- SNA
• 1GB transferred in 10 min
- ATM
• 1 GB transferred in 5 min
- Optical connection
• 1 GB transferred in 2.2 min with RAID protected disk

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• 1 GB transferred in 1.0 min with non-RAID


• Faster catch-up means faster switch-back
The journal state describes an attribute for a journal. The attribute value can be *ACTIVE,
*INACTIVE (remote journal only), or *STANDBY (local journal only). For a local journal,
*ACTIVE indicates that journal entries are currently allowed to be deposited into the
journal. *STANDBY indicates that most journal entries are not deposited.

12-94 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Remote journal benefits


IBM i

• Less disk writes on the source system than prior support

• Less CPU overhead than prior support on the source system

• DB images can be sent to target machine in real time

• High availability (24x7)

• Shift saving JRN receivers to the target machine

• No lost transactions

• Faster switch-back
© Copyright IBM Corporation 2012

Figure 12-69. Remote journal benefits OL1914.1

Notes:
Differences from what is in the market today:
• Less disk writes on source system than former JRN support
- Greater DASD efficiency
- Adaptive bundling
• Less CPU overhead than prior support
- Frees up CPU cycles on production/source machine
- Shifts work to the backout/target machine
• DB images can be sent to target machine in real time
- SYNC mode
- No delay
- No trapped transactions
• If you need high availability (24x7)

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• If you need to free up CPU cycles on the source/production machine


• If you would like to Shift the role of saving JRN receivers from the source to the target
machine
• If you cannot tolerate any lost transactions
• If switch-back needs to be faster switch-back
• If you are feeding a central data warehouse from multiple sites

12-96 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How to add a remote journal (1 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-70. How to add a remote journal (1 of 6) OL1914.1

Notes:
Add a remote journal with IBM i Navigator
1. In the IBM i Navigator window, expand the system you want to use.
2. Expand Database.
3. Expand the database you want to use.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How to add a remote journal (2 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-71. How to add a remote journal (2 of 6) OL1914.1

Notes:
1. Expand Schemas.
2. Click the library that contains the journal to which you want to add a remote journal.

12-98 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How to add a remote journal (3 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-72. How to add a remote journal (3 of 6) OL1914.1

Notes:
1. Click Journals.
2. Right-click the journal to which you want to add a remote journal and select Properties.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How to add a remote journal (4 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-73. How to add a remote journal (4 of 6) OL1914.1

Notes:
1. In the Journal Properties dialog box, click Remote Journals.

12-100 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

How to add a remote journal (5 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-74. How to add a remote journal (5 of 6) OL1914.1

Notes:
1. To add (associate) a remote journal to this journal, click Add.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

How to add a remote journal (6 of 6)


IBM i

© Copyright IBM Corporation 2012

Figure 12-75. How to add a remote journal (6 of 6) OL1914.1

Notes:
The Add a Remote Journal dialog associates a remote journal on the target system, as
identified by the relational database directory entry (WRKRDBDIRE), with the journal on the
source system. The journal on the source system may be either a local journal or another
remote journal. A maximum of 255 remote journals may be associated with a single journal
on a source system.
The remote journal is created if it does not already exist. If a remote journal with the
specified name already exists on the target system, it is reused if it was previously
associated with this journal.
Relational database name: Lists the relational database (RDB) directory entries. Select
the RDB directory entry that you want.
Journal type: Allows you to select whether the remote journal should be of Type 1 or
Type 2.The journal type default is Type 1.The remote journal type influences the
redirection capabilities, journal receiver restore operations, and remote journal association
characteristics.

12-102 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Redirect receiver: Specifies whether or not to create the remote journal receivers on the
target system with a different library from that used on the source system.
Target receiver library: Allows you to specify the library on the target system where the
remote journal receivers are to be located. If this field is blank, receivers will reside in the
same libraries as on the source system.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Remote journal APIs


IBM i

• ADDRMTJRN: Add Remote Journal (QjoAddRemoteJournal API)


– Establishes and associates a remote journal on a target system with a journal on
a source system
• CHGRMTJRN: Change Journal State (QjoChangeJournalState API)
– Changes the journal state for local and remote journals
• RMVRMTJRN: Remove Remote Journal (QjoRemoveRemoteJournal API)
– Disassociates a remote journal on a target system from a journal on a source
system
• Retrieve Journal Information (QjoRetrieveJournalInformation API)
– Retrieves the attributes of a journal including the receiver directory, journaled
files, and remote journals
• Retrieve Journal Receiver Information (QjoRtvJrnReceiverInformation
API)
– Retrieves the attributes of a journal receiver

© Copyright IBM Corporation 2012

Figure 12-76. Remote journal APIs OL1914.1

Notes:
As an alternative to IBM i Navigator you can use the Add Remote Journal (ADDRMTJRN)
Command or the Add Remote Journal (QjoAddRemoteJournal) API to add a remote
journal.
If you set up the remote journal with IBM i Navigator, CL-command or API, there are:
• No application changes required
• No special feature to install
• No tuning mandated
• No extra housekeeping steps
Even Swap of Receivers is automated on the target.
CL-Commands:
The Add Remote Journal (ADDRMTJRN) command associates a remote journal on the
target system, as identified by the relational database directory entry, with the specified
journal on the source system. The journal on the source system may be either a local

12-104 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty journal or another remote journal. A maximum of 255 remote journals may be associated
with a single journal on a source system.
The Change Remote Journal (CHGRMTJRN) command is used to change the journal state
for remote journals. This command is used on the source system for a remote journal that
is associated with a source-system journal, to change the state of the remote journal from
*ACTIVE to *INACTIVE or from *INACTIVE to *ACTIVE. A journal state of *ACTIVE for a
remote journal indicates that journal entries can be received from the associated journal on
the source system. A journal state of *INACTIVE for a remote journal indicates that the
journal is not ready to receive journal entries from a source journal. This command also
allows additional attributes that are associated with the journal state to be set.
The Remove Remote Journal (RMVRMTJRN) command disassociates a remote journal on
the specified target system from the specified journal on the source system. The journal on
the source system may be either a local journal or another remote journal. The remote
journal, and any associated journal receivers, are not deleted from the target system by the
command processing. No processing is performed on the target system for the command.
The remote journal that remains on the target system may later be added back to the
remote journal definition for the journal on the source system by using the Add Remote
Journal (ADDRMTJRN) command.
The Change Journal (CHGJRN) command can be used to modify the other journal attributes
of remote journals, such as the journal message queue, deleting receivers, and text.
Special attention needs to be given to the base main storage pool size for both source and
target systems in order to keep page faulting to a minimum. Refer to the Performance
section for other performance issues when working with remote journals.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New in V7R1
IBM i

© Copyright IBM Corporation 2012

Figure 12-77. New in V7R1 OL1914.1

Notes:
As an alternative to IBM i Navigator you can use the Add Remote Journal (ADDRMTJRN)
Command or the Add Remote Journal (QjoAddRemoteJournal) API to add a remote
journal.
If you set up the remote journal with IBM i Navigator, CL-command or API, there are:
• No application changes required
• No special feature to install
• No tuning mandated
• No extra housekeeping steps
Even Swap of Receivers is automated on the target.
CL-Commands:
The Add Remote Journal (ADDRMTJRN) command associates a remote journal on the
target system, as identified by the relational database directory entry, with the specified
journal on the source system. The journal on the source system may be either a local

12-106 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty journal or another remote journal. A maximum of 255 remote journals may be associated
with a single journal on a source system.
The Change Remote Journal (CHGRMTJRN) command is used to change the journal state
for remote journals. This command is used on the source system for a remote journal that
is associated with a source-system journal, to change the state of the remote journal from
*ACTIVE to *INACTIVE or from *INACTIVE to *ACTIVE. A journal state of *ACTIVE for a
remote journal indicates that journal entries can be received from the associated journal on
the source system. A journal state of *INACTIVE for a remote journal indicates that the
journal is not ready to receive journal entries from a source journal. This command also
allows additional attributes that are associated with the journal state to be set.
The Remove Remote Journal (RMVRMTJRN) command disassociates a remote journal on
the specified target system from the specified journal on the source system. The journal on
the source system may be either a local journal or another remote journal. The remote
journal, and any associated journal receivers, are not deleted from the target system by the
command processing. No processing is performed on the target system for the command.
The remote journal that remains on the target system may later be added back to the
remote journal definition for the journal on the source system by using the Add Remote
Journal (ADDRMTJRN) command.
The Change Journal (CHGJRN) command can be used to modify the other journal attributes
of remote journals, such as the journal message queue, deleting receivers, and text.
Special attention needs to be given to the base main storage pool size for both source and
target systems in order to keep page faulting to a minimum. Refer to the Performance
section for other performance issues when working with remote journals.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 8: Access path protection

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 12-78. Topic 8: Access path protection OL1914.1

Notes:

12-108 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Introduction to access path journaling


IBM i

How can I significantly reduce


the time needed to IPL following
an abnormal system end? That is easy! Implement
access path journaling or use
system managed access
path protection.

© Copyright IBM Corporation 2012

Figure 12-79. Introduction to access path journaling OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Access path protection


IBM i

• What is the benefit?


– Reduces IPL time after abnormal end

• How?
– By journaling access paths

• What does the user have to do?


– Very little

• What does it cost?


– Some CPU performance and some DASD space

© Copyright IBM Corporation 2012

Figure 12-80. Access path protection OL1914.1

Notes:
Without access path protection, an IPL after an abnormal system end could take several
hours.
An access path describes the order in which records in a database file are processed. A file
can have multiple access paths, if different programs need to see the records in different
sequences. If your system ends abnormally when access paths are in use, the system may
have to rebuild the access paths before you can use the files again. This is a
time-consuming process. To perform an IPL on a large, busy IBM Power System with IBM i
that has ended abnormally can take many hours.
The QSAVACCPTH system value indicates whether or not the access paths are saved
during a save operation. The access path is the order in which records in one or more
database files are organized for processing by a program
Two methods of access-path protection are available:
1. System-managed access-path protection (SMAPP)
2. Explicit journaling of access paths

12-110 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Access path's contribution to IPL time


IBM i

• Abnormal end of system can leave an access path unusable.


• Access path is made usable no later than when file is opened.
• Protected access paths are:
– Recovered quickly through journal during or after IPL
• Unprotected access paths:
– DB files have a RECOVER attribute
• RECOVER(*NO): Rebuild when opened
• RECOVER(*AFTIPL): IPL, and then rebuild
• RECOVER(*IPL)
– Rebuild during IPL
– Valid only if file has MAINT *IMMED or *DLY, not *REBLD
– During IPL, RECOVER attribute changeable on Override Access Path
Recovery display

© Copyright IBM Corporation 2012

Figure 12-81. Access path's contribution to IPL time OL1914.1

Notes:
Access path maintenance (MAINT)
Specifies, for files with key fields, the type of access path maintenance used for all
members of the physical file.
The possible values are:
*IMMED: The access path is updated each time a record is changed, added, or deleted
from a member. *IMMED must be specified for files that require unique keys.
*REBLD: The access path is completely rebuilt each time a file member is opened. The
access path is maintained until the member is closed; then the access path is deleted.
*REBLD cannot be specified for files that require unique keys.
*DLY: The maintenance of the access path is delayed until the physical file member is
opened for use. Then, the access path is changed only for records that have been added,
deleted, or changed since the file was last opened. While the file is open, changes made to
its members are immediately reflected in the access paths of those members, no matter
what is specified for MAINT. To prevent a lengthy rebuild time when the file is opened, *DLY

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

should be specified only when the number of changes to the access path between
successive opens are small; that is, when the file is opened frequently or when the key
fields in records for this access path change infrequently. *DLY is not valid for Access paths
that require unique key values.
If the number of changes between a close and the next open reaches approximately 10%
of the access path size, the system stops saving changes and the access path is
completely rebuilt the next time the file is opened.
Access path recovery (RECOVER)
Specifies for files with immediate or delayed access path maintenance, when recovery
processing of the file is performed if the access path is being changed when a system
failure occurs. This parameter is valid only for a file with a keyed access path.
If *IMMED is specified for the MAINT parameter, the access path can be rebuilt during initial
program load (IPL) (before any user can run a job), or after IPL has ended (during jobs
running at the same time), or when the file is next opened. While the access path is being
rebuilt, the file cannot be used by any job.
During the IPL, an Override Access Path Recovery display lists those access paths that
must be recovered and the RECOVER parameter value for each access path. The user can
override the RECOVER parameter value on this display. More information on access paths is
in the IBM Power Systems with IBM i Information Center.
If *REBLD is specified for the MAINT parameter, the access path is rebuilt the next time its
file is opened.
The possible values are:
*NO: The access path of the file is rebuilt when the file is opened. *NO is the default for all
files that do not require unique keys. The file's access path, if not valid, is rebuilt when the
file is next opened.

Note

*NO is the default for all files that do not require unique keys.

*AFTIPL: The access path of the file is rebuilt after the initial program load (IPL) operation
is completed. This option allows other jobs not using this file to start processing
immediately after the completion of the IPL. If a job tries to allocate the file while its access
path is being rebuilt, a file open exception occurs.

Note

*AFTIPL is the default for all files that require unique keys.

12-112 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty *IPL: The access path of the file is rebuilt during the IPL operation. This ensures that the
file's access path is rebuilt before the first user program tries to use it. However, no jobs
can start running until after all files that specify RECOVER(*IPL) have their access paths
rebuilt.
Force keyed access path (FRCACCPTH)
Specifies, for files with key fields, whether access path changes are forced to auxiliary
storage along with the associated records in the file. FRCACCPTH(*YES) minimizes (but
does not remove) the possibility that an abnormal job end may cause damage to the
access path that requires it to be rebuilt.
The possible values are:
*NO: The access path and associated records are not forced to be written to auxiliary
storage when the access path is changed.
*YES: The access path and associated records are forced to be written to auxiliary storage
when the access path is changed. *YES cannot be specified if *REBLD is specified on the
Access path maintenance prompt (MAINT parameter).
FRCACCPTH(*YES) slows the response time of the IBM Power System with IBM i if the
access path is changed in an interactive job. If the access path is changed frequently, the
overall performance of the IBM Power System with IBM i is decreased.

Note

The default of the parameters are underlined.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Edit Rebuild of Access Paths: EDTRBDAP command


IBM i

© Copyright IBM Corporation 2012

Figure 12-82. Edit Rebuild of Access Paths: EDTRBDAP command OL1914.1

Notes:
This display appears during an attended IPL after an abnormal system end.
The Edit Rebuild of Access Paths display shows the names of the file members that have
immediate or delayed maintenance access paths that are not valid.
The display allows you to rebuild the access path for a given member of the file. The
access path for a file member is marked as not valid when the system ends abnormally and
the file member is in use.
Files with journaled access paths and files with rebuild maintenance of the access path are
not shown on the Edit Rebuild Access Path display.
When a sequence value is selected and the Enter key is pressed, the status field is
updated to show the current rebuild condition of the access path.
The following sequence values can be selected:
1-99=Rebuild sequence

12-114 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Rebuild during IPL (number less than IPL Threshold)


If the sequence value is a number less than or equal to the IPL threshold value, the access
path is rebuilt during the IPL. This recovery option ensures that the file's access path is
rebuilt before the job uses the file. Note that rebuilding access paths during the IPL causes
the IPL to run longer.
Rebuild after IPL (number greater than IPL Threshold)
If the sequence value is a number greater than the IPL threshold value, the access path is
rebuilt after the IPL is completed. Jobs cannot use a file whose access path is rebuilt after
the IPL until the rebuilding of the access path for the file is complete. However, jobs not
using a file whose access path is rebuilt after the IPL can begin running immediately after
the IPL is complete.
*OPN=Rebuild at open
The access path is rebuilt when the file is next opened. If the access path has unique keys,
rebuilding the access path at open time prevents some applications from adding and
updating records to the file until the rebuild of the access path is complete.
*HLD=Hold the rebuild
The access path is rebuilt when the sequence value is changed to 1-99 or *OPN.
Sequence
The sequence in which access paths are rebuilt is determined by the values assigned to
them. The possible values include: whole numbers ranging from 1 through 99, *OPN, and
*HLD. One (1) represents the highest priority path and is rebuilt first. Whether paths with
values 1 through 99 are rebuilt before or after the IPL is determined by the value specified
on the THRESHOLD parameter. *OPN designates a value of 100, which means the access
path is rebuilt the next time the file is opened, and *HLD designates a value of 200, which
means the access path is not rebuilt until the value has been changed to *OPN or to a
number ranging from 1 through 99.
Status
The status values are:
• RUN: The access path is being rebuilt
• READY: The access path is waiting to be rebuilt according to its sequence number
• WAIT: The access path is rebuilt when the required locks are obtained
• HELD: The access path is rebuilt when the user changes the sequence to *OPN or to a
value ranging from 1 through 99.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Explicit access path journaling (protection)


IBM i

• You decide which access paths to protect.

• Underlying physical files must be journaled.

• STRJRNAP for file with the access path.

• Access path and file use same journal.

• Encoded vector access paths are not eligible.

© Copyright IBM Corporation 2012

Figure 12-83. Explicit access path journaling (protection) OL1914.1

Notes:
As mentioned earlier, if your system ends abnormally when access paths are in use, the
system may have to rebuild the access paths before the database can be used again.
To perform an IPL on a large, busy IBM Power System with IBM i that has ended
abnormally can take many hours.
Two methods of access-path protection are available:
• Explicit journaling of access paths
• System-managed access-path protection
Explicit journal management may be used to keep a record of changes to access paths.
This greatly reduces the amount of time it takes the system to perform an IPL after it ends
abnormally. However, this method requires the user to decide which access paths should
be journaled and how the journaling should be controlled.
The need to protect some access paths may have be obvious but, for other access paths,
the need may not be so obvious. For example, the use of a file may vary from time-to-time
during the day or even over a cycle as long as a year. It is easy to omit an access path.

12-116 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Protecting every access path may consume system resources unnecessarily and omission
of the wrong path could affect availability in the event of an abnormal termination.
Most users make a decision based on their experience with their applications.
An alternative to a user controlled access path protection scheme is to use the System
Managed Access Path Protection (SMAPP) facility.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System-managed access-path protection


IBM i

• Reduces IPL time after abnormal end

• User sets target recovery time

• Automatic:
– Determines which access paths to journal
– Adjusts for system hardware and file changes
– Files not journaled: Uses internal journal and receiver
– Files already journaled: Uses same journal and receiver

• Will not duplicate protection if access path already journaled

© Copyright IBM Corporation 2012

Figure 12-84. System-managed access-path protection OL1914.1

Notes:
You can allow the system to determine which access paths to protect. You specify target
recovery times for access paths for the entire system or for auxiliary storage pools (ASPs).
Your system has a default recovery time for access paths for the entire system of 90
minutes when it is shipped. You can use the Edit Recovery for Access Paths (EDTRCYAP)
command to see and change the target recovery times for access paths and to see how
much space the IBM Power System with IBM i is using for system-managed access-path
protection (SMAPP).
SMAPP provides a simple method to reduce your recovery time after an abnormal system
end. SMAPP manages the required environment for you. You do not need to use any type
of journal management to use SMAPP.
• Automated
- You need not take any action to benefit
- Adapts to new LFs and APs as they arrive
- No files get overlooked

12-118 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty - Uses an algorithm somewhat similar to journaling without as much disk space or
CPU overhead
• Can be customized to your needs
- You get to dial the level of protection you require
- You tell the system how much recovery time you can afford and the system tries to
match it
Is expected to have minimal performance impact/overhead
- Perhaps as low as 3 - 4%
- Even less if you want to specify a slightly longer recovery time
• Completely compatible with any journaling you are already using
- No need to change any of your current practices
- Does not require set up of a private User ASP
Some access paths are not eligible for protection by SMAPP including the following:
• Those defined for file that specifies MAINT(*REBLD)
• Any access path that is already explicitly journaled
• Any access path in the QTEMP library
• Any access path whose underlying physical files are journaled to different journals
• Any access path for a physical file that was created specifying FRCACCPTH(*YES)
• Any encoded vector access path
• Any access path that uses an international component for unicode (ICU) sort sequence
table
• A file journaled to a journal in standby state

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SMAPP performance and auxiliary storage use


IBM i

• Low target recovery time has greater impact on performance

• Asynchronous writes, which do not directly affect response time for a


transaction

• Specify target recovery times either for entire system or ASPs, but not
both

• Storage space for journal receivers:


– System manages internal receiver space.
– Internal receivers are more condensed (less space).
– Uses existing receiver if file is already being journaled.
RCVSIZOPT(*RMVINTENT) saves space at a small performance cost
– It can be turned off.

• Increased disk activity

• Usually small impact on CPU


© Copyright IBM Corporation 2012

Figure 12-85. SMAPP performance and auxiliary storage use OL1914.1

Notes:
• Disk space consumed
- AP JRN requires customer to change Journal receivers, can overflow an ASP, and
consumes hundreds of megabytes per day
- SMAPP logging area is circular and consumes less space
• JRNRCVR placement
- AP JRN requires Journal placement on user ASP to achieve best performance
- SMAPP spreads logging area among ten fastest arms, with affinity for arms with
write cache, bundles writes to 32 KB, and performs 10 writes in parallel
• Performance impacts
- AP JRN performs a synchronous write to the disk for each DB operation (Add,
Delete, Update)
- SMAPP provides just as good protection with bundled async writes thereby reducing
total number of writes and performance overhead

12-120 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Edit Recovery for Access Paths (EDTRCYAP)


IBM i

© Copyright IBM Corporation 2012

Figure 12-86. Edit Recovery for Access Paths (EDTRCYAP) OL1914.1

Notes:
The Edit Recovery for Access Paths display shows a list of access path recovery times
for the system and for auxiliary storage pools (ASP) that are currently active on the system.
The information shown reflects the current target and estimated access path recovery
times. Access path and access path recovery information is shown also for all auxiliary
storage pools (ASPs) if they are active and if system-managed access-path protection has
not been turned off (the system access path recovery time value is not *OFF). On this list,
you can type changes for the target access path recovery times for the system and for the
ASPs. You can also view updated access path recovery status information.

Note

The ASP information is not shown when the system ASP (ASP 1) is the only ASP that is
active. The system does not keep track of the access path rebuild exposure when SMAPP
protection is set to *OFF.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Estimate system access path recovery time


The estimated system access path recovery time is the estimated total amount of time (in
minutes) that the system takes to recover the access paths on the system during initial
program load (IPL) after an abnormal system end. This value assumes that all access
paths eligible for protection are recovered or built at IPL.
Total storage used
The total amount of auxiliary disk storage used by internal objects that are used exclusively
for system-managed access-path protection (SMAPP). This value is expressed in
megabytes (1,000,000 bytes) and is the sum of the auxiliary storage used for access-path
protection for each auxiliary storage pool (ASP).
% of storage used
The total amount of auxiliary disk storage used exclusively for system-managed
access-path protection as a percentage of the total amount of system auxiliary disk
storage.
System access path recovery time
The system access path recovery time can be changed by typing a new value over the
current value. The target system-managed system access path recovery time is the time
(in minutes) targeted for access-path protection for the system. Allowed values are:
• *SYSDFT
• *NONE
• *MIN
• *OFF
• 1 to 1440
ASP (auxiliary storage pool)
Each ASP configured on the IBM Power System with IBM i is listed, whether or not access
paths can be created on the ASP.
Recovery time
The target time for access path recovery and the estimated time for access path recovery
are shown for each auxiliary storage pool (ASP). You can change the target access path
recovery time for an ASP by typing a new value over the current value.
• Target access path recovery time is the time (in minutes) targeted for access-path
protection for the ASP.
• Estimated access path recovery time is the estimated amount of time (in minutes)
that the system takes to recover the access paths for the ASP during an initial program
load (IPL) after an abnormal system end.

12-122 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Disk storage used


The disk storage used for system-managed access-path protection (SMAPP) in megabytes
and as a percentage of total auxiliary storage is shown for each auxiliary storage pool
(ASP).
• Megabytes storage used: The amount of auxiliary disk storage being used on each
ASP exclusively for SMAPP. This value is expressed in megabytes (1,000,000 bytes).
• % of storage used on ASP: The amount of auxiliary disk storage used exclusively for
SMAPP as a percentage of the total amount of auxiliary storage used. If the user ASP
has overflowed into the system ASP, this value is ++++++.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

New panel in V7R1


IBM i

• Using the F16=Display details function from the Display


Recovery for Access Paths (DSPRCYAP) screen or the Edit
Recovery for Access Paths (EDTRCYAP) screen (see figure)
shows the internal threshold used by SMAPP.

• This panel was added in V7R1. All access paths with


estimated rebuild times greater than the internal threshold are
protected by SMAPP.
© Copyright IBM Corporation 2012

Figure 12-87. New panel in V7R1 OL1914.1

Notes:
The F16=Display details function displays SMAPP tuning information.
All access paths with estimated rebuild times greater than the internal threshold will be
protected by SMAPP. The internal threshold value may change if the number of access
paths or their estimated rebuild times change.
The last retune field shows the most recent date and time the internal threshold was
changed.
The last recalibrate field shows the most recent date and time that the operating system
needed to recalibrate internal structures in order to optimize SMAPP efficiency.

12-124 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
SMAPP contribution to system performance
(1 of 2)
IBM i

• SMAPP has some effect on the overall system performance.

• The lower the target recovery time you specify for access
paths, the greater this effect might be.

• Typically, the effect is not very noticeable, unless the


processor is nearing its capacity.

© Copyright IBM Corporation 2012

Figure 12-88. SMAPP contribution to system performance (1 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SMAPP contribution to system performance


(2 of 2)
IBM i

• Another situation that might cause an increase in processor


consumption is when local journals are placed in standby state,
and large access paths, built over files journaled to the local
journal, are modified.

© Copyright IBM Corporation 2012

Figure 12-89. SMAPP contribution to system performance (2 of 2) OL1914.1

Notes:
When journaled files (that have large access paths built over them) are modified while the
journal is in a standby state, processor use is increased and system performance may be
impacted.

12-126 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

SMAPP summary
IBM i

• Automatic
• Not much DASD consumed
• Not much performance overhead
• Does not miss any files
• Needs no special setup; no ASPs required
• No special hardware
• Covers broad spectrum of outage causes
• Substantial IPL/recovery time reductions

© Copyright IBM Corporation 2012

Figure 12-90. SMAPP summary OL1914.1

Notes:
There are several advantages to SMAPP that make its use worth investigating.

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (1 of 6)
IBM i

1. Which of the following is not a valid object that can be journaled?


a. Database files
b. Data area
c. Data queue
d. Root folders

2. A ______ is a program that intercepts activity to an object that is being


journaled.
a. Journal
b. Journal receiver
c. Trigger
d. Referential constraint

3. What is the first object that needs to be created when you start
journaling?
a. Journal audit trail
b. Journal receiver
c. Journal
d. Journal access path

© Copyright IBM Corporation 2012

Figure 12-91. Checkpoint (1 of 6) OL1914.1

Notes:

12-128 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (2 of 6)
IBM i

4. Which object contains the images and details of the objects


that are being journaled?
a. Journal audit trail
b. Journal receiver
c. Journal
d. Journal access path

5. What is the command used to create the journal?


a. CRTJRN
b. CRTJRNRCV
c. STRJRNAP
d. STRJRNPF

6. True or False: The management of journal receivers is


something that must be done by the database administrator.
© Copyright IBM Corporation 2012

Figure 12-92. Checkpoint (2 of 6) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (3 of 6)
IBM i

7. The _____ command is used to see the attributes associated with your journal.
a. WRKJRN
b. CRTJRN
c. DSPJRNA
d. WRKJRNA

8. What command is used to review the details of objects being journaled?


a. WRKJRN
b. DSPJRN
c. WRKJRNA
d. DSPJRNA

9. True or False: When displaying journal information, you can specify to only show
transactions performed by a specific program.

10. True or False: User-generated entries get placed into a journal receiver when the
user selects an option to generate a system message.
© Copyright IBM Corporation 2012

Figure 12-93. Checkpoint (3 of 6) OL1914.1

Notes:

12-130 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (4 of 6)
IBM i

11. True or False: When a bad batch of transactions is performed against


an object being journaled, the only way to bring that object back to a
good point is to restore that object off of your backup media and rekey
a good batch of records.

