Administrator's Guide

Link to Other ADSM Books


Table of Contents

  • Preface
  • Who Should Read This Publication
  • What You Should Know before Reading This Publication
  • Conventions Used in This Book
  • ADSTAR Distributed Storage Manager Publications
  • Related IBM Hardware Products Publications
  • IBM International Technical Support Center Publications (Redbooks)
  • Software Developer's Program
  • Do You Have Comments or Suggestions?
  • Translations
  • Summary of Changes for ADSTAR Distributed Storage Manager Version 3
  • Changes for Version 3--March 1998
  • Changes for Version 3--October 1997

  • Part 1. ADSM Basics

  • Chapter 1. Introducing ADSTAR Distributed Storage Manager
  • How ADSM Stores Client Data
  • How ADSM Represents Storage Devices
  • Disk Devices
  • Tape or Optical Devices
  • Files on Disk as Sequential Volumes
  • Sequential Volumes on Another ADSM Server
  • How ADSM Represents Storage Media
  • What Are the ADSM Storage Objects?
  • Device Class
  • Library
  • Drive
  • Storage Pool
  • Storage Pool Volume
  • Server
  • What Does a Device Class Contain?
  • Device Classes for Random Access Devices
  • Device Classes for Sequential Access Devices
  • Putting It All Together
  • Planning for ADSM Storage
  • Evaluating Your Storage Environment
  • Mapping Devices to Device Classes
  • Mapping Storage Pools to Device Classes and Devices
  • Configuring Devices
  • Automating Client Operations
  • Chapter 2. Administrator Tasks
  • Interfaces to ADSM
  • Using Magnetic Disk Devices with ADSM
  • Storing Data on Another Server
  • Using Removable Media Devices with ADSM
  • Managing Removable Media Operations
  • Defining Drives and Libraries
  • Defining Device Classes
  • Managing Storage Pools
  • Managing Storage Pool Volumes
  • Managing Clients
  • Managing Client Data Using Policies
  • Automating Client Operations
  • Managing Server Operations
  • Automating Server Operations
  • Managing the Database and Recovery Log
  • Monitoring the ADSM Server
  • Licensing Your ADSM Server
  • Exporting and Importing Data
  • Protecting and Recovering Your Data
  • Using Disaster Recovery Manager

