As400 Architecture
As400 Architecture
Susan Powers, Bill Bradshaw, Pat Lozano, Olga T. Saldivar, Satid Singkorapoom
SG24-5693-00
International Technical Support Organization AS/400 Disk Storage Topics and Tools
SG24-5693-00
April 2000
Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix F, Special notices on page 219.
First Edition (April 2000) This edition applies to Version 4 Release 4 of OS/400, AS/400 Operating System, Program Number 5769-SS1. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JLU Building 107-2 3605 Highway 52N Rochester, Minnesota 55901-7829 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you.
Copyright International Business Machines Corporation 2000. All rights reserved. Note to U.S Government Users - Documentation related to restricted rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii The team that wrote this redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Comments welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Part 1. Storage architectures and components of AS/400 DASD . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Chapter 1. System architecture . . . . . . . . . . . . . . . . . . 1.1 Components of the AS/400 system . . . . . . . . . . . . . . 1.2 Licensed Internal Code (LIC) . . . . . . . . . . . . . . . . . . 1.2.1 Technology Independent Machine Interface . . . 1.2.2 PLIC on AS/400e series systems (V4R4) . . . . . 1.2.3 Vertical Licensed Internal Code (VLIC) . . . . . . . 1.2.4 Horizontal Licensed Internal Code (HLIC) . . . . . 1.3 AS/400 addressing . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.1 Physical location . . . . . . . . . . . . . . . . . . . . . . . . 1.3.2 Logical addressing . . . . . . . . . . . . . . . . . . . . . . 1.3.3 Direct select address (DSA) and unit address . . 1.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 . .3 . .5 . .6 . .7 . .9 . .9 .10 .10 .11 .11 .17 .19 .19 .19 .19 .20 .22 .23 .23 .23 .24 .24 .24 .25 .25 .26 .26 .27 .29 .31 .34 .37 .39 .44 .49 .49 .51
Chapter 2. Storage architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Direct access storage device (DASD) . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1 Expert cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.2 Extended Adaptive Cache (EAC). . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Logical partitioning on the AS/400 system. . . . . . . . . . . . . . . . . . . . . . . 2.4 Data storage and management on the AS/400 system . . . . . . . . . . . . . 2.4.1 Data management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.2 Database management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 Integrated File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6 Digital Versatile Disk (DVD) on the AS/400 system . . . . . . . . . . . . . . . . 2.6.1 How DVD applies to the AS/400 system . . . . . . . . . . . . . . . . . . . . 2.7 Storage Area Network (SAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8 IBM Versatile Storage Server (VSS) . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9 IBM Enterprise Storage Server (ESS) . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10 AS/400 DASD availability options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.1 Mirrored protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.2 System level checksum protection. . . . . . . . . . . . . . . . . . . . . . . . 2.10.3 Device Parity Protection (RAID-5) . . . . . . . . . . . . . . . . . . . . . . . . 2.10.4 Integrated Hardware Disk Compression (IHDC) . . . . . . . . . . . . . 2.10.5 Hierarchical Storage Management (HSM) on the AS/400 system 2.10.6 Auxiliary storage pools (ASP) . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.7 Other protection and performance topics of interest . . . . . . . . . . 2.11 Considerations for ASP management . . . . . . . . . . . . . . . . . . . . . . . . . 2.11.1 OS/400 command usage or BRMS/400 . . . . . . . . . . . . . . . . . . . . 2.12 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
iii
Chapter 3. Storage options . . . 3.1 Digital Versatile Disk (DVD) . 3.2 CD-ROM . . . . . . . . . . . . . . . 3.3 Optical storage device . . . . . 3.4 Removable storage (tape) . . 3.5 Summary . . . . . . . . . . . . . . .
. . . . . .
. . . . . .
. . . . . .
.. .. .. .. .. ..
. . . . . .
. . . . . .
. . . . . .
.. .. .. .. .. ..
. . . . . .
. . . . . .
. . . . . .
. . . . . .
.. .. .. .. .. ..
. . . . . .
. . . . . .
. . . . . .
.. .. .. .. .. ..
. . . . . .
. . . . . .
. . . . . .
. . . . . .
.. .. .. .. .. .. .. .. .. .. .. ..
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. ..
. . . . . . . . . . . .
53 53 53 54 56 56 57 57 60 62 63 64
Chapter 4. Extended Adaptive Cache (EAC) . . . . . . . . . . . . . . 4.1 Extended Adaptive Cache benefits . . . . . . . . . . . . . . . . . . . . 4.2 Extended Adaptive Cache Simulator . . . . . . . . . . . . . . . . . . . 4.3 Read Cache Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 The 1.6 GB Read Cache Device . . . . . . . . . . . . . . . . . . . . . . 4.4.1 A sample performance effect of the Read Cache Device
Part 2. Tools and tips for AS/400 DASD storage management . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Chapter 5. Extending the Integrated File System with UDFS . . . . . . . . . . 73 5.1 Creating and mounting a UDFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 5.2 UDFS considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Chapter 6. Using the QFILESVR.400 file system . . . . . 6.1 Configuring QFILESVR.400 in a TCP/IP environment 6.2 Copying objects between systems . . . . . . . . . . . . . . . 6.2.1 Sharing direct-attached optical library . . . . . . . . 6.3 QFILESVR.400 considerations . . . . . . . . . . . . . . . . . .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . 81 82 82 84 84
Chapter 7. OS/400 disk storage management tools . . . . 7.1 Identifying disk storage consumption of AS/400 objects. 7.1.1 Disk information tool . . . . . . . . . . . . . . . . . . . . . . . 7.1.2 Creating a customized disk information report . . . . 7.2 The disk balance tool. . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.1 Disk balance type . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.2 Recommendation for using balance commands . . . 7.2.3 TRCASPBAL command . . . . . . . . . . . . . . . . . . . . . 7.2.4 STRASPBAL and ENDASPBAL commands . . . . . . 7.2.5 Integrated File System and HSM Balance . . . . . . . 7.2.6 DSKBAL command . . . . . . . . . . . . . . . . . . . . . . . . 7.3 Management Central disk resource utilization monitor . . 7.4 Disk reorganization tool . . . . . . . . . . . . . . . . . . . . . . . . . 7.4.1 Using the STRDSKRGZ command. . . . . . . . . . . . . 7.5 Automating disk management commands . . . . . . . . . . . 7.6 Web sites on the Internet for system management . . . .