12. True or False: When performing a forward recovery, the system


assists you with the recovery of journaled objects by prompting you
with the missing object name.

13. True or False: Journaling and saving changed objects are two
recovery methods that cannot be used together or at the same time
with the same objects.

14. Which of the following is the command used to save those objects that
have changed since the last time that object was changed.
a. SAVLIBCHG
b. SAVOBJCHG
c. SAVCHGOBJ
d. SAVCHGLIB

© Copyright IBM Corporation 2012

Figure 12-94. Checkpoint (4 of 6) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-131
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (5 of 6)
IBM i

15. True or False: Objects that have a high change volume are
prime candidates that should be journaled.

16. True or False: For the best performance on your system, it is


better to have just one journal for all of the objects being
journaled on the system.

17. True or False: Journaled files must be in the same library


ASP as the journaled file.

18. True or False: The following are all valid transport


mechanisms for remote journaling: OptiConnect, TCP/IP,
SNA, and ATM.
© Copyright IBM Corporation 2012

Figure 12-95. Checkpoint (5 of 6) OL1914.1

Notes:

12-132 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (6 of 6)
IBM i

19. True or False: Remote journaling cannot be set up through IBM


System i Navigator.

20. True or False: Access path protection will cut down on the amount of
time it takes a system to IPL after an abnormal system end.

21. True or False: Journaling can also be used to protect access paths.

22. True or False: At IPL time, the system will show you a screen that lists
all of those objects whose access paths are being protected
(journaled) and have already been recovered (basically, a screen to
show you what has already be recovered).

© Copyright IBM Corporation 2012

Figure 12-96. Checkpoint (6 of 6) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 12. Journal management 12-133
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe how journal management can be used to recover
data lost during a failure
• Implement journal management on your IBM Power System
with IBM i as part of a comprehensive recovery plan
• List the advantages and considerations of journal management
• List the advantages and considerations of journaling access
paths
• Describe remote journaling and how it can be used to replicate
data or to implement a hot backup environment on a remote
system

© Copyright IBM Corporation 2012

Figure 12-97. Unit summary OL1914.1

Notes:

12-134 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 13. Commitment control: Overview

What this unit is about


Commitment control is an extension of journaling and is designed to
help you recover more complex transactions. The information covered
in this unit will be an overview because you must be a programmer to
initiate and use commitment control. Specific details on the
programming that is required to implement commitment control is
taught in course AS10 (IBM i RPG IV Advanced Programming
Workshop).

What you should be able to do


After completing this unit, you should be able to:
• Describe the functions and considerations of commitment control
• Describe how to implement commitment control

How you will check your progress


• Checkpoint questions
• Lab exercise

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe the functions and considerations of commitment
control
• Describe how to implement commitment control

© Copyright IBM Corporation 2012

Figure 13-1. Unit objectives OL1914.1

Notes:

13-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

What is commitment control?


IBM i

• Commitment control is a function that ensures integrity.


– It allows you to define and process a group of changes to resources,
such as database files or tables, as a transaction.
– It ensures that either the entire group of individual changes occur on
all systems that participate or that none of the changes occur.

© Copyright IBM Corporation 2012

Figure 13-2. What is commitment control? OL1914.1

Notes:
You can use commitment control to design an application so the system can restart the
application if a job, an activation group within a job, or the system ends abnormally.
With commitment control, you can have assurance that when the application starts again,
no partial updates are in the database due to incomplete transactions from a prior failure.
A transaction is a group of individual changes to objects on the system that appears as a
single atomic change to the user.

Note

IBM i Navigator uses the term transaction, while the 5250 user (also called command line
or character based) interface uses the term Logical Unit of Work (LUW). The two terms are
interchangeable.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Why commitment control?


IBM i

• Suppose the following:


– An application's database files are being journaled.
– Multiple users are entering transactions involving multiple files.
– The system ends abnormally.

• Performing a recovery through APYJRNCHG or RMVJRNCHG


might present the situation where there might not be a
recovery point in which the application files reflect only whole
transactions.

• The solution is commitment control.

© Copyright IBM Corporation 2012

Figure 13-3. Why commitment control? OL1914.1

Notes:
In an environment where multiple users are keying in transactions using the same
application and the same data files, it is possible that journaling may not provide the best
solution to recover from an abnormal system or application end.
If you are only using journaling, there may not be a single recovery point that can be used
to recover all of the completed transactions. A single point recovery under these conditions
might require rekeying on the part of most of the users.
Commitment control provides a recovery method in which each user may have a unique
recovery point. It allows you to define and process a complex transaction (multiple changes
to the database) as a single unit of work.
Using commitment control, you can design an application that can be restarted for each job
that terminates abnormally. It ensures that all changes within a transaction are completed
for the files affected. It also provides facilities to remove changes when a user determines
that a transaction is not considered a complete transaction or is in error.

13-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Complex transactions with multiple users


IBM i

Display journal entries

Sequence Code Type Object Library Job Time


20 R UP ITEM ADMCTL W1 10:21:15
21 R UP ITEM ADMCTL W333 10:26:17
22 R UP DETAIL ADMCTL W333 10:27:19
23 R UP DETAIL ADMCTL W1 10:27:23
24 R UP ITEM ADMCTL W1 10:27:40
25 R UP ITEM ADMCTL W22 10:28:35
26 R UP ITEM ADMCTL W333 10:28:45
27 R UP DETAIL ADMCTL W22 10:29:12
28 R UP DETAIL ADMCTL W333 10:30:24
29 F CL ITEM ADMCTL W22 10:32:34
30 F CL DETAIL ADMCTL W22 10:32:39

? What is the recovery point?


28: Leaves 24 unfinished
23: Omits complete transactions
for W22 and W333
© Copyright IBM Corporation 2012

Figure 13-4. Complex transactions with multiple users OL1914.1

Notes:
The example on the visual shows that the transactions that are considered complete are:
• Sequence #20 and sequence #23
• Sequence #21 and sequence #22
• Sequence #25 and sequence #27
• Sequence #26 and sequence #28
If you choose to start the recovery at sequence #20 through Sequence #28, the problem is
that sequence #24 is not a complete transaction and thus produces data that is damaged
or corrupted.
On the other hand, you choose to start the recovery at sequence #20 through Sequence
#23, now the problem is that several transactions that are considered complete (sequence
#25 - #28) is work that will have to be redone, data that will have to be rekeyed.
This is a problem that will grow exponentially as more and more operators are keying in
data in this application environment.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Functions of commitment control


IBM i

• Allows a transaction to be defined

• Ensures that incomplete transactions are rolled


back if a job or the system ends abnormally

• Permits rollback by individual user

• Provides information for the restart of an application


in the event of a job or system failure

© Copyright IBM Corporation 2012

Figure 13-5. Functions of commitment control OL1914.1

Notes:

13-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Commitment control: Overview


IBM i
Sign On

Journal Entries

C BC . . . . . . . . . . . . . STRCMTCTL

CALL
Commitment definition

F OP . . . . . . . . . . . . . . . . .OPEN FILES
C SC . . . . . . . . . . . . . . . . .READ ITEM
Commit

READ DETAIL
JOB

cycle

R UB Record Before . . . . . . . . . .UPDATE ITEM


R UP Record After
R UB Record Before . . . . . . . . . .UPDATE DETAIL
R UP Record After
C CM Commit Identification . . . . . .COMMIT Commit Identification

F CL . . . . . . . . . . . . . . . . .CLOSE FILES

C EC . . . . . . . . . . . . . ENDCMTCTL

SIGNOFF

© Copyright IBM Corporation 2012

Figure 13-6. Commitment control: Overview OL1914.1

Notes:
A commitment definition includes:
• Parameters on the STRCMTCTL command
• Current status of the commitment definition
• Information about database files and other committable resources that contain changes
that are made during the current logical unit of work.
An application transaction should fall exactly within a commit cycle. A commit cycle is the
time from one commitment boundary to the next. The system assigns a commit cycle
identifier to associate all of the journal entries for a particular commit cycle together. Each
journal that participates in a transaction has its own commit cycle and its own commit cycle
identifier.
Reprogramming of an application is required to implement commitment control.
Specifically:
• To use commit in a program, the files have to be opened for commitment control.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• The commit identification is whatever information the programmer includes in the


commit operation. It is used to identify a restart point for the application.
• For rollbacks other than programmed rollback operations, the commit identification is
written to a notify object, if one is specified.

13-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Rollback event
IBM i

• Uncommitted changes exist and:


– Normal or abnormal end of job or system
– ENDCMTCTL run
• Batch job
• Interactive job and RB is the response to message:
CPA8350
“ENDCMTCTL requested with changes pending (RB C CM)”
– HLL rollback operation

© Copyright IBM Corporation 2012

Figure 13-7. Rollback event OL1914.1

Notes:
A rollback operation removes all changes made within a transaction since the previous
commit operation or rollback operation. During a rollback operation, the system also
releases locks related to the transaction. If the system contains thousands of transactions,
the system can take hours to complete a rollback operation. These long-running rollbacks
can consume critical processor time, lock resources or take up storage space.
Before you end a long-running rollback, you need to know which commitment definitions
are being rolled back and what state the commitment definitions are in. The State field for
commitment definitions that are rolling back is set to ROLLBACK IN PROGRESS.
Use the Work with Commitment Definitions (WRKCMTDFN) command to check the status of
a rollback by following these steps:
• Type WRKCMTDFN JOB(*ALL) from the character-based interface.
• Press F11 to display the State field.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disable the ability to end a long-running rollback


Users with *ALLOBJ special authority can end rollbacks by default. If you want to restrict
users who have *ALLOBJ special authority from ending rollbacks, you can do this by
creating data area QGPL/QTNNOENDRB.
Refer to the IBM Power Systems with IBM i Information Center.

13-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Previous example with commitment control


IBM i
Sequence Code Type Object Library Job Time
20 C SC W1 10:21:15
21 R UB ITEM Before ADMCTL W1 10:21:15
22 R UP ITEM After ADMCTL W1 10:21:55
23 C SC W333 10:26:17
Complete

24 R UB ITEM Before ADMCTL W333 10:26:17


25 R UP ITEM After ADMCTL W333 10:27:19
26 R UB DETAIL Before ADMCTL W333 10:27:23
27 R UP DETAIL After ADMCTL W333 10:27:40
28 C CM W333 10:28:35
29 C SC W22 10:28:45
30 R UB ITEM Before ADMCTL W22 10:29:12
31 R UP ITEM After ADMCTL W22 10:30:24

Rollback event

32 J IA 12:20:00
33 R UR ITEM After ADMCTL W22 12:21:15
34 R BR ITEM Before ADMCTL W22 12:21:18
35 C RB W22 12:21:30
36 R UR ITEM After ADMCTL W1 12:21:40
37 R BR ITEM Before ADMCTL W1 12:21:45
38 C RB W1 12:21:55
© Copyright IBM Corporation 2012

Figure 13-8. Previous example with commitment control OL1914.1

Notes:
1. Before the Rollback event, the transaction for job W333 is complete, but the
transactions for W1 and W22 are incomplete.
2. Then a Rollback event occurs, it could be one of the following:
a. A implicit Rollback originating from the system
b. A Rollback originating from a program Rollback instruction
3. The completed transaction for job W333 is unaffected by the Rollback.
4. The incomplete transactions for jobs W1 and W22 are rolled back.
The system rolls back any uncommitted transactions.
• Record before image is entered in the journal as type UR.
• The image after the rollback is entered as type BR.
• DR identifies record deleted or rollback.
• IA identifies an IPL following an abnormal system termination.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Commitment control requirements


IBM i

• In order to implement commitment control the following


conditions must be met:
– All database files under commitment control must be journaled.
– *BOTH images (automatic for files opened under commitment
control).
– Job must issue the STRCMTCTL and the ENDCMTCTL commands.
– Programs must open files for commitment control.
– Program must issue COMMIT operation.

© Copyright IBM Corporation 2012

Figure 13-9. Commitment control requirements OL1914.1

Notes:
If only after images are specified to be journaled, the system also journals the before
images of the files while those files are under commitment control.

13-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Start Commitment Control (STRCMTCTL)


IBM i

© Copyright IBM Corporation 2012

Figure 13-10. Start Commitment Control (STRCMTCTL) OL1914.1

Notes:
The Start Commitment Control (STRCMTCTL) command is used to establish either a job
level or activation group level commitment definition.
This command also specifies the level of record locking that occurs for the commitment
definition to be started. Also, a notify object can be specified.
Before a commitment definition is established, the user must ensure that all database files
that are to be opened under commitment control for a single commitment transaction are
journaled. If only the after images are being journaled, the IBM Power System with IBM i
implicitly begins journaling both the before and the after images for the duration of the
changes being made to files opened under this commitment definition.
A default journal can be specified. Entries that describe all journals and systems involved in
a commitment control operation can be placed in this journal.
Commitment definition scope (CMTSCOPE)
The scope of a commitment definition determines which programs use that commitment
definition, and how locks acquired during transactions are scoped. The interface that starts

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

the commitment definition determines the scope of the commitment definition. Specifies the
scope for the commitment definition to be started. The possible values are:
• *ACTGRP: An activation-group-level commitment definition is started for the activation
group associated with the program issuing the command.
• *JOB: The job-level commitment definition is started for the job. It specifies text that
briefly describes the commitment definition to be started. It specifies the default journal.
The default journal contains entries identifying each of the resources involved in a unit
of work. Entries can also be placed when each unit of work starts or ends due to a
commit or rollback operation, depending on the OMTJRNE parameter value.
Journal entries to be omitted (OMTJRNE)
Specifies the journal entries to omit from the default journal. If *NONE is specified on the
DFTJRN parameter, this is ignored. The possible values are:
• *NONE: No journal entries are omitted.
• *LUWID: The journal entry that contains the Logical Unit of Work Identifier (LUWID) and
all the resources involved in the logical unit of work, are omitted if the logical unit of
work is committed or rolled back successfully. If an error occurs while committing or
rolling back the logical unit of work, the entry will always be sent regardless of this
value.

Note

The default values for the parameters are underlined.


Commitment control does not need to be started by SQL applications. SQL implicitly starts
commitment control at connect time when the SQL isolation level is not *NONE.

13-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Record lock-level parameter


IBM i

• STRCMTCTL LCKLVL ( )
– *CHG: Record adds, updates, and deletes are protected from changes
by other jobs until commit or rollback.

– *CS: Changed and retrieved records are protected from changes by


other jobs. Retrieved records that are not changed are protected only
until they are released or a different record from the same file is
retrieved.

– *ALL: Changed and retrieved records are protected until commit or


rollback.

© Copyright IBM Corporation 2012

Figure 13-11. Record lock-level parameter OL1914.1

Notes:
Lock Level (LCVLVL)
Specifies the default level of record locking that occurs for the commitment definition to be
started. This is a required parameter.
The possible values are:
*CHG
Every record read for update (for a file opened under commitment control) is locked. If a
record is changed, added, or deleted, that record remains locked until the transaction is
committed or rolled back. Records that are accessed for update operations but are
released without being changed are unlocked.
*CS
Every record accessed for files opened under commitment control is locked. A record that
is read, but not changed or deleted, is unlocked when a different record is read. Records
that are changed, added, or deleted are locked until the transaction is committed or rolled
back.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

*ALL
Every record access for files opened under commitment control is locked until the
transaction is committed or rolled back.
Refer to Information Center for details.

13-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Notify object parameter


IBM i

• STRCMTCTL NFYOBJ(object object-type)


– Programmer can provide information for a restart after an abnormal
end.
– Specify either *FILE, *DTAARA, or *MSGQ to identify the last
successful transaction (commit) if commit definition ends abnormally.
– Commit identification can identify last successful transaction.
• Character data specified on HLL (CL, RPG, PL/1, or C) commit operation
• Entry specific data of commit (C/CM) journal entry
– This is an optional parameter.

© Copyright IBM Corporation 2012

Figure 13-12. Notify object parameter OL1914.1

Notes:
The notify object parameter is specified on the STRCMTCTL command.
Notify Object (NFYOBJ)
It specifies the name and type of the object where notification is sent regarding the status of
a transaction for a commitment definition.
For a system failure, the commitment identifier is placed in the notify object after the next
successful initial program load (IPL). For a job that ends with uncommitted changes or with
a nonzero completion code, the commitment identifier is placed in the notify objects during
end job processing. For an activation group that ends with uncommitted changes or ends
normally, the notification text is placed in the notify object during activation group end
processing.
*NONE
No notification is sent after an abnormal system or process end.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Object-name
Specify the name (library-name/object-name) of the object to receive notification of the last
transaction that is successfully committed. You must have correct authority for the object
specified. The possible object type values are:
• *MSGQ: The text identifying the last commitment boundary is placed on the specified
message queue.
• *DTAARA: The text identifying the last commitment boundary is placed in the specified
data area. The data area specified must be of type character, and unique to this job.
The text is padded or truncated to fit the data area.
• *FILE: The text identifying the last commitment boundary is added to the specified
physical file.
COBOL's commit operation does not have the capability to supply a commit identification.

13-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

When is the notify object updated?


IBM i

• At least one successful commit and any of the following


conditions:
– Abnormal job end or an abnormal system end
• Rollback occurs if there are uncommitted changes.
– Normal EOJ and uncommitted changes exist
• Rollback also occurs in this case.
– ENDCMTCTL with uncommitted changes
• Batch job, the changes are rolled back.
• Interactive job gets CPA8350 ENDCMTCTL requested with changes
pending (RB C CM), and response RB or CM is taken. For CM response,
the commit identifier is entered on the prompt display.

© Copyright IBM Corporation 2012

Figure 13-13. When is the notify object updated? OL1914.1

Notes:
Notify object is used as part of programmer-written error handling procedure.
After an abnormal end, a program upon restart, could interrogate the notify object to get
information about restarting the application.
During normal processing of the application, the programmer would include on the commit
operation, after each transaction, a commit identification to identify that transaction.
Each application should have its own notify object if the object type is *FILE or *MSGQ and
the commit identification should include an identification of the job or user who made the
transaction.
If the notify object is a *DTAARA, there should be a notify object for each combination of
application and user.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Commitment control implementation


IBM i

• Identify the application that will use commitment control.

• Journal all of the physical files used by this application.

• Modify the application programs.


– Files used by the application must now be opened for commit.
– The application must be updated to define logical transaction
boundaries.
– Use rollback if desired.

• Modify CL programs to include STRCMTCTL and ENDCMTCTL.

© Copyright IBM Corporation 2012

Figure 13-14. Commitment control implementation OL1914.1

Notes:

13-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Two-phase commit: Overview


IBM i

1. Prepare wave

2. Vote

3. Committed wave or rollback

© Copyright IBM Corporation 2012

Figure 13-15. Two-phase commit: Overview OL1914.1

Notes:
Two-phase commit is intended to ensure that committable resources on multiple systems
remain synchronized.
• LUW = Logical Unit of Work
• Prepare wave: The resource manager that initiated the commit request informs all other
resource managers that the LUW is ready to be committed.
• Vote: All resource managers must respond that they are ready to commit.
• Committed wave: The resource manager that initiated the commit request decides what
to do, based on the outcome of the prepare wave.
- If the prepare wave completes successfully and all participants vote ready, the
resource manager instructs all other resource managers to commit the LUW.
- If the prepare wave does not complete successfully, all the resource managers are
instructed to roll back the LUW.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i supports two-phase commit in accordance with the SNA LU 6.2 architecture. For
more detailed information about the internal protocols used by the system for two-phase
commit, refer to the SNA Transaction Programmer’s Reference for LU Type 6.2,
GC30-3084-05. All supported releases of IBM i support the Presumed Nothing protocols of
SNA LU 6.2 and the Presumed Abort protocols of SNA LU 6.2.
Two-phase commit is also supported using TCP/IP as a Distributed Unit of Work (DUW)
DRDA protocol. To use TCP/IP DUW connections, all of the systems (both the application
requester and the application server) must be at V5R1M0 or newer. For more information
about DRDA see the Open Group Technical Standard, DRDA V2 Vol. 1: Distributed
Relational Database Architecture at the Open Group web site.

13-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Commitment control: Considerations


IBM i

• After failure, applications are at transaction boundaries.

• Records are locked longer.


– If possible, keep transactions small.

• Control language programs must be modified to include


STRCMTCTL and ENDCMTCTL.

• Application programs must be modified.


– Open files for commitment control.
– Add commit operation at end of transactions.
– You can use notify object to automate restart.

• More journal entries will be generated.


© Copyright IBM Corporation 2012

Figure 13-16. Commitment control: Considerations OL1914.1

Notes:
If a rollback occurs, file cursor position is also rolled back.
Refer to Information Center for additional considerations.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Enhancements to database savepoints


IBM i

Transaction

Begin COMMIT:
trans Rollback to End trans
A B Savepoint B

Timeline

Flight reservation Hotel reservation Automobile reservation

Savepoint A Savepoint B

© Copyright IBM Corporation 2012

Figure 13-17. Enhancements to database savepoints OL1914.1

Notes:
The SAVEPOINT statement sets a savepoint within a unit of work to identify a point in time
within the unit of work to which relational database changes can be rolled back.
Faster transaction recovery with database savepoints. Instead of starting over from the
beginning of related transactions, start from a known interim step.
• ROLLBACK TO <savepoint>: This statement rolls back changes only to the
specified savepoint instead of all changes made by the transaction.
• RELEASE SAVEPOINT: This statement deletes a savepoint.
• COMMIT or ROLLBACK: Savepoints in a distributed transaction are scoped to the
current connection.

13-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

IASP considerations for commitment control


IBM i

• You should be aware of the following considerations for


commitment definitions when you use independent disk pools:
– QRECOVERY library
– Set ASP group
– Default journal
– IPL and vary off
– Remote database

© Copyright IBM Corporation 2012

Figure 13-18. IASP considerations for commitment control OL1914.1

Notes:
Independent disk pools and independent disk pool groups, can each have a separate IBM i
SQL database. You can use commitment control with these databases.
QRECOVERY library considerations
When you start commitment control, the commitment definition is created in the
QRECOVERY library.
Each independent disk pool or independent disk pool group has its own version of a
QRECOVERY library. On an independent disk pool, the name of the QRECOVERY library is
QRCYxxxxx, where xxxxx is the number of the independent disk pool. Furthermore, if the
independent disk pool is part of a disk pool group, only the primary disk pool has a
QRCYxxxxx library.
When you start commitment control, the commitment definition is created in the
QRECOVERY library of the independent disk pool that is associated with that job, making
commitment control active on the independent disk pool.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SET ASP Group considerations


Using the Set ASP Group (SETASPGRP) command while commitment control is active on
an independent disk pool has the following effects:
• If you switch from an independent disk pool, and resources are registered with
commitment control on the disk pool, the SETASPGRP command fails.
• If you switch from an independent disk pool and no resources are registered with
commitment control, the commitment definitions are moved to the independent disk
pool to which you are switching.
• If you switch from the system disk pool, commitment control is not affected. The
commitment definitions stay on the system disk pool.
• If you move the commitment definition to another independent disk pool or independent
disk pool group, the notify object must also reside on that other independent disk pool
or independent disk pool group, otherwise if the object was not found, the update fails.
The notify object on the other independent disk pool or independent disk pool group is
updated if the commitment definitions ends abnormally.
Default journal considerations
The following are default journal considerations:
• If you use the default journal, the journal must reside on the same independent disk
pool or independent disk pool group as the commitment definition.
• If the default journal is not found on the other independent disk pool or independent disk
pool group when commitment control starts, the commitment control start fails.
• If you move the commitment definition to another independent disk pool or independent
disk pool group, the default journal must also reside on that other independent disk pool
or independent disk pool group. If the journal is not found on the other independent disk
pool or independent disk pool group, the commitment definition is moved, but no default
journal is used from this point on.
IPL and vary off considerations
The following are IPL and vary off considerations:
• Recovery of commitment definitions residing on an independent disk pool is performed
during independent disk pool vary on processing and is similar to IPL recovery.
• Commitment definitions in an independent disk pool are not recovered during the IBM
Power Systems with IBM i iPL.
• The vary off of an independent disk pool has the following effects on commitment
definitions:
- Jobs associated with the independent disk pool end.
- No new commitment definitions are allowed to be created on the independent disk
pool.

13-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty - Commitment definitions residing on the independent disk pool become unusable.
- Commitment definitions residing on the independent disk pool, but not attached to a
job, release transaction scoped locks.
Remote database considerations
• You cannot use an LU6.2 SNA connection (protected conversations or Distributed Unit
of Work (DUW)) to connect to a remote database from an independent disk pool
database. You can use unprotected SNA conversations to connect from an independent
disk pool database to a remote database.
• When commitment control is active for a job or thread, access to data outside the
independent disk pool or disk pool group to which the commitment definition belongs is
only possible remotely, as if it were data that resides on another system. When you
issue an SQL CONNECT statement to connect to the relational database (RDB) on the
independent disk pool, the system makes the connection a remote connection.
• The system disk pool and basic disk pools do not require a remote connection for read
only access to data that resides on an independent disk pool. Likewise, an independent
disk pool does not require a remote connection for read-only access to data that resides
on the system disk pool or a basic disk pool.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

XA transaction support for commitment control


IBM i

• DB2 UDB for IBM i can participate in X/Open global


transactions.

• There are five components to the DTP model.


– Application program (AP)
– Transaction manager (TM)
– Resource manager (RM)
– Communications resource manager (CRM)
– Communication protocol

• IBM i Navigator supports the management of XA transactions


as global transactions.

© Copyright IBM Corporation 2012

Figure 13-19. XA transaction support for commitment control OL1914.1

Notes:
DB2 UDB for IBM i can participate in X/Open global transactions
The Open Group has defined an industry standard model for transactional work that allows
changes made against unrelated resources to be part of single global transaction. An
example of this is changes to databases that are provided by two separate vendors. This
model is called the X/Open Distributed Transaction Processing model (DTP model).
In the XA environment, each database is considered a separate resource manager. When
a transaction manager wants to access two databases under the same transaction, it must
use the XA protocols to perform two-phase commit with the two resource managers.
Since each independent disk pool is a separate SQL database, in the XA environment
each independent disk pool is also considered a separate resource manager. For an
application server to perform a transaction which targets two different independent disk
pools, the transaction manager must also use a two-phase commit protocol.
Application Program (AP): Implements the desired function of the end user by specifying
a sequence of operations that involves resources such as databases. It defines the start

13-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty and end of global transactions, accesses resources within transaction boundaries, and
normally makes the decision whether to commit or roll back each transaction.
Transaction Manager: Manages global transactions and coordinates the decision to start
them, and commit them, or roll them back in order to ensure atomic transaction completion.
The TM also coordinates recovery activities with the RMs after a component fails.
Resource Manager (RM): Manages a defined part of the computer's shared resources,
such as a database management system. The AP uses interfaces defined by each RM to
perform transactional work. The TM uses interfaces provided by the RM to carry out
transaction completion.
Communications Resource Manager (CRM): Allows an instance of the model to access
another instance either inside or outside the current TM domain. CRMs are outside the
scope of DB2 UDB for IBM i and are not discussed here.
Communication Protocol: This refers to the protocols used by CRMs to communicate
with each other. This is outside the scope of DB2 UDB for IBM i and is not discussed here.
The XA Specification is the part of the DTP model that describes a set of interfaces that is
used by the TM and RM components of the DTP model. DB2 UDB for IBM i implements
these interfaces as a set of UNIX style APIs and exit programs. See XA APIs for detailed
documentation of these APIs and for more information on how to use DB2 UDB for IBM i as
an RM.
IBM i Navigator and XA transactions
IBM i Navigator supports the management of XA transactions as Global transactions. A
Global transaction may contain changes both outside and within DB2 UDB for IBM i. A
global transaction is coordinated by an external Transaction Manger using the Open Group
XA architecture, or another similar architecture.
An application commits or rolls back a global transaction using interfaces provided by the
Transaction Manager. The Transaction Manager uses commit protocols defined by the XA
architecture, or another architecture, to complete the transaction. DB2 UDB for IBM i acts
as an XA Resource Manager when participating in a global transaction. There are two
types of global transactions:
• Transaction-scoped locks: Locks acquired on behalf of the transaction are scoped to
the transaction. The transaction can move from one job or thread to another.
• Job-scoped locks: Locks acquired on behalf of the transaction are scoped to the job.
The transaction cannot move from the job that started it.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator: Support for commitment control


(1 of 6)
IBM i

© Copyright IBM Corporation 2012

Figure 13-20. IBM i Navigator: Support for commitment control (1 of 6) OL1914.1

Notes:
You can use IBM i Navigator to display information about all transactions (logical units of
work) on the system. You can also look at information about the job, if any, associated with
a transaction.