  • Part 2. Configuring and Managing Server Storage

  • Chapter 3. Using Magnetic Disk Devices with ADSM
  • Setting Up Storage Pools on Disk Devices
  • Using Random Access Volumes on Disk Devices
  • Using Disk for FILE Sequential Volumes
  • Varying Disk Volumes Online or Offline
  • Notes on Operations
  • Using Cache
  • Freeing Space on Disk
  • Scratch FILE Volumes
  • FILE Volumes Used for Database Backups and Export Operations
  • Chapter 4. Storing Data on Another Server
  • Using Virtual Volumes
  • Setting Up Source and Target Servers
  • Performing Operations at the Source Server
  • Back Up the Database
  • Back Up a Storage Pool
  • Store Client Data on a Target Server
  • Migrate Data from a Source Server Storage Pool to a Target Server Storage Pool
  • Export Server Information to a Target Server
  • Import Server Information from a Target Server
  • Reconciling Virtual Volumes and Archive Files
  • Chapter 5. Using Removable Media Devices with ADSM
  • Configuring Devices: An Overview
  • Installing Device Drivers
  • Before You Start: Names for Devices
  • Installing Device Drivers for IBM 3490, 3570, and 3590 Tape Drives
  • Installing Device Drivers for IBM 349X Libraries
  • Configuring an Autochanger or a Robot Device Driver for a Library
  • Configuring a Device Driver for a Tape or an Optical Drive for Use by ADSM
  • Example of a Manual Library: Setting Up Two 8mm Tape Drives
  • Attach the Device to the Server System
  • Define the Device to ADSM
  • Update the ADSM Policy
  • Register Clients to the Policy Domain
  • Label Volumes
  • Example of an Automated Library: Setting Up an 8mm Autochanger
  • Attach the Device to the Server System
  • Define the Device to ADSM
  • Update the ADSM Policy
  • Register Clients to the Policy Domain
  • Label and Check In a Library Volume
  • Notes on Configuring Devices
  • Troubleshooting Problems with Devices
  • Setting the Library Mode
  • Notes on Operations
  • Mount Operations for Manual Libraries
  • Handling Messages for Automated Libraries
  • Cleaning Drives in Automated Libraries
  • Collocation
  • Single Drive Libraries
  • Chapter 6. Managing Removable Media Operations
  • How ADSM Uses and Reuses Removable Media
  • Using Scratch Volumes and Private Volumes
  • Private and Scratch Volumes in Automated Libraries
  • Categories in 349X Automated Libraries
  • Without 3590 Support Enabled
  • With 3590 Support Enabled
  • Enabling Support for IBM 3590 Drives in Existing 3494 Libraries
  • Preparing Removable Media for ADSM
  • Labeling Sequential Access Volumes
  • Informing the Server about New Volumes in a Library
  • Maintaining the Volume Inventory
  • Controlling ADSM Access to Volumes
  • Reusing Tapes in Storage Pools
  • Reusing Volumes Used for Database Backups and Export Operations
  • Maintaining a Supply of Scratch Volumes
  • Managing Storage Volumes in Automated Libraries
  • Changing the Status of a Volume in a Library
  • Removing Volumes from a Library
  • Returning Volumes to a Library
  • Managing a Full Library
  • Auditing a Library's Volume Inventory
  • Maintaining a Supply of Scratch Volumes in an Automated Library
  • Managing Media Mount Operations
  • Using the Administrative Client for Mount Messages
  • Requesting Information about Pending Operator Requests
  • Replying to Operator Requests
  • Canceling an Operator Request
  • Responding to Requests for Volume Check-In
  • Determining Which Volumes Are Mounted
  • Dismounting an Idle Volume
  • Chapter 7. Defining Drives and Libraries
  • How ADSM Uses Sequential Access Devices
  • Defining and Managing Libraries
  • Defining Libraries
  • Requesting Information about Libraries
  • Updating Libraries
  • Deleting Libraries
  • Defining and Managing Drives
  • Defining Drives
  • Requesting Information about Drives
  • Updating Drives
  • Deleting Drives
  • Chapter 8. Defining Device Classes
  • Defining and Updating Device Classes for Sequential Media
  • Defining and Updating Device Classes for Tape Devices
  • Defining and Updating Device Classes for Generic Tape Devices
  • Defining and Updating Device Classes for Optical Devices
  • Defining and Updating FILE Device Classes
  • Defining and Updating SERVER Device Classes
  • Requesting Information about a Device Class
  • Deleting a Device Class
  • How ADSM Fills Volumes
  • Using Data Compression
  • Tape Volume Capacity and Data Compression
  • Chapter 9. Managing Storage Pools
  • Storage Pools
  • An Example of Server Storage
  • Comparing Primary and Copy Storage Pools
  • How Volumes Are Assigned to Storage Pools
  • Assigning Random Access Storage Pool Volumes
  • Assigning Sequential Access Storage Pool Volumes
  • The Storage Pool Hierarchy
  • How ADSM Stores Files in a Storage Pool Hierarchy
  • How the Storage Hierarchy Affects Planning for Copy Storage Pools
  • Using the Hierarchy to Stage Client Data from Disk to Tape
  • Migration of Files in a Storage Pool Hierarchy
  • Migration Thresholds for Disk Storage Pools
  • Migration Thresholds for Sequential Access Storage Pools
  • Migration and Copy Storage Pools
  • The Use of Cache on Disk Storage Pools
  • How the Server Removes Cached Files
  • Effect of Caching on Storage Pool Statistics
  • Collocation on Sequential Access Storage Pools
  • The Effects of Collocation on Operations
  • How the Server Selects Volumes with Collocation Enabled
  • How the Server Selects Volumes with Collocation Disabled
  • Turning Collocation On or Off
  • Collocation on Copy Storage Pools
  • Reclaiming Space in Sequential Access Storage Pools
  • How ADSM Reclamation Works
  • Choosing a Reclamation Threshold
  • Reclaiming Volumes in a Storage Pool with One Drive
  • Reclamation for WORM Optical Media
  • Reclamation of Volumes with the Device Type of SERVER
  • Reclamation for Copy Storage Pools
  • How Collocation Affects Reclamation
  • Estimating Space Needs for Storage Pools
  • Estimating Space Needs in Random Access Storage Pools
  • Estimating Space Needs in Sequential Access Storage Pools
  • Defining or Updating Storage Pools
  • Defining a Primary Storage Pool
  • Defining a Copy Storage Pool
  • Monitoring the Use of Storage Pools
  • Monitoring the Use of Storage Pool Space
  • Monitoring Migration Processes
  • Monitoring the Use of Cache Space on Disk Storage
  • Requesting Information on the Use of Storage Space
  • Deleting a Storage Pool
  • Chapter 10. Managing Storage Pool Volumes
  • Access Modes for Storage Pool Volumes
  • Preparing Volumes for Random Access Storage Pools
  • Preparing Volumes for Sequential Access Storage Pools
  • Defining Storage Pool Volumes
  • Using Scratch Volumes
  • Updating Storage Pool Volumes
  • Monitoring the Use of Storage Pool Volumes
  • Requesting General Information about Storage Pool Volumes
  • Requesting Detailed Information about Storage Pool Volumes
  • Requesting Information about the Contents of a Storage Pool Volume
  • Moving Files from One Volume to Another Volume
  • Moving Data to Other Volumes in the Same Storage Pool
  • Moving Data to Another Storage Pool
  • Moving Data from an Offsite Volume in a Copy Storage Pool
  • Procedure for Moving Data
  • Deleting Storage Pool Volumes
  • Deleting an Empty Storage Pool Volume
  • Deleting a Storage Pool Volume with Data