. 87 . 87 . 89 . 98 . 99 100 105 105 107 108 109 111 117 118 119 120 121 121 122 123 124 126 129 130 132 142 142
Chapter 8. Runaway DASD . . . . . . . . . . . . . . . . . . . . . . . . . 8.1 Disk and growth terminology . . . . . . . . . . . . . . . . . . . . . . 8.2 Storage concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.3 Detecting DASD consumption problems . . . . . . . . . . . . . 8.3.1 An auxiliary storage threshold has been reached . . . 8.3.2 A rapid increase in disk storage has been observed 8.3.3 What to do next . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.3.4 Your system is slowing down . . . . . . . . . . . . . . . . . . 8.3.5 Your system has stopped. . . . . . . . . . . . . . . . . . . . . 8.4 Analyzing DASD consumption problems . . . . . . . . . . . . . 8.4.1 Using disk information tools . . . . . . . . . . . . . . . . . . . iv
AS/400 Disk Storage Topics and Tools
8.4.2 Using performance tools . . . . . . . . . . . . 8.4.3 Using APIs . . . . . . . . . . . . . . . . . . . . . . 8.4.4 Using the Performance Explorer (PEX) . 8.4.5 Using Enhanced PEX Trace . . . . . . . . . 8.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
.145 .149 .157 .159 .169 171 171 172 172 173 173 174 174 176 178 179 179 179 184 185 185 186 190
Appendix A. Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.1 AS/400 buses and interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.1.1 Private and main storage buses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.1.2 I/O bus (system I/O buses) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.1.3 I/O bus (IOP/IOA to device buses) . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.2 SPD and PCI architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.2.1 Device Function Controller Interface (DFCI) bus . . . . . . . . . . . . . . . . . A.2.2 Small Computer System Interface (SCSI) bus . . . . . . . . . . . . . . . . . . . A.2.3 The system power control network (SPCN) bus . . . . . . . . . . . . . . . . . . A.3 SPCN interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.4 AS/400 IOP and IOA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.4.1 Hierarchy of microprocessors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.4.2 Input output processor (IOP) and input output adapter (IOA) . . . . . . . . A.5 DASD I/O cables within the AS/400 system . . . . . . . . . . . . . . . . . . . . . . . . . A.6 AS/400 device controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.6.1 Controller functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.7 DASD terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.7.1 Read/Write I/O process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix B. Storage management terms used in SLIC . . . . . . . . . . . . . . . 193 Appendix C. Non-removable storage (DASD) . . . . . . . . . . . . . . . . . . . . . . . C.1 DASD available for the AS/400 system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.1.1 280X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.1.2 9337 DASD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.1.3 Enterprise Storage Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.1.4 Versatile Storage Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.2 Internal DASD: SPCN versus Non-SPCN . . . . . . . . . . . . . . . . . . . . . . . . . . . C.3 Expansion Towers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.3.1 #508x Storage Expansion Tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.3.2 #5065 Storage/PCI Expansion Tower. . . . . . . . . . . . . . . . . . . . . . . . . . C.3.3 #5066 1.8 I/O Tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 195 195 195 197 197 198 199 199 199 200
Appendix D. WRKDASD sample code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Appendix E. Using the additional material. . . . . . . . . . . . . . . . . . . . . . . . . . 217 E.1 Locating the additional material on the Internet . . . . . . . . . . . . . . . . . . . . . . 217 E.2 Using the Web material. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Appendix F. Special notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Appendix G. Related publications . . . . . . . G.1 IBM Redbooks . . . . . . . . . . . . . . . . . . . . . G.2 IBM Redbooks collections. . . . . . . . . . . . . G.3 Other resources . . . . . . . . . . . . . . . . . . . . G.4 Referenced Web sites. . . . . . . . . . . . . . . . ...... ...... ...... ...... ...... ....... ....... ....... ....... ....... ...... ...... ...... ...... ...... ....... ....... ....... ....... ....... 223 223 224 224 225
How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227 IBM Redbooks fax order form. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 v
vi
Figures
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. CISC system architecture overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Comparison of CISC and RISC architectures . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Partition Licensed Internal Code (PLIC) and the Hypervisor . . . . . . . . . . . . . . . 8 CISC (LIC) architecture strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Model D, E, F 3xx and 4xx, physical slots, DSA, and logical address . . . . . . . 11 #5042/#5044 physical slots, DSA, and logical address . . . . . . . . . . . . . . . . . . 12 Display of product activity log (PAL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Service Action Log (SAL) report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Failing item information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Model 500 physical slots, DSA, and logical addressing . . . . . . . . . . . . . . . . . . 15 9406 Model 720 physical slots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Model 720 DSA logical addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Example of Expert Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Example of using the Read Cache Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Example LPAR configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Mirroring levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Remote DASD mirroring of the entire system or of ASPs . . . . . . . . . . . . . . . . 29 Checksum theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Checksum recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Checksum striping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Device parity protection on 9337 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 DPY: Less than eight drives installed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 DPY: 16 drives (two DPY sets) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Integrated Hardware Disk Compression (IHDC) architecture . . . . . . . . . . . . . 35 Savings example with HSM and DASD compression . . . . . . . . . . . . . . . . . . . 37 Hierarchical Storage Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Auxiliary storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Single level storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Scatter load on a single ASP AS/400 system . . . . . . . . . . . . . . . . . . . . . . . . . 41 Scatter load on a multi ASP AS/400 system . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Journaling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Example of multiple system setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 A conceptual illustration of data banding on disk storage . . . . . . . . . . . . . . . 58 Extended Adaptive Cache architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 CPW response time: EAC without Expert Cache. . . . . . . . . . . . . . . . . . . . . . . 60 CPW response time: EAC with Expert Cache . . . . . . . . . . . . . . . . . . . . . . . . . 60 The #2748 disk controller: Jumper setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 System Report without RCD or Expert Cache . . . . . . . . . . . . . . . . . . . . . . . . . 65 Component Report without RCD or Expert Cache. . . . . . . . . . . . . . . . . . . . . . 66 Workload without Expert Cache and with Read Adaptive Device Utilization . . 67 Workload without Expert Cache and with Read Adaptive Device Disk Activity 67 Workload with Expert Cache and without Read Adaptive Device Utilization . . 68 Workload with Expert Cache and without Read Adaptive Device Disk Activity 69 Expanding Integrated File System group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Creating a new User-defined File System in ASP 2. . . . . . . . . . . . . . . . . . . . . 74 Specifying UDFS details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 CRTUDFS command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Mounting a UDFS onto an Integrated File System directory . . . . . . . . . . . . . . 76 MOUNT command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Displaying UDFS properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
vii
51. CMDUDFS menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 52. Saving UDFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 53. Copy Object display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 54. Copy Object display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 55. DISKTASKS menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 56. PRTDSKINF command parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 57. PRTDSKINF Disk Space Report (Part 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92 58. PRTDSKINF Disk Space Report (Part 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 59. Operations Navigator: Users and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 60. Personal button in the User Profiles Properties window . . . . . . . . . . . . . . . . . 94 61. Personal window: Mail tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 62. Invoking the Run Command function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 63. Run Command window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 64. Management Central: Task activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 65. Management Central: Displaying the spooled output of a completed task . . . . 97 66. Viewing a spooled file with AFP Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 67. Record format of QAEZDISK file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 68. Capacity balance: The objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 69. Capacity balance process: A conceptual view . . . . . . . . . . . . . . . . . . . . . . . . 101 70. Usage balance: The objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 71. Usage balance: A conceptual view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 72. HSM balance: A conceptual view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104 73. TRCASPBAL command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105 74. Trace ASP Balance messages in the OS/400 history log . . . . . . . . . . . . . . . . 