13-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM i Navigator: Support for commitment control
(2 of 6)
IBM i

© Copyright IBM Corporation 2012

Figure 13-21. IBM i Navigator: Support for commitment control (2 of 6) OL1914.1

Notes:
This display shows the following:
• Unit of Work ID
• Unit of Work State
• Job
• User
• Number
• Resynchronization in Progress
• Commitment Definition
If you choose a Transaction and right-click it, you can get more information about the
transaction, such as:
• Jobs
• Resource Status
• Properties

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator: Support for commitment control


(3 of 6)
IBM i

The General properties information

© Copyright IBM Corporation 2012

Figure 13-22. IBM i Navigator: Support for commitment control (3 of 6) OL1914.1

Notes:
This System i Navigator screen shows the general properties information of selected
commitment control transactions on your system. This is achieved by right-clicking a
specific transaction, selecting Properties and choosing the General tab.

13-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM i Navigator: Support for commitment control
(4 of 6)
IBM i

The Details properties information

© Copyright IBM Corporation 2012

Figure 13-23. IBM i Navigator: Support for commitment control (4 of 6) OL1914.1

Notes:
This System i Navigator screen shows the detail information of selected commitment
control transactions on your system. This is achieved by right-clicking a specific
transaction, selecting Properties and choosing the Detail tab.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator: Support for commitment control


(5 of 6)
IBM i

The Commitment Options properties information

© Copyright IBM Corporation 2012

Figure 13-24. IBM i Navigator: Support for commitment control (5 of 6) OL1914.1

Notes:
This System i Navigator screen shows the commitment options information of selected
commitment control transactions on your system. This is achieved by right-clicking a
specific transaction, selecting Properties and choosing the Commitment Options tab.

13-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
IBM i Navigator: Support for commitment control
(6 of 6)
IBM i

Resource
status for
transaction

Jobs for
transaction

The Commitment Options properties information


© Copyright IBM Corporation 2012

Figure 13-25. IBM i Navigator: Support for commitment control (6 of 6) OL1914.1

Notes:
This System i Navigator screen shows the detail resource status information of selected
commitment control transactions on your system.

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Commitment control


IBM i

Commitment control:
Lab exercise
© Copyright IBM Corporation 2012

Figure 13-26. Exercise: Commitment control OL1914.1

Notes:

13-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint
IBM i

1. True or False: Programming changes must be made to an


application in order to implement commitment control.

2. True or False: Commitment control requires that journaling


be implemented for the objects that are used by this
application.

3. True or False: Commitment control allows you to recover


only those transactions that are considered a whole or
complete transaction.

© Copyright IBM Corporation 2012

Figure 13-27. Checkpoint OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 13. Commitment control: Overview 13-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe the functions and considerations of commitment
control
• Describe how to implement commitment control

© Copyright IBM Corporation 2012

Figure 13-28. Unit summary OL1914.1

Notes:

13-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 14. Backup and recovery planning

What this unit is about


Save and restore commands, journal management, commitment
control, user auxiliary storage pools, access path journaling, mirrored
and device parity and dual systems are all powerful tools that perform
valuable functions. To ensure that the system is adequately protected
from disk failure, site loss, human error, and power or system failure,
all of these tools must be integrated properly into a comprehensive
backup and recovery plan.

What you should be able to do


After completing this unit, you should be able to:
• Compare the availability options that are available and their impact
on the recovery process
• Describe simple, medium, and complex save strategies
• Describe a disaster recovery plan

How you will check your progress


• Checkpoint questions

References
IBM i Information Center:
http://publib.boulder.ibm.com/iseries > i 7.1 > IBM i 7.1
Information Center > Systems management > Backup
and recovery > Planning a backup and recovery
strategy

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Compare the availability options that are available and their
impact on the recovery process
• Describe simple, medium, and complex save strategies
• Describe a disaster recovery plan

© Copyright IBM Corporation 2012

Figure 14-1. Unit objectives OL1914.1

Notes:

14-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: The environment

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 14-2. Topic 1: The environment OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Balance costs of backup and recovery


IBM i

Cost of implementing Cost of failure


availability features multiplied by
and backing up probability of failure

© Copyright IBM Corporation 2012

Figure 14-3. Balance costs of backup and recovery OL1914.1

Notes:
The cost of implementing availability features must be offset by the cost of failure multiplied
by probability of failure.

14-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Can your business still function?


IBM i

IBM i

© Copyright IBM Corporation 2012

Figure 14-4. Can your business still function? OL1914.1

Notes:
If you were to loose a key application, for example order entry, could you recover it and
how long would it take to recover?

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup and recovery plan evaluation


IBM i

Point 1 Recovery timeline:


Known point (last save)
Activity occurs on system
Point 2
Failure occurs
Hardware repair or IPL
Point 3
Hardware available
Information is restored from
backup
Point 4
System recovered to
known point 1 Transactions from point 1 to
point 2 are recovered
Point 5
System recovered to
failure point 2 Business activity from failure
point 2 to recovery point 5
is recovered
Point 6
System is current
1. Can your plan complete each step?
2. How long will it take to complete each step?
© Copyright IBM Corporation 2012

Figure 14-5. Backup and recovery plan evaluation OL1914.1

Notes:
The timeline for backup and recovery begins when you save the information and ends
when your system is fully recovered after a failure.
Refer to this timeline as you read this information and make the decisions. Your strategies
for saving and availability determine these things:
• Whether you can successfully complete each step in the chart.
• How long does it take you to complete each step.
Use the timeline to develop specific examples.
• What if the known point (1) is Sunday evening and the failure point (2) is Thursday
afternoon?
• How long does it take to get back to the known point?
• How long does it take you to get to the current point (6)?
• Is it even possible with the save strategy that you have planned?

14-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

What to save and how often?


IBM i

• Frequent changes = save frequently (daily):


– Security information
– Configuration objects in QSYS
– QGPL, QUSRSYS (IBM supplied libraries with user data)
– User libraries
– Folders and documents
– Distributions
– Directories
• Infrequent changes = Save infrequently (weekly):
– System: LIC, QSYS, QHLPSYS, QUSRTOOL
– Licensed program libraries (RPG, COBOL, and so on), folders,
directories

© Copyright IBM Corporation 2012

Figure 14-6. What to save and how often? OL1914.1

Notes:
The answer to the question of what you need to save is simple: everything. To be prepared
for a site loss or certain types of disk failures, you need to be able to recover everything on
your system. Saving the right things determines whether you can recover to point 4 (the
last save) shown in the backup and recovery timeline, in the previous visual.
In an ideal world, how often you need to save is also an easy question.
• Every day, save the parts of your system that change often.
• Every week, save the parts of your system that do not change often.
Saving the right things at the right time determines how much information you need to
recover to get from point 4 to point 5 in the backup and recovery timeline in the previous
visual.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

This table shows the parts of the system that change often, and should be saved daily.

Table 1: What to save: Parts of the system that change often


Item description IBM-supplied? When changes occur
Security information (user
profiles, private authorities, Regularly as new users and
authorization lists) Some objects are added or
Configuration objects in authorities are changed1
QSYS
Regularly, when device
descriptions are added or
Configuration objects in changed or when you use the
No
QSYS Hardware Service Manager
function to update
configuration information1
IBM-supplied libraries that
contain user data (QGPL, Yes Regularly
QUSRSYS)
User libraries that contain
No Regularly
user data and programs
Regularly, if you use these
Folders and documents Some
objects
Regularly, if you use the
Distributions No
distribution function
Regularly, if you use these
Directories Some
objects
1 These objects may also change when you update licensed programs.

This table shows the parts of the system that do not change often; you can save these on a
weekly basis.

Table 2: What to save weekly: Parts of the system that do not change often
Item description IBM-supplied? When changes occur
PTFs or new release of the
Licensed Internal Code Yes
operating system
Operating system objects in PTFs or new release of the
Yes
QSYS library operating system
Operating System/400
PTFs or new release of the
optional libraries (QHLPSYS, Yes
operating system
QUSRTOOL)

14-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Table 2: What to save weekly: Parts of the system that do not change often
Item description IBM-supplied? When changes occur
Licensed program libraries Updates to licensed
Yes
(QRPG, QCBL, Qxxxx) programs
Licensed program folders Updates to licensed
Yes
(Qxxxxxxx) programs
Licensed program libraries
Updates to licensed
directories Yes
programs
(/QIBM/QOpenSys/QIBM)

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Save window/save strategy


IBM i

• Save window
– System and data at known point
– Not changing for period of time

Save window Save strategy

8 - 12 hours with no
Simple
system activity
4 - 6 hours with no
Medium
system activity

0 – minimal down time Complex

© Copyright IBM Corporation 2012

Figure 14-7. Save window/save strategy OL1914.1

Notes:
Realistically, when you run the save procedures, how you run your save procedures and
what you save, all of these things depend on the size of your save window. Your save
window is the amount of time that your system can be unavailable to users while you
perform your save operations. To simplify your recovery, you need to save when your
system is at a known point and your data is not changing.
To determine which save strategy is the best strategy for your business, you will have to
balance what your users think is an acceptable save window versus the value of the data
you might lose and the amount of time it may take to recover that data in case it is lost or
damaged.
If your system is so critical to your business that you do not have a manageable save
window, you probably cannot afford an unscheduled outage either. In this case you should
seriously evaluate all of the availability options of IBM i, including implementing a dual
systems environment.

14-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Based on the size of your save window, you will choose one of the following save
strategies. Then reevaluate your decision based on how your save strategy positions you
for a recovery.
• Simple save strategy: If you have a long save window, 8 to 12 hours available daily
with no system activity including batch work, then implementing a simple save strategy
is the best option.
• Medium save strategy: If you have a shorter block of time, 4 to 6 hours available with
no system activity during this time, then implementing a medium save strategy is the
best option.
• Complex save strategy: You have a short save window, which means that there is little
or no time when your system is not being used for interactive or batch work, then
implementing a complex save strategy is the best option.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Simple save strategy


IBM i

• Save everything nightly.


– Issue GO SAVE; then select option 21 (Entire system).

Or

• Save everything once per week and save all user data nightly.
– Issue GO SAVE; then select option 23 (All user data).

© Copyright IBM Corporation 2012

Figure 14-8. Simple save strategy OL1914.1

Notes:
The simplest save strategy is to save everything every night or during the off-shift hours.
The simplest way to save the entire system is to use option 21 – Save Entire system from
the Save menu. You can schedule option 21 to run without an operator (unattended) at a
specified time.
You can also use this method to save your entire system after you upgrade to a new
release or apply program temporary fixes (PTFs).
You may find that you do not have enough time or enough tape unit capability to run option
21 without an operator. You can still employ a simple strategy:
• Daily: Save everything that changes often.
• Weekly: Save the things that do not change often.
Choosing Option 23 – Save all user data on the Save menu saves those things that change
regularly. Option 23 can be scheduled to run attended or unattended. To run unattended
you must have enough online backup media capacity.

14-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty If your system has a long period of inactivity on the weekend, your save strategy might look
like this:
Friday night: Save menu option 21
Monday night: Save menu option 23
Tuesday night: Save menu option 23
Wednesday night: Save menu option 23
Thursday night: Save menu option 23
Friday night: Save menu option 21

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Medium save strategy


IBM i

Weekly: Save everything weekly.


Daily: Save all user data mid-week.

Or
Daily: Save journal receivers.

Or
Save changed objects
Daily:
(SAVCHGOBJ, SAVDLO, SAV).

Or
Save groups of libraries, folders, and
Daily:
directories (simplified with BACKUP menu).

© Copyright IBM Corporation 2012

Figure 14-9. Medium save strategy OL1914.1

Notes:
You might find that you do not have a long enough save window to use the simple save
strategy. Perhaps you run large batch jobs on your system at night. Or, you have very large
files that take a long time to save. If this is the case, you may need to develop a medium
save strategy, which means that the complexity for saving and for recovery is medium.
When developing a medium save strategy apply this principle: the more often the data
changes, the more often you should save that data. When using the medium save strategy
you need to be more detailed in evaluating how often your data changes.
Several techniques are available to help you implement a medium save strategy. You can
use one or several or a combination of these strategies.
• Saving changed objects
• Journaling
• Database files and saving the journal receivers
• Saving groups of libraries, folders, or directories

14-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Complex save strategy


IBM i

• Complex save strategy:


– This is similar to a medium save strategy.
– Daily saves might be at specific times.
– Save-while-active might be necessary.
• Available on SAVLIB, SAVOBJ, SAVCHGOBJ, SAVDLO, SAV

© Copyright IBM Corporation 2012

Figure 14-10. Complex save strategy OL1914.1

Notes:
A very short save window requires implementing a complex save strategy for both saving
your data and for performing a recovery of this data in case of a system failure or a loss of
user data. You will use the same tools and techniques that are described for a medium
save strategy but you will be implementing these strategies at a greater level of detail. For
example, you may need to save specific critical files at specific times of the day or week. If
you will be implementing a complex save strategy then you may also want to consider
using IBM i Backup Recovery and Media Services (BRMS).
Saving your system while it is active is often necessary when implementing a complex save
strategy. The save-while-active (SAVACT) parameter is supported on the following
commands:
• Save Library (SAVLIB)
• Save Object (SAVOBJ)
• Save Changed Objects (SAVCHGOBJ)
• Save Document Library Object (SAVDLO)
• Save (SAV)

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

If you use save-while-active support, you can significantly reduce the amount of time that
files are made unavailable. When the system has established a checkpoint for all objects
being saved, the objects can be made available for use. Save-while-active support can be
used in combination with journaling and commitment control to simplify the recovery
procedure. If you choose to use save-while-active support, make sure that you understand
that process and monitor how well checkpoints are being established on your system.
You can also reduce the amount time that files are unavailable by performing save
operations on more than one save device at a time, or performing concurrent save
operations. For example, you can save libraries to save device number one, folders to save
device number two, and save directories and other IFS objects to a third save device.
Another way to set up a concurrent save operations is to save different sets of libraries or
objects to different save devices.
Another time saving strategy to your data is to use multiple save devices simultaneously by
performing a parallel save operation. This is useful if most of your data is contained in a
single library. To perform a parallel save operation, you need Backup Recovery and Media
Services or an application that allows you to create media definition objects.
For more information on save-while-active support, concurrent save operations, and
parallel save operations, refer to the Systems Management Recovering Your System
Guide SC41-5304.
If your situation requires a medium save strategy or a complex save strategy, it also
requires regular review, of the following:
• Are saving everything occasionally?
• What do you need to do, to recover to the known point (4) on the backup and recovery
timeline?
• Are you using options like journaling or saving changed objects to help you recover to
the failure point (5)? Do you know how to recover using those options?
• Have you added new applications? Are the new libraries, folders, and directories being
saved?
• Are you saving the IBM-supplied libraries that contain user data (QGPL and QUSRSYS)?
• Have you tested your recovery?
The best way to test if your save strategy is a sound strategy is to perform a full recovery.
Although you can test a recovery on your own system, doing so can be risky. If you have
not saved everything successfully, you may lose information when you attempt to restore
the data. A number of organizations offer recovery testing as a service. IBM Business
Recovery Services is one organization that can assist you with recovery testing.

14-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Availability options
IBM i

Attribute Physical file journaling Mirrored protection Device parity protection

Data loss after single Minimal loss to file data if good


None of the data is lost None of the data is lost
disk failure backups are available

Recovery time after


Potentially many hours None to a few hours None to a few hours
single disk failure

Performance impact Minimal to significant Minimal Minimal

Planning complexity:
- Hardware Minimal Careful planning Careful planning
- Software Significant Minimal Minimal

Setup complexity and


Minimal Minimal Minimal
time

Operational and
management Average Minimal Minimal
complexity

Possibly more disk and Double the disk; possibly One or two disk units per
Additional hardware
separate ASPs more controllers and IOPs parity set

© Copyright IBM Corporation 2012

Figure 14-11. Availability options OL1914.1

Notes:

Attribute Physical File Mirrored Device Parity


Journaling Protection Protection

Data loss after a Minimal loss to file None of the data is None of the data is
single disk failure. data if good lost. lost.
backups are
available.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Attribute Physical File Mirrored Device Parity


Journaling Protection Protection

Recovery time after Potentially many None to a few None to a few


a single disk unit hours. After the disk hours. In some hours. In some
failure. unit is repaired or cases, the system cases, the system
replaced, files must does not stop. After does not stop.
be restored and mirrored protection Performance
journaled changes is resumed, the degrades until the
must be applied. system recovers failed unit is
the data on the replaced and data
mirrored pair while is rebuilt from the
the system is parity information.
running normally.

Performance Varies from minimal Minimal. In some Minimal, except for


impact. to significant. cases, performance the performance of
improves. restore operations,
which can be
considerably
slower.

Planning Minimal. Additional Careful planning is Careful planning is


complexity — disk capacity may necessary to necessary to
Hardware. be required determine the determine the
because of the hardware restore time.
storage required for configuration to Additional disks
journal receivers. A provide the best may be needed.
user auxiliary possible protection. Mixing device parity
storage pool may Mixing mirrored protection with
need to be set up protection with mirrored protection
for the journal device parity must be analyzed.
receivers. protection must be
analyzed.

Planning Significant. Minimal. Some Minimal. Some


complexity — Detailed application application application
Software. knowledge is knowledge is knowledge is
required to required to required to
determine what files determine whether determine whether
to journal and how user auxiliary user auxiliary
to assign them to storage pools are storage pools are
journals. needed and to needed and to
correctly place correctly place
objects in user objects in user
auxiliary storage auxiliary storage
pools. pools.

14-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Attribute Physical File Mirrored Device Parity


Journaling Protection Protection

Setup complexity Minimal. Minimal. New disk Minimal. New disk


and time required. units and other units and other
hardware must be hardware must be
installed. The disk installed. Device
units must be parity protection
added to an ASP. must be started,
Starting mirrored which can take
protection is a about an hour. The
simple operation disk units must be
that takes a added to an ASP.
maximum of a few
hours on the largest
systems.
Operational and Average. Journal Minimal Minimal
management receivers must be
complexity. detached and
saved regularly.
New applications
must be evaluated
for journaling
needs.

Additional Additional disk Twice as many One or two disk


hardware required. capacity may be storage units. Other units for each parity
required of the redundant set. This depends
storage required hardware, such as on the number of
because of the Controllers and disk units in the
storage required for IOPs, based on parity set.
journal receivers. A availability
user auxiliary requirements.
storage pool may
need to be set up
for the journal
receivers.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Availability options by failure type: Recovery time


IBM i

Has this relative impact on the recovery time for these failure types:

Program
This save or availability option: DASD System Power loss failure Site loss

Save operations + + + + +

File journaling ++ ++ ++ +

Access path protection ++ ++ ++

Uninterruptible power supply +++

User ASPs ++

Device parity protection +++

Mirrored protection +++

Dual systems +++ + ++

© Copyright IBM Corporation 2012

Figure 14-12. Availability options by failure type: Recovery time OL1914.1

Notes:
The availability options (save operations, journaling, access path protection, mirroring, and
so forth.) are rated in terms of relative impact on recovery time for various failure types
(DASD, power failure, site loss, system loss, and so forth).
The number of plus signs (+) in a column indicates that option's impact compared to the
other options. An option with more pluses has greater relative impact.

14-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Availability options by failure type: Frequency


IBM i

Has this relative impact on the frequency of failures that cause a


recovery for these failure types:

Program
This save or availability option: DASD System Power loss failure Site loss

Save operations

File journaling

Access path protection

Uninterruptible power supply +

User ASPs

Device parity protection +

Mirrored protection ++

Dual systems + + +

© Copyright IBM Corporation 2012

Figure 14-13. Availability options by failure type: Frequency OL1914.1

Notes:
The number of plus signs (+) in a column indicates that option's impact compared to the
other options. For example, mirrored protection is more likely to prevent you from having to
recover from a DASD failure than device parity protection and dual systems. However,
device parity protection and dual systems, while not as effective as mirrored protection, are
more effective than the other options.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Creating a disaster recovery


plan

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 14-14. Topic 2: Creating a disaster recovery plan OL1914.1

Notes:

14-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Disaster recovery plan: Major goals


IBM i

• Minimize interruptions to normal operations.


• Limit extent of disruption and damage.
• Minimize economic impact of the interruption.
• Establish alternative means of operation in advance.
• Train staff with emergency procedures.
• Provide smooth and rapid restoration of service.

© Copyright IBM Corporation 2012

Figure 14-15. Disaster recovery plan: Major goals OL1914.1

Notes:
The objective of a disaster recovery plan is to ensure that you can respond to a disaster or
other emergency that affects information systems and minimize the effect on the operation
of the business.
When you have prepared the information described in this topic collection, store your
document in a safe. This safe should be in a location that is off site, that is easily and
readily accessible and ideally, this would be a fireproof safe.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Disaster recovery plan


IBM i
• Personnel
– Data processing
– Organizational chart
– Positions, address, telephone number, email address
• Application profile: How critical, when it runs, manufacturer
• Inventory profile: Manufacturer, description, model, serial number, owner, cost
• Information services backup procedures
– IBM i
– Personal computers
• Disaster recovery procedures
– Emergency response procedures to protect lives and limit damage
– Backup operational procedures to conduct essential tasks
– Recovery and restoration of data processing system
– Disaster action checklist (before beginning recovery)
– Recovery start up procedures (notify people and outside companies involved)
• Recovery plan at mobile site
• Recovery plan at hot site
• Restoring entire system
• Plan and start to rebuild data processing site
• Test the disaster recovery plan

© Copyright IBM Corporation 2012

Figure 14-16. Disaster recovery plan OL1914.1

Notes:
IBM i Information Center:
http://publib.boulder.ibm.com/infocenter/iseries/ > i 7.1 > IBM i 7.1 Information Center >
Systems management > Backup and recovery > Planning a backup and recovery strategy
Describes a method, in 13 sections, how to create and maintain a detailed Disaster
recovery plan.
Section 1. Major goals of this plan (as shown by the previous slide)
Section 2. Personnel, including a table describing all required information of involved
personnel.
Section 3. Application profile: Use the Display Software Resources (DSPSFWRSC)
command to complete this table.
Section 4. Inventory profile: Use the Work with Hardware Products (WRKHDWPRD)
command to complete this table. A second table with miscellaneous inventory should be
filled in.
Section 5. Information services backup procedures

14-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 6. Disaster recovery procedures: For any disaster recovery plans, the following
elements should be addressed:
• Emergency response procedures
• Backup operations procedures
• Recovery actions procedures
• Disaster action checklist:
• Recovery start-up procedures for use after a disaster
Section 7. Recovery plan: Mobile site including a checklist, and:
• Mobile site setup plan
• Communication disaster plan
• Electrical service
Section 8. Recovery plan – hot site: The disaster recovery service provides an alternate hot
site. The site has a backup system for temporary use while the home site is being
reestablished.
Section 9. Restoring the entire system: To get your system back to the way it was before
the disaster, use the procedures on recovering after a complete system loss in Systems
management: Backup and recovery.
Section 10. Rebuilding process
Section 11. Testing the disaster recovery plan
Section 12. Disaster site rebuilding
Section 13. Record of plan changes: Keep your current plan. Keep records of changes to
your configuration, your applications, and your backup schedules and procedures.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Sample disaster recovery plan


The objective of a disaster recovery plan is to ensure that you can respond to a disaster or
other emergency that affects information systems and minimize effect on the operation of
the business. When you have prepared the information described in this topic, store your
document in safe. This safe should be in a location that is off site, that is easily and readily
accessible, and ideally, this would be a fireproof safe.

Section 1. Major goals of a disaster recovery plan


Here are the major goals of a disaster recovery plane.
• To minimize interruptions to the normal operations
• To limit the extent of disruption and damage
• To minimize the economic impact of the interruption
• To establish alternative means of operation in advance
• To train personnel with emergency procedures
• To provide for smooth and rapid restoration of service

14-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 2. Personnel


You can use the tables in this topic to record your data processing personnel. You can
include a copy of the organization chart with your plan.

Data processing personnel


Name Position Address Telephone

Data processing personnel


Name Position Address Telephone

Data processing personnel


Name Position Address Telephone

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Section 3. Application profile


Use the Display Software Resource (DSPSFWRSC) command to complete this table.
Application profile
Application Critical Fixed Asset Manufacturer Comments
Name Yes/No Yes/No

Comment Legend:
1. Runs daily.
2. Runs weekly on _________.
3. Runs monthly on _________.

14-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 4. Inventory profile


You can use the Work with Hardware Products (WRKHDWPRD) command to complete this
table:

Application profile
Manufacturer Description Model Serial No. Owned or Cost
Leased

Note:
1. This list should be audited every _______________months.
2. This list should include:
Processing units System printer
Disk units Tape and diskette units
Models Controllers
Workstation Controllers I/O Processors
Personal computers General data communication
Spare workstations Spare displays
Telephones Racks
Air conditioner or heater Humidifier or dehumidifier

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Miscellaneous inventory
Description Quantity Comments

Note: This miscellaneous inventory list should include:


Tapes CDs and DVDs
PC software Emulation packages
File cabinet contents or documentation Language software:
(such as COBOL and RPG)
Tape vault contents Printer supplies:
(such as paper and forms)
Optical media

Related reference
Section 12. Disaster site rebuilding
Use this information to do disaster site rebuilding.

14-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 5. Information services backup procedures


Use these procedures for information services backup.
• IBM i environment
- Daily, journals receivers are changed at ______________and at _________.
- Daily, a save of changed objects in the following libraries is done at____________:
- __________
- __________
- __________
- __________
- __________
- __________
- __________
- __________
This procedure also saves the journals and journal receivers.
- On _________ at __________ a complete save of the system is done.
- All save media is stored off-site in a vault at ___________ location.
• Personal computer
- It is suggested that all personal computers be backed up. Copies of the personal
computer files should be uploaded to the IBM i environment on ___________ (date)
at ____________ (time), just before a complete save of the system is done. It is
then saved with the normal system save procedure. This provides for a more secure
backup of personal computer-related systems where a local area disaster could
wipe out important personal computer systems.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Section 6. Disaster recovery procedures


For any disaster recovery plan, the following three elements should be addressed:
Emergency response procedure
Document the appropriate emergency response to a fire, natural disaster, or any
other activity in order to protect lives and limit damage.
Backup operations procedures
Ensure that essential data processing operational tasks can be conducted after the
disruption.
Recovery actions procedures
Facilitate the rapid restoration of a data processing system following a disaster.
Disaster action checklist
1. Plan initiation:
a. Notify senior management
b. Contact and set up disaster recovery team
c. Determine degree of disaster
d. Implement proper application recovery plan dependent on extent of disaster
e. Monitor progress
f. Contact backup site and establish schedules
g. Contact all other necessary personnel-both user and data processing
h. Contact vendors - both hardware and software
i. Notify users of the disruption of service
2. Follow-up checklist:
a. List teams and tasks of each
b. Obtain emergency cash and set up transportation to and from backup site, if
necessary
c. Set up living quarters, if necessary
d. Set up eating establishments, as required
e. List all personnel and their telephone numbers
f. Establish user participation plan
g. Set up the delivery and the receipt of mail
h. Establish emergency office supplies
i. Rent or purchase equipment, as needed

14-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty j. Determine applications to be run and in what sequence


k. Identify number of workstations needed
l. Check out any off-line equipment needs for each application
m. Check on forms needed for each application
n. Check all data being taken to backup site before leaving and leave inventory profile
at home location
o. Set up primary vendors for assistance with problems incurred during emergency
p. Plan for transportation of any additional items needed at backup site
q. Take directions (map) to backup site
r. Check for additional magnetic tapes, or optical media if required
s. Take copies of system and operational documentation and procedural manuals
t. Ensure that all personnel involved know their tasks
u. Notify insurance companies
Related tasks
Section 7. Recovery plan for mobile site
This topic provides information about how to plan your recovery task at a mobile site.

