Administrator's Guide
Link to Other ADSM Books
Part 1. ADSM Basics
Chapter 1. Introducing ADSTAR Distributed Storage Manager
How ADSM Stores Client Data
How ADSM Represents Storage Devices
Disk Devices
Tape or Optical Devices
Files on Disk as Sequential Volumes
Sequential Volumes on Another ADSM Server
How ADSM Represents Storage Media
What Are the ADSM Storage Objects?
Device Class
Library
Drive
Storage Pool
Storage Pool Volume
Server
What Does a Device Class Contain?
Device Classes for Random Access Devices
Device Classes for Sequential Access Devices
Putting It All Together
Planning for ADSM Storage
Evaluating Your Storage Environment
Mapping Devices to Device Classes
Mapping Storage Pools to Device Classes and Devices
Configuring Devices
Automating Client Operations
Chapter 2. Administrator Tasks
Interfaces to ADSM
Using Magnetic Disk Devices with ADSM
Storing Data on Another Server
Using Removable Media Devices with ADSM
Managing Removable Media Operations
Defining Drives and Libraries
Defining Device Classes
Managing Storage Pools
Managing Storage Pool Volumes
Managing Clients
Managing Client Data Using Policies
Automating Client Operations
Managing Server Operations
Automating Server Operations
Managing the Database and Recovery Log
Monitoring the ADSM Server
Licensing Your ADSM Server
Exporting and Importing Data
Protecting and Recovering Your Data
Using Disaster Recovery Manager
Part 2. Configuring and Managing Server Storage
Chapter 3. Using Magnetic Disk Devices with ADSM
Setting Up Storage Pools on Disk Devices
Using Random Access Volumes on Disk Devices
Using Disk for FILE Sequential Volumes
Varying Disk Volumes Online or Offline
Notes on Operations
Using Cache
Freeing Space on Disk
Scratch FILE Volumes
FILE Volumes Used for Database Backups and Export Operations
Chapter 4. Storing Data on Another Server
Using Virtual Volumes
Setting Up Source and Target Servers
Performing Operations at the Source Server
Back Up the Database
Back Up a Storage Pool
Store Client Data on a Target Server
Migrate Data from a Source Server Storage Pool to a Target Server Storage Pool
Export Server Information to a Target Server
Import Server Information from a Target Server
Reconciling Virtual Volumes and Archive Files
Chapter 5. Using Removable Media Devices with ADSM
Configuring Devices: An Overview
Installing Device Drivers
Before You Start: Names for Devices
Installing Device Drivers for IBM 3490, 3570, and 3590 Tape Drives
Installing Device Drivers for IBM 349X Libraries
Configuring an Autochanger or a Robot Device Driver for a Library
Configuring a Device Driver for a Tape or an Optical Drive for Use by ADSM
Example of a Manual Library: Setting Up Two 8mm Tape Drives
Attach the Device to the Server System
Define the Device to ADSM
Update the ADSM Policy
Register Clients to the Policy Domain
Label Volumes
Example of an Automated Library: Setting Up an 8mm Autochanger
Attach the Device to the Server System
Define the Device to ADSM
Update the ADSM Policy
Register Clients to the Policy Domain
Label and Check In a Library Volume
Notes on Configuring Devices
Troubleshooting Problems with Devices
Setting the Library Mode
Notes on Operations
Mount Operations for Manual Libraries
Handling Messages for Automated Libraries
Cleaning Drives in Automated Libraries
Collocation
Single Drive Libraries
Chapter 6. Managing Removable Media Operations
How ADSM Uses and Reuses Removable Media
Using Scratch Volumes and Private Volumes
Private and Scratch Volumes in Automated Libraries
Categories in 349X Automated Libraries
Without 3590 Support Enabled
With 3590 Support Enabled
Enabling Support for IBM 3590 Drives in Existing 3494 Libraries
Preparing Removable Media for ADSM
Labeling Sequential Access Volumes
Informing the Server about New Volumes in a Library
Maintaining the Volume Inventory
Controlling ADSM Access to Volumes
Reusing Tapes in Storage Pools
Reusing Volumes Used for Database Backups and Export Operations
Maintaining a Supply of Scratch Volumes
Managing Storage Volumes in Automated Libraries
Changing the Status of a Volume in a Library
Removing Volumes from a Library
Returning Volumes to a Library
Managing a Full Library
Auditing a Library's Volume Inventory
Maintaining a Supply of Scratch Volumes in an Automated Library
Managing Media Mount Operations
Using the Administrative Client for Mount Messages
Requesting Information about Pending Operator Requests
Replying to Operator Requests
Canceling an Operator Request
Responding to Requests for Volume Check-In
Determining Which Volumes Are Mounted
Dismounting an Idle Volume
Chapter 7. Defining Drives and Libraries
How ADSM Uses Sequential Access Devices