106 75. STRASPBAL command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 76. ASP Balance messages in OS/400 history log . . . . . . . . . . . . . . . . . . . . . . . . 108 77. DSKBAL command parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109 78. Display Disk Configuration Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110 79. Expanded Management Central function group . . . . . . . . . . . . . . . . . . . . . . . 111 80. Creating a new endpoint system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 81. Creating a new monitor profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 82. New Monitor window: Metrics tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 83. Edit Thresholds window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115 84. Starting resource utilization monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 85. A real-time resource utilization monitor windows . . . . . . . . . . . . . . . . . . . . . .116 86. Disk reorganization: A conceptual view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 87. Disk reorganization messages in OS/400 history log . . . . . . . . . . . . . . . . . . . 119 88. Work with System Status display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 89. System operator message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 90. Run attributes display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 91. Work with System Status display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127 92. Management Central DASD Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128 93. Work with Disk Status display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 94. Display Disk Configuration Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130 95. Work with System Activity display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 96. Display Log Command (Part 1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 97. Display Log command (Part 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 98. Display History Log Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 99. Additional message information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136 100.Display History Log Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 101.Display Job Run Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 102.IPL screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 103.Signon screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
viii
104.Select Products display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105.IPL Options display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106.Rebuild Access Path display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107.Disk Space Report: Library Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108.Disk Space Report: Specific object Information. . . . . . . . . . . . . . . . . . . . . . . 109.Disk Space Report: Folder Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110.Disk Space Report: System Information (Part 1 of 3) . . . . . . . . . . . . . . . . . . 111.Disk Space Report: System Information (Part 2 of 3) . . . . . . . . . . . . . . . . . . 112.Disk Space Report: System Information (Part 3 of 3) . . . . . . . . . . . . . . . . . . 113.The Work with System Activity display: View 1 . . . . . . . . . . . . . . . . . . . . . . . 114.The Work with System Activity display: View 2 . . . . . . . . . . . . . . . . . . . . . . . 115.The Work with System Activity display: View 3 . . . . . . . . . . . . . . . . . . . . . . . 116.Disk Activity sample report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117.Work with DASD display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118.Work with DASD command prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119.Work with DASD display: Sorted by Auxiliary I/O . . . . . . . . . . . . . . . . . . . . . 120.Work with DASD display: Sorted by Database I/O . . . . . . . . . . . . . . . . . . . . 121.Work with DASD display: Sorted by Temporary Storage . . . . . . . . . . . . . . . 122.Work with DASD display: Work with Open Files . . . . . . . . . . . . . . . . . . . . . . 123.Display Open Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124.Work with DASD display: Work with Spool Files . . . . . . . . . . . . . . . . . . . . . . 125.Work with Job Spooled Files display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126.Work with DASD display: Work with Job Locks. . . . . . . . . . . . . . . . . . . . . . . 127.Work with Job Locks display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128.Work with DASD command prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129.Work with DASD report (Part 1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130.Work with DASD report (Part 2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.Performance Tools Main menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132.Performance Utilities menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133.Work with Performance Explorer display. . . . . . . . . . . . . . . . . . . . . . . . . . . . 134.PEX Trace Main Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135.Display Active PEX Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136.Storage Management Trace in Batch (SMTBCH) display . . . . . . . . . . . . . . . 137.PEX Trace Reports Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138.NETSIZE command prompt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139.Net size change (in bytes) of individual segments. . . . . . . . . . . . . . . . . . . . . 140.Net size change, grouped by (name, object type, segment type) . . . . . . . . . 141.Net size change, grouped by (object, segment description) . . . . . . . . . . . . . 142.Net size change by job or task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143.AS/400 buses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144.Typical SPD and PCI IOP/IOA packaging . . . . . . . . . . . . . . . . . . . . . . . . . . . 145.SPCN bus architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146.Hierarchy of microprocessors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147.SPD MFIOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148.Advanced MFIOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149.Addressable storage unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150.DASD track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.DASD cylinder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152.DASD sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153.DASD sector format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154.Header information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155.Read/write head move (seek) (1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156.Read/write index detection (2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
140 140 141 142 143 143 144 144 145 146 147 147 148 149 150 151 151 152 152 153 153 154 154 155 155 156 157 158 158 159 161 161 162 163 164 165 165 166 166 171 173 177 179 182 183 186 187 188 188 189 189 190 191
ix
157.Read/write data read (3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 158.Read/write data transmission (4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 159.9337 DASD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196 160.Library contents of WRKDASD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 161.Source listing for the physical file DATAFILE . . . . . . . . . . . . . . . . . . . . . . . . .202 162.Source listing for the physical file DBIOFILE . . . . . . . . . . . . . . . . . . . . . . . . . 203 163.Source listing for the physical file HOLDFILE. . . . . . . . . . . . . . . . . . . . . . . . .203 164.Source listing for the display file WRKDASD (Part 1 of 2) . . . . . . . . . . . . . . .204 165.Source listing for the display file WRKDASD (Part 2 of 2) . . . . . . . . . . . . . . .205 166.Source listing for the CL program GETDBIO . . . . . . . . . . . . . . . . . . . . . . . . . 205 167.Source listing for the RPG program WRKDASD (Part 1 of 11) . . . . . . . . . . . 206 168.Source listing for the RPG program WRKDASD (Part 2 of 11) . . . . . . . . . . . 207 169.Source listing for the RPG program WRKDASD (Part 3 of 11) . . . . . . . . . . . 208 170.Source listing for the RPG program WRKDASD (Part 4 of 11) . . . . . . . . . . . 209 171.Source listing for the RPG program WRKDASD (Part 5 of 11) . . . . . . . . . . . 210 172.Source listing for the RPG program WRKDASD (Part 6 of 11) . . . . . . . . . . . 211 173.Source listing for the RPG program WRKDASD (Part 7 of 11) . . . . . . . . . . . 212 174.Source listing for the RPG program WRKDASD (Part 8 of 11) . . . . . . . . . . . 213 175.Source listing for the RPG program WRKDASD (Part 9 of 11) . . . . . . . . . . . 214 176.Source listing for the RPG program WRKDASD (Part 10 of 11) . . . . . . . . . . 215 177.Source listing for the RPG program WRKDASD (Part 11 of 11) . . . . . . . . . . 216 178.Source listing for the WRKDASD command. . . . . . . . . . . . . . . . . . . . . . . . . . 216
Tables
1. 2. 3. 4. 5. 6. WRKASP functions cross-reference table for OS/400 and BRMS. . CD-ROM options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Read Cache Device configuration rules . . . . . . . . . . . . . . . . . . . . . . Read Cache Device test: Performance results . . . . . . . . . . . . . . . . PEX Trace recommended parameter values . . . . . . . . . . . . . . . . . . Files generated by PEX Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... ....... ....... ....... ....... ....... . 49 . 54 . 63 . 70 162 167
xi
xii
Preface
Uncover the basics of AS/400 disk storage. This redbook is designed to help AS/400 system administrators and operators gain a broad understanding of AS/400 disk storage, architecture, and management. The technology covered in this redbook is based on current AS/400 system offerings, along with pertinent history, in contrast to newer technology and methods. This book is divided into two parts. Part 1 discusses hardware architecture and components, while Part 2 discusses tools to manage disk storage. Youll gain a base understanding of AS/400 system architecture and learn about the architecture of disk storage, disk storage components, and disk storage options. Youll also learn about the storage features that are available to maximize the availability and performance of the disk subsystem. Plus, this redbook offers information on tools and tips to help the AS/400 system administrator and operator to better manage the AS/400 disk storage subsystem space utilization, both historically and in real-time. Management tips are based primarily on the software components offered with OS/400 V4R4. Throughout this redbook, the term direct address storage drive (DASD) is used. For the AS/400 system, DASD is another term for disk storage. We use these two terms interchangeably.