Recovery start-up procedures for use after actual disaster


Consider these recovery startup procedures for use after actual disaster.
1. Notify __________ Disaster Recovery Services of the need to utilize service and of
recovery plan selection.
Note: Guaranteed delivery time countdown begins at the time ____________ is notified
of recovery plan selection.
2. Disaster notification numbers
__________ or ____________
These telephone numbers are in service form __________ am until ____________ pm
Monday through Friday.
Disaster notification number: ___________
This telephone number is in service for disaster notification after business hours, on
weekends, and during holidays. Please use this number only for the notification of the
actual disaster.
3. Provide ___________ with an equipment delivery site address (when applicable), a
contact, and an alternate contact for coordinating service and telephone numbers at
which contacts can be reached 24 hours per day.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

4. Contact power and telephone service suppliers and schedule any necessary service
connections.
5. Notify ___________ immediately if any related plans should change.

14-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 7. Recovery plan for mobile site


This topic provides information about how to plan for your recovery task at a mobile site.
1. Notify _____________ of the nature of the disaster and the need to select the mobile
site plan.
2. Confirm in writing the substance of the telephone notification to ____________ within
48 hours of the telephone notification.
3. Confirm all needed backup media are available to load the backup machine.
4. Prepare a purchase order to cover the use of backup equipment.
5. Notify ______________ of plans for a trailer and its placement (on side of
____________).
6. Depending on communication needs, notify telephone company (____________) of
possible emergency line changes.
7. Begin setting up power and communications at ____________.
a. Power and communications are prearranged to hook into when trailer arrives.
b. At the point where telephone lines come into the building (_____________), break
the current linkage to the administration controllers (____________). These lines
are rerouted to lines going to the mobile site. They are linked to modems at the
mobile site.
The lines currently going from __________ to _____________ would then be linked
to the mobile unit through modems.
c. This could conceivably require ____________ to redirect lines at __________
complex to a more secure area in case of disaster.
8. When the trailer arrives, plug into power and do necessary checks.
9. Plug into the communications lines and do necessary checks.
10. Begin loading system from backups.
11. Begin normal operations as soon as possible:
a. Daily jobs
b. Daily saves
c. Weekly saves
12. Plan a schedule to backup the system in order to restore on a home-base computer
when a site is available. (Use regular system backup procedures).
13. Secure mobile site and distribute keys as required.
14. Keep a maintenance log on mobile equipment.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Related tasks
Disaster action checklist
This checklist provides possible initial actions that you might take following a disaster.
Related reference
Section 9. Restoring the entire system
You can learn how to restore the entire system.

Mobile site setup plan


You can attach the mobile site setup plan here.

Communication disaster plan


You can attach the communication disaster plan, including the wiring diagrams, here.

Electrical service
You can attach the electrical service diagram here.

14-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 8. Recovery plan for hot site


An alternate hot site plan should provide for an alternative (backup) site. The alternate site
has a backup system for temporary use while the home site is being reestablished.
1. Notify _________ of the nature of the disaster and of its desire for a hot site.
2. Request air shipment of modems to _______________ for communications. (See
_________ for communications for the hot site.)
3. Confirm in writing the telephone notification to ____________ within 48 hours of the
telephone notification.
4. Begin making necessary travel arrangements to the site for operations team.
5. Confirm that you have enough save media and that it is packed for shipment to restore
on the backup system.
6. Prepare a purchase order to cover the use of the backup system.
7. Review the checklist for all necessary materials before departing to the hot site.
8. Ensure that the disaster recovery team at the disaster site has the necessary
information to begin restoring the site.
9. Provide for travel expenses (cash advance).
10. After arriving at the hot site, contact home base to establish communications
procedures.
11. Review materials brought to the hot site for completeness.
12. Start loading the system from the save media.
13. Begin normal operations as soon as possible:
a. Daily jobs
b. Daily saves
c. Weekly saves
14. Plan the schedule to back up the hot-site system in order to restore on the home-base
computer.
Related reference
Section 12. Disaster site rebuilding
Use this information to do disaster site rebuilding.

Hot-site system configuration


You can attach the alternate-site configuration here.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Section 9. Restoring the entire system


You can learn how to restore the entire system.
To get your system back to the way it was before the disaster, use the procedures in
Recovering your entire system after a complete system loss.
Before you begin: Find the following save media, equipment, and information from the
on-site tape vault or the off-site storage location:
• If you install from the alternate installation device, you need both your save media and
the CD-ROM media containing the Licensed Internal Code.
• All tapes from the most recent complete save operation
• The most recent save media from saving security data (SAVSECDTA or SAVSYS)
• The most recent save media from saving your configuration, if necessary
• All save media containing journals and journal receivers that you saved since the most
recent daily save operation
• All save media from the most recent daily save operation
• PTF list (stored with the most recent complete save media, weekly save media, or both)
• Save media list from recent complete save operation
• Save media list from most recent weekly save operation
• Save media list from daily saves
• History log from the most recent complete save operation
• History log from the most recent weekly save operation
• History log from the daily save operations
• The Installing, upgrading, or deleting IBM i and related software PDF. You can order a
printed version of this PDF SC41-5120; feature code 8006) with IBM i software upgrade
orders or new hardware orders.
• The Recovering your system PDF. You can order a printed version of this PDF
(SC41-5304; feature code 8007) with IBM i software upgrade orders or new hardware
orders.
• Telephone directory
• Modem manual
• Tool kit
Related tasks
Section 7. Recovery plan for mobile site
This topic provides information about how to plan your recovery task at a mobile site.

14-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Section 10. Rebuilding process


The management team must assess the damage and begin the reconstruction of a new
data center.
If the original site must be restored or replaced, the following are some of the factors to
consider:
• What is the projected availability of all needed computer equipment?
• Will it be more effective and efficient to upgrade the computer systems with newer
equipment?
• What is the estimated time needed for repairs or construction of the data site?
• Is there an alternative site that more readily could be upgraded for computer purposes?
After the decision to rebuild the data center has been made, go to Section 12. Disaster site
rebuilding.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Section 11. Testing the disaster recovery plan


In successful contingency planning, it is important to test and evaluate the plan regularly.
Data processing operations are volatile in nature, resulting in frequent changes to
equipment, programs, and documentation. These actions make it critical to consider the
plan as a changing document.
Checklist for testing the disaster recovery plan.

14-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Not
Item Yes No Applicable Comments
Applicable

Conducting a recovery test


1. Select the purpose of the
test. What aspects of the
plan are being evaluated?
2. Describe the objectives of
the test. How will you
measure successful
achievement of the
objectives?
3. Meet with management
and explain the test and
objectives. Gain their
agreement and support.
4. Have management
announce the test and the
expected completion time.
5. Collect test results at the
end of the test period.
6. Evaluate results. Was
recovery successful? Why
or why not?
7. Determine the implications
of the test results. Does
successful recovery in a
simple case imply
successful recovery for all
critical jobs in the tolerable
outage period?
8. Make recommendations
for changes. Call for
responses by a given date.
9. Notify other areas of
results. Include users and
auditors.
10. Change the disaster
recovery plan manual as
necessary.

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Not
Item Yes No Applicable Comments
Applicable

Areas to be tested
1. Recovery of individual
application systems by
using files and
documentation stored
off-site
2. Reloading of system save
media and performing an
initial program load (IPL)
by using files and
documentation stored
off-site
3. Ability to process on a
different computer
4. Ability of management to
determine the priority of
systems with limited
processing
5. Ability to recover and
process successfully
without key people
6. Ability of the plan to
clarify areas of
responsibility and the
chain of command
7. Effectiveness of security
measures and security
bypass procedures
during the recovery
period
8. Ability to accomplish
emergency evacuation
and basic first-aid
responses
9. Ability of users of real
time systems to cope with
a temporary loss of online
information

14-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Item Yes No Applicable Not Applicable Notes

Areas to be tested (continued)


10. Ability of users to continue
day-to-day operations
without applications or jobs
that are considered
noncritical
11. Ability to contact the key
people or their designated
alternates quickly
12. Ability of data entry
personnel to provide the
input to critical systems by
using alternate sites and
different input media
13. Availability of peripheral
equipment and processing,
such as printers and
scanners
14. Availability of support
equipment, such as air
conditioners and
dehumidifiers
15. Availability of support:
supplies, transportation,
communication
16. Distribution of output
produced at the recovery
site
17. Availability of important
forms and paper stock
18. Ability to adapt plan to
lesser disasters

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Section 12. Disaster site rebuilding


Use this information to do disaster site rebuilding.
• Floor plan of data center
• Determine current hardware needs and possible alternatives.
• Data center square footage, power requirements and security requirements.
1. Square footage___________
2. Power requirements___________
3. Security requirements: Locked area, preferably with combination lock on one door.
4. Floor-to-ceiling studding
5. Detectors for high temperature, water, smoke, fire, and motion
6. Raised floor
Related tasks
Section 8. Recovery plan for hot site
An alternate hot site plan should provide for an alternative (backup) site. The alternate
site has a backup system for temporary use while the home site is being reestablished.
Related reference
Section 4. Example: Inventory profile
You can use the Work with Hardware Products (WRKHDWPRD) command to complete the
table in this topic.
Vendors
You can attach the vendors information here.
Floor plan
You can include a copy of the proposed floor plan here.

Section 13. Record of plan changes


Keep your plan current, and keep records of changes to your configuration, your
applications, and your backup schedules and procedures.
You can print a list of your current local hardware by typing the following command:
DSPLCLHDW OUTPUT(*PRINT)

14-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint
IBM i

1. True or False: Information that changes frequently is


something that should be saved on a weekly basis.

2. True or False: The LIC and all of the Q libraries should be


saved on a daily basis.

3. Which of the following is not one of the save strategies that


was covered in the lecture?
a. Simple
b. Medium
c. Full
d. Complex

© Copyright IBM Corporation 2012

Figure 14-17. Checkpoint OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 14. Backup and recovery planning 14-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit summary
IBM i

Having completed this unit, you should be able to:


• Compare the availability options that are available and their
impact on the recovery process
• Describe simple, medium, and complex save strategies
• Describe a disaster recovery plan

© Copyright IBM Corporation 2012

Figure 14-18. Unit summary OL1914.1

Notes:

14-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 15. Problem determination

What this unit is about


This unit is provided to take a look at system displays that can help
you with problem management using the knowledge gained in
previous units.

What you should be able to do


After completing this unit, you should be able to:
• Display IBM Power System with IBM i information and identify
problem jobs
• Change values that affect system performance and problem
handling
• Schedule functions that avoid system problems

How you will check your progress


• Checkpoint questions
• Lab exercise

References
Basic System Operations Topic in IBM Power Systems with IBM i
Information Center or view New IBM i User

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Display IBM Power Systems with IBM i information and identify
problem jobs
• Change values that affect system performance and problem
handling
• Schedule functions that avoid system problems

© Copyright IBM Corporation 2012

Figure 15-1. Unit objectives OL1914.1

Notes:
We review where to look for information about activity in the system. You learn steps that
you can take to improve system performance and avoid system problems.

15-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Problem determination


concepts

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 15-2. Topic 1: Problem determination concepts OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Problem determination
IBM i

• Where can I look?


• What can I do?

© Copyright IBM Corporation 2012

Figure 15-3. Problem determination OL1914.1

Notes:
We begin with a basic review of problem determination aids on the IBM Power System with
IBM i.

15-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Problem determination process


IBM i

• Problem determination has two components:


– Problem determination (PD)
– Problem source identification (PSI)

• Problem determination:
– Identifying the problem
– Identifying the effects of this problem

• Problem source identification:


– Identifying what has caused the problem

• Often called PD / PSI

© Copyright IBM Corporation 2012

Figure 15-4. Problem determination process OL1914.1

Notes:
The terms problem determination and problem source identification are often joined
together into yet another acronym, PD/PSI. While this might seem to be an unnecessary
duplication of terms, it conveys that there is an important distinction between the following
components of problem analysis:
• Problem determination (PD): The process of finding out exactly what the problem is
and what its effects are
• Problem source identification (PSI): The process of finding out what has caused the
problem
In some cases, it is not possible to give a complete explanation of the cause of a problem.
Your service provider, with the assistance of appropriate diagnostic information, can
recommend a course of action to recover from a problem.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Classification of symptoms
IBM i

• There are two classifications of symptoms:


– External symptoms
• Incorrect output
• Messages
• Wait
• Loop
– Internal symptoms
• Record messages
• Determine if one job is in a loop or is the entire system
• Determine if the wait is at a job level or the system level
• Determine if the problem is isolated within a job environment or between
jobs

© Copyright IBM Corporation 2012

Figure 15-5. Classification of symptoms OL1914.1

Notes:
External symptoms
The first objective of problem isolation is to define the external symptoms accurately. The
external symptoms are the attributes of the incident that first drew attention to the existence
of a problem. One or more of the following symptoms can be present:
• Incorrect output: The displayed or printed output from a job is not as expected.
• Messages: There are error messages in the job log, system operator message queue,
or the system history log.
• Wait: A job, many jobs, or the entire system can stop processing with little CPU activity.
• Loop: A job, or many jobs, can consume large amounts of CPU, precluding normal
processing.

15-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
Hint

The job or IBM Power System with IBM i is either in a loop or a wait state. There is no such
thing as a “hang”.

Internal symptoms
The second objective of problem isolation is to find one or more internal symptoms. Any
number of internal symptoms can contribute to an external symptom. Each internal
symptom has a special diagnostic plan that requires the collection of specific information.
• Where messages are concerned, it is necessary to record any return codes, sense
codes, dump identifiers, and qualifiers.
• When a loop is encountered, it is necessary to determine if there is a single job involved
in the loop or if the entire IBM Power System with IBM i is affected.
• When a wait condition is encountered, it is necessary to determine whether the wait is
at a job or a system level.
• Messages are the key indicators in determining if a lock condition is held within a job
environment or between jobs.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Problem solving tools


IBM i

IBM Syste
ms
Director
Navigato WRKS
Y
r for i DSPL SSTS
DSPM O G Q
S G Q HST
S Y SO
CPYSCN PR
STR
OB
WRKJ OG WRKP
L
JOB TJOB RB
C
WRKA

IBM Power Systems with


IBM i toolbox
© Copyright IBM Corporation 2012

Figure 15-6. Problem solving tools OL1914.1

Notes:
The system cannot solve all problems for you, so to help you, IBM i provides you with the
description of a problem and tools to help solve it. These tools (CL commands, menus,
displays, message queues, and logs) are provided as part of IBM i.
How your server manages problems:
The problem analysis functions that are provided by your server allow you to manage both
system-detected and user-defined problems. Your server provides functions for problem
analysis, problem logging and tracking, problem reporting, and problem correction. The
structured problem management server helps you and your service provider quickly and
accurately manage problems as they occur on the server.
Here is an example of the flow when managing a problem:
1. The server detects a hardware error.
2. An error notification is sent to the server.
3. A problem record is created with configuration information, a system reference code,
the name of the reporting device, and other information.

15-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty 4. The system error log records the error.


5. A message is sent to the system operator's message queue.
6. Problem analysis starts with the message.
The results of problem analysis are automatically stored, along with the collected problem
information. At this point, you can report the problem to your service provider.
Various tools are available to help you manage the problems on your server.
• Messages
• Error messages
• System reference codes
• Logs
• Alerts
• Solving problems using problem handling menus
• Electronic customer support
• Error codes

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

SG24-8253: Diagnostic tools Redbook


IBM i

© Copyright IBM Corporation 2012

Figure 15-7. SG24-8253: Diagnostic tools Redbook OL1914.1

Notes:
The contents of this Redbook are:
Part 1 Service tools for operators
Chapter 1 Problem determination overview
Chapter 2 IBM Power System with IBM i information documents
Chapter 3 Easy data collection
Chapter 4 Collecting messages
Chapter 5 Job information, job logs and spooled files
Chapter 6 Collecting the history log (QHST)
Chapter 7 Problem log and Save APAR Data
Chapter 8 Power problems
Part 2 Service provider and advanced service aids
Chapter 9 Initial program load (IPL)

15-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Chapter 10 Main storage dumps


Chapter 11 Tracing jobs
Chapter 12 Database – Data collection and analysis
Chapter 13 Communications problem determination
Chapter 14 Collecting a communications trace
Chapter 15 Advanced function – Watch support
Chapter 16 Java virtual machine problem determination
Chapter 17 Java virtual machine logs and dumps
Chapter 18 Cluster resource services
Chapter 19 Collecting HTTP server traces
Chapter 20 Collecting HTTP server logs
Chapter 21 Dumping a job
Chapter 22 Dumping an object
Chapter 23 Collecting an IOP dump
Chapter 24 Tracing the LIC
Chapter 25 Collecting LIC logs
Chapter 26 Using SST
Chapter 27 Using DST
Chapter 28 Collecting the product activity log
Chapter 29 Electronic service agent
Chapter 30 Submitting a problem report
Chapter 31 Technical databases and logging problems
Chapter 32 Collecting PTF levels
Appendix A Quick reference to data collection commands
Appendix B Start remote support
Appendix C Using the control panel
Appendix D Using system flight recorders
Appendix E Copying displays to another display
Appendix F Damaged objects
Appendix G Problem information
Appendix H Web sites related to IBM Power Systems with IBM i problem determination

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 2: Problem determination using


5250 emulation

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 15-8. Topic 2: Problem determination using 5250 emulation OL1914.1

Notes:

15-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Work with Active Jobs command


IBM i

© Copyright IBM Corporation 2012

Figure 15-9. Work with Active Jobs command OL1914.1

Notes:
The Work with Active Jobs (WRKACTJOB) command allows you to work with performance
and status information for the active jobs in the system. The sequence of jobs can be
changed with the Sequence (SEQ) parameter or through operations on the display. Other
parameters allow the selection of jobs to be shown on the display.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Work with Active Jobs screen


IBM i

© Copyright IBM Corporation 2012

Figure 15-10. Work with Active Jobs screen OL1914.1

Notes:
The Work with Active Jobs display shows the performance and status information for jobs
that are currently active on the system. All information is gathered on a job basis. The jobs
are ordered on the basis of the subsystems in which they are running. Jobs that run in a
subsystem (autostart jobs, interactive jobs, batch jobs, readers, and writers) are
alphabetized by job name and indented under the subsystem monitor job field they are
associated with. Subsystem monitors (with the jobs in the subsystem grouped under each
monitor job) are alphabetized and presented before system (SYS) jobs. The system jobs
(SCPF, QSYSARB, QLUS) are alphabetized by job name and presented following the
subsystem monitors and jobs within the subsystems.

15-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Work with Job


IBM i

© Copyright IBM Corporation 2012

Figure 15-11. Work with Job OL1914.1

Notes:
The Work with Job and the Display Job menus allow you to select options to work with or to
change information related to a user job.
Information about the following options can be shown regardless of where the job is located
in the system (on a job queue, on an output queue, or active):
• Job status attributes
• Job definition attributes
• Spooled file information

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Option 3: Display Job Run Attributes


IBM i

© Copyright IBM Corporation 2012

Figure 15-12. Option 3: Display Job Run Attributes OL1914.1

Notes:
The Work with Job Run Attributes display, and the Display Job Run Attributes display, show
run attributes that are defined in the class object associated with the job. Note that F9 from
this display, allows you to change job attributes.

15-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Option 10: Job log or DSPJOBLOG


IBM i

© Copyright IBM Corporation 2012

Figure 15-13. Option 10: Job log or DSPJOBLOG OL1914.1

Notes:
The Display All Messages display shows you the commands processed by the job and the
messages returned from running those commands. All available messages are shown,
including those not normally seen on the original display.
If you are displaying a batch job, you can see commands that are still to be processed
(identified by "..").
For specific information about messages, put the cursor on the message you want
information about and press the Help key. An additional message information display will
then be shown.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Ending a job
IBM i

© Copyright IBM Corporation 2012

Figure 15-14. Ending a job OL1914.1

Notes:
Option 4=End
Use this option to run the End Job (ENDJOB) command; the job's spooled files are not
deleted unless the default for the Delete spooled file (SPLFILE) parameter is overridden by
using the Parameter's input field. Unless the OPTION parameter is overridden by using the
Parameter's input field, a controlled end is performed as if the End Job (ENDJOB) command
were typed with all the default parameter values assumed. The End Reader (ENDRDR) or
End Writer (ENDWTR) command (with OPTION(*CNTRLD)) is issued if this option is selected
for a spooling reader or spooling writer job. This option is not valid for system or subsystem
monitor jobs. END replaces the status field if the command runs successfully.
The End Job (ENDJOB) command ends the specified job and any associated inline data
files. The job can be on a job queue, it can be active, or it can have already completed
running.

15-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

End Job Abnormal


IBM i

© Copyright IBM Corporation 2012

Figure 15-15. End Job Abnormal OL1914.1

Notes:
The End Job Abnormal (ENDJOBABN) command ends a job that cannot be ended
successfully by running the End Job (ENDJOB) command with *IMMED specified for the
How to end (OPTION) parameter. The ENDJOBABN command cannot be issued against a
job until 10 minutes have passed following the request for immediate ending. This allows
sufficient time for normal job ending functions to be attempted.
When the ENDJOBABN command is issued, most of the end-of-job processing is bypassed
(including spooling of the job log, the end of job display for interactive jobs, and the
end-of-job processing for the specific functions that are being performed). The part of the
end-of-job processing that is attempted is allowed only five minutes to complete. If it does
not do so in five minutes, the job is forced to end at that point. Because some of the job
cleanup is not performed, the ENDJOBABN command should only be used when a job that
is in the process of immediate ending does not finish ending and resources in use by the
job are needed by another job or by the system. When the ENDJOBABN command is used,
some resources in use by the ended job may be left unavailable until the next IPL.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Display system operator messages


IBM i

© Copyright IBM Corporation 2012

Figure 15-16. Display system operator messages OL1914.1

Notes:
The Display Messages (DSPMSG) command is used by the display station user to show the
messages received at the specified message queue. If the message queue is not allocated
to the job in which this command is entered or to any other job, it is implicitly allocated by
this command for the duration of the command. When the messages are shown, options
are also shown that allow the user to either remove one or more messages from the queue
or to enter a reply to each inquiry message.
To display the system operator message queue enter the DSPMSG QSYSOPR command.

15-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

History log
IBM i

• System history
– Automatically logs system activity
• Job information (start/stop times)
• Component failures
• Critical IBM Power Systems with IBM information
– Storage thresholds

• Information written to a system log


– QHST
• Multiple physical files QHST<yyddda>

© Copyright IBM Corporation 2012

Figure 15-17. History log OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Problem analysis: History log


IBM i

QHST *MSGQ DSPLOG

• Collection of messages
summarizing system
activity:
– IBM Power Systems with QHSTyydddn
IBM i information
QHSTLOGSIZ
– Job information
– Device status changes
– System operator messages
'A LOG VERSION'
– PTF activity

© Copyright IBM Corporation 2012

Figure 15-18. Problem analysis: History log OL1914.1

Notes:

15-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

DSPLOG
IBM i

QHST: Log of all system messages

© Copyright IBM Corporation 2012

Figure 15-19. DSPLOG OL1914.1

Notes:
The Display Log (DSPLOG) command shows the system history log (QHST). The history log
contains information about the operation of the system and system status.
The display contains the messages sent to the log, the date and time the message was
sent, and the name of the job that sent it.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

DSPLOG QHST
IBM i

© Copyright IBM Corporation 2012

Figure 15-20. DSPLOG QHST OL1914.1

Notes:
This view of the log shows all system activity.

15-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Saving and deleting history logs


IBM i

© Copyright IBM Corporation 2012

Figure 15-21. Saving and deleting history logs OL1914.1

Notes:
The Work with Files (WRKF) screen allows you to see and perform housekeeping on the
system history log (QHST*) files.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Copy screen
IBM i

I need some
assistance.

STRCPYSCN
Let me see
what is happening
Remote assistance on your
workstation.
or problem determination

© Copyright IBM Corporation 2012

Figure 15-22. Copy screen OL1914.1

Notes:
The Start Copy Screen (STRCPYSCN) command allows you to copy the screens of another
display station on your display station to observe what is happening and diagnose
problems.
If the STRCPYSCN command is used to copy displays from a source device that has the
wide-display feature to an output device with a regular-width display, the command is
accepted, but wide-display images are not shown and an informational message is sent to
the target work station indicating that the display was not shown.
If the STRCPYSCN command is used to copy displays from a source device that supports
graphic DBCS characters, the command is accepted and character information is shown,
but graphic DBCS characters appear as single byte. No message is sent.

15-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 3: Problem determination using


IBM i Navigator

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 15-23. Topic 3: Problem determination using IBM i Navigator OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Active Jobs: Details


IBM i

© Copyright IBM Corporation 2012

Figure 15-24. Active Jobs: Details OL1914.1

Notes:
A wealth of information is available about the jobs on your system. Expand your IBM Power
Systems with IBM i icon and Work Management. Double-click Active Jobs.
From the menu bar, select Options and Columns. The information available to display in
the right panel has to do with the jobs performance statistics of the jobs. Select any or all of
the columns of interest, particularly any columns that seem to relate to the problem at
hand.
Right-clicking a job gives access to the following information about the job:
• Call stack
• Library list
• Locked objects
• Open files
• Threads
• Transactions
• Elapsed performance statistics
• SQL

15-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Active Jobs: Job Log


IBM i

© Copyright IBM Corporation 2012

Figure 15-25. Active Jobs: Job Log OL1914.1

Notes:
One of the details (right-clicking the job name) is the job log (a history of the job's activity).
Additional details of the job log can be seen by selecting additional columns of information.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Active Jobs: Elapsed Performance Statistics


IBM i

© Copyright IBM Corporation 2012

Figure 15-26. Active Jobs: Elapsed Performance Statistics OL1914.1

Notes:
This is another way to get a job's performance statistics.

15-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Job properties: General


IBM i

© Copyright IBM Corporation 2012

Figure 15-27. Job properties: General OL1914.1

Notes:
Job properties will show you all of the information related to your job. Consider how
knowing or being aware of the information displayed through these panels could be helpful
when solving problems related to your jobs.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Job properties: Performance and Printer Output


IBM i

© Copyright IBM Corporation 2012

Figure 15-28. Job properties: Performance and Printer Output OL1914.1

Notes:
These System i Navigator screens of a job's attributes allow a user to monitor and alter the
job's performance metrics and control printed output.

15-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Job properties: Messages and Job Log


IBM i

© Copyright IBM Corporation 2012

Figure 15-29. Job properties: Messages and Job Log OL1914.1

Notes:
These System i Navigator screens of a job's attributes allow a user to change how
messages and the job log are handled within the job.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Job properties: Server and Security


IBM i

© Copyright IBM Corporation 2012

Figure 15-30. Job properties: Server and Security OL1914.1

Notes:
These System i Navigator screens of a job's attributes allow a user to monitor and alter the
job's server and security attributes.

15-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Job properties: Date/Time and International


IBM i

© Copyright IBM Corporation 2012

Figure 15-31. Job properties: Date/Time and International OL1914.1

Notes:
These System i Navigator screens of a job's attributes allow a user to monitor and alter the
job's date, time and international attributes.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Job properties: Threads, Resources, and Other


IBM i

© Copyright IBM Corporation 2012

Figure 15-32. Job properties: Threads, Resources, and Other OL1914.1

Notes:
These System i Navigator screens of a job's attributes allow a user to monitor and alter the
job's thread and resource attributes.

15-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

End a job
IBM i

© Copyright IBM Corporation 2012

Figure 15-33. End a job OL1914.1

Notes:
If you need to end a job, right-click the job name and select Delete/End. Note the job
name, number, and user. These three items are the unique job identification.
When a controlled end is chosen, the job is given a time limit to end. When the time limit
expires, the job begins an immediate end.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

End Job Abnormal


IBM i

© Copyright IBM Corporation 2012

Figure 15-34. End Job Abnormal OL1914.1

Notes:
Obtain the complete job identification from the active jobs display.
If you have requested an end to a user’s job, but after ten minutes it still has not ended, you
can use ENDJOBABN.
Use ENDJOBABN only when you must, since it does not close any files the job has open.
The same applies for any other end-of-job processing.

15-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Active Pools: Performance statistics


IBM i

© Copyright IBM Corporation 2012

Figure 15-35. Active Pools: Performance statistics OL1914.1

Notes:
By checking the performance statistics of the memory pools, you might be able to identify
some system performance problems.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

System operator messages (1 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 15-36. System operator messages (1 of 2) OL1914.1

Notes:
These System i Navigator screens allow a user to monitor the system operator message
queue.