  • Part 3. Managing Client Operations

  • Chapter 11. Managing Clients
  • Ensuring Client/Server Password Authentication
  • Setting Password Authentication
  • Setting the Administrative Client Web Interface Authentication
  • Setting User Password Expiration
  • Setting Invalid Password Limit
  • Setting a Minimum Password Length
  • Managing Client Nodes
  • Setting Client Node Registration
  • Defining Client Options from the Server
  • Registering Client Nodes
  • Managing Client Node Access
  • Requesting Information about Client Nodes
  • Requesting Information about File Spaces
  • Deleting File Spaces and Client Nodes
  • Registering an Application Programming Interface to the Server
  • Understanding How the Compression Option Is Set
  • Understanding How the File Deletion Option Is Set
  • Managing Client Sessions
  • Requesting Information about Client Sessions
  • Canceling a Client Session
  • Freeing Links for SNA LU6.2 Client Connections
  • Managing Client Restartable Restore Sessions
  • Controlling Administrator Access to the Server
  • Registering Administrators or Updating Information
  • Granting Administrative Authority
  • Renaming an Administrator
  • Changing Administrative Authority
  • Removing Administrators
  • Locking and Unlocking Administrators from the Server
  • Disabling or Enabling Access to the Server
  • Chapter 12. Managing Client Data Using Policies
  • Client Operations Controlled by Policy
  • Backup and Restore
  • Archive and Retrieve
  • Client Migration and Recall
  • The Parts of a Policy
  • More on Management Classes
  • Contents of a Management Class
  • Default Management Classes
  • The Include-Exclude List
  • How Files Are Associated with a Management Class
  • How Files Are Deleted
  • How ADSM Selects Files for Policy Operations
  • Incremental Backup
  • Selective Backup
  • Archive
  • Automatic Migration from a Client Node
  • How Client Migration Works with Backup and Archive
  • Using the Standard Policy
  • Creating Your Own Policies
  • Getting Users Started
  • Example: Sample Policy Objects
  • Defining and Updating a Policy Domain
  • Defining and Updating a Policy Set
  • Defining and Updating a Management Class
  • Defining and Updating a Backup Copy Group
  • Special Considerations: Enabling Point-in-Time Restore for Clients
  • Defining and Updating an Archive Copy Group
  • Assigning a Default Management Class
  • Validating and Activating Policy Sets
  • Running Expiration Processing to Delete Expired Files
  • Querying Policy
  • Querying Copy Groups
  • Querying Management Classes
  • Querying Policy Sets
  • Querying Policy Domains
  • Deleting Policy
  • Deleting Copy Groups
  • Deleting Management Classes
  • Deleting Policy Sets
  • Deleting Policy Domains
  • Chapter 13. Automating Client Operations
  • Automating a Basic Client Operation
  • Defining the Client Schedule
  • Associating Client Nodes with Schedules
  • Starting the Scheduler on the Clients
  • Verifying the Schedule
  • Issuing Commands for Immediate Processing on a Client Node
  • Coordinating Client Schedules
  • Setting the Scheduling Mode
  • Specifying the Schedule Period for Incremental Backup Operations
  • Controlling the Server's Scheduled Workload
  • Controlling Contact with the Server
  • Tailoring Schedules
  • Example: Defining a New Client Schedule
  • Example: Updating an Existing Client Schedule
  • Copying Schedules
  • Deleting Schedules
  • Managing Scheduled Event Records
  • Querying Event Records
  • Removing Event Records from the Database
  • Managing Client Associations with Schedules
  • Querying Associations
  • Deleting Associations