xiii
Migrations and System Transitions. Pat holds a Certified Electronic Technician degree from the Association of Certified Electronic Technicians through Charles Stuart Mott University and is a Certified Technical Trainer recognized by the International Board of Standards for Training Performance and Instruction. Olga T. Saldivar is an AS/400 Hardware and Software Services Instructor and Developer for IBM Global Learning Services in Atlanta, Georgia. She has 20 years of experience in the technology field, ten years as an IBM Customer Service Representative, and the remaining ten years in education. She has developed and delivered courses on DASD Management and AS/400 hardware maintenance and services primarily to internal IBM service personnel. She has presented numerous topics at the IBM AS/400 Technical Conferences. Olga holds a degree in computer repair from the Electronic Technical Institute in San Diego, California, and is a Certified Technical Trainer recognized by the International Board of Standards for Training Performance and Instruction. Satid Singkorapoom is an Advisory Product Specialist in IBM Thailand. He has nine years experience with the AS/400 system. He holds a masters degree in Computer Engineering from the Asian Institute of Technology, Thailand. His areas of expertise include AS/400 Client/Server and AS/400 Technical Sales. He has been extensively involved with customers on AS/400 product technology updates and AS/400 technical sales and marketing activities. He also co-authored the 1999 redbook AS/400 Client Access Express for Windows: Implementing V4R4M0, SG24-5191. Thanks to the following people for their invaluable contributions to this project: Jim Cook International Technical Support Organization, Rochester Center Brian Podrow AS/400 Brand Marketing Sue Baker AS/400 Product Support Brian Bakke Steve Beilby Larry Connoy Tom Crowley Julie Duncan Carl Forhan Bob Galbraith Jessica Gisi Dave Legler Bruce Long Mark Manges Glen Nelson Steve Norgaard Dan OHare Jeff Parker Luz Rink Laurel Scaife Kevin Swancutt
xiv
Comments welcome
Your comments are important to us! We want our redbooks to be as helpful as possible. Please send us your comments about this or other redbooks in one of the following ways: Fax the evaluation form found in IBM Redbooks review on page 233 to the fax number shown on the form. Use the online evaluation form found at http://www.redbooks.ibm.com/ Send your comments in an internet note to [email protected]
xv
xvi
The items outlined in this section include: Service Processor functions Basic Assurance Tests (BATs) Service Processor and control panel interface Walking the bus during an IPL Events during an IPL
Service processor functions The AS/400 system uses the service processor to get the system processor (also known as the central processor unit or CPU) to an operational state. The CPU also uses the service processor to provide error reporting and debug operations for the system CPU. Some of the basic functions of the service processor are: Starts the system IPL Tests bus 0 Tests the CPU Loads the CPU LIC Provides a system termination path (SRC display) Supports read and write time of day Supports read and write system Vital Product Data (VPD) Supports Programmed restart IPLs (that is, a PWRDWNSYS *IMMED RESTART(*YES) command) Controls delayed power off Provides a general control panel interface The following hardware is specifically service processor hardware (as compared to system processor hardware): The time-of-day chip The system Vital Product Data (VPD) storage The Control panel interface Basic Assurance Tests (BATs) During the IPL process, the service processor verifies that the I/O bus, the load source I/O bus unit, the system processor, and the service processor itself are operational. It also supplies specific fault information to the user in the event of a failure during this verification process. These are known as Basic Assurance Tests (BATs). Service processor and control panel interface The control panel connects to the service processor and sets up an interface for the user from which the IPL source can be selected and for indicating status and error conditions. The control panel Licensed Internal Code gives the service processor and operating system access to control panel functions. Walking the bus during IPL On early 9406 systems (that is, the stage 1 model B), the service processor must search multiple bus units on I/O bus 0. Bus 0 is the first I/O bus on these models. This search consists of: A sequence of bus commands that first identifies the bus configuration, including location and state of each bus unit, and then checks each bus unit to find the service processor load. An expected response from the bus unit identifying itself as the load source I/O bus unit.
Having located the load source I/O bus unit, the read-only storage (ROS) Licensed Internal Code loads the service processor random access memory (RAM) control storage with the service processor run-time code and turns control over to that Licensed Internal Code. On the next series of models manufactured after the model B, the service processor was designed to be part of a multiple function I/O bus unit. On these models, the service processor is combined with disk, diskette, tape, communications, and on some models CD-ROM support. Searching for the load source I/O bus unit is quicker during IPL because bus 0 does not need to be searched to get the service processor code load. The IPL is performed from disk or tape devices attached directly to the system. Events during IPL The sequence of events that occur during an IPL from a powered-down condition are outlined here: 1. When the system is first powered on, the service processor: Assumes control of bus 0 and obtains its Licensed Internal Code load-source from disk or tape. Retrieves the Licensed Internal Code for the system processor. 2. The service processor sets up the interface between the operating system and control panel functions. 3. Control storage is loaded with a sequence of BATs to check out the system processor. 4. The system processor Vertical Licensed Internal Code (VLIC) is loaded into main storage, followed by the Horizontal Licensed Internal Code (HLIC), which is loaded into system processor control storage. 5. The system processor is started and, when the horizontal code is initialized, the service processor code instructs the system processor to start reading control words out of control storage. Once the Vertical Licensed Internal Code startup is complete, control of I/O bus 0 is transferred from the service processor to the system processor. 6. The system processor Vertical Licensed Internal Code continues loading code from the remaining I/O devices attached to the system. 7. Once the system is running, the user sign-on screen is displayed on the system console or attached and available workstations. For more detailed descriptions of other components of the AS/400 system, such as the various IOPs and IOAs related to storage, turn to Appendix A, Architecture on page 171.