15-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

System operator messages (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 15-37. System operator messages (2 of 2) OL1914.1

Notes:
A variety of system messages can indicate conditions that range from simple typing errors
to problems with system devices or programs. Error messages can be sent to a message
queue or to a program and shown on a display. Messages may be one of the following:
• An error message on your current display
• A message regarding a system problem that is sent to the system operator message
queue, QSYSOPR
• A message regarding a device problem that is sent to the message queue specified in a
device description
• A message regarding a potential sever system condition that is sent to the QSYSMSG
message queue, the system operator message queue, and other message queues
specified by the users
• An unexpected error message that is not handled by a program (shown on the Display
Program Messages display)

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 4: Using the power off switch

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 15-38. Topic 4: Using the power off switch OL1914.1

Notes:

15-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Why use the power switch?


IBM i

If I have to shut down the


system abnormally, what
Shut down using
can I do to reduce the time
the power switch
for the next IPL?
or power push
button.

© Copyright IBM Corporation 2012

Figure 15-39. Why use the power switch? OL1914.1

Notes:
It is vital for the system to shut down normally so that internal directories can be written to
auxiliary storage. Damage to internal directories results in a very long IPL. It is also
important from your application point of view that any changes made to data are also
written to auxiliary storage.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Power down initiation using power push button or


power switch
IBM i

• This operation ends:


– All interrupted MI instructions completed
– Power off follows
– Next IPL longer than normal
• If not completed in 30 minutes, you should use system
problem handling procedures.

© Copyright IBM Corporation 2012

Figure 15-40. Power down initiation using power push button or power switch OL1914.1

Notes:
Powering off your system by using the Power Switch.
What function does this action perform?
It allows the system to complete machine interface (MI) instructions that would be
interrupted during abnormal system end.
What happens on the system?
Objects referred to by MI instruction are marked as usable.
This will avoid a lengthy IPL.
When to perform this type of power down?
Perform this action when you cannot execute the PWRDWNSYS command. You should only
use the Power Switch if normal shutdown is not possible. You should use the Power Switch
instead of the Emergency Power Off switch.

15-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

What can I do to help minimize problems?


IBM i

• You can:
– Recognize normal versus abnormal.
• System performance
• Job mix
– Get rid of unneeded objects.
• Clean up your system

© Copyright IBM Corporation 2012

Figure 15-41. What can I do to help minimize problems? OL1914.1

Notes:
It is very important that you start observing your system using the commands shown
previously in this unit so that you are aware of the values presented under normal
circumstances. Then, when something abnormal does occur, it is easier for you to identify
it.
You also should do housekeeping on your system on a regular basis, so that the IBM
Power System with IBM i is not tracking unnecessary jobs or objects.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Topic 5: System cleanup

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 15-42. Topic 5: System cleanup OL1914.1

Notes:

15-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Cleaning up your system


IBM i

• Temporary libraries deleted


• Work control blocks compressed (QTOTJOB)
• Unused addresses made available
• Subsystem job logs closed
• New job logs created

The tasks performed during an IPL


result in a more efficient system.

© Copyright IBM Corporation 2012

Figure 15-43. Cleaning up your system OL1914.1

Notes:
When you IPL, the system does some housekeeping of system jobs and workspace,
resulting in a more efficient IBM Power System with IBM i.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Automatic cleanup (Operational Assistant)


IBM i

© Copyright IBM Corporation 2012

Figure 15-44. Automatic cleanup (Operational Assistant) OL1914.1

Notes:
GO CLEANUP, option 1 (or GO ASSIST, option 11, 2, then 1), allows you to change the
automatic cleanup options for messages, job logs and other system output, system
journals, and system logs. You have the option of keeping any of these items and still doing
automatic cleanup for the others. The number of days shown on this visual is the default.

15-48 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Tailoring automatic cleanup (1 of 3)


IBM i

Automatic cleanup Manual cleanup


Messages Messages
• User message queues • All other queues
• Workstation message queues
• System operator message queue

Printer output Printer output


• Output queue QEZJOBLOG (job logs) • All other output queues
• Output queue QEZDEBUG (service and program
dumps)

Journals Journals
• DIA files journal • Security journal
• DSNX journal • All user journals
• Problem databases journal
• Performance adjustment journal
• Job accounting journal
• OSI Message Services/400 journal
• Managed System Service/400 journal
• Application Enabler OFC files journal
• Application program driver files journal
• SNMP journal

© Copyright IBM Corporation 2012

Figure 15-45. Tailoring automatic cleanup (1 of 3) OL1914.1

Notes:
This chart shows exactly what is handled by the automatic cleanup and what objects you
still need to clean up manually.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Tailoring automatic cleanup (2 of 3)


IBM i

Automatic cleanup Manual cleanup


• Application Development Manager
Transactions journal
• Project logs journal
• Work order request journal
• QMSD job journal

Other system objects Objects created by applications or users


• History log • Database files (delete if no longer needed)
• Problem log and files • Database files (reorganize)
• Alerts database • Programs (for example, Query/400)
• PTF save files
• Reclaim temporary storage used by
temporarily decompressed objects

© Copyright IBM Corporation 2012

Figure 15-46. Tailoring automatic cleanup (2 of 3) OL1914.1

Notes:
This visual continues the list of system objects that automatic cleanup affects.

15-50 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Tailoring automatic cleanup (3 of 3)


IBM i

• RTVCLSRC
– PGM(QSYS/QEZUSRCLNP) SRCFILE(SOURCE-LIB/SOURCE-
FILE)

• STRPDM
– Use SEU to code additional functions.

• Compile QEZUSRCLNP and store it in a library.


– The library you store it in should precede QSYS in the library list.

Now: Your version of QEZUSRCLNP will be automatically run by the


system.

© Copyright IBM Corporation 2012

Figure 15-47. Tailoring automatic cleanup (3 of 3) OL1914.1

Notes:
The IBM-supplied automatic cleanup program is called QEZUSRCLNP. You can add
additional function to this program if you choose.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Reorganize file
IBM i

• This frees storage used by deleted records; it can also


sequence a file more efficiently.
• If a file is journaled, back it up immediately after it is
reorganized.
DSPFD FILE(Name) TYPE(*MBRLIST)

DELETED
MEMBER SIZE_ _ _ _ _ _ _ _RECORDS RECORDS

BROCHPF 12493824 45712 5981

RGZPFM FILE(Name) MBR(Name) KEYFILE(File Member)

© Copyright IBM Corporation 2012

Figure 15-48. Reorganize file OL1914.1

Notes:
The Reorganize Physical File Member (RGZPFM) command removes deleted records from
(compresses) one member of a physical file in the database, and it optionally reorganizes
that member.
A file description shows how many deleted rows (records) it has.
Also check large files for deleted records.
Reorganizing a file frees the space occupied by deleted records and can re sequence the
records so that it lends itself to faster processing.

15-52 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Reorganize file or table


IBM i

© Copyright IBM Corporation 2012

Figure 15-49. Reorganize file or table OL1914.1

Notes:
Check the number of rows and the number of deleted rows of your large files. The space
occupied by deleted records/rows can be regained by reorganizing the file.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Clear Save File (CRLSAVF)


IBM i

• Saving using a save file:

*FILE *SAVF

SAVSAVFDTA
SAVOBJ CUSTMAST
CUSTMAST CUSTMAST

Wasted
space on
system

CLRSAVF FILE(SAVE-FILE-NAME)

© Copyright IBM Corporation 2012

Figure 15-50. Clear Save File (CRLSAVF) OL1914.1

Notes:
Once a save file has been copied to tape (SAVSAVFDTA), the information in the save file no
longer needs to be kept on disk. Running CLRSAVF frees up disk space, but leaves the
save file itself there for the next time it is needed.

15-54 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Reclaim Storage (RCLSTG)


IBM i

• Unexpected failure can cause unusual conditions.


– Objects not correctly updated (damaged)
– User profiles might contain incorrect information about object
ownership

• Consider running RCLSTS when:


– WRKSYSSTS--High percentage of auxiliary storage used
– Unusual things exist when you:
• Work with object description
• Work with user profiles
– Starting system
• Message received not enough storage
– Have not run RCLSTG in quite a while

© Copyright IBM Corporation 2012

Figure 15-51. Reclaim Storage (RCLSTG) OL1914.1

Notes:
To run RCLSTG, the system must be in a restricted state. Depending on the amount of
DASD on your system and the number of objects, RCLSTG may take a number of hours to
run. It can, however, clear up problems with objects that cannot be addressed any other
way.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

RCLSTG command
IBM i

© Copyright IBM Corporation 2012

Figure 15-52. RCLSTG command OL1914.1

Notes:
The RCLSTG command attempts to correct objects that were incompletely updated such as
database files, libraries, device descriptions, user profiles with incorrect object ownership
information, directories and stream files. Any unusable objects or fragments are deleted.
The command has four parameters: Estimate, Select, Omit and ASPDEV.

ESTIMATE – specifies whether to calculate an estimate of the amount of time that the
RCLSTG command will take to run. The estimate is calculated by using statistics collected
during previous RCLSTG operations and the values specified for the other RCLSTG
parameters. The options are *YES or *NO, with *NO as the default.

SELECT – specifies whether to run all reclaim functions or only one specific reclaim
function. The choices for this parameter are *ALL, *DBXREF and *DIR. *ALL is the default.
This parameter tells the system to reclaim the database cross reference table and all file
objects or the directory and its IFS objects, or both.

15-56 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty
OMIT – specifies the reclaim functions that you would like omitted during the reclaim
process. The choices are *NONE, *DBXREF or *DIR. *NONE is the default.

ASPDEV – specifies the auxiliary storage pool (ASP) that is to be reclaimed. The options
are *SYSBAS (pools 1 through 32), an auxiliary-storage-pool-device-name (pools higher
than 32) or an auxiliary-storage-pool-group-name (wherein the primary and secondary
ASPs within the ASP group named) will be reclaimed. The default is *SYSBAS.

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

After running RCLSTG


IBM i

• Directory QReclaim (root file system objects only)

• Library QRCL
– Examine after running RCLSTG
– DSPLIB QRCL

• Take appropriate action


– Delete unusable objects
– Move objects
– Grant authority
– Transfer ownership
– Copy data to rebuild files

© Copyright IBM Corporation 2012

Figure 15-53. After running RCLSTG OL1914.1

Notes:
After running RCLSTG, examine the contents of QRCL and QReclaim directory. The
QReclaim directory is for lost objects from the Root File system, while the QRCL is for lost
objects that normally reside in libraries.

15-58 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Web sites for more information


IBM i

• IBM i Information Center


– http://publib.boulder.ibm.com/eserver/?topic=/rzahg/icmain.htm

© Copyright IBM Corporation 2012

Figure 15-54. Web sites for more information OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Exercise: Problem determination


IBM i

Problem determination:
Lab exercise
© Copyright IBM Corporation 2012

Figure 15-55. Exercise: Problem determination OL1914.1

Notes:

15-60 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (1 of 2)
IBM i
1. True or False: The process of finding out exactly what is the problem is problem
source identification.

2. The two classifications of problem symptoms are:


a. Messages
b. External symptoms
c. SRC
d. Internal symptoms

3. The command to work with all of the active jobs on the IBM Power System with
IBM i is:
a. WRKJOB
b. WRKACTJOB
c. WRKSBMJOB
d. WRKSPLJOB

4. True or False: When displaying your job’s run attributes, you can select the F9 key
to change your job.

5. True or False: If your job has not ended after five minutes, you can submit the
ENDJOBABN command.

© Copyright IBM Corporation 2012

Figure 15-56. Checkpoint (1 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (2 of 2)
IBM i

6. True or False: Choosing the Active Jobs branch in IBM i Navigator is


equivalent to using the WRKACTJOB command on the green screen.

7. True or False: Only the system operator can make changes to a


user’s job.

8. True or False: The preferred method to shut down an IBM Power


System with IBM i is to use the power switch.

9. True or False: The CLEANUP program will always run automatically


on your system at midnight.

10. True or False: A programmer can update the CLEANUP program to


perform whatever user activities the programmer decides to add.

© Copyright IBM Corporation 2012

Figure 15-57. Checkpoint (2 of 2) OL1914.1

Notes:

15-62 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• Display IBM Power System with IBM i information and identify
problem jobs
• Change values that affect system performance and problem
handling
• Schedule functions that avoid system problems

© Copyright IBM Corporation 2012

Figure 15-58. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 15. Problem determination 15-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

15-64 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty Unit 16. Introduction to Backup Recovery and


Media Services

What this unit is about


This unit provides an overview of the features and functions of Backup
Recovery and Media Services. Also to be introduced are two of the
most commonly used commands (WRKMEDBRM and WRKMEDIBRM) and
the functions that can be performed by using these commands. The
functions performed by the implementation and use of backup control
groups are also discussed in this unit.

What you should be able to do


After completing this unit, you should be able to:
• Describe the features and functions provided by BRMS
• List the different software that makes up the BRMS product
• Discuss the benefits of using the WRKMEDBRM command
• Discuss the benefits of using the WRKMEDIBRM command
• Discuss the benefits of using backup control groups to do your
backups
• Describe the functions supported for BRMS by IBM i Navigator

How you will check your progress


• Checkpoint questions

References
Basic System Operations Topic in IBM i Information Center on View
New System i User

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit objectives
IBM i

After completing this unit, you should be able to:


• Describe the features and functions provided by BRMS
• List the different software that makes up the BRMS product
• Discuss the benefits of using the WRKMEDBRM command
• Discuss the benefits of using the WRKMEDIBRM command
• Discuss the benefits of using backup control groups to do your
backups
• Describe the functions supported for BRMS by IBM i Navigator

© Copyright IBM Corporation 2012

Figure 16-1. Unit objectives OL1914.1

Notes:
References: http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/topic/rzai8/rzai8.pdf

16-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 1: Overview of BRMS functions


and features

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 16-2. Topic 1: Overview of BRMS functions and features OL1914.1

Notes:
Backup Recovery and Media Services (BRMS) provides a robust, easy-to-use graphical
user interface to perform save and recovery operations and to manage media.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup Recovery and Media Services (1 of 4)


IBM i

• Licenses

IBM i 7.1 i5/OS V6R1 i5/OS V5R4


Functions
5770BR1 5761BR1 5722BR1
Backup and recovery
Media and device management *Base *Base *Base
Reporting

Networking 1 1 1

Archive and retrieval


HSM
Media library management
BRMS user-defined system name 2 2 2
Tape library status tool
Software encryption
HA support for I-ASPs in a BRMS network

© Copyright IBM Corporation 2012

Figure 16-3. Backup Recovery and Media Services (1 of 4) OL1914.1

Notes:
This chart outlines the program numbers and options for the Backup Recovery and Media
Services software.
Reference: http://publib.boulder.ibm.com/infocenter/iseries/ IBM i 7.1 > IBM i 7.1
Information Center > Systems management > Backup and recovery

16-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup Recovery and Media Services (2 of 4)


IBM i

• Primary functions:
– Backup and recovery (license *BASE option)

– Networking (license option 1)

– Archive and retrieve (license option 2)

– Hierarchical storage management (license option 2)

© Copyright IBM Corporation 2012

Figure 16-4. Backup Recovery and Media Services (2 of 4) OL1914.1

Notes:
BRMS is an integrated and comprehensive tool for managing the backup, archiving, and
recovery environment for a single system or multiple systems in a site, or across a network
where data exchange by tape is required.
Backup
The key to maximizing the availability of a system is to reduce the backup window, while
still allowing for simple system recovery. BRMS is designed to perform very complex
backups easily. Backups are easy to define, and easy to change. Full error checking is
performed by BRMS to ensure that errors do not go unnoticed by operators. BRMS offers
full-function backup facilities, including keywords to match the normal save keywords (such
as *IBM and *ALLUSR), *EXITs to allow processing of user commands or programs during
the backup procedures, full incremental or noncumulative incremental saves, saves to
save files, saves to virtual tape, and save while active.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Recovery
BRMS offers a step-by-step recovery which is in the form of a report printed during the
maintenance command. BRMS has full and detailed feedback during the recovery process
- with an auto-refresh screen, updated as each library is restored.
Networking
The BRMS Network feature enables a BRMS system to interconnect through a network to
other BRMS networked systems. A networked BRMS system can share the inventory and
policies that are associated with media that is managed by a central BRMS system. A
BRMS networked system can be another System i platform or System i logical partition.
You can also use the network feature to distribute messages sent to the Backup and
Recovery Log. You can send up to 5000 bytes of any message electronically to a cellular
telephone, pager, or mailbox which uses an Internet address.
Archival of data
Data archiving is important in sites where large volumes of history data must be kept and
rapid access to this information is not required. BRMS will archive data from DASD to tape
and track information about objects that have been archived. Locating data in the archives
is very easy, and the restore can be triggered from a work-with screen.
Dynamic retrieval
It allows archived data to be dynamically restored back to DASD. Dynamic retrieval
provides support for all database files. At file open, BRMS will restore the file with no
interaction required other than tape mounts. In a tape library environment no operator
intervention is required.
Hierarchical storage management (HSM)
Hierarchical storage management (HSM) provides an automatic way of managing and
distributing data between the different storage layers in order to meet the users' needs for
accessing data while minimizing the overall cost. The concept of HSM involves the
placement of data items in such a way as to minimize its accessibility. BRMS provides an
interface to utilize this feature.

16-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup Recovery and Media Services (3 of 4)


IBM i

• Features
– Graphical interfaces
– Tailored save operations
– Lotus server online and incremental saves
– Enhanced save-while-active functions
– Parallel save and restore support
– Network feature
– Media and device management
– Step-by-step disaster recovery

© Copyright IBM Corporation 2012

Figure 16-5. Backup Recovery and Media Services (3 of 4) OL1914.1

Notes:
On the IBM i operating system, you can perform backup and recovery operations in several
ways. You can use local save and restore commands or the Save menu options, or you can
create CL programs. However, BRMS provides a more dynamic solution for your backup
and recovery needs, enables you to manage your media, provides archiving capabilities for
infrequently used objects. It also maintains a history of all saved items, which simplifies the
restore process and enables BRMS to create a detailed recovery report. BRMS provides
the following added functions that other backup solutions do not have:
Graphical interface
The BRMS graphical interfaces are available as a plug-in for the IBM i Navigator client and
for the IBM Systems Director web environment. The BRMS interface provides more
granular backups of individual files and directories, the ability to create control groups to
manage archives and backups on your system, a simple save history query function to
quickly locate items to restore, and an easy, effective method of managing media and
devices used for BRMS save operations.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Tailored save operations


BRMS includes several standard control groups that cover your basic needs, but you can
also create customized control groups that save data based on your company’s specific
needs. You have the option to create archive control groups, which provide a systematic
way of saving infrequently used objects to media to free space on the system, and backup
control groups, which perform save operations on data that is critical to your day-to-day
operations. You can also choose to back up individual files or directories or to perform
incremental and online backups of Lotus servers while they are still active.
Lotus server online and incremental saves
BRMS enables you to save Lotus servers while they are active. You can also easily define
items to omit from the save operation.
Enhanced save-while-active function
BRMS allows you to use your system during all or part of the save process, which can help
you reduce or eliminate your downtime for certain save operations.
Parallel save and restore support
BRMS provides the ability to save libraries and objects to multiple devices at once. You can
use up to 32 devices in this manner.
Network feature
By placing multiple systems in a BRMS network, you can share BRMS control groups,
policies, media information, and storage locations across the network. This allows you to
manage save and restore operations across all of your systems in a consistent manner.
Media and device management
BRMS enables you to keep an inventory of your media and track everything that is on
them.
When you do a backup, BRMS lets you know which tapes to use, so you do not have to
worry about writing over active data. In addition, you can manage devices, such as Tivoli
Storage Manager servers, to store your saved data.
Step-by-step disaster recovery
After every backup, you can print a disaster recovery report that will guide you through the
recovery of your system. It even tells you which media you need to restore on which pieces
of the system.

Note

It is recommended that after every scheduled backup, you print your disaster recovery
report. In the event of an unplanned system outage, this report will guide you through a
recovery of your entire system.

16-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup Recovery and Media Services (4 of 4)


IBM i

• The required software is: (7.1 is 5770, V6 is 5761, V5 is 5722)


– 5770-SS1 Option 18: Media and storage extensions
• Optional feature of IBM i that provides tape interface routines
• One-time charge
– 5770-BR1 BRMS
• Tier-priced by CPU size; three separate pieces:
– *Base: Product
– Option 1: Networking
– Option 2: Advanced functions (archive / retrieval / HSM)
• The BRMS licensed program product
– Supports:
• All IBM i tape devices and tape media and save file
• Virtual tape and optical media
– Uses standard menus, commands, and help text as well as GUIs
– Uses native IBM i save commands in the background
• Tapes readable by any system
• Runs in a single or networked (multisystem) environment
© Copyright IBM Corporation 2012

Figure 16-6. Backup Recovery and Media Services (4 of 4) OL1914.1

Notes:
BRMS is an IBM product and has the familiar IBM i look and feel. Just as for IBM i, base
BRMS function is accessed through the standard IBM i system interface. BRMS has its
own CL commands. These can be included into a CL or HLL program.
BRMS has a significant amount of online help text. This is available through the standard
pop-up windows, with function keys for full screen display. Some functions have up to 30
screens of help text associated with them.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

BRMS: Restrictions
IBM i

• Restrictions
– Tape volumes (physical and virtual) must have a unique volume ID.
– There is no support for:
• Diskette
• Unlabelled or nonstandard labeled tapes
– It does not support SAVSTG, CPYTOTAP, or CPYFRMTAP natively.
– It cannot run on the same system as other tape management
software.

© Copyright IBM Corporation 2012

Figure 16-7. BRMS: Restrictions OL1914.1

Notes:
Incompatible with other tape management solutions.
If you have another tape management solution installed on your system when BRMS is
installed, the existing tape management solution may no longer work correctly. This is due
to a low-level tape routine provided by IBM to many non-IBM tape management system
vendors. This routing intercepts any tape activity and calls a nominated program. If BRMS
is installed after one of these other products (even if for a trial), this routine will call the
BRMS program for checking tape activity, rather than the routine for the original product.
You can use the CPYTOTAP and CPYFRMTAP using BRMS by issuing the SETMEDBRM
command first.

16-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Supported tape systems


IBM i

© Copyright IBM Corporation 2012

Figure 16-8. Supported tape systems OL1914.1

Notes:
The web site captured in the visual is the best place to get the most up-to-date details
about what specific tape hardware is supported for attachment to your IBM i system.
http://www-03.ibm.com/systems/storage/product/tape.html

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

FlashCopy support: Overview


IBM i

© Copyright IBM Corporation 2012

Figure 16-9. FlashCopy support: Overview OL1914.1

Notes:
FlashCopy creates a copy of the source system onto a second set of disk drives, which are
then attached and used by another system or logical partition (LPAR). The BRMS
implementation of FlashCopy provides a way to perform a backup on a system that has
been copied by FlashCopy and a BRMS history appears, as the backup is performed, on
the production system.

Important

If you plan to use online Domino backup, you must do the backup on the production
system. You must save all journal receivers on the production system to avoid journal
receiver conflict and to enable point-in-time recovery.

BRMS stores backup history and media information in a library called QUSRBRM. The files
in this library define both the setup of the BRMS environment and the dynamic information
gathered as a result of doing BRMS operations such as saves and restore tasks. This

16-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty information is critical to the recovery of the system. When using FlashCopy to create a full
system image, QUSRBRM is also copied from the production system to the backup system.
The slide shows two partitions:
1. A production partition for normal day-to-day processing
2. A backup partition for taking offline backups
The BRMS FlashCopy function requires the BRMS Network Feature product 5770-BR1
(IBM I 7.1). In order to use BRMS to perform a backup of the copy system, FlashCopy
function must be enabled on the production system. After you enable the BRMS FlashCopy
function, all backups that are performed on the backup system look like they were
performed on the production system.
For more Information see ITSO Redbooks: SG24-7120 iSeries and Total Storage: A Guide
to Implementing External Disk on eServer – found at the following site:
http://www.redbooks.ibm.com/abstracts/sg247120.html
SG24-7103 IBM System Storage Copy Services and IBM i: A Guide to Planning and
Implementation - found at the following site:
http://www.redbooks.ibm.com/redbooks/pdfs/sg247103.pdf

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

BRMS main menu (GO BRMS)


IBM i

© Copyright IBM Corporation 2012

Figure 16-10. BRMS main menu (GO BRMS) OL1914.1

Notes:
GO BRMS shows the BRMS main menu
The options 3, 4, and 5 only appear if the advanced functions (license option 2) are
installed.

16-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Media management (WRKMEDBRM) (1 of 2)


IBM i

• The WRKMEDBRM command:


– Tracks contents of each tape
– Protects tapes against overwriting
– Manages tape moves to and from offsite locations
– Logs tape usage and error rates
– Duplicates tapes and manages pairs
– Manages tape sets
– Manages parallel sets

• Use option 13 to invoke the WRKMEDIBRM command.

© Copyright IBM Corporation 2012

Figure 16-11. Media management (WRKMEDBRM) (1 of 2) OL1914.1

Notes:
The Work with Media using BRM (WRKMEDBRM) command (or option 1 and then option 2 of
the BRMS main menu) works with active, expired, requiring initialization, in error, or all
media volumes in the BRMS media inventory by creation and expiration date for any or all
locations. Like all other IBM i commands, there are several parameters that are used with
this command to tailor the display or printed report that are generated. The report that is
produced is the Media report. The report, if printed, is written to printer file QP1AMM.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Media management (WRKMEDBRM) (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 16-12. Media management (WRKMEDBRM) (2 of 2) OL1914.1

Notes:
The Work with Media display is used to add, change, and remove media volumes in the
media inventory.
Perform media-related processes on single or groups of volumes in the media inventory.
Creation and expiration dates as well as current storage location, current container, and
last move dates are displayed for each volume.
Use F11 to view more information, such as cartridge type, virtual catalog, volume statistics,
and so on.
From this display, most media management functions can be accessed and performed.

16-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Media information (WRKMEDIBRM) (1 of 2)


IBM i

• The WRKMEDIBRM command:


– Tracks data that has been saved
– Is sortable
– Allows quick and easy restores
– Can view down to object/member detail if proper level of detail has
been saved

• Type of save is shown.

• F11 shows if any objects were missed during the save.


– Displays any errors that might have been logged

• Use option 6 to invoke the WRKMEDBRM command.

© Copyright IBM Corporation 2012

Figure 16-13. Media information (WRKMEDIBRM) (1 of 2) OL1914.1

Notes:
The Work with Media Information using BRMS (WRKMEDIBRM) command displays media
information based on libraries, date ranges, and sequences. This command can be started
from the command line, or through option 13 at the WRKMEDBRM display. The display shows
the date and time each library was saved, the type of save, the volume serial, and its
associated expiration date, the number of objects that were saved, and the number that
were not saved.
Using the default on the command will display all of the BRMS save history, with the most
recent save information displayed first.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Media information (WRKMEDIBRM) (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 16-14. Media information (WRKMEDIBRM) (2 of 2) OL1914.1

Notes:
A new column of Parallel Devices was added at V5R4. This column will display how many
device resources were used during parallel processing.
This display lists all saved items (libraries, special values, integrated file system information
and so on) saved by BRMS with their accompanying save information.
This screen allows you to remove saved items from the save history, display saved items or
restore saved items.
You can select object detail to review or restore objects from selected saves, provided
information was saved at that level. (option 9)

16-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Backup control groups (1 of 2)


IBM i

• Describes the backup


– What to backup: libraries, objects, folders, spool files, objects in
directories, special values
– Full or cumulative
– Save-while-active
• Controls backups
– Subsystems to end, job queues to hold, users to sign off
– Which media to select
– Use save files
– Use virtual tape
• Tracks success of backup
– BRMS log shows all backup activity
– Backup activity report shows all items saved and missed
– Save strategy exceptions shows libs never backed up
• Facilitates parallel saves
© Copyright IBM Corporation 2012

Figure 16-15. Backup control groups (1 of 2) OL1914.1

Notes:
The backup function is the cornerstone of the BRMS product. It is the option that controls
the save process, which ultimately determines how effectively a system can be restored.
Careful planning is required in determining a backup strategy before using BRMS.
Once the backup control group has been defined, performing a backup is simply a matter
of issuing a command STRBKUBRM (Start Backup using BRM), naming a single backup
control group, and specifying immediate or delayed start, and interactive or batch options.
The delayed option submits the backup job to run at a scheduled time. This is a 24-hour
clock submission time.
Conceptually, a backup control group is very much like a control language program (CLP).
A CLP consists of a list of commands that will run as part of calling up the CL program. A
backup control group is very similar in that it is used to identify a list of objects that are to be
saved as part of running this control group.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Backup control groups (2 of 2)


IBM i

© Copyright IBM Corporation 2012

Figure 16-16. Backup control groups (2 of 2) OL1914.1

Notes:
A control group defines a group of libraries, lists, and special values (starting with *) to be
backed up.
The WRKCTLGBRM display is used to create, change, copy, or delete control groups. You
can add, edit, or delete entries for subsystems to end or restart and hold or release job
queues.
You can perform an IPL after the backup.