  • Part 4. Maintaining the Server

  • Chapter 14. Managing Server Operations
  • Starting, Halting, and Restarting the Server
  • Starting the Server
  • Halting the Server
  • Restarting the Server
  • Managing Server Processes
  • Requesting Information about Server Processes
  • Canceling Server Processes
  • Preemption of Client or Server Operations
  • Setting the Server Name
  • Adding or Updating Server Options
  • Adding or Updating a Server Option without Restarting the Server
  • Getting Help on Commands and Error Messages
  • Chapter 15. Automating Server Operations
  • Automating a Basic Administrative Command Schedule
  • Defining the Schedule
  • Verifying the Schedule
  • Tailoring Schedules
  • Example: Defining and Updating an Administrative Command Schedule
  • Copying Schedules
  • Deleting Schedules
  • Managing Scheduled Event Records
  • Querying Events
  • Removing Event Records from the Database
  • Chapter 16. Managing the Database and Recovery Log
  • Database and Recovery Log
  • How ADSM Processes Transactions
  • How Space Is Managed by the Server
  • Estimating and Monitoring Database and Recovery Log Space Requirements
  • Monitoring the Database and Recovery Log
  • Adding Space to the Database or Recovery Log
  • The Advantages of Using Journal File System Files
  • Step 1: Allocating Space for the Database and Recovery Log
  • Step 2: Defining Database or Recovery Log Volumes to ADSM
  • Step 3: Extending the Capacity of the Database or Recovery Log
  • Deleting Space from the Database or Recovery Log
  • Step 1: Determining If Volumes Can Be Deleted
  • Step 2: Reducing the Capacity of the Database or Recovery Log
  • Step 3: Deleting a Volume from the Database or Recovery Log
  • Optimizing the Performance of the Database or Recovery Log
  • Adjusting the Database Buffer Pool
  • Adjusting the Recovery Log Buffer Pool
  • Chapter 17. Monitoring the ADSM Server
  • Using ADSM Queries to Display Information
  • Requesting Information about ADSM Definitions
  • Requesting Information about Client Sessions
  • Requesting Information about Server Processes
  • Requesting Information about Server Status
  • Querying Server Options
  • Querying the System
  • Using SQL to Query the ADSM Database
  • Using the ODBC Driver
  • Issuing SELECT Commands
  • Canceling a SELECT Command
  • Controlling the Format of SELECT Results
  • Creating Output for Use by Another Application
  • Using the ADSM Activity Log
  • Changing the Size of the Activity Log
  • Setting the Activity Log Retention Period
  • Requesting Information from the Activity Log
  • Using Event Logging
  • Setting Up Tivoli as an ADSM Receiver
  • Setting Up SNMP for ADSM
  • Monitoring ADSM Accounting Records
  • Chapter 18. Licensing Your ADSM System
  • ADSM Licensing
  • Licensed Features
  • License Compliance
  • Registering Licensed Features
  • Saving Your Licenses
  • Monitoring Licenses
  • Chapter 19. Exporting and Importing Data
  • Data That Can Be Exported and Imported
  • Preparing to Export or Import Data
  • Using Preview before Exporting or Importing Data
  • Planning for Sequential Media Used to Export Data
  • Monitoring Export and Import Processes
  • Requesting Information about an Export or Import Process
  • Viewing Information from the Server Console
  • Viewing Information from an Administrative Client
  • Querying the Activity Log for Export or Import Information
  • Exporting Data to Sequential Media Volumes
  • Deciding When to Export Data
  • Exporting Server Data
  • Exporting Administrator Information
  • Exporting Client Node Information
  • Exporting Policy Information
  • Importing Data from Sequential Media Volumes
  • Step 1: Previewing Information before You Import Data
  • Step 2: Importing Definitions
  • Step 3: Tailoring Server Storage Definitions on the Target Server
  • Step 4: Importing File Data Information
  • Considerations When Importing Data
  • Recovering from Errors during the Import Process
  • Exporting and Importing Data from Virtual Volumes