The first portion of LIC to be described is the Technology Independent Machine Interface (TIMI). Then, a detailed description of LIC is presented for both RISC and CISC systems.
that a partition uses the resources that it owns, and provides the service processor and control panel functions for the secondary partitions. Figure 3 shows where PLIC and PLIC code fit into the internal structure on an LPAR system.
Applic a tions
Applic ations
A pplic a tions
A pplic ations
O S /4 00
O S /4 00
O S /40 0
O S /4 00
S LIC
S LIC
S LIC
S LIC
For additional online articles about LPAR, visit this Web site:
http://publib.boulder.ibm.com/pubs/html/as400/v4r4/ic2924/info/INFOCENT.HTM
Or refer to Slicing the AS/400 with Logical Partitioning: A How to Guide, SG24-5439. IMPI-based LIC on CISC systems (all systems up to and including V3R2) The AS/400 CISC architecture is similar to the Internal Microprogram Instruction (IMPI) architecture developed for the System/38. IMPI is divided into five distinct layers, each layer giving support to the layer above and the layer below. Refer to Figure 4 for a visual representation of LIC on a CISC system.
The architecture is designed so that a change to one level does not affect a function at a different layer. And knowing how the layers work with each other gives a better understanding of the system when diagnosing problems.
10
Bus 0
Bus 1
IOP
IOP
IOP
IOP
IOP
IOP
IOP
IOP IOP
IOP
IOP
1
0 0 1 0
2
0 0 2 0
3
0 0 3 0
4
0 0 4 0
5
0 0 5 0
6
0 0 6 0
7
0 1 7 0
8
0 1 8 0
9
0 1 9 0
10
0 1 A 0
11
0 1 B 0
12
0 1 C 0
13
Figure 5. Model D, E, F 3xx and 4xx, physical slots, DSA, and logical address
Processor
MFIOP
11
Bus 3/5/7
IOP
IOP
IOP
IOP
IOP
IOP
IOP
IOP IOP
IOP IOP
IOP
1
0 X 0 0
2
0 X 2 0
3
0 X 3 0
4
0 X 4 0
5
0 X 5 0
6
0 X 6 0
7
0 X 7 0
8
0 X 2 0
9
0 X 3 0
10
0 X 4 0
11
0 X 5 0
12
0 X 6 0
13
0 X 7 0
The first digit in the unit address displays a port number. This is the port on the IOP card. This port number is also referred to as the bus number. It is important to understand that this port (bus) number is not the system I/O bus, rather it is the SCSI bus related to the IOP card. On external devices, the device controller number is often set with a switch. For internal devices, it is set by the system. For internal devices, the controller is often physically part of the logic card attached to internal Head Disk Assemblies (HDAs). It should be understood that, although DSA addressing is a logical address, it does not always follow what we may feel is a logical flow. Direct select addressing is how the system talks to us about individual components. The system references DSA addresses in operator's messages, problem logs, and error logs on the CISC platform. On the RISC platform, the problem logs are split into two different logs: a product activity log (PAL) for customer review, and the service action log (SAL), used by service representatives for a repair action. For an example of the report generated when displaying the PAL, see Figure 7.
12
From...:10/06/99
14:05:18
To...: 10/08/99
14:05:18
6=Print report
Opt 5
More..... F12+Cancel
This is the type of information you provide to your service representative. They use it for failure analysis and repair. They also use the SAL report for detailed information. For an example of the SAL, see Figure 8.
From...: 10/06/99
14:22:48
To...: 10/08/99
14:22:48
2=Display failing item information 9=Delete a CLOSED entry Opt 2 Status NEW NEW Date 10/07/99 10/07/99 Time 16:27:07 16:45:14
Isolated? Y N
Count 1 4
F3=Exit
F12=Cancel
Notice there is an option to obtain failing item information (option 2). After selecting the display failing item information option from the service action log report, the detail includes the DSA. Figure 9 on page 14 provides an example of this.
13
Description DISK DRIVE AND LOGIC CARD I/O ADAPTER CARD DISK UNIT TRAY REMOVABLE MEDIA OR DISK UNIT NOT ACTIVE CABLE ASSEMBLY
Location
Notice how it provides a failing item listing. The items are presented in order of probable cause of failure. It is imperative to realize that DSA does not always follow a logical flow. For example, refer to the DSA plug charts for the Stage 2 model 35 and 45s, as shown in Figure 5 on page 11. Instead of referencing the logical components on a bus (like logical addressing does), DSA counts from 1 through C on both buses. It is tempting to, therefore, assume it counts logically through the card cage instead of the bus, but this is a wrong assumption. For an example, refer to the DSA plug chart for a #5042 and #5044 card cage as shown in Figure 6 on page 12. The DSA starts counting with 0, skips 1, and continues with 2. It is also worth noting that the card in physical slot 1 actually has two DSA addresses. For example, in Figure 6, if the #5042 is the first expansion in the system, it adds buses 2 and 3. Then the card in physical slot 1 has a DSA address of both 0200 and 0300. If a component on the card that only affects bus 2 fails, the system tells you to replace the card at 0200. If a component on the card, that only affects bus 3 fails, the system tells you to replace the card at 0300. If the entire card fails, the system tells you to replace two cards, both 0200 and 0300, even though this is in fact the same card. An even more dramatic example is on the Model 500 system unit. Refer to Figure 10 to observe that the logical and DSA addressing match. However, they are nothing like the physical slot order.
14
REAR VIEW
D I S K
D I S K
D I S K
D I S K
D I S K
D I S K
D I S K
D I S K
RR E E GG U L A 1 T O R
02
03
04
05
06
07
08
3 2
Figure 10. Model 500 physical slots, DSA, and logical addressing
Admittedly, all of this can become very confusing. The point we are making is: do not trust that you know DSA addressing. This is especially important in the Advanced Series and e-Series AS/400 systems.
Note
Using the wrong DSA can destroy critical data. Be sure to look up the address every time.
In Figure 11 on page 16, observe the physical placement of the PCI board which is the MFIOP board for the AS/400e series.