16-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Recovery
IBM i

• Recovering a few objects:


– The user selects objects from a list of saved items.
– BRMS provides mount messages as required.
– There is an online progress report.

• Recovering a large number of objects or whole system:


– The volume summary report lists volumes needed.
– The recovery analysis report lists steps required.
– BRMS manages the recovery.

© Copyright IBM Corporation 2012

Figure 16-17. Recovery OL1914.1

Notes:
BRMS provides facilities to allow you to document a recovery plan using contact lists and
activity lists.
Three recovery reports are printed during the maintenance command. The 'Recovery
Analysis Report' gives you step-by-step instructions to guide you through recovering your
system.
When using the *RESTORE option on a full system recovery, the information is displayed on
the screen and is used to guide you through the recovery. You need only use options on a
work-with screen that is refreshed automatically as libraries are restored.
Using BRMS networking allows you to restore information to a system different from the
system that performed the save.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Recovery with WRKMEDIBRM


IBM i

• WRKMEDIBRM with 7 (Restore object)


– When you select option 7, the subsequent screens should guide you
through the rest of the restore.
© Copyright IBM Corporation 2012

Figure 16-18. Recovery with WRKMEDIBRM OL1914.1

Notes:
The WRKMEDIBRM command will list data that has been backed up using BRMS.
From this screen, I can choose option 7 to restore a specific object that is being tracked by
BRMS. Using this method, makes the recovery or restore of this object very simple
because the system is keeping track of where this data is stored. BRMS will call for the
specific tape required and will know what sequence number on that tape to get the data
from. All of this information is automatically filled into the recovery command.

16-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Archive (1 of 4)
IBM i

• Archive
– Locate and list objects that have not been used recently.
– Move these objects to tape and erase from disk.
– This frees up disk space.

• Retrieval
– Restore objects back to disk when needed.
– For *FILE, IFS, and DLO objects, BRMS optionally should auto-recall
when touched by a user, provided that they are archived with
STG(*FREE).

© Copyright IBM Corporation 2012

Figure 16-19. Archive (1 of 4) OL1914.1

Notes:
Archiving is a save and delete in one operation.
Auto-recall (retrieval) can be transparent to a user when using a tape library. Auto-recall
can only be accomplished with a stand-alone if the volume with the information to be
retrieved is mounted and ready in the tape device. A normal restore operation would be
required otherwise.
BRMS archive and auto-recall functions are considered part of hierarchical storage
management. (This is part of the Option 2 – Advanced functions).

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Archive (2 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 16-20. Archive (2 of 4) OL1914.1

Notes:
The first screen (Control group entries) is the result of option 2 at the WRKCTLGBRM
TYPE(*ARC) display. It shows which objects the archive job has to judge to determine if
they become an archive candidate. In this case, the objects residing in library ARH, and
those defined in the archive link-list ARHARCL are examined. The archive link-list can be
defined similar to the definitions used in the SAV command. (in this case it includes all
objects of the /home/arh subdirectory). The second screen Control group attributes) is the
result of option 8 at the WRKCTLGBRM TYPE(*ARC) display. Each BRMS control group
(Backup as well as Archive) is provided with lots of attributes. With Archive the specific
attributes that define the selection of archive candidates are shown in this slide. Actually, all
objects that are inactive for more than 30 days, are archive candidates.

16-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Archive (3 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 16-21. Archive (3 of 4) OL1914.1

Notes:
The STRACRBRM command generates two reports based on the criteria specified when
creating the Archive control group. (1st report of the library objects. Spooled file: QP1AARC.
2nd report of the subdirectory objects. Spooled file: QP1A1ARC) You must change the
default from *REPORT to *ARCHIVE in order to initiate the archive operation.
The report generated, first shows the criteria that you used to determine what objects are to
be archived. Then it lists the objects that are candidates to be archived, down to the
member level.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Archive (4 of 4)
IBM i

© Copyright IBM Corporation 2012

Figure 16-22. Archive (4 of 4) OL1914.1

Notes:
The report generated due to the archive link-list, also first shows the criteria that you used
to determine what objects are to be archived. Then it lists the objects that are candidates to
be archived.
Create a control group using WRKCTLGBRM *ARC with a list of items to compare with your
criteria.

16-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Advanced functions: HSM (1 of 2)


IBM i

• Hierarchical storage management (HSM) (migration)

• Allows migration of data among expensive and fast disks to


less expensive and slower disks
– Through user ASPS
– Automatically using control groups
– Manually using STRMGRBRM command

• Eventually to tape through archive

© Copyright IBM Corporation 2012

Figure 16-23. Advanced functions: HSM (1 of 2) OL1914.1

Notes:
Through the migration function, BRMS offers a full-functioned HSM solution whereby data
can be migrated between user ASPs according to policies, and then migrated to tape for
later auto-recall. Objects that are eligible for migration between ASPs are full libraries, and
root level folders. Spoolfiles can be moved between user ASPs using the MOVSPLFBRM
command.
“Compressed DASD” is available which gives existing disk units the ability to store 2-4
times as much data, when compressed by a compression-capable IOP. The DASD
performance will be slightly reduced due to the compression.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Advanced functions: HSM (2 of 2)


IBM i

• Only libraries, root folders, and spool files are eligible for migration.
• Specify criteria for objects to migrate.
• *DEMOTE or *PROMOTE through the hierarchy chain of user ASPs one
storage level at a time.

© Copyright IBM Corporation 2012

Figure 16-24. Advanced functions: HSM (2 of 2) OL1914.1

Notes:
Use the WRKCTLGBRM TYPE(*MGR) to create a control group that will list items to compare
with the criteria you specify. Option 8 again provides the option to change the attributes. In
this case, all objects in the library ARH (as defined through option 2 on the control group)
must have a size of greater or equal to 1 MB before the library is promoted to a faster
medium. And all objects in the library ARH must be older than 364 days, before the library
is demoted to a slower medium.
Use the STRMGRBRM command to generate a report listing the items that are candidates for
migration.
Change the default from *REPORT to *MIGRATE to initiate the migration.

16-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

TSM application client to BRMS


IBM i

© Copyright IBM Corporation 2012

Figure 16-25. TSM application client to BRMS OL1914.1

Notes:
BRMS offers the option to send the saved user data to the Tivoli Storage Manager (TSM)
backup tool.
You would set up the communications protocol that will be used by this interface to connect
to the Tivoli server.
Once Tivoli is set up and working, then there is a set of APIs to download from the BRMS
web site along with the instructions on how to set up the APIs. Once these are in place, you
can use the standard BRMS interface as the way to manage the backup and recovery of
your data. The only difference, and the way to tie this into Tivoli, is that when it comes time
to back up the data, instead of pointing to a tape device you tell it the name of the
communications device used by the Tivoli interface. Now the save is being sent through
this communications device to the Tivoli server.
The old name of the TSM application, was ADSM. BRMS still uses the special value *ADSM
to configure the interface with TSM.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Note

Only user data can be saved to a Tivoli server. You can not save system data using this
method of backup. This solution is used by infrastructures, where IBM i server(s) form a
minor part. If more than 100 GB – 150 GB of data is to be saved each night at an IBM i
server, it is not recommended to use the Tivoli Storage Manager interface.

16-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 2: Overview of IBM i Navigator


and BRMS

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 16-26. Topic 2: Overview of IBM i Navigator and BRMS OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

IBM i Navigator
IBM i

• If BRMS is installed on the system, the BRMS plug-in is available.


• If BRMS is not installed on the system, the BRMS plug-in is not
available.

© Copyright IBM Corporation 2012

Figure 16-27. IBM i Navigator OL1914.1

Notes:

16-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

BRMS GUI V6R1


IBM i

• IBM i Navigator and IBM Systems Service Director for i:


– Ability to create and manage media policies (was hidden in previous releases)
– Support for DVD, CD-ROM, optical libraries, and virtual optical devices
– Support for file or object level backup of Linux or Windows guests OS
– Backup and archive policies renamed as backup and archive control groups
– Ability to manage and select media policies from the Backup Control Group and
Archive Control Group wizards and from the Properties page
– Backup and archive control groups properties support for:
• Restoring and saving private authorities
• Disk pools and generic libraries
• Software encryption, including tape libraries and stand-alone tapes
– Ability to balance media ownership to match the required number of media
needed by systems within the BRMS network (network systems must be running
V6R1 i5/OS or later)
– Ability to exempt media from save operations

© Copyright IBM Corporation 2012

Figure 16-28. BRMS GUI V6R1 OL1914.1

Notes:
As an alternative to the character-based interface, BRMS provides a full function graphical
user interface (GUI). The BRMS GUI is a plug-in for the IBM i Navigator installed client
application and the IBM Systems Director Navigator for i web browser environment.
Save file encryption and optical media encryption are not supported.
If you are using encrypted independent auxiliary storage pools (ASPs) and want to have
the data remain encrypted when you save them to tapes, you need to use the software
encryption function provided in the backup and archive control groups to encrypt the data;
otherwise, the data will be decrypted when you save them to tapes.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

BRMS GUI IBM i 7.1


IBM i

• IBM i Navigator and IBM Systems Service Director for i:


– Support for the IBM Systems Director Web browser environment
– Scheduling support for IBM Systems Director Navigator for i Web
browser environment
– High availability independent ASPs enhancement
– Enhanced current email function to support multiple email addresses
– Enhanced BRMS log filter to provide option to filter on control groups
– BRMS maintenance feature in backup policy now allows the user to
run movement, expire partial volume sets, and reorganize BRMS
database files

© Copyright IBM Corporation 2012

Figure 16-29. BRMS GUI IBM i 7.1 OL1914.1

Notes:
Both System i Navigator and System Director Navigator for i have plug-in support for
Backup Recovery and Media Services.

16-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

BRMS functions by release


IBM i

© Copyright IBM Corporation 2012

Figure 16-30. BRMS functions by release OL1914.1

Notes:
Excellent web site to know about and to get the most up-to-date information regarding
BRMS and Navigator.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

BRMS and GUI FAQs


IBM i

© Copyright IBM Corporation 2012

Figure 16-31. BRMS and GUI FAQs OL1914.1

Notes:
BRMS functions supported by System i Navigator and System Director Navigator for i vary
by release of the operating system and they can be explored in the IBM i Information
Center.

16-36 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Topic 3: Additional reference material

Powertm with IBM i

© Copyright IBM Corporation 2012


Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 7.0

Figure 16-32. Topic 3: Additional reference material OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

BRMS Internet home page


IBM i

© Copyright IBM Corporation 2012

Figure 16-33. BRMS Internet home page OL1914.1

Notes:
This visual pictures the BRMS web site for more information.

16-38 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

BRMS: Product Information link


IBM i

© Copyright IBM Corporation 2012

Figure 16-34. BRMS: Product Information link OL1914.1

Notes:
Product information links for BRMS are displayed.

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Publications
IBM i

• Refer to these publications for more information:


– Backup Recovery Media Services
• IBM i 7.1 SC41-5345-07
• V6R1 SC41-5345-06
• V5R4 SC41-5345-05
– A Practical Approach to Managing BRMS for OS/400
• SG24-4840-01 (Redbook)
– Redpiece (REDP0508)
• Info on online Domino, SAP, TSM, and so on
• www.redbooks.ibm.com
– Automated Tape Library Planning and Management
• SC41-5309
– OS/400 Backup and Recovery
• IBM i 7.1 SC41-5304-10 (Systems management: Recovering your system)
• V6R1 SC41-5304-09
• V5R4 SC41-5304-08

© Copyright IBM Corporation 2012

Figure 16-35. Publications OL1914.1

Notes:
For more information, check the following publications:
SC41-5345-07, BRMS Reference,
SC41-5309, Automated Tape Library and Planning, and
SG24-4840, A Practical Approach to Managing BRMS for OS/400.
www.redbooks.ibm.com

16-40 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Additional Internet sites


IBM i

• IBM i Navigator
– http://www-03.ibm.com/servers/eserver/iseries/navigator/
• Storage Web site (tape)
– http://www-03.ibm.com/servers/eserver/iseries/hardware/storage/
• IBM i Network
– http://www.systeminetwork.com/
• Backup basics and BRMS chapters
• System i Magazine backup and recovery FAQs
• Commonly asked backup and recovery questions
• IBM i Information Center
– http://publib.boulder.ibm.com/iseries/

© Copyright IBM Corporation 2012

Figure 16-36. Additional Internet sites OL1914.1

Notes:
IBM i Navigator
http://www-03.ibm.com/servers/eserver/iseries/navigator/
Storage Web site (tape)
http://www-03.ibm.com/servers/eserver/iseries/hardware/storage/
IBM i Network
http://www.systeminetwork.com/
• Backup basics and BRMS chapters
• System i Magazine backup and recovery FAQs
• Commonly asked backup and recovery questions
IBM i Information Center
http://publib.boulder.ibm.com/iseries/

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Where can I get education?


IBM i

• Education
– AS28/OV28 Backup, Recovery and Media Services (BRMS)
for IBM i

© Copyright IBM Corporation 2012

Figure 16-37. Where can I get education? OL1914.1

Notes:

16-42 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Checkpoint (1 of 2)
IBM i

1. True or False: If you only need to save and restore your data, you only
need to install the *Base BRMS software.

2. True or False: In order to do software encryption as part of your save,


you would need to install BRMS Option 1: Networking software.

3. True or False: BRMS requires that all of the volumes that it is going to
manage must have a unique volume ID.

4. True or False: BRMS will work systems that are part of an SAN.

5. True or False: BRMS provides support to do backup and recovery as


well as archive and retrieval.

© Copyright IBM Corporation 2012

Figure 16-38. Checkpoint (1 of 2) OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Checkpoint (2 of 2)
IBM i

6. True or False: BRMS gets installed as a default for IBM i


Navigator.

7. True or False: IBM i Navigator will have a different look and


feel depending on what version and release is installed.

8. True or False: The BRMS home page has useful links to help
you learn how to use this software to its maximum potential.

© Copyright IBM Corporation 2012

Figure 16-39. Checkpoint (2 of 2) OL1914.1

Notes:

16-44 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

Uempty

Unit summary
IBM i

Having completed this unit, you should be able to:


• Describe the features and functions provided by BRMS
• List the different software that makes up the BRMS product
• Discuss the benefits of using the WRKMEDBRM command
• Discuss the benefits of using the WRKMEDIBRM command
• Discuss the benefits of using backup control groups to do your
backups
• Describe the functions supported for BRMS by IBM i Navigator

© Copyright IBM Corporation 2012

Figure 16-40. Unit summary OL1914.1

Notes:

© Copyright IBM Corp. 1995, 2012 Unit 16. Introduction to Backup Recovery and Media Services 16-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

16-46 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Appendix A. Checkpoint solutions

Unit 1, "IBM i overview and concepts"

Solutions for Figure 1-48, "Checkpoint (1 of 2)," on page 1-55

Checkpoint solutions (1 of 2)
IBM i

1. True or False: The TIMI is a separately ordered software.


The answer is false.

2. True or False: This system addresses both main storage


(memory) and auxiliary storage (disk) using the same
addressing scheme.
The answer is true.

3. True or False: The LIC must be installed by the customer.


The answer is false.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-1


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 1-49, "Checkpoint (2 of 2)," on page 1-56

Checkpoint solutions (2 of 2)
IBM i

4. True or False: Java is not supported on this system.


The answer is false.

5. True or False: Using a simple naming convention is the best


method for locating or accessing an object on the system.
The answer is false.

6. True or False: The new GUI that became available at V6R1


and V7R1 is Systems Director Navigator for IBM i.
The answer is true.

© Copyright IBM Corporation 2012

A-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 2, "Management Central overview"

Solutions for Figure 2-68, "Checkpoint," on page 2-91

Checkpoint solutions
IBM i

1. True or False: Management Central is a suite of systems management functions


that allows you to manage multiple systems in a TCP/IP network environment.
The answer is true.
2. True or False: The Management Central server must be running in order for that
system to be visible in the Management Central view of systems.
The answer is true.
3. True or False: Once an IBM Power System with IBM i is defined as the central
server you cannot define a different system as your central server.
The answer is false.
4. True or False: Endpoint systems can be added either manually or automatically.
The answer is true.
5. True or False: The advanced job scheduler is automatically included with every
IBM Power System with IBM i that is shipped from IBM.
The answer is false.
6. True or False: Using Application Administration, it is possible to secure the
Management Central functions.
The answer is true.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-3


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 3, "Security concepts and overview"

Solutions for Figure 3-9, "Checkpoint," on page 3-12

Checkpoint solutions
IBM i

1. True or False: The objectives of security are confidentiality, integrity,


and availability.
The answer is true.

2. Physical security includes which of the following?


a. Controlling access to the CPU
b. Securing the tapes used for backup
c. Securing the printers connected to your system
d. All of the above
The answer is all of the above.

3. Which of the following is not one of the modes you can select for your
system?
a. Manual
b. Normal
c. Automatic
d. Secure
e. Lockdown
The answer is lockdown.
© Copyright IBM Corporation 2012

A-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 4, "Security-related system values"

Solutions for Figure 4-47, "Checkpoint," on page 4-66

Checkpoint solutions
IBM i

1. True or False: In order to implement security on your


system, you must install additional security software on
your system.
The answer is false.

2. True or False: It is possible to lock out users from


changing system values.
The answer is true.

3. True or False: One of the components available to


implement security on your system is system values.
The answer is true.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-5


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 5, "User security"

Solutions for Figure 5-59, "Checkpoint (1 of 3)," on page 5-80

Checkpoint solutions (1 of 3)
IBM i
1. True or False: User profiles are one of the security components available to
implement security on the system.
The answer is true.

2. The user profile does not contain which of the following?


a. Password
b. User classification
c. Special authorities assigned
d. List of owned object
e. List of authorized objects
f. Listing of all the authorization lists where the user is included
The answer is a listing of all the authorization lists where the user is included.

3. The *ALLOBJ special authority allows a user access to all system resources.
a. *ALLOBJ
b. *JOBCTL
c. *SPLCTL
d. *SECADM
e. *SERVICE
The answer is *ALLOBJ.

© Copyright IBM Corporation 2012

A-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 5-60, "Checkpoint (2 of 3)," on page 5-81

Checkpoint solutions (2 of 3)
IBM i

4. True or False: A user profile can be used to specify an initial program


to be called when the user signs on to the system.
The answer is true.

5. By specifying limit capabilities, you can keep a user from changing


which menu and which library they will sign on to from the sign on
screen.
a. Do not limit capabilities
b. Limit some capabilities
c. Limit capabilities
The answer is limit capabilities.

6. True or False: Ideally, group profiles should be created with a


password of *NONE because you should not sign on to the system
using this group ID.
The answer is true.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-7


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 5-61, "Checkpoint (3 of 3)," on page 5-82

Checkpoint solutions (3 of 3)
IBM i

7. The maximum number of group profiles that a user can belong to is?
a. 16
b. 32
c. 64
d. *NOLIMIT
The answer is 16.

8. True or False: With Management Central you can send a user profile to other systems in
your network.
The answer is true.

9. True or False. The same QSECOFR user ID and password is used to sign on to the
operating system and to service tools.
The answer is false.

10. True or False. I can recover the QSECOFR service tool profile by signing on with the IBM
i QSECOFR profile and using the CHGDSTPWD command.
The answer is true.

© Copyright IBM Corporation 2012

A-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 6, "Resource security"

Solutions for Figure 6-52, "Checkpoint (1 of 3)," on page 6-62

Checkpoint solutions (1 of 3)
IBM i
1. True or False: An object can be owned by multiple users on the system.
The answer is false.

2. True or False: The name of the primary group and its authority to the object are
stored in the object header.
The answer is true.

3. When an object does not have an owner specified, it gets assigned to the
QDFTOWN user profile.
a. *USER
b. *SECOFR
c. *SYSOPR
d. QDFTOWN
The answer is QDFTOWN.

4. True or False: The QCRTAUT system value is used to determine the public
authority for a newly created object.
The answer is true.

5. True or False: Read, add, and update are authorities that can be specified to the
object management authority for a specific object.
The answer is false.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-9


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 6-53, "Checkpoint (2 of 3)," on page 6-63

Checkpoint solutions (2 of 3)
IBM i

6. True or False: OBJOPR, OBJMGT, and OBJEXIST are authorities that can be
specified to the data authority for a specific object.
The answer is false.

7. The very first thing that a system checks when determining if a user is allowed to
access an object is:
a. Group authority
b. Authorization list
c. Private authorities
d. All object access
The answer is all object access.

8. The maximum number of authorization lists that a user can be specified in is:
a. 16
b. 32
c. 64
d. No maximum
The answer is no maximum.

© Copyright IBM Corporation 2012

A-10 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 6-54, "Checkpoint (3 of 3)," on page 6-64

Checkpoint solutions (3 of 3)
IBM i

9. Adopted authority is an authority that can be assigned to an


object temporarily.
a. User
b. Object
c. Resource
d. Adopted
The answer is adopted.

10. True or False: Applications that utilize calls to programs that


adopt authority should library-qualify those calls.
The answer is true.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-11


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 7, "Security auditing"

Solutions for Figure 7-24, "Checkpoint," on page 7-31

Checkpoint solutions
IBM i

1. True or False: Security auditing is implemented to keep a


system at a planned security level.
The answer is true.

2. Which of the following is not one of the levels of security


auditing that can be implemented on the system?
a. System wide
b. Specific user
c. Specific object
d. Configuration changes
The answer is configuration changes.

3. True or False: An effective security strategy does not require


that it be endorsed by management.
The answer is false.

© Copyright IBM Corporation 2012

A-12 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 8, "Designing security"

Solutions for Figure 8-54, "Checkpoint," on page 8-70

Checkpoint solutions
IBM i
1. True or False: It is recommended that you only secure those objects that require
securing.
The answer is true.

2. True or False: Access to objects cannot be specified at the library level.


The answer is false.
3. True or False: It is possible to control whether a user has access to a command
line.
The answer is true.
4. True or False: You cannot limit access to the System Request screen.
The answer is false.
5. True or False: You can define ASP encryption through 5250 interface.
The answer is false.
6. The most granular security that you can specify is:
a. Library
b. User
c. Object
d. Program level
The answer is object.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-13


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 9, "IBM Power Systems with IBM i: Availability overview"

Solutions for Figure 9-91, "Checkpoint (1 of 3)," on page 9-131

Checkpoint solutions (1 of 3)
IBM i

1. True or False: Whenever there is a disk failure on the system, this will
force a full recovery of all data.
The answer is false.
2. Which of the following is a hardware availability function designed to
protect data from loss due to two disk unit failures or because of
damage to two disks?
a. RAID 5
b. RAID 6
c. Mirroring
d. Concurrent maintenance support
The answer is RAID 6.
3. Which of the following provides a means to save an object while the
system remains active and users are working with the data?
a. Parallel save
b. Save of all user data
c. Save changed objects
d. Save-while-active
The answer is save-while-active.
© Copyright IBM Corporation 2012

A-14 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 9-92, "Checkpoint (2 of 3)," on page 9-132

Checkpoint solutions (2 of 3)
IBM i
4. The maximum number of partitions supported on POWER4-based hardware is 32.
The maximum number of partitions supported on POWER5 and POWER6-based hardware is 254.
The maximum number of partitions supported on POWER7-based hardware is 1000.
a. POWER4 = 32 POWER5 and POWER6 = 254 POWER7 = 1000
b. POWER4 = 64 POWER5 and POWER6 = 128 POWER7=512
c. POWER4 = 128 POWER5 and POWER6 = 64 POWER7=254
d. POWER4 = 254 POWER5 and POWER6 = 32 POWER7=128
e. POWER4, 5, and 6 support the same number of partitions, but POWER7 supports 1000.
The answer is POWER4 = 32, POWER5 and POWER6 = 254, and POWER7 = 1000.

5. Which of the following are resources that can be allocated to an LPAR? Select all that apply.
a. Only whole processors
b. Memory
c. I/O adapters
d. Disk drives
e. Operating system software
The answers are memory, I/O adapters, and disk drives.

6. Which of the following is not supported in an IBM Power System with IBM i partition?
a. AIX
b. Linux
c. IBM i
d. Windows server software
The answer is Windows server software.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-15


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 9-93, "Checkpoint (3 of 3)," on page 9-133

Checkpoint solutions (3 of 3)
IBM i
7. True or False: Each LPAR requires a separate license from IBM for the OS installed in that LPAR.
The answer is false.

8. Which of the following is one of the supported type of clusters that can be set up?
a. Separate servers
b. Switchable DASD
c. Cross site mirrors
d. System storage copy services
e. Hot site immediate switchover
The answer is hot site immediate switchover.

9. A cluster node is a system or partition that is in a cluster.


a. Separate server
b. Switchable DASD server
c. Cross site mirror
d. Cluster node
The answer is cluster node.

10. Which of the following cannot be shared on an IBM Power System with IBM i and integrated
xSeries server?
a. Tape drive
b. DASD
c. Memory
d. CD-ROM drive
The answer is memory.

© Copyright IBM Corporation 2012

A-16 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 10, "Disk management"

Solutions for Figure 10-78, "Checkpoint (1 of 3)," on page 10-119

Checkpoint solutions (1 of 3)
IBM i
1. True or False: The terms disk pool and IASP are terms that are not
interchangeable.
The answer is false.

2. The maximum number of basic ASPs you can create is 32, and the maximum
number of IASPs you can create is 255.
a. 32 and 255
b. 64 and 128
c. 128 and 64
d. 255 and 32
e. The number is the same for both
The answers are 32 and 255.

3. RAID-5 is a hardware function that protects data from being lost because of one
disk unit failure or damage to the disk drive.
a. Mirroring
b. RAID-5
c. RAID-6
d. IASPs
The answer is RAID-5.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-17


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 10-79, "Checkpoint (2 of 3)," on page 10-120

Checkpoint solutions (2 of 3)
IBM i
4. Mirroring is a type of disk protection that is implemented through software.
a. RAID-5
b. RAID-6
c. Mirroring
d. ASPs
The answer is mirroring.

5. Mirroring can be implemented at which of the following levels?


a. Disk
b. IOA
c. IOP
d. Bus
e. All of the above
The answer is all of the above.

6. True or False: The ability to access and manage disk units is a function that is
automatically available when you install IBM i Navigator.
The answer is false.

© Copyright IBM Corporation 2012

A-18 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 10-80, "Checkpoint (3 of 3)," on page 10-121

Checkpoint solutions (3 of 3)
IBM i

7. True or False: The OS security officer user ID and password are different from the
service tools security officer user ID and password.
The answer is true.

8. Which of the following is not usually the cause of an abnormal system end?
a. Power failure
b. Disk failure
c. User error
d. Failure of critical IBM i program
The answer is user error.

9. True or False: During a normal IPL, after there has been an abnormal end, the
system determines which access paths need to be rebuilt.
The answer is true.

10. True or False: During an attended IPL, after there has been an abnormal end, the
user is not presented with any options for rebuilding access paths.
The answer is false.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-19


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 11, "Backup and recovery strategy using save/restore"

Solutions for Figure 11-102, "Checkpoint (1 of 3)," on page 11-146

Checkpoint solutions (1 of 3)
IBM i
1. True or False: Ideally, objects on your system should be saved frequently, while they are only
restored infrequently.
The answer is true.

2. Which of the following is not one of the supported basic modes of operation for a tape library?
a. Manual mode
b. Virtual mode
c. Automatic cartridge loader mode
d. Library mode
The answer is virtual mode.