Defining and Managing Libraries
Defining Libraries
Requesting Information about Libraries
Updating Libraries
Deleting Libraries
Defining and Managing Drives
Defining Drives
Requesting Information about Drives
Updating Drives
Deleting Drives
Chapter 8. Defining Device Classes
Defining and Updating Device Classes for Sequential Media
Defining and Updating Device Classes for Tape Devices
Defining and Updating Device Classes for Generic Tape Devices
Defining and Updating Device Classes for Optical Devices
Defining and Updating FILE Device Classes
Defining and Updating SERVER Device Classes
Requesting Information about a Device Class
Deleting a Device Class
How ADSM Fills Volumes
Using Data Compression
Tape Volume Capacity and Data Compression
Chapter 9. Managing Storage Pools
Storage Pools
An Example of Server Storage
Comparing Primary and Copy Storage Pools
How Volumes Are Assigned to Storage Pools
Assigning Random Access Storage Pool Volumes
Assigning Sequential Access Storage Pool Volumes
The Storage Pool Hierarchy
How ADSM Stores Files in a Storage Pool Hierarchy
How the Storage Hierarchy Affects Planning for Copy Storage Pools
Using the Hierarchy to Stage Client Data from Disk to Tape
Migration of Files in a Storage Pool Hierarchy
Migration Thresholds for Disk Storage Pools
Migration Thresholds for Sequential Access Storage Pools
Migration and Copy Storage Pools
The Use of Cache on Disk Storage Pools
How the Server Removes Cached Files
Effect of Caching on Storage Pool Statistics
Collocation on Sequential Access Storage Pools
The Effects of Collocation on Operations
How the Server Selects Volumes with Collocation Enabled
How the Server Selects Volumes with Collocation Disabled
Turning Collocation On or Off
Collocation on Copy Storage Pools
Reclaiming Space in Sequential Access Storage Pools
How ADSM Reclamation Works
Choosing a Reclamation Threshold
Reclaiming Volumes in a Storage Pool with One Drive
Reclamation for WORM Optical Media
Reclamation of Volumes with the Device Type of SERVER
Reclamation for Copy Storage Pools
How Collocation Affects Reclamation
Estimating Space Needs for Storage Pools
Estimating Space Needs in Random Access Storage Pools
Estimating Space Needs in Sequential Access Storage Pools
Defining or Updating Storage Pools
Defining a Primary Storage Pool
Defining a Copy Storage Pool
Monitoring the Use of Storage Pools
Monitoring the Use of Storage Pool Space
Monitoring Migration Processes
Monitoring the Use of Cache Space on Disk Storage
Requesting Information on the Use of Storage Space
Deleting a Storage Pool
Chapter 10. Managing Storage Pool Volumes
Access Modes for Storage Pool Volumes
Preparing Volumes for Random Access Storage Pools
Preparing Volumes for Sequential Access Storage Pools
Defining Storage Pool Volumes
Using Scratch Volumes
Updating Storage Pool Volumes
Monitoring the Use of Storage Pool Volumes
Requesting General Information about Storage Pool Volumes
Requesting Detailed Information about Storage Pool Volumes
Requesting Information about the Contents of a Storage Pool Volume
Moving Files from One Volume to Another Volume
Moving Data to Other Volumes in the Same Storage Pool
Moving Data to Another Storage Pool
Moving Data from an Offsite Volume in a Copy Storage Pool
Procedure for Moving Data
Deleting Storage Pool Volumes
Deleting an Empty Storage Pool Volume
Deleting a Storage Pool Volume with Data
Part 3. Managing Client Operations
Chapter 11. Managing Clients
Ensuring Client/Server Password Authentication
Setting Password Authentication
Setting the Administrative Client Web Interface Authentication
Setting User Password Expiration
Setting Invalid Password Limit
Setting a Minimum Password Length
Managing Client Nodes
Setting Client Node Registration
Defining Client Options from the Server
Registering Client Nodes
Managing Client Node Access
Requesting Information about Client Nodes
Requesting Information about File Spaces
Deleting File Spaces and Client Nodes
Registering an Application Programming Interface to the Server
Understanding How the Compression Option Is Set
Understanding How the File Deletion Option Is Set
Managing Client Sessions
Requesting Information about Client Sessions
Canceling a Client Session
Freeing Links for SNA LU6.2 Client Connections
Managing Client Restartable Restore Sessions
Controlling Administrator Access to the Server
Registering Administrators or Updating Information
Granting Administrative Authority
Renaming an Administrator
Changing Administrative Authority
Removing Administrators
Locking and Unlocking Administrators from the Server
Disabling or Enabling Access to the Server
Chapter 12. Managing Client Data Using Policies