15
LEFT
PCI Cards
Disk Unit Controller PCI Slot ECS & Console PCI Slot
FRONT
Slot C11* C10 C09 C08 C07 C06 C05 C04 C03 C02* C01*
Tape/CD Cage D02 D01
CD-ROM
TAPE Op Panel
FAN
Op Panel
Processor-Main Storage
Main Storage Main Storage Expansion M05 M04 Disk Unit Cage
480 Watt Power Supply
L01
FAN
L03
L04
L05
FAN
FC.7128
F01 F02 F03 F04 F05
Battery
Battery
UPS Electronics
UPS Electronics
KEY:
This example is of a Model 720. Due to the PCI technology, multiple IOAs can be installed in the MFIOP board. As there are multiple PCI cards installed, each slot needs to have its own unique address for the system to access the I/O attached to the individual IOA. In Figure 12, observe that the DSA addresses vary by physical slot position.
IOA 0110 0FFF IOA 0110 EXXX IOA 0110 EXXX IOA 0110 EXXX IPCS 0110 E4FF 0110 E5FF IOA 0110 E401 IOA 0110 E400 CFIOP 0120 FFFF IOA 0120 EXXX IOA 0120 EXXX
16
The first four digits represent the controller with which the IOA is associated. The board itself provides the first controller, and slots C04 through C11 are controlled by it. The second controller is installed in slot C03. This is an optional feature. When the second controller is installed, slots C01and C02 are controlled by it. If the second controller in slot C03 remains empty, the last three slots on this board are inactive. The last four digits of the address on AS/400e series models vary, depending on the type of card (for example whether it is a communication or workstation controller card). This addressing scheme is a unique characteristic to this family of processors. To properly manage and maintain the AS/400 system, it is important to understand the addressing characteristics for each component of the AS/400 Advanced Series and e-series systems. Refer to your IBM Service Representative and the problem analysis and service information guide associated with your system for more information. Schematics are also found in AS/400 System Builder, SG24-2155. Note: The problem analysis guides vary by the associated system type. The correct edition must be used to properly locate a component in an AS/400 system. For a more detailed discussion of the theory and the architecture of AS/400 buses, IOPs, IOAs, and the various controller functions, refer to Appendix A, Architecture on page 171.
1.4 Summary
This chapter introduced you to the concepts of the AS/400 system architecture, beginning with identifying basic system unit components and walking through the flow of an IPL sequence. It provided an overview of differences in the manner in which the AS/400 system addresses and communicates with its device components in the CISC platform versus the RISC platform. There was also an overview of the various levels of License Internal Code, including an introduction to the layer of code announced with V4R4 that aids in the implementation and management of AS/400 logical partitions (LPAR).
17
18
The architecture of the AS/400 system allows for other types of devices to be direct access storage devices. In this redbook, when the term direct access storage is used, it is meant to imply disk drives.
2.2 Cache
Cache is a supplemental memory system that temporarily stores frequently used instructions and data. Cache allows for quicker processing by the central processor of a computer. The cache augments, and is an extension of, a computer's main memory. Both main memory and cache are internal, random access memory (RAM). Both use semiconductor-based transistor circuits.
19
Caching theory assumes that optimal caching occurs as close to the processor as possible. By caching in main storage, the system not only eliminates accesses to the storage devices, but all associated I/O traffic on the internal system buses as well. In addition, an algorithm running in the main processor has a better view of actual application trends and should do a better job, overall, of assessing what data should be cached. Expert Cache works by minimizing the effect of synchronous DASD I/Os on a job. The best candidates for performance improvement are those jobs that are most affected by synchronous DASD I/Os. The ten jobs with the largest synchronous disk I/O count per transaction are noted on the Job Statistics section of the Transaction Report. Other System, Component and Transaction reports available with the AS/400 Performance Tools/400 (5769-PT1) licensed program product also identify disk I/O statistics. Refer to Performance Tools/400, SC41-4340, for a description of each field and report relative to synchronous I/O. Expert Cache provides a disk cache tuner option, which allows the AS/400 system to take advantage of available main storage capacity. The tuner dynamically responds to system jobs to cache pages of data in main storage, thus reducing the time to process disk I/O. Refer to Figure 13 for the position of Expert Cache within a caching strategy.
CPU
CTLR
26 MB Write Cache
20
algorithm considers how recently and how frequently the host has accessed a predetermined range of data. For additional detail regarding Extended Adaptive Cache, refer to Chapter 4, Extended Adaptive Cache (EAC) on page 57. 2.2.2.1 Read Cache Device (RCD) The Read Cache Device is a solid state 1.6 GB cache memory assembled in a package. From the exterior, it resembles an AS/400 disk unit. The RCD is optimized for use as cache memory on the AS/400 system. Instead of a spinning platter inside, the RCD is packed with solid state memory chips that function at electronic speeds. It can be installed in a disk slot of the AS/400e server or expansion storage enclosure using disk concurrent maintenance, if the slot you install it in is vacant. Only one RCD can be installed per feature code #2748. If your system currently has all DASD slots filled, plan for the removal both logically and physically of one disk unit to accommodate the RCD. Once installed, the I/O adapter detects the RCD through automatic polling, and Extended Adaptive Cache goes to work. The Read Cache Device helps reduce physical read requests to disk units attached to the same #2748 controller as the RCD. The RCD can be used with RAID-5 protected storage devices or storage subsystems with mirrored protection. The RCD itself does not require RAID-5 or mirrored protection because all data contained on the RCD is also on the disks. RCD storage is volatile. In the event of a RCD failure, read caching is suspended and the system continues to run. The Read Cache Device (RCD) is the memory for Extended Adaptive Cache. Purchase and install RCD for the Extended Adaptive Cache to function. Figure 14 shows an example of how Read Cache Device (RCD) fits in the caching function architecture.
PCI Bus
SCSI Buses
Storage Devices
Figure 14. Example of using the Read Cache Device
RCD
21
For additional detail regarding implementation of the Read Cache Device, see Chapter 4, Extended Adaptive Cache (EAC) on page 57. For information regarding physical characteristics and proper physical placement of the RCD, refer to Chapter 3, Storage options on page 53.
Rely on this Web site for direction and management tips on Logical Partitioning:
http://www.as400.ibm.com/lpar/
22
For additional online articles about LPAR, visit this Web site:
http://publib.boulder.ibm.com/pubs/html/as400/v4r4/ic2924/info/INFOCENT.HTM
23
24
Refer to the following Web site for a white paper to explore how deploying an IBM enterprise Storage Area Network (SAN) can help make the corporate information utility a reality: http://www.storage.ibm.com/ibmsan/whitepaper/strategy.htm
25
See Chapter 3, Storage options on page 53, for additional physical characteristics and IOP requirements for the VSS Storage option for the AS/400 system.
26
DASD management, including mirroring, check summing, data parity protection, integrated hardware disk compression, Auxiliary Storage Pool (ASP), and Hierarchical Storage Management (HSM). In order for you to understand and implement the following availability concepts, it is imperative that you read the AS/400 Backup Recovery Guide, SC41-5304. Be sure to use the correct version and release level of documentation for your system when planning your DASD configuration and protection.