3. The command used to manage the status of your tape devices is WRKCFGSTS.
a. WRKMLBSTS
b. WRKTAPSTS
c. WRKCFGSTS
d. MNGTAPSTS
The answer is WRKCFGSTS.

4. The command used to manage the status of your tape library devices is WRKMLBSTS.
a. WRKMLBSTS
b. WRKTAPSTS
c. WRKCFGSTS
d. MNGTAPSTS
The answer is WRKMLBSTS.
© Copyright IBM Corporation 2012

A-20 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 11-103, "Checkpoint (2 of 3)," on page 11-147

Checkpoint solutions (2 of 3)
IBM i

5. True or False: The SAVCHGOBJ command does not require that any
other command has been previously used if this command is used in
your save strategy.
The answer is false.
6. True or False: The SAVSYSINF command is the new command that is
a replacement for the SAVSYS command.
The answer is false.

7. The command parameter that allows you to save data while users are
still working with that data is SAVACT.
a. ACTDTA
b. SYSDTA
c. ACTSAV
d. SAVACT
The answer is SAVACT.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-21


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 11-104, "Checkpoint (3 of 3)," on page 11-148

Checkpoint solutions (3 of 3)
IBM i

8. True or False: The Restore menu option 21 will perform a


direct opposite of the Save menu option 21. Restore option
21 will restore the entire system.
The answer is false.
9. True or False: It is possible to save all of the user data
across all of the LPARs on a system using one single
command.
The answer is false.
10. True or False: You can use either IBM i or Windows server
utilities or a combination of both to manage backups of
integrated xSeries servers.
The answer is true.

© Copyright IBM Corporation 2012

A-22 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 12, "Journal management"

Solutions for Figure 12-91, "Checkpoint (1 of 6)," on page 12-128

Checkpoint solutions (1 of 6)
IBM i
1. Which of the following is not a valid object that can be journaled?
a. Database files
b. Data area
c. Data queue
d. Root folders
The answer is root folders.

2. A journal is a program that intercepts activity to an object that is being journaled.


a. Journal
b. Journal receiver
c. Trigger
d. Referential constraint
The answer is journal.

3. What is the first object that needs to be created when you start journaling?
a. Journal audit trail
b. Journal receiver
c. Journal
d. Journal access path
The answer is journal receiver.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-23


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 12-92, "Checkpoint (2 of 6)," on page 12-129

Checkpoint solutions (2 of 6)
IBM i

4. Which object contains the images and details of the objects that are being
journaled?
a. Journal audit trail
b. Journal receiver
c. Journal
d. Journal access path
The answer is journal receiver.

5. What is the command used to create the journal?


a. CRTJRN
b. CRTJRNRCV
c. STRJRNAP
d. STRJRNPF
The answer is CRTJRN.

6. True or False: The management of journal receivers is something that must be


done by the database administrator.
The answer is false.
© Copyright IBM Corporation 2012

A-24 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 12-93, "Checkpoint (3 of 6)," on page 12-130

Checkpoint solutions (3 of 6)
IBM i
7. The WRKJRNA command is used to see the attributes associated with your journal.
a. WRKJRN
b. CRTJRN
c. DSPJRNA
d. WRKJRNA
The answer is WRKJRNA.

8. What command is used to review the details of objects being journaled?


a. WRKJRN
b. DSPJRN
c. WRKJRNA
d. DSPJRNA
The answer is DSPJRN.

9. True or False: When displaying journal information, you can specify to only show
transactions performed by a specific program.
The answer is true.

10. True or False: User-generated entries get placed into a journal receiver when the
user selects an option to generate a system message.
The answer is false.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-25


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 12-94, "Checkpoint (4 of 6)," on page 12-131

Checkpoint solutions (4 of 6)
IBM i

11. True or False: When a bad batch of transactions is performed against an object
being journaled, the only way to bring that object back to a good point is to restore
that object off of your backup media and rekey a good batch of records.
The answer is false.

12. True or False: When performing a forward recovery, the system assists you with
the recovery of journaled objects by prompting you with the missing object name.
The answer is true.

13. True or False: Journaling and saving changed objects are two recovery methods
that cannot be used together or at the same time with the same objects.
The answer is false.

14. Which of the following is the command used to save those objects that have
changed since the last time that object was changed.
a. SAVLIBCHG
b. SAVOBJCHG
c. SAVCHGOBJ
d. SAVCHGLIB
The answer is SAVCHGOBJ.

© Copyright IBM Corporation 2012

A-26 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Solutions for Figure 12-95, "Checkpoint (5 of 6)," on page 12-132

Checkpoint solutions (5 of 6)
IBM i

15. True or False: Objects that have a high change volume are prime
candidates that should be journaled.
The answer is true.

16. True or False: For the best performance on your system, it is better to
have just one journal for all of the objects being journaled on the
system.
The answer is true.

17. True or False: Journaled files must be in the same library ASP as the
journaled file.
The answer is false.

18. True or False: The following are all valid transport mechanisms for
remote journaling: OptiConnect, TCP/IP, SNA, and ATM.
The answer is true.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-27


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 12-96, "Checkpoint (6 of 6)," on page 12-133

Checkpoint solutions (6 of 6)
IBM i

19. True or False: Remote journaling cannot be set up through IBM


System i Navigator.
The answer is false.

20. True or False: Access path protection will cut down on the amount of
time it takes a system to IPL after an abnormal system end.
The answer is true.

21. True or False: Journaling can also be used to protect access paths.
The answer is true.

22. True or False: At IPL time, the system will show you a screen that lists
all of those objects whose access paths are being protected
(journaled) and have already been recovered (basically, a screen to
show you what has already be recovered).
The answer is false.

© Copyright IBM Corporation 2012

A-28 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 13, "Commitment control: Overview"

Solutions for Figure 13-27, "Checkpoint," on page 13-37

Checkpoint solutions
IBM i

1. True or False: Programming changes must be made to an


application in order to implement commitment control.
The answer is true.

2. True or False: Commitment control requires that journaling


be implemented for the objects that are used by this
application.
The answer is true.

3. True or False: Commitment control allows you to recover


only those transactions that are considered a whole or
complete transaction.
The answer is false.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-29


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Unit 14, "Backup and recovery planning"

Solutions for Figure 14-17, "Checkpoint," on page 14-45

Checkpoint solutions
IBM i

1. True or False: Information that changes frequently is something that


should be saved on a weekly basis.
The answer is false.

2. True or False: The LIC and all of the Q libraries should be saved on a
daily basis.
The answer is false.

3. Which of the following is not one of the save strategies that was
covered in the lecture?
a. Simple
b. Medium
c. Full
d. Complex
The answer is full.

© Copyright IBM Corporation 2012

A-30 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 15, "Problem determination"

Solutions for Figure 15-56, "Checkpoint (1 of 2)," on page 15-61

Checkpoint solutions (1 of 2)
IBM i
1. True or False: The process of finding out exactly what is the problem is problem
source identification.
The answer is false.
2. The two classifications of problem symptoms are:
a. Messages
b. External symptoms
c. SRC
d. Internal symptoms
The answers are external symptoms and internal symptoms.
3. The command to work with all of the active jobs on the IBM Power System with
IBM i is:
a. WRKJOB
b. WRKACTJOB
c. WRKSBMJOB
d. WRKSPLJOB
The answer is WRKACTJOB.
4. True or False: When displaying your job’s run attributes you can select the F9 key
to change your job.
The answer is true.
5. True or False: If your job has not ended after five minutes, you can submit the
ENDJOBABN command.
The answer is false.
© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-31


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 15-57, "Checkpoint (2 of 2)," on page 15-62

Checkpoint solutions (2 of 2)
IBM i

6. True or False: Choosing the Active Jobs branch in IBM i Navigator is


equivalent to using the WRKACTJOB command on the green screen.
The answer is true.

7. True or False: Only the system operator can make changes to a


user’s job.
The answer is false.

8. True or False: The preferred method to shut down an IBM Power


System with IBM i is to use the power switch.
The answer is false.

9. True or False: The CLEANUP program will always run automatically


on your system at midnight.
The answer is false.

10. True or False: A programmer can update the CLEANUP program to


perform whatever user activities the programmer decides to add.
The answer is true.
© Copyright IBM Corporation 2012

A-32 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Unit 16, "Introduction to Backup Recovery and Media Services"

Solutions for Figure 16-38, "Checkpoint (1 of 2)," on page 16-43

Checkpoint solutions (1 of 2)
IBM i

1. True or False: If you only need to save and restore your data, you only need to
install the *Base BRMS software.
The answer is true.

2. True or False: In order to do software encryption as part of your save, you would
need to install BRMS Option 1: Networking software.
The answer is false.

3. True or False: BRMS requires that all of the volumes that it is going to manage
must have a unique volume ID.
The answer is true.

4. True or False: BRMS will work systems that are part of an SAN.
The answer is true.

5. True or False: BRMS provides support to do backup and recovery as well as


archive and retrieval.
The answer is true.

© Copyright IBM Corporation 2012

© Copyright IBM Corp. 1995, 2012 Appendix A. Checkpoint solutions A-33


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Solutions for Figure 16-39, "Checkpoint (2 of 2)," on page 16-44

Checkpoint solutions (2 of 2)
IBM i

6. True or False: BRMS gets installed as a default for IBM i Navigator.


The answer is false.

7. True or False: IBM i Navigator will have a different look and feel
depending on what version and release is installed.
The answer is true.

8. True or False: The BRMS home page has useful links to help you
learn how to use this software to its maximum potential.
The answer is true.

© Copyright IBM Corporation 2012

A-34 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Appendix B. Security tips and checklists

Security tips

Helpful hints

Note

Be careful of the keylock position.

OPERATION MAN NORM AUTO SEC


Manual load of
Yes No No No
the system
Manual control of
Yes No No No
functions
Automatic
No Yes Yes No
operations
PWRDWNSYS at
Yes Yes Yes Yes
a workstation
Power off by
Yes No No No
power switch
Power on by
Yes Yes No No
power switch
Load the system Yes No No No
Alternate load of
Yes No No No
system
Perform DST
Yes No No No
functions

Security exposures
What should I look for to close possible security exposures?
• Users with *ALLOBJ authority
• Users with *SERVICE authority
• Group profiles with *ALLOBJ or *SERVICE special authority
• Programs that adopt an owner with *ALLOBJ authority

© Copyright IBM Corp. 1995, 2012 Appendix B. Security tips and checklists B-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Libraries with public authority. *READ on the library allows the public authority to find
any object in the library

Preventing system request usage


There are two methods available to prevent system usage requests:
• You may prevent individual options by revoking authority to the subject commands
GRTOBJAUT TFRSECJOB *CMD USER *EXCLUDE
or
RVKOBJAUT TFRSECJOB *CMD *PUBLIC *ALL
GRTOBJAUT TFRSECJOB *CMD BEAR *USE

Note

If you revoke authority to commands (for example, SIGNOFF), you should provide an
adoptive program that performs that function.

• You may prevent all options by revoking authority to the system request menu
GRTOBJAUT QGMNSYSR *PNLGRP USER *EXCLUDE
or
RVKOBJAUT QGMNSYSR *PNLGRP *PUBLIC *ALL
GRTOBJAUT QGMNSYSR *PNLGRP BEAR *USE

Notification queue
Use the command CRTMSGQ QSYSMSG to create a message queue in QSYS.
If QSYSMSG message queue exists, i5/OS sends messages about important system
events.
•CPF1397 Signon limit exceeded
•CPF1269 Invalid EVOKE request
•CPI9014 DIA log-on failed
•CPF0907 Storage threshold warning
•CPI0955 System ASP storage exceeded
•CPI0954 ASP storage limit exceeded
Put the message queue in *BREAK mode at security console and build a break handling
CL program to handle anticipated problems.

B-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Securing spool files


Users should be allowed to view ONLY their output in queues.
• CRTOUTQ command: DSPDTA *NO
Some users may be allowed to display other's output.
• CRTOUTQ command: OPRCTL *YES, DSPDTA *NO
• Assign SPCAUT(*JOBCTL) in user profile
• Can secure users with *JOBCTL by specifying *NO for DSPDTA and OPRCTL on
OUTQ.

Note

Watch out for users with *SPLCTL authority.

Securing production programs


Source code for programs cannot be secured individually.
Compiled programs may be secured individually.
To secure production source code:
• *USE authority to programmers on source file
• *PUBLIC *EXCLUDE authority

QSECOFR password
Lock hardcopy in safe/desk.
More than one person with password.
Program to reset password.
Create CL program.
PGM
CHGUSRPRF USRPRF(QSECOFR) PASSWORD(QSECOFR)
ENDPGM
• Compile under QSECOFR profile
• Create RESET user profile
• Add Reset PGM to profile as INLPGM
• Make INLMNU parameter in profile *SIGNOFF

© Copyright IBM Corp. 1995, 2012 Appendix B. Security tips and checklists B-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security monitoring
Regularly monitor the status of primary security controls.
• System values
- QSECURITY and QMAXSIGN
• Keylock position
• Critical profiles
- User profiles with special authorities such as *ALLOBJ
- User profiles with PASSWORD(*NONE)
- Use the DSPAUTUSR and DSPUSRPRF commands
• Critical objects
- Production libraries containing source programs and files
- QSYS, QUSRSYS, QHLPSYS libraries should specify *PUBLIC *USE
• Journals and History Logs
- DSPLOG QHST: Look for messages in CPF2200 range
- For QAUDLVL *AUTFAIL, or *PGMFAIL, check journal entry type AF
- PRTSBSDAUT, PRTSYSSECA, PRTCMNSEC, PRTJOBDAUT, DSPSECAUD,
DSPAUDJRNE, CHGSECAUD

User profile monitoring


DSPAUTUSR SEQ(*GRPPRF) OUTPUT(*PRINT)
DSPOBJD OBJ(*ALL) OBJTYPE(*USRPRF)
OUTPUT(*PRINT) DETAIL(*BASIC)
DSPUSRPRF USRPRF(name) TYPE(*BASIC)
OUTPUT(*PRINT)
DSPUSRPRF USRPRF(name) TYPE(*ALL)
OUTPUT(*PRINT)
PRTPVTAUT, ANZDFTPWD, DSPACTPRFL, CHGACTPRFL, ANZPRFACT,
DSPACTSCD, CHGACTSCDE, DSPEXPSCD, CHGEXPSCDE, PRTUSRPRF

Library and object inspection


DSPOBJD OBJ(*ALL) OBJTYPE(*LIB)
OUTPUT(*PRINT)
DSPLIB LIB(name) OUTPUT(*PRINT)
DSPOBJAUT OBJ(lib-name) OBJTYPE(*LIB)
OUTPUT(*PRINT)
PRTUSROBJ, CHKOBJITG, PRTQAUT, PRTPUBAUT

B-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Selected program inspection


DSPPGMADP USRPRF(name) OUTPUT(*PRINT)
DSPOBJAUT OBJ(lib/object) OBJTYPE(*PGM)
OUTPUT(*PRINT)
DSPOBJD OBJ(lib-name) OBJTYPE(*LIB)
OUTPUT(*PRINT) DETAIL(*FULL)
PRTADPOBJ

Recommendations
• Use *PUBLIC authority where possible
• Use library security to secure an object
• Make group profiles the owners of objects
• Use EITHER authorization lists OR private authorities to secure an object, not both
• Use a combination of strategies
- Menu security
- Library security
- Object security
• Isolate programmers from production
• Use consistent naming conventions
• Set and monitor security type system values
• Implement password management
• Monitor physical security regularly
• Use system-supplied journaling as basis for audits

Security checklist
An organization can implement items from the following list that meet its security
requirements.
Physical security
• Physical access to the system console is restricted
• Offline backup media are protected from damage and theft
• Security officer signon is limited to specific devices
System value QLMTSECOFR(1) will restrict users with *ALLOBJ or *SERVICE special
authority to specific devices
• Key removed from system console and stored in a secure location

© Copyright IBM Corp. 1995, 2012 Appendix B. Security tips and checklists B-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Security policy
• Change the system value QSECURITY to 30 or 40 to activate resource security
• Employees are removed from the system immediately upon notification of transfer or
termination
• Programmers are restricted from production libraries.
• *USE authority allows access to objects but does not allow creation of new objects in
library
• Owners of objects annually verify the authorized users including *PUBLIC access
• Management annually verifies the users authorized to the system.
Password controls
• The IBM-supplied profiles have their password changed
• The IBM-dedicated service passwords are changed
• Password expiration active
• System value QPWDEXPITV(60) requires users to change their password every 60
days
• Trivial passwords are prevented by selecting QPWDxxxx system values
• Users do not share a common password
• Limit user signon to one device at a time
System value QLMTDEVSSN(1) limits users to one signed-on device.
Programs
• Programs prevent use of DEBUG facilities to change variables by removing *ADD
authority
• The source for programs is captured when programs are moved into the production
environment. The source is used to create the version of the program that is placed into
production
• Specify SECURE(*YES) on override statements to prevent the file name being
redirected to another file
• Control the library list in applications to prevent a library that contains a trojan horse
object being added before the production libraries

B-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP • Programs that adopt are only used when required.


- Use the Display Program Adopt (DSPPGMADP) command to detect any programs
that adopt critical profiles.
- Inspect adopting programs to prevent the user of the program from excess function,
for example, command entry while running under the adopted profile.
- Program adoption should only be used at the lower invocation levels. Adoption at a
high invocation level relinquishes the rights of the program owner in several
programs and increases the possibility for an unqualified reference.
- The programs adopt the minimum authority level needed. For example, the owner's
profile for the object is adopted, rather than the QSECOFR profile.
User profiles
• Each user is assigned a unique profile.
• The only change users can make to their profile is to change the password. Allowing
users to define their own password reduces the need for the user to write down the
password.
• Users that are limited to menus have LMTCPB(*YES) specified to prevent override of
initial program or initial menu at signon. This also restricts use of commands on system
menus.
• Users that are limited to menus have no menu option that allows entry of commands.
• The security officer profile or user with *ALLOBJ special authority is not a group profile.
If other profiles have the QSECOFR as a group profile, then these profiles should be
controlled in a tight security environment.
• Group profiles are identified with a naming convention.
• The naming convention GRPxxx for group profiles makes it apparent that multiple users
are authorized when the group profile name is shown on a list of authorized users.
Authorization control
• Owners of data understand their obligation to authorize users on a need-to-know basis.
• Data is not overprotected.
System performance is improved when *PUBLIC authority is used for objects that do
not justify protection. This also saves time during the backup of the system (SAVSYS or
SAVSECDTA).
• Sensitive data is not public.
• Authorization lists are used for physical files with multiple members.
• Job descriptions with *PUBLIC authority specify USER(*RQD).
• Job descriptions that specify a user profile name are authorized to specific users.
• System call-level interfaces corresponding to commands are secured when command
is secured. See appendix in Security Reference (SC41-5302).

© Copyright IBM Corp. 1995, 2012 Appendix B. Security tips and checklists B-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Auditing access
• Activate logging of security relevant events.
System value QAUDJRN should be *AUTHFAIL *SECURITY *SAVRST; use of
*DELETE is optional.
• Entries in audit journal that report authorization failures are reviewed for repeated
offenders.
• Restrict profiles with *ALLOBJ authority to menu options that record commands entered
in audit journal.
• Periodically review changes to user profiles.
Use the OUTFILE option on DSPUSRPRF to detect changes in security structure.
• System value QMAXSIGN limits number of access attempts.
• Message queue QSYSMSG is created in library QSYS and monitored.
• The message CPF1116 shown when the user is about to exceed the retry limit for
passwords appears the same as the invalid password message CPF1107. This
prevents the user from knowing the next attempt notifies the security officer.
Communications
• Dial-in support is protected by call-back procedures.
• Encryption is used on sensitive data.
• Subsystems prevent the user of default user DFTUSR so that user ID is required to
start a session.

B-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Appendix C. Sample security tools reports

© Copyright IBM Corp. 1995, 2012 Appendix C. Sample security tools reports C-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Print System Security Attributes (PRTSYSSECA)

C-2
System Security Attributes Page 1

5761SS1 V6R1M0 080215 I520DVL2 10/01/08 21:33:06 EDT


System Value
Name Current value Recommended value
Student Notebook

QALWOBJRST *ALL *NONE


QALWUSRDMN *ALL QTEMP
QATNPGM QEZMAIN QSYS *NONE
QAUDENDACN *NOTIFY *NOTIFY
QAUDFRCLVL *SYS *SYS
QAUDCTL *NONE *AUDLVL *OBJAUD

i System Administration
*NOQTEMP
QAUDLVL *NONE *AUTFAIL *CREATE
*DELETE *SECURITY
*SAVRST
QAUTOCFG 1 0
QAUTORMT 1 0
QAUTOVRT 300 0
QCMNRCYLMT 0 0 0 0
QCRTAUT *CHANGE Control at library level.
QCRTOBJAUD *NONE Control at library level.
QDEVRCYACN *DSCMSG *DSCMSG
QDSCJOBITV 240 120
QDSPSGNINF 0 1
QINACTITV *NONE 60
QINACTMSGQ *ENDJOB *ENDJOB
QLMTDEVSSN 0 1
QLMTSECOFR 0 1
QMAXSIGN 3 3
QPWDEXPITV *NOMAX 60
QPWDLMTCHR *NONE AEIOU@$#
QPWDLMTREP 0 1
QPWDLVL 0

without the prior written permission of IBM.


JOBACN *FILE *REJECT
PCSACC *OBJAUT *REJECT
.
.

Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


* * * * * E N D O F L I S T I N G * * * * *

© Copyright IBM Corp. 1995, 2012


AP
V7.0

Print User Profile Information Output (PRTUSRPRF)


User Profile Information Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/01/08 21:44:31 EDT
Report type . . . . . . . . . : *AUTINFO
Select by . . . . . . . . . . : *SPCAUT
Special authorities . . . . . : *ALL
-------------Special Authorities-------------
*IO Group
User Group *ALL *AUD SYS *JOB *SAV *SEC *SER *SPL User Group Authority Limited
Profile Profiles OBJ IT CFG CTL SYS ADM VICE CTL Class Owner Authority Type Capability
AMY *NONE X X X X X X X X *SECOFR *USRPRF *NONE *PRIVATE *NO
DB2XML *NONE *USER *USRPRF *NONE *PRIVATE *NO
MDUNTITLED *NONE X X *USER *USRPRF *NONE *PRIVATE *NO
MRADMIN *NONE X X *USER *USRPRF *NONE *PRIVATE *NO
OL50GROUP *NONE *USER *USRPRF *NONE *PRIVATE *NO

© Copyright IBM Corp. 1995, 2012


OL5001 X *SECADM *USRPRF *NONE *PRIVATE *NO
OL50GROUP
OL5002 X *SECADM *USRPRF *NONE *PRIVATE *NO
OL50GROUP
OL5003 X *SECADM *USRPRF *NONE *PRIVATE *NO
OL50GROUP
* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Course materials may not be reproduced in whole or in part
Appendix C. Sample security tools reports
C-3
Student Notebook
Display Authorized Users (DSPAUTUSR)

C-4
SEQ(*USRPRF)
Display Authorized Users Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/01/08 22:07:48 EDT
Password Level Level Local
User Group Last No 0 or 1 2 or 3 Netserver Pwd
Profile Profile Changed Password Password Password Password Mgt Text
AMY 01/30/08 *YES *YES *YES *YES Amy Cox
Student Notebook

DB2XML 01/17/08 X *NO *NO *NO *YES 5722DE1 - XML EXT


DUNTITLED 05/14/08 X *NO *NO *NO *YES IBM DB2 WEB QUERY
MRADMIN 05/14/08 X *NO *NO *NO *YES IBM DB2 WEB QUERY
OL50GROUP 09/02/08 X *NO *NO *NO *YES Used in Security lab
OL5001 OL50GROUP 09/02/08 *YES *YES *YES *YES System Admin & Ctl cls
OL5002 OL50GROUP 09/28/08 *YES *YES *YES *YES System Admin & Ctl cls

i System Administration
* * * * * E N D O F L I S T I N G * * * * *
SEQ(*GRPPRF)
Display Authorized Users Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/01/08 22:09:05 EDT
Password Level Level Local
Group User Last No 0 or 1 2 or 3 Netserver Pwd
Profile Profile Changed Password Password Password Password Mgt Text
AS24GR 03/03/08 *YES *YES *YES *YES Group Prf AS24
AS24B01 03/03/08 *YES *YES *YES *YES User prf AS24 Web labs
AS24B02 03/03/08 *YES *YES *YES *YES User prf AS24 Web labs
AS24ERIK 03/03/08 *YES *YES *YES *YES SysOpr - prob det prf
AS24MARIA 03/03/08 *YES *YES *YES *YES SysOpr - prob det prf
AS2401 04/09/08 *YES *YES *YES *YES User QSYSOPR prf AS240
AS2402 03/03/08 *YES *YES *YES *YES User QSYSOPR prf AS240
OL50GROUP 09/02/08 X *NO *NO *NO *YES Used in Security lab
OL5001 09/02/08 *YES *YES *YES *YES System Adm & Ctl
OL5002 09/28/08 *YES *YES *YES *YES System Adm & Ctl
OL5003 09/02/08 *YES *YES *YES *YES System Adm & Ctl
* * * * * E N D O F L I S T I N G * * * *

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
AP
V7.0

Print Adopted Object Information Output (PRTADPOBJ)


SEQ(*USRPRF)
Adopting Objects by User Profile (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/01/08 22:41:11 EDT
User profile . . . . . . . . . : DB2XML
Special authorities . . . . . : *NONE
---------------Object--------------- ----------------Library----------------
Public ASP Public Private
Name Type Authority Name Device Authority Authorities
QZXMADM *PGM *USE QDBXM *SYSBAS *USE N
DESAPISP *PGM *EXCLUDE QDB2TX *SYSBAS *USE Y
DESLSSTX *SRVPGM *EXCLUDE QDB2TX *SYSBAS *USE N
DESSVAPI *SRVPGM *EXCLUDE QDB2TX *SYSBAS *USE N
QYPECHGO *PGM *USE QSYS *SYSBAS *USE N
QYPECRTP *PGM *EXCLUDE QSYS *SYSBAS *USE Y

© Copyright IBM Corp. 1995, 2012


QYPEDLTP *PGM *EXCLUDE QSYS *SYSBAS *USE Y
MYMESSAGES *PGM *USE MYSYSTEMI *SYSBAS *USE N
MYPWDRESET *PGM *CHANGE MYSYSTEMI *SYSBAS *USE N
MYSTATUS *PGM *USE MYSYSTEMI *SYSBAS *USE N
QNSCREA *PGM USER DEF QSMU *SYSBAS *USE N
QNSCRHA *PGM USER DEF QSMU *SYSBAS *USE N
QNSCRMON *PGM *USE QSMU *SYSBAS *USE N
* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Course materials may not be reproduced in whole or in part
Appendix C. Sample security tools reports
C-5
Student Notebook
Check Default Passwords Output (ANZDFTPWD)

C-6
User profiles with default passwords. Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/01/08 23:38:38 EDT
Action taken against profiles . . . . . . : *NONE
User
Profile STATUS PWDEXP Text
Student Notebook

AS24ERIK *ENABLED *NO System Operatior Workshop - prob


AS24GR *ENABLED *NO Group Profile used for S6229/AS24
AS24MARIA *ENABLED *NO System Operatior Workshop - prob.
* * * * * E N D O F L I S T I N G * * * * *

i System Administration

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
AP
V7.0

Print Private Authorities Output (PRTPVTAUT)


Private Authorities (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 00:09:20 EDT
Library . . . . . . . . . . . : QSYS
*PUBLIC authority . . . . . : *USE
Object type . . . . . . . . . : *LIB
ASP device . . . . . . . . . . : *SYSBAS
Primary Auth ----------Object----------- ------------Data------------
Object Owner Group List User Authority Opr Mgt Exist Alter Ref Read Add Upd Dlt Execute
AMYLIB QSECOFR *NONE *NONE *PUBLIC *CHANGE X X X X X X
QSECOFR *ALL X X X X X X X X X X