Client Operations Controlled by Policy
Backup and Restore
Archive and Retrieve
Client Migration and Recall
The Parts of a Policy
More on Management Classes
Contents of a Management Class
Default Management Classes
The Include-Exclude List
How Files Are Associated with a Management Class
How Files Are Deleted
How ADSM Selects Files for Policy Operations
Incremental Backup
Selective Backup
Archive
Automatic Migration from a Client Node
How Client Migration Works with Backup and Archive
Using the Standard Policy
Creating Your Own Policies
Getting Users Started
Example: Sample Policy Objects
Defining and Updating a Policy Domain
Defining and Updating a Policy Set
Defining and Updating a Management Class
Defining and Updating a Backup Copy Group
Special Considerations: Enabling Point-in-Time Restore for Clients
Defining and Updating an Archive Copy Group
Assigning a Default Management Class
Validating and Activating Policy Sets
Running Expiration Processing to Delete Expired Files
Querying Policy
Querying Copy Groups
Querying Management Classes
Querying Policy Sets
Querying Policy Domains
Deleting Policy
Deleting Copy Groups
Deleting Management Classes
Deleting Policy Sets
Deleting Policy Domains
Chapter 13. Automating Client Operations
Automating a Basic Client Operation
Defining the Client Schedule
Associating Client Nodes with Schedules
Starting the Scheduler on the Clients
Verifying the Schedule
Issuing Commands for Immediate Processing on a Client Node
Coordinating Client Schedules
Setting the Scheduling Mode
Specifying the Schedule Period for Incremental Backup Operations
Controlling the Server's Scheduled Workload
Controlling Contact with the Server
Tailoring Schedules
Example: Defining a New Client Schedule
Example: Updating an Existing Client Schedule
Copying Schedules
Deleting Schedules
Managing Scheduled Event Records
Querying Event Records
Removing Event Records from the Database
Managing Client Associations with Schedules
Querying Associations
Deleting Associations
Part 4. Maintaining the Server
Chapter 14. Managing Server Operations
Starting, Halting, and Restarting the Server
Starting the Server
Halting the Server
Restarting the Server
Managing Server Processes
Requesting Information about Server Processes
Canceling Server Processes
Preemption of Client or Server Operations
Setting the Server Name
Adding or Updating Server Options
Adding or Updating a Server Option without Restarting the Server
Getting Help on Commands and Error Messages
Chapter 15. Automating Server Operations
Automating a Basic Administrative Command Schedule
Defining the Schedule
Verifying the Schedule
Tailoring Schedules
Example: Defining and Updating an Administrative Command Schedule
Copying Schedules
Deleting Schedules
Managing Scheduled Event Records
Querying Events
Removing Event Records from the Database
Chapter 16. Managing the Database and Recovery Log
Database and Recovery Log
How ADSM Processes Transactions
How Space Is Managed by the Server
Estimating and Monitoring Database and Recovery Log Space Requirements
Monitoring the Database and Recovery Log
Adding Space to the Database or Recovery Log
The Advantages of Using Journal File System Files
Step 1: Allocating Space for the Database and Recovery Log
Step 2: Defining Database or Recovery Log Volumes to ADSM
Step 3: Extending the Capacity of the Database or Recovery Log
Deleting Space from the Database or Recovery Log
Step 1: Determining If Volumes Can Be Deleted
Step 2: Reducing the Capacity of the Database or Recovery Log
Step 3: Deleting a Volume from the Database or Recovery Log
Optimizing the Performance of the Database or Recovery Log
Adjusting the Database Buffer Pool
Adjusting the Recovery Log Buffer Pool
Chapter 17. Monitoring the ADSM Server
Using ADSM Queries to Display Information
Requesting Information about ADSM Definitions
Requesting Information about Client Sessions
Requesting Information about Server Processes
Requesting Information about Server Status
Querying Server Options
Querying the System
Using SQL to Query the ADSM Database
Using the ODBC Driver
Issuing SELECT Commands
Canceling a SELECT Command
Controlling the Format of SELECT Results
Creating Output for Use by Another Application
Using the ADSM Activity Log
Changing the Size of the Activity Log
Setting the Activity Log Retention Period
Requesting Information from the Activity Log
Using Event Logging
Setting Up Tivoli as an ADSM Receiver
Setting Up SNMP for ADSM
Monitoring ADSM Accounting Records
Chapter 18. Licensing Your ADSM System
ADSM Licensing
Licensed Features
License Compliance
Registering Licensed Features
Saving Your Licenses
Monitoring Licenses
Chapter 19. Exporting and Importing Data