  • Part 5. Protecting the Server

  • Chapter 20. Protecting and Recovering Your Data
  • Levels of Protection
  • Storage Pool Protection
  • Database and Recovery Log Protection
  • Protecting and Recovering Data: An Overview
  • Protecting Your Database and Storage Pool
  • Recovering to a Point in Time
  • Recover a Lost or Damaged Storage Pool Volume
  • Backing Up Storage Pools
  • Delaying Reuse of Sequential Access Volumes
  • Mirroring the Database and Recovery Log
  • Allocating Volume Copies to Separate Physical Disks
  • Defining Database or Recovery Log Mirrored Volumes
  • Requesting Information about Mirrored Volumes
  • Using Copy Storage Pools to Improve Data Availability
  • Example: Simple Hierarchy with One Copy Storage Pool
  • Backing Up the Database
  • Defining Device Classes for Backups
  • Setting the Recovery Log Mode
  • Scheduling Database Backups
  • Estimating the Size of the Recovery Log
  • Setting a Database Backup Trigger
  • Saving the Volume History File
  • Saving the Device Configuration Backup File
  • Doing Full and Incremental Backups
  • Recovering by Using Mirrored Volumes
  • Recovering by Using Database and Storage Pool Backups
  • Restoring a Database to a Point in Time
  • Restoring a Database to its Most Current State
  • Restoring Storage Pools
  • Restoring Storage Pool Volumes
  • What Happens When a Volume Is Restored
  • When a Volume Restoration Is Incomplete
  • Auditing a Storage Pool Volume
  • What Happens When You Audit Storage Pool Volumes
  • Auditing a Volume in a Disk Storage Pool
  • Auditing Multiple Volumes in a Sequential Access Storage Pool
  • Auditing a Single Volume in a Sequential Access Storage Pool
  • Correcting Damaged Files
  • Maintaining the Integrity of Files
  • Restore Damaged Files
  • Backup and Recovery Scenarios
  • Protecting Your Database and Storage Pool
  • Recovering to a Point in Time from a Disaster
  • Recovering a Lost or Damaged Storage Pool Volume
  • Chapter 21. Using Disaster Recovery Manager
  • Features of Disaster Recovery Manager
  • Automated Generation of a Server Disaster Recovery Plan
  • Offsite Recovery Media Management
  • Storage of Client Recovery Information
  • Setting Up Disaster Recovery Manager
  • Licensing Disaster Recovery Manager
  • Defining Machine Information for the ADSM Server
  • Backing up the Primary Storage Pools and the Database
  • Tracking Movement of Server Backup Volumes
  • Creating the ADSM Server Disaster Recovery Plan
  • Storing Client Recovery Information
  • Customizing Disaster Recovery Manager
  • Performing Routine DRM Operations
  • Sending Server Backup Volumes Offsite
  • Moving Reclaimed or Expired Volumes Back Onsite
  • Recovering Your System
  • Recovering the Server
  • Recovering the Clients
  • A DRM User Scenario
  • Disaster Recovery Preparation
  • Recovering the Server Scenario
  • Recovering ADSM Clients Scenario
  • Summary of Disaster Recovery Manager Use
  • Disaster Recovery Manager Checklist
  • The Disaster Recovery Plan
  • Breaking Out a Disaster Recovery Plan File
  • Structure of the Disaster Recovery Plan File
  • Example Disaster Recovery Plan File

  • Part 6. Appendixes

  • Appendix A. External Media Management Interface Description
  • Processing during ADSM Server Initialization
  • Processing for ADSM Mount Requests
  • Processing for ADSM Release Requests
  • Processing for ADSM Batch Requests
  • Error Handling
  • Begin Batch Request
  • End Batch Request
  • Volume Query Request
  • Initialization Requests
  • Volume Eject Request
  • Volume Release Request
  • Volume Mount Request
  • Volume Dismount Request
  • Appendix B. Supported Devices and Device Configuration Worksheets
  • Devices Supported by ADSM
  • Libraries Supported by the ADSM Device Driver
  • Recording SCSI IDs and Device Names
  • Appendix C. User Exit and File Exit Receivers
  • Sample User Exit Declarations
  • Sample User Exit Program
  • Appendix D. Notices
  • Programming Interface
  • Trademarks
  • Appendix E. Glossary

  • Index


  • [ Top of Page | Previous Page | Next Page | Index ]