27
IOP I/O Bus IOP Controller Disk Unit IOP Controller Disk Unit I/O Bus IOP
2.10.1.2 Remote DASD mirroring of the entire system or of ASPs Remote mirroring support makes it possible to divide the disk units on your system into a group of local and a group of remote disk units. The remote disks attach to one set of optical buses. The local disks attach to a different set of buses. The local DASD and the remote DASD can be physically separated from one another at different sites by extending the applicable optical buses to the remote site. The distance between the sites is restricted by the distance an optical bus can be extended. Limited cable distance enhances acceptable performance for synchronous operation, and local-like performance and reliability. Note: Although optical technology supports distances up to 2 km (when 16 or less disk units are installed, up to 500 meters for System Unit Expansion Towers with 17 to 32 disk units), disk and high speed tape operations must be reviewed to support distances beyond 100 meters. Refer to RPQ 841958 System Cabling Information (available from IBM marketing and service) when ordering a variation from the default cable length. For specifics about your installation, contact your service provider and refer to Site Preparation and Physical Planning at the AS/400 Technical Studio site:
http://www.as400.ibm.com/tstudio/planning/plngstrt.htm
When remote DASD mirroring is started, the local disk is mirrored to remote disk units. If a failure occurs at either the local or remote location, a complete copy of all data for the system still exists. The system configuration can be recovered from the unaffected mirrored members, and processing can continue. If the distance between the main and remote location is such that a site disaster does not affect both systems, mirror all DASD in all ASPs of the system in local-remote pairs to help protect against a single site disaster.
28
Refer to Figure 17 for a visual representation of remote DASD configuration. The drawing represents a simple configuration of a 9406 model 7xx, with a remote bus mirrored to a single I/O bus tower.
System Unit
Mirrored
29
following graphics, Figure 18 shows the checksum theory, Figure 19 shows the checksum recovery process, and Figure 20 shows checksum striping.
DATA
10110101
DATA
00110111
SUM
Sum: 0 1 1 1 1 1 0 1
DATA
10110101
DATA
00110111
SUM
Sum: 0 1 1 1 1 1 0 1
Recreate: 1 0 1 1 0 1 0 1
Figure 19. Checksum recovery
As portrayed, checksum data is calculated based on a pairing of like 0s or 1s. Identical twin numbers are written as 0. A pair of numbers that are not alike is written as a 1 on the sum disk unit. In this way, it is always possible to calculate the data on any missing unit of the set.
30
Checksum Data
Figure 20. Checksum striping
System level checksumming is a valid protection method for CISC systems. However, there are times (particularly when older technology is involved) when more than one disk fails at the same time. In most cases, this requires a complete reload of the affected ASP to recover. While a single disk failure can be recovered from, concurrent maintenance does not apply. The system is unavailable to users for the duration of the recovery. A more reliable protection method was designed and introduced, and so came about a similar, yet higher system availability-oriented method, known as Device Parity Protection (DPY). DPY allows for concurrent maintenance in a single failed DASD repair action, which translates to no associated downtime. The following section describes this method of protection.
31
Bus
Write-Cache (2xx, 4xx, and 5xx models)
Note: First four logical files have parity, 1xx, 2xx, 4xx and 5xx models in HA mode only
IO Processor Controller
Redundant Power
Power
1
Base Models
Power Power
Features positions
Internal DASD installed in a #5051 or #5052 is available for the AS/400 Advanced series 3xx models. All internal DASD (except those attached to the MFIOP), are eligible for DPY if the proper DASD IOP is installed. Previously, DASD designated as internal were those installed in the card cage and logically associated with the MFIOP. These were not eligible for DPY. For a detailed description of which DASD IOPs support RAID, see Appendix A, Architecture on page 171. A minimum of four disk units of the same capacity is required for a valid Redundant Array of Independent Disk (RAID-5) configuration. Parity information can be spread across four or eight of the disk units in an array. Any number of drives (up to ten) can be protected. The set is automatically maintained as part of the RAID-5 protection feature. Internal disk units of different technology (that is, different feature numbers), but of the same capacity, can be either mirrored or RAID-5 protected. RAID-5 protection is supported for all 1.03 GB, 1.96 GB, 4.19 GB, 8.58 GB, and 17.54 GB (1-byte or 2-byte disk units), provided that the disk controller supports RAID-5 protection. When less than seven DASD are installed in a storage expansion unit (#5051, #5052 or #5058), the maximum number of drives to contain parity stripes is four. When using the storage expansion units #5052 or #5058, up to sixteen DASD can be installed. With this physical configuration, when all DASD installed are unprotected, the code creates two sets of 8 parity striped drives when device parity is started. Refer to Figure 22 to observe the striping for internal DASD with less than eight drives installed.
32
Given the correct number of drives being physically available, attached to the same IOP and operational, the system stripes the maximum number of DASD for a set, to include eight members.
Parity Stripes
K9 K10 K11 K12 K13 K14 K15 K16
@1100 @1200 @1300 @1400 @1500 @1600 @1700 @1800
Mod 074
Mod 074
Mod 074
Mod 074
Mod 070
Mod 070
Mod 070
Set of Parity
K8
K1
K2
K3
K4
K5
K6
K7
@0400 @2500
Note the model numbers of the drives in Figure 22. The models with a zero as the last digit do not contain parity stripes. Spreading parity across eight disk units can provide better performance in the event of a disk unit failure, since the information required to dynamically rebuild the data on the failed disk after replacement is accessed from an eighth of the disk units, as opposed to one-fourth. The disk unit controller reads the parity and data from the same data areas on the other disk units to dynamically rebuild the original data from the failed disk unit to satisfy ongoing read requests. When data needs to be recreated, the controller generates the parity information for the failed disk unit as if it were still operating. As far as the AS/400 system is concerned, the subsystem continues to respond to I/O even though a single disk unit has failed. A RAID controller is necessary when concurrent maintenance support is required. Of course protection must be activated to allow concurrent maintenance to take place. Use of concurrent maintenance is supported only to replace a failed drive with the same size replacement drive. Figure 23 on page 34 shows an example of a fully populated #5052 or #5058 when DPY is activated. Note that two sets are generated, each having all members with parity stripes.
33
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Parity Set 2
K9
K10
K11
K12
@1400
K13
@1500
K14
K15
K16
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Mod 072
Parity Set 1
K1
K2
K3
@0300
K4
@0400
K5
K6
K7
K8
@0100 @0200
Notice that the last digit in the model number is a two. This is an indication that the drive is a member of an 8 striped drive parity set. Note in Figure 22 that the last digit on four of the DASD was a four. This is an indication that those DASD are members of a parity set that has only four striped drives. The other drives have full capacity available for customer data. In either case, no matter whether there are four or eight drives that contain parity stripes, each DPY set must provide the total capacity of one member of that set to store the parity information on. For example, if the DPY set is made up of four, 8 GB DASD, parity stripes add up to 8 GB of information for that set. If there were eight members (8 GB each) of the DPY set, each containing parity stripes, the set still requires 8 GB of space to store parity information for that set.