AS06V5LIB QDFTOWN *NONE *NONE *PUBLIC *CHANGE X X X X X X


QDFTOWN *ALL X X X X X X X X X X

© Copyright IBM Corp. 1995, 2012


AS06GROUP0 *USE X X X
AS06000 *ALL X X X X X X X X X X
EJJACKS *ALL X X X X X X X X X X
OL50LIB QSECOFR *NONE ADMLIST *PUBLIC *CHANGE X X X X X X
QSECOFR *ALL X X X X X X X X X X
OL5001 OL5001 *NONE ADMLIST *PUBLIC *CHANGE X X X X X X
OL5001 *ALL X X X X X X X X X X
PROG5001 *ALL X X X X X X X X X X
OL5002 OL5002 *NONE *NONE *PUBLIC *CHANGE X X X X X X
OL5002 *ALL X X X X X X X X X X

* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Course materials may not be reproduced in whole or in part
Appendix C. Sample security tools reports
C-7
Student Notebook
Print Publicly Authorized Objects Output (PRTPUBAUT)

C-8
Publicly Authorized Objects (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 00:24:07 EDT
Object type . . . . . . . . . : *PGM
Specified library . . . . . . : OL50LIB
Student Notebook

ASP Auth ----------Object----------- ------------Data------------


Library Object Device Owner List Authority Opr Mgt Exist Alter Ref Read Add Upd Dlt Execute
OL50LIB BLDJRN *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB DST *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB LAB3 *SYSBAS QSECOFR *NONE *CHANGE X X X X X X

i System Administration
OL50LIB LAB3X *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB LAB7 *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB PDDEMO *SYSBAS QSECOFR *NONE *USE X X X
OL50LIB PROBDET *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB SAVEOL50 *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB SIGNON *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB TEST *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB USRENT *SYSBAS QSECOFR *NONE *CHANGE X X X X X X
OL50LIB VER *SYSBAS EJJACKS *NONE *CHANGE X X X X X X
* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
AP
V7.0

Print Communications Info Output (PRTCMNSEC)


Communications Information (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 00:26:46 EDT
Object type . . . . . . . . . : *DEVD
Pre SNUF
Object Object Device Secure Location APPN Single Establish Program
Name Type Category Location Password Capable Session Session Start
DSP01 *DEVD *DSP
I520DVL2 *DEVD *DSP
OPT01 *DEVD *OPT
OPT02 *DEVD *OPT
PRODETCP *DEVD *NET
PRT01 *DEVD *PRT
QCONSOLE *DEVD *DSP
QESPAP *DEVD *APPC *NO *NO *NO *YES *NO

© Copyright IBM Corp. 1995, 2012


QIAPRT *DEVD *HOST
TAPMLB02 *DEVD *MLB
TAPVRT01 *DEVD *TAP
TAP01 *DEVD *TAP
VRTOPT01 *DEVD *OPT
VTAPDEV01 *DEVD *TAP
V6R1PRT *DEVD *PRT
CTL01 *CTLD *LWS *YES *NO 0 0 DSP01
PRODENET *CTLD *NET *YES *NO 0 0 PRODETCP
QCTL *CTLD *LWS *YES *NO 0 0 QCONSOLE
QESCTL *CTLD *HOST *YES *YES *DIAL 0 0 QESPAP
QPACTL01 *CTLD *VWS *YES *NO 0 0 PADEV000B
QTICTL *CTLD *HOST *YES *YES *DIAL 0 0 QTIDA
QVIRCD0001 *CTLD *VWS *YES *NO 0 0 SLOPEZIA1
QVIRCD0002 *CTLD *VWS *YES *NO 0 0 *NONE

* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Course materials may not be reproduced in whole or in part
Appendix C. Sample security tools reports
C-9
Student Notebook
Print JOBD authority Output (PRTJOBDAUT)
Job Descriptions with Excess Authority (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 00:42:57 EDT
Specified library . . . . . . : *ALLUSR
------------------Special Authorities------------------
Job ASP User *ALL *AUD *IOSYS *JOB *SAV *SEC *SER *SPL
Library Description Device Owner Profile OBJ IT CFG CTL SYS ADM VICE CTL
AS24 APBATCH *SYSBAS QSECOFR AS24MARIA X X X
FACLIB FACJOBD *SYSBAS QSECOFR QPGMR X X
Student Notebook

FACLIB FACJOBDXX *SYSBAS QSECOFR QPGMR X X


MYSYSTEMI MYEXAMPLE *SYSBAS QPGMR QCPMGTDIR
MYSYSTEMI MYSYSTEMI *SYSBAS QPGMR QPGMR X X
QGPL QCTXFORM *SYSBAS QSYS QUSER
QGPL QSPLAFPW *SYSBAS QSPL QSPLJOB
QGPL QSPLDBR *SYSBAS QSPL QSPLJOB

C-10 i System Administration


QGPL QSPLDKTR *SYSBAS QSPL QSPLJOB
QGPL QSPLDKTW *SYSBAS QSPL QSPLJOB
QGPL QSPLPRTW *SYSBAS QSPL QSPLJOB
QGPL QSPLRMTW *SYSBAS QSPL QSPLJOB
QGPL QSPLSTRWTR *SYSBAS QSPL QSPLJOB
QUSRSYS QTMSMTPS *SYSBAS QSYS QTCP X
* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
AP
V7.0

Print Queue Authority Output (PRTQAUT)


Queue Authority (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 17:25:40 EDT
Specified library . . . . . . : *ALL
Library Object Type Owner Authority DSPDTA OPRCTL AUTCHK
AS24 OPROUTQ *OUTQ QSECOFR *EXCLUDE *NO *YES *OWNER
AS24 OPROUTQ2 *OUTQ QSECOFR *EXCLUDE *NO *YES *OWNER
AS28LIB BRMSOUTQ *OUTQ QSECOFR *USE *NO *YES *OWNER
AS28LIB ADDMED *JOBQ SLOPEZ *USE *NONE *YES *OWNER
LIB5001 OUTQ01 *OUTQ SLOPEZ *USE *NO *YES *OWNER
MYSYSTEMI MYSYSTEMI *OUTQ QPGMR *USE *NO *NO *DTAAUT
OE98V8LIB OE98OUTQ *OUTQ QSECOFR *ALL *NO *YES *OWNER
OL50LIB OL50 *OUTQ QSECOFR *CHANGE *NO *YES *OWNER
OL51LIB OL51 *OUTQ QDFTOWN *CHANGE *NO *YES *OWNER
QBRM Q1ABRMNET *JOBQ QBRMS *USE *NONE *YES *OWNER
QBRM Q1ACTLSBS *JOBQ QBRMS *CHANGE *NONE *YES *OWNER

© Copyright IBM Corp. 1995, 2012


QDP4 QZSNDPR *JOBQ QSYS *USE *NONE *YES *OWNER
QGPL QPRINT *OUTQ QPGMR *USE *NO *YES *OWNER
QGPL QPRINTS *OUTQ QPGMR *USE *NO *YES *OWNER
QGPL QPRINT2 *OUTQ QPGMR *USE *NO *YES *OWNER
QGPL V6R1PRT *OUTQ LINDAM *USE *NO *YES *OWNER
QGPL QBASE *JOBQ QPGMR *USE *NONE *YES *OWNER
QGPL QBATCH *JOBQ QPGMR *USE *NONE *YES *OWNER
QGPL QFNC *JOBQ QFNC *USE *NONE *YES *OWNER
QGPL QINTER *JOBQ QPGMR *USE *NONE *YES *OWNER
QGPL QPGMR *JOBQ QPGMR *USE *NONE *YES *OWNER
QGPL QSNADS *JOBQ QSNADS *USE *NONE *YES *OWNER
QGPL QSPL *JOBQ QPGMR *USE *NONE *YES *OWNER
QGPL QTXTSRCH *JOBQ QPGMR *USE *NONE *YES *OWNER
QHTTPSVR QZHBHTTP *JOBQ QSYS *USE *NONE *YES *OWNER
QIJS QIJSOUTQ *OUTQ QIJS *USE *NO *YES *OWNER
QIJS QIJSSCD *JOBQ QIJS *USE *NONE *YES *OWNER
QRCL QSPRCLOUTQ *OUTQ QSYS *USE *OWNER *NO *OWNER
QUSRRDARS ONDERR *OUTQ QRDARS400 *USE *NO *YES *OWNER
QUSRRDARS ONDPROC *OUTQ QRDARS400 *USE *NO *YES *OWNER
QUSRRDARS QRDARS400 *OUTQ QRDARS400 *EXCLUDE *NO *YES *OWNER
QUSRSYS PRT01 *OUTQ LINDAM *CHANGE *NO *YES *OWNER
QUSRSYS QEZDEBUG *OUTQ QSYS *USE *NO *YES *OWNER
QUSRSYS QEZJOBLOG *OUTQ QSYS *USE *NO *YES *OWNER
QUSRSYS QTPPPOUTQ *OUTQ QSYS *USE *NO *YES *DTAAUT
QUSRSYS QVPN01IBM1 *OUTQ QTCP *USE *NO *YES *DTAAUT

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


QWAS6 QWASOUTQ *OUTQ QSYS *USE *NO *YES *OWNER
QWAS6 QWASJOBQ *JOBQ QSYS *USE *NONE *YES *OWNER
* * * * * E N D O F L I S T I N G * * * * *

Course materials may not be reproduced in whole or in part


Appendix C. Sample security tools reports
Student Notebook

C-11
Print Subsystem Description Output (PRTSBSDAUT)
Subsystem Description (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 17:36:39 EDT
Specified library . . . . . . : *ALL
Default ------------------Special Authorities------------------
Subsystem Subsystem ASP Subsystem User *ALL *AUD *IOSYS *JOB *SAV *SEC *SER *SPL
Library Name Device Owner Profile OBJ IT CFG CTL SYS ADM VICE CTL
Student Notebook

QBRM Q1ABRMNET *SYSBAS QBRMS QBRMS


QINMEDIA QSYSWRK *SYSBAS QSYS QUSER
QINMEDIA QSYSWRK *SYSBAS QSYS QPM400 X X
QINMEDIA QSYSWRK *SYSBAS QSYS QPM400 X X
QINSYS QCMN *SYSBAS QSYS QUSER
QINSYS QCMN *SYSBAS QSYS QIJS

C-12 i System Administration


QINSYS QCMN *SYSBAS QSYS QBRMS
QINSYS QSYSWRK *SYSBAS QSYS QUSER
QINSYS QSYSWRK *SYSBAS QSYS QPM400 X X
QINSYS QSYSWRK *SYSBAS QSYS QIJS
QINSYS QSYSWRK *SYSBAS QSYS QPM400 X X
QSYS QCMN *SYSBAS QSYS QBRMS
QSYS QCMN *SYSBAS QSYS QIJS
QSYS QCMN *SYSBAS QSYS QUSER
QSYS QSYSWRK *SYSBAS QSYS QUSER
QSYS QSYSWRK *SYSBAS QSYS QPM400 X X
QSYS QSYSWRK *SYSBAS QSYS QIJS
QSYS QSYSWRK *SYSBAS QSYS QPM400 X X
* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
AP
V7.0

Print Trigger Program Putput (PRTTRGPGM)


Trigger Programs (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 17:41:10 EDT
Specified library . . . . . . : *ALL
Allow
ASP --------------------------------------Trigger--------------------------------------- Repeated
Library File Device Name Type Library Program Time Event Condition Change

QRECOVERY QADBERAP *SYSBAS Q__QRECOVERY_QADBE > *SYS QSYS QDBERAPTRG Before Update Change Yes
QSYS QADBCCST *SYSBAS Q__QSYS_QADBCCST__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBCCST *SYSBAS Q__QSYS_QADBCCST__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBCCST *SYSBAS Q__QSYS_QADBCCST__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBFCST *SYSBAS Q__QSYS_QADBFCST__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBFCST *SYSBAS Q__QSYS_QADBFCST__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBFCST *SYSBAS Q__QSYS_QADBFCST__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBFDEP *SYSBAS Q__QSYS_QADBFDEP__ > *SYS QSYS QDBXESND After Insert Yes

© Copyright IBM Corp. 1995, 2012


QSYS QADBFDEP *SYSBAS Q__QSYS_QADBFDEP__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBFDEP *SYSBAS Q__QSYS_QADBFDEP__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBIFLD *SYSBAS Q__QSYS_QADBIFLD__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBIFLD *SYSBAS Q__QSYS_QADBIFLD__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBIFLD *SYSBAS Q__QSYS_QADBIFLD__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBKFLD *SYSBAS Q__QSYS_QADBKFLD__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBKFLD *SYSBAS Q__QSYS_QADBKFLD__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBKFLD *SYSBAS Q__QSYS_QADBKFLD__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBPKG *SYSBAS Q__QSYS_QADBPKG___ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBPKG *SYSBAS Q__QSYS_QADBPKG___ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBPKG *SYSBAS Q__QSYS_QADBPKG___ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBXMQT *SYSBAS Q__QSYS_QADBXMQT__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBXMQT *SYSBAS Q__QSYS_QADBXMQT__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBXMQT *SYSBAS Q__QSYS_QADBXMQT__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBXREF *SYSBAS Q__QSYS_QADBXREF__ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBXREF *SYSBAS Q__QSYS_QADBXREF__ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBXREF *SYSBAS Q__QSYS_QADBXREF__ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBXSFLD *SYSBAS Q__QSYS_QADBXSFLD_ > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBXSFLD *SYSBAS Q__QSYS_QADBXSFLD_ > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBXSFLD *SYSBAS Q__QSYS_QADBXSFLD_ > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBXTRIGB *SYSBAS Q__QSYS_QADBXTRIGB > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBXTRIGB *SYSBAS Q__QSYS_QADBXTRIGB > *SYS QSYS QDBXESND After Update Change Yes
QSYS QADBXTRIGB *SYSBAS Q__QSYS_QADBXTRIGB > *SYS QSYS QDBXESND After Delete Yes
QSYS QADBXTRIGC *SYSBAS Q__QSYS_QADBXTRIGC > *SYS QSYS QDBXESND After Insert Yes
QSYS QADBXTRIGC *SYSBAS Q__QSYS_QADBXTRIGC > *SYS QSYS QDBXESND After Update Change Yes

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


.
.
.
.

Course materials may not be reproduced in whole or in part


.
* * * * * E N D O F L I S T I N G * * * * *

Appendix C. Sample security tools reports


Student Notebook

C-13
Print User Objects Output (PRTUSROBJ)
User Objects (Full Report) Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 18:02:06 EDT
Specified library . . . . . . : OL50LIB
ASP
Library Object Type Device Attribute Owner Description
OL50LIB BLDJRN *PGM *SYSBAS CLP QSECOFR SNDJRNE to team journal
OL50LIB BUILD *PGM *SYSBAS RPG QSECOFR Customer File Maintenance Program
Student Notebook

OL50LIB CLEANUP *PGM *SYSBAS CLP QSECOFR Delete student objects and profiles
OL50LIB DST *PGM *SYSBAS CLP QSECOFR Ded Serv Tools lab
OL50LIB GRTUSRAUT *PGM *SYSBAS CLP QSECOFR prompt GRTUSRAUT command, adopting QSECOFR auth.
OL50LIB LAB1 *PGM *SYSBAS CLP QSECOFR Run by students in Security lab
OL50LIB LAB3 *PGM *SYSBAS CLP QSECOFR checksum and ASP simulation
OL50LIB LAB3X *PGM *SYSBAS CLP QSECOFR checksum and ASP simulation - old version

C-14 i System Administration


OL50LIB LAB7 *PGM *SYSBAS CLP QSECOFR executed in batch by students
OL50LIB PDDEMO *PGM *SYSBAS CLP QSECOFR Problem Det. demo program - tight loop.
OL50LIB PROBDET *PGM *SYSBAS CLP QSECOFR executed in batch; message and infinite loop
OL50LIB SAVEOL50 *PGM *SYSBAS CLP QSECOFR save the ADMLIB library
OL50LIB SECGRP *PGM *SYSBAS CLP QSECOFR executed by students in Security lab
OL50LIB SETUP *PGM *SYSBAS CLP SLOPEZ Setup the class (student profiles and objects)
OL50LIB SIGNON *PGM *SYSBAS CLP QSECOFR Student initial program
OL50LIB TEST *PGM *SYSBAS CLP QSECOFR compiled and executed in the user environment lab
OL50LIB USRENT *PGM *SYSBAS RPG QSECOFR used by lab exercise 2
OL50LIB VER *PGM *SYSBAS CLP EJJACKS CPP for VER command to display course version
OL50LIB OL50CTL *JRNRCV *SYSBAS SLOPEZ job accounting journal receiver
OL50LIB OL50CT0001 *JRNRCV *SYSBAS EJJACKS job accounting journal receiver
OL50LIB OL50 *OUTQ *SYSBAS QSECOFR Class output queue
OL50LIB COURSE *MSGF *SYSBAS SLOPEZ
OL50LIB OL50MSGF *MSGF *SYSBAS QSECOFR Cleanup program meassage file
OL50LIB COURSE *FILE *SYSBAS DSPF SLOPEZ
OL50LIB CUSMSI *FILE *SYSBAS PF QSECOFR CUSTOMER MASTER FILE. REC FMT. CUSNOC
OL50LIB CUSMST *FILE *SYSBAS PF QSECOFR CUSTOMER MASTER FILE. REC FMT: CUSTMR
OL50LIB DST *FILE *SYSBAS DSPF QSECOFR Record formats for Ded Serv Tools lab
OL50LIB FLDREF *FILE *SYSBAS PF QSECOFR FIELD REFERENCE FILE
OL50LIB LAB3 *FILE *SYSBAS DSPF QSECOFR Record formats for simulation exercise
OL50LIB LAB4DSP *FILE *SYSBAS DSPF QSECOFR
OL50LIB MAINT *FILE *SYSBAS DSPF QSECOFR CUSTOMER MASTER FILE MAINTENANCE OPTIONS
OL50LIB MASTER *FILE *SYSBAS PF QSECOFR SECOND MASTER FILE. REC FMT. CUSNOC
OL50LIB QCLSRC *FILE *SYSBAS PF QSECOFR Control language source
OL50LIB QCMDSRC *FILE *SYSBAS PF QSECOFR
OL50LIB QDDSSRC *FILE *SYSBAS PF QSECOFR DDS source
OL50LIB QMENUSRC *FILE *SYSBAS PF QSECOFR Native Menu source file

without the prior written permission of IBM.


OL50LIB QMNUSRC *FILE *SYSBAS PF EJJACKS Source file for Course menu
OL50LIB QRPGSRC *FILE *SYSBAS PF QSECOFR RPG source
OL50LIB SCREENS *FILE *SYSBAS DSPF QSECOFR Screens used for setup and drop of the course

Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


* * * * * E N D O F L I S T I N G * * * * *

© Copyright IBM Corp. 1995, 2012


AP
V7.0

Display Security Auditing Output (DSPSECAUD)


Current Security Auditing Values Page 1
5761SS1 V6R1M0 080215 I520DVL2 10/02/08 19:07:16 EDT
Security Auditing Journal Values
Security journal QAUDJRN exists . . . . . : YES
Journal receiver attached to QAUDJRN . . : AUDJRNRCV
Library . . . . . . . . . . . . . . . . : QSYS
Security Auditing System Values
Current QAUDCTL system value . . . . . . : *AUDLVL *OBJAUD
Current QAUDLVL system value . . . . . . : *ATNEVT *AUTFAIL *DELETE
*OBJMGT *PGMADP *SECCFG
*SECURITY *SECVFY *SERVICE
*PGMFAIL *SYSMGT
Current QAUDLVL2 system value . . . . . . : *NONE

© Copyright IBM Corp. 1995, 2012


* * * * * E N D O F L I S T I N G * * * * *

without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Course materials may not be reproduced in whole or in part
Appendix C. Sample security tools reports
Student Notebook

C-15
Print Audit Record Report Output (DSPAUDJRNE)
QUERY NAME . . . . . QSECAF
LIBRARY NAME . . . . QSYS
FILE LIBRARY MEMBER FORMAT
QASYAFJ4 QTEMP QASYAFJ4 QASYAFJ4
DATE . . . . . . . . 10/02/08
TIME . . . . . . . . 19:14:36
Student Notebook

10/02/08 19:14:36 PAGE 1


Violation User Object Library Object Office DLO Folder Behalf Job Job Job
type profile name name type user name path of name user number
user

C-16 i System Administration


Timestamp
AF A OL5001 A QSYS *DEVD A OL5001 040048
2008-10-02-19.02.25.342096
AF A OL5001 AS24DEV QSYS *DEVD A OL5001 040048
2008-10-02-19.02.25.350928
AF A OL5001 AS24DVL2 QSYS *DEVD A OL5001 040048
2008-10-02-19.02.25.351200
* * * E N D O F R E P O R T * * *

without the prior written permission of IBM.


Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


© Copyright IBM Corp. 1995, 2012
V7.0
Student Notebook

AP

© Copyright IBM Corp. 1995, 2012 Appendix C. Sample security tools reports C-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


5761BR1 V6R1M0 080215 Recovery Volume Summary Report I520DVL2 5/23/08 17:42:49 Page 1
Student Notebook

Volume Media Creation Expiration Location Storage Volume Container System


Serial Status Class Date Date Date Location Slot Container Slot ID

C-18 i System Administration


000023 *ACT ULTRIUM1 5/22/08 8/20/08 *NONE TAPMLB02 NONE I520DVL2

Total volumes needed for recovery . . . . . . . . . . : 1

5761BR1 V6R1M0 080215 Recovery Volume Summary Report I520DVL2 5/23/08 17:42:49 Page 2

****************************************************************************************************
------------------------------

without the prior written permission of IBM.


Encrypted Save Key Information
------------------------------

Course materials may not be reproduced in whole or in part

Individually Licensed to Tharanga Nirupamali


(No Key record label required)
* * * * * E N D O F L I S T I N G * * * * *

© Copyright IBM Corp. 1995, 2012


V7.0
Student Notebook

AP Appendix D. Task list for new administration and


control

Describe the features and functions of the System i


• Describe how storage is managed by the System i
- Describe single level storage
• Describe object-oriented environment
• Describe the components of System i security
• Describe the System i relational database
- Define journaling
• Recognize the backup/recovery features of the System i
• Recognize the hardware components of the System i
• Describe the ease of use functions of the System i
- Define electronic customer support (ECS)
- Define the operator assist facility
- Use the menu/command-driven interfaces
- Access help support

© Copyright IBM Corp. 1995, 2012 Appendix D. Task list for new administration and control D-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Implement and maintain security for a System i installation


• Define security requirements
- Identify assets
• Identify hardware assets
- Locate
- Inventory
- Secure
• Identify objects on the System i
- Classify objects as public or private
• Determine need for specific authority for private objects
• Determine need for authority list authority for private objects
- Establish ownership for objects
• Identify supporting documentation
- Classify documentation as public or private
- Establish ownership for documentation
- Identify access required by users
• Assign user to class
• Assign user to groups
- Create and assign group profiles
- Create authorization lists
• Assign specific authorities
• Assign special authorities
• Implement security on a System i
- Control access to hardware
• Modify system values which affect security
• Determine need for physical security
• Block system access from specific users
- Assign passwords to users
• Develop password rules
- Grant authority by device
- Modify routing entry

D-2 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP • Determine need for security built into the application


- Create user profiles
• Assign password to each user
• Determine ownership of objects
• Assign job description
• Assign class
• Assign object authorities
• Create/assign group profiles
• Create/assign initial program/menu
- Grant object authorities
• Change object ownership
• Assign public authority
• Assign private authorities
• Assign group profiles authorities
• Assign objects to authorization lists
- Create authorization lists
• Assign objects to authorization lists
• Assign users to authorization lists
• Assign public authorities
• Assign group profiles
• Perform a security audit
- Implement audit security journaling
- Implement physical inventory
• Inventory the hardware
• Inventory the documentation
- Interpret history log
• Initiate display log
• Identify invalid password message
• Identify invalid sign-on attempts
- Interpret database journals
• Review/update the security plan
- Assign responsibilities
- Determine security enhancements currently available
- Validate security needs

© Copyright IBM Corp. 1995, 2012 Appendix D. Task list for new administration and control D-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

Design and implement disaster recovery plan for System i


• Design and document a system recovery plan
- Define recovery requirements
• Identify the exposures
- Guide customer in ranking data value
• Obtain list of every application
• Obtain list of every data file
• Define and provide the criteria to determine the data value
- Guide customer in ranking hardware value
• Obtain list of all hardware
• Define and provide the criteria to determine the hardware value
- Identify potential disasters
• List disaster types and the effects of each
- List site disasters and their effects
- List system disasters and their effects
- List object disasters and their effects
• Determine likelihood of disaster occurrences
- Define required recovery skills
• Prioritize exposures by risk, expense, system capabilities, and business
implications
- Define the risks
- Determine the cost of the loss
• Define industry and customer legal requirements, if applicable
• Allocate recovery tasks to personnel
- Identify recovery tasks
- Identify people and skill levels required
• Identify specific recovery requirements for your shop
- Define the alternatives
• Identify hardware options as they relate to alternatives
• Identify software options
- Identify system software options
- Identify application software options

D-4 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP • Determine the customer's priorities and objectives


- Establish deadlines by application for recovery
- Determine the cost of the alternatives
• Implement recovery plan
- Establish backup requirements
• Define hardware requirements for recovery
- Define on-site requirements
- Define off-site requirements
• Define frequency of requirements
- Define frequency of system requirements
- Define frequency of application requirements
- Define frequency of data requirements
• Advise and counsel customer on backup of documentation
- Determine where backup should reside
- Determine who should have access to backup documentation
- Determine how to implement
- Include operating procedure, runbooks, and so forth
• Define staffing required, including names, functions, and backup names
• Define offline storage management
- Define offline off-site requirements
- Define offline on-site requirements
• Define source (input) document recovery procedures
• Define supplies needed
- Develop procedures
• Define backup procedures
- Define use of automatic recovery tools
• Determine need for journaling
- Identify and explain commands
- Document the procedures
• Determine need for device parity: RAID5
- Identify and explain commands
- Document the procedures

© Copyright IBM Corp. 1995, 2012 Appendix D. Task list for new administration and control D-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

• Determine the need for mirroring


- Identify and explain the commands
- Document the procedures
- Define daily procedures
• Identify and explain the commands
• Document the procedures
- Define weekly procedures
• Identify and explain the commands
• Document the procedures
- Define monthly procedures
• Identify and explain the commands
• Document the procedures
- Define on-demand procedures
• Identify and explain the commands
• Document the procedures
• Define recovery procedures
- Determine and document the site recovery procedures
• Identify and explain the commands
• Document the procedures
- Determine and document the system recovery procedures
• Identify and explain the commands
• Document the procedures
- Determine and document the application recovery procedures
• Identify and explain the commands
• Document the procedures
- Determine and document the user object recovery procedures
• Identify and explain the commands
• Document the procedures
- Determine and document the system object recovery procedures
• Identify and explain the commands
• Document the procedures
- Test and update the procedures

D-6 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0
Student Notebook

AP Problem determination and resolution


• Apply problem determination techniques to System i problems
• Select and use System i problem determination tools
- Select tools provided for single System i
• Define the tools
- Electronic customer support (ECS)
- GO PROBLEM(2)
- WRK commands
- Copy screen command
- Performance tools package
- Q&A
- Logs (Error, history, job)
• Compare and contrast the features/functions of the tools as they relate to
specific problem types
- Select tools provided for multiple system environments
• Define the tools
- Electronic customer support (ECS)
- GO PROBLEM(2)
- WRK commands
- Copy screen command
- Performance tools package
- Q&A
- Logs (Error, history, job)
- Communications trace
- Alert processing
- Help Desk program product (system management utility)
• Compare and contrast the features/functions of the tools as they relate to
specific problem types
• Resolve the problem
- Resolve hardware problems
• Resolve hardware failures
• Resolve performance problems

© Copyright IBM Corp. 1995, 2012 Appendix D. Task list for new administration and control D-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


Student Notebook

- Resolve software problems


• Resolve problems with IBM software
- Identify, order, and apply PTFs
- Determine action to take using Preventive service planning (PSP) letters
- Determine need to use hot line support
- Order and apply system updates
• Resolve problems with customer software
- Resolve user problems
• Perform preventive maintenance

D-8 i System Administration © Copyright IBM Corp. 1995, 2012


Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.

Individually Licensed to Tharanga Nirupamali


V7.0

backpg
Back page

Individually Licensed to Tharanga Nirupamali


Individually Licensed to Tharanga Nirupamali

You might also like