Data That Can Be Exported and Imported
Preparing to Export or Import Data
Using Preview before Exporting or Importing Data
Planning for Sequential Media Used to Export Data
Monitoring Export and Import Processes
Requesting Information about an Export or Import Process
Viewing Information from the Server Console
Viewing Information from an Administrative Client
Querying the Activity Log for Export or Import Information
Exporting Data to Sequential Media Volumes
Deciding When to Export Data
Exporting Server Data
Exporting Administrator Information
Exporting Client Node Information
Exporting Policy Information
Importing Data from Sequential Media Volumes
Step 1: Previewing Information before You Import Data
Step 2: Importing Definitions
Step 3: Tailoring Server Storage Definitions on the Target Server
Step 4: Importing File Data Information
Considerations When Importing Data
Recovering from Errors during the Import Process
Exporting and Importing Data from Virtual Volumes
Part 5. Protecting the Server
Chapter 20. Protecting and Recovering Your Data
Levels of Protection
Storage Pool Protection
Database and Recovery Log Protection
Protecting and Recovering Data: An Overview
Protecting Your Database and Storage Pool
Recovering to a Point in Time
Recover a Lost or Damaged Storage Pool Volume
Backing Up Storage Pools
Delaying Reuse of Sequential Access Volumes
Mirroring the Database and Recovery Log
Allocating Volume Copies to Separate Physical Disks
Defining Database or Recovery Log Mirrored Volumes
Requesting Information about Mirrored Volumes
Using Copy Storage Pools to Improve Data Availability
Example: Simple Hierarchy with One Copy Storage Pool
Backing Up the Database
Defining Device Classes for Backups
Setting the Recovery Log Mode
Scheduling Database Backups
Estimating the Size of the Recovery Log
Setting a Database Backup Trigger
Saving the Volume History File
Saving the Device Configuration Backup File
Doing Full and Incremental Backups
Recovering by Using Mirrored Volumes
Recovering by Using Database and Storage Pool Backups
Restoring a Database to a Point in Time
Restoring a Database to its Most Current State
Restoring Storage Pools
Restoring Storage Pool Volumes
What Happens When a Volume Is Restored
When a Volume Restoration Is Incomplete
Auditing a Storage Pool Volume
What Happens When You Audit Storage Pool Volumes
Auditing a Volume in a Disk Storage Pool
Auditing Multiple Volumes in a Sequential Access Storage Pool
Auditing a Single Volume in a Sequential Access Storage Pool
Correcting Damaged Files
Maintaining the Integrity of Files
Restore Damaged Files
Backup and Recovery Scenarios
Protecting Your Database and Storage Pool
Recovering to a Point in Time from a Disaster
Recovering a Lost or Damaged Storage Pool Volume
Chapter 21. Using Disaster Recovery Manager
Features of Disaster Recovery Manager
Automated Generation of a Server Disaster Recovery Plan
Offsite Recovery Media Management
Storage of Client Recovery Information
Setting Up Disaster Recovery Manager
Licensing Disaster Recovery Manager
Defining Machine Information for the ADSM Server
Backing up the Primary Storage Pools and the Database
Tracking Movement of Server Backup Volumes
Creating the ADSM Server Disaster Recovery Plan
Storing Client Recovery Information
Customizing Disaster Recovery Manager
Performing Routine DRM Operations
Sending Server Backup Volumes Offsite
Moving Reclaimed or Expired Volumes Back Onsite
Recovering Your System
Recovering the Server
Recovering the Clients
A DRM User Scenario
Disaster Recovery Preparation
Recovering the Server Scenario
Recovering ADSM Clients Scenario
Summary of Disaster Recovery Manager Use
Disaster Recovery Manager Checklist
The Disaster Recovery Plan
Breaking Out a Disaster Recovery Plan File
Structure of the Disaster Recovery Plan File
Example Disaster Recovery Plan File
Part 6. Appendixes
Appendix A. External Media Management Interface Description
Processing during ADSM Server Initialization
Processing for ADSM Mount Requests
Processing for ADSM Release Requests
Processing for ADSM Batch Requests
Error Handling
Begin Batch Request
End Batch Request
Volume Query Request
Initialization Requests
Volume Eject Request
Volume Release Request
Volume Mount Request
Volume Dismount Request
Appendix B. Supported Devices and Device Configuration Worksheets
Devices Supported by ADSM
Libraries Supported by the ADSM Device Driver
Recording SCSI IDs and Device Names
Appendix C. User Exit and File Exit Receivers
Sample User Exit Declarations
Sample User Exit Program
Appendix D. Notices
Programming Interface
Trademarks
Appendix E. Glossary
Index
[ Top of Page | Previous Page | Next Page | Index ]