34
CPU
Main Store
Compress
Disk Controller
Decompress
With hierarchical storage management (HSM), the DASD to receive demoted data must be in a user ASP. The user ASP can contain any combination of disk unitsslower technology, compressed units, or faster technology. HSM provides an automated method to distribute data based on frequency of use across all levels of single level storage. While compression is not required to use this form of data management (HSM), it provides a greater amount of capacity for the data. Create what may be termed a slow ASP and assign older technology drives to that ASP. They operate with less throughput than new technology drives. Then, add new and faster technology drives to this ASP with compression active for them. Objects spread across this group of drives is compressed or not, depending on which DASD the data is stored. This ASP with slower DASD assigned is a likely candidate to use for archiving, journaling, Internet applications and other processes that do not require high speed access to the data. Keep the production work that needs high speed disk access in the system ASP. To improve performance of your production ASP (ASP 1), move less often used data to a separate ASP. The data remains available to programs, independent of ASP assignment. By compressing the less-used data, it takes less DASD space, thus lowering the overall cost of DASD. The process is managed by software and is transparent to end users. You can grow the storage by adding additional drives either through purchasing new drives or by using drives you already have on the system. User ASPs may be used for journals or to perform backup processes to minimize downtime.
35
Once disk compression is initiated on a system, status can be viewed through the Display Disk Configuration screen in Dedicated Service Tools (DST) or System Service Tools (SST). There are minimum requirements for the type of hardware necessary to implement HSM. There is no special requirement for drives. Any drive supported on the system can be compressed as long as the version/release of the software supports compression, and the appropriate DASD IOPs are installed for the specific drive type to be compressed. For specific configuration rules, refer to Appendix C of the AS/400 940x Installation and Upgrade (publication number varies by version and release and AS/400 system model). At V4R4, all internal disk drives not in the system ASP can be compressed. On V4R3, the 17.54 GB drive is not supported for compression. Refer to Appendix A, Architecture on page 171, for a discussion and listing of which IOPs support compression. Compression IOPs were introduced in tandem with OS/400 V4R2. To implement integrated hardware disk compression, the IOP must support compression. Only specific Ultra-SCSI controllers are compression-capable. When a drive is compressed, there is at minimum a 2-to-1 compression ratio. It is possible to see as much as a 4-to-1 compression ratio. Most systems see something between the 2-to-1 and the 4-to-1 ratio. You can expect approximately 8 GB of capacity on a 4 GB drive, 2 GB capacity on a 1 GB drive, and so on. The amount of compression that takes place depends on the characteristics of the data that is being compressed. For example, source code compresses more than program code. Images are already stored in compressed form and gain little (if any) by further hardware compression. Storage costs can be reduced when you use HSM and compressed DASD. Figure 25 shows an example of a system with one TB of data100 GB of data used within the last 30 days, 300 GB of data used within one year but not within the last 30 days, and 600 GB of data not used within the last year.
36
Figure 25 shows a pre-HSM cost of storage versus the cost of storage when using HSM. Be aware that this is an example only. The cost savings for each system varies. The numbers are based on a unit cost.
000,681
000,006 000,006
BM/ecirP )X3( epaT )x2( ksiD desserpmoC ecirP latoT ksiD freP hgiH
Fast DASD
rfo Pe an rm
st Co
Slow DASD
ce
Tape
Data compression is used as one component of HSM. Data compression is discussed in more detail in 2.10.4, Integrated Hardware Disk Compression (IHDC) on page 34. You have always had some ability to manage the hierarchy of data. In the past you could use software, for example Backup and Recovery Media Service (BRMS), or Report/Data Archive and Retrieval System (R/DARS), to manage moving data to a lower hierarchy. You could set up your software so that if an object is not used in a defined number of days, the software demotes it to tape or optical storage. An automated tape library is the ideal for the archive. A single tape drive may be used but requires more operator intervention. Starting with OS/400 Version 4 Release 3, this data movement strategy is significantly enhanced with the availability of HSM APIs. HSM enables the software to take advantage of another layer in the single level storage hierarchy, the DASD layer. Note: BRMS/400 is an IBM product designed to automate this archive, as well as retrieval. In BRMS you set up policies to demote any object that has not been used in a set amount of days (for example 30 days). Demotion happens to slower DASD, typically to compressed DASD. If the data is not used for another set amount of days, it is further demoted to tape. The reverse is also true. For example, if you start accessing data on tape often, HSM (through defined rules with BRMS or other storage management products) promotes it back to DASD. Note: This promotion and demotion applies to libraries only. Refer to Backup Recovery and Media Services/400, SC41-5345, Complementing AS/400 Storage Using Hierarchical Storage Management APIs, SG24-4450, and
38
ASP 1
ASP 2
Load Source System ASP User ASP used for save/archive on compressed DASD
ASP 3
2.10.6.1 Single level storage To understand ASPs, it is valuable to first understand single level storage, also known as single address architecture. The following provides an analogy of single level storage. When you put your money into a bank account at your local branch, in your view, the funds now sit in a drawer in that branch. This is your virtual view of your funds. In all actuality, the funds are invested in your neighbor's mortgage, a foreign business, a local business research department, or the government. All you (the system processor) are concerned about is that when you make a withdrawal, the funds are delivered to you. This is much like an applications view of data. It does not care where the data is stored, only that it has fast access to the data when it chooses to do so.
39
Single level storage is achieved through the Technology Independent Interface, as pictured in Figure 28.
Main Storage
Auxiliary Storage
64 2
By scattering pieces of any given object among multiple drives, single-level storage enables multiple paths that can be used simultaneously by each portion of data to travel back to the processor. The speed of this data transfer is directly related to the speed of the slowest component in the architecture. This is typically the mechanical movement of disk actuators. Because this travel depends on the speed of each hardware component, single-level storage assists in overcoming the bottleneck. In addition to understanding single level storage, it is important that you understand how disk units attach to the system. To improve disk performance, data resides on auxiliary storage in disk areas that are not connected, as shown in Figure 29. This is referred to as a scatter load. Because you do not know where a given part of an object resides on disk, it is not evident what is stored on a disk when it fails. Because the system spreads the data for any object across more than one disk, it is likely that pieces of many objects are lost when a single disk fails. The system cannot continue without the object's missing data. No direct function exists to tell you which piece of an object was lost. It can be difficult to determine what was lost. If you are unable to save the failing disk's data, your only recovery option is to reload the entire object. Or in many cases, reload the entire system from backup media. An alternative is to divide the pool of storage units and protect the availability of the DASD.
40
Object A
Object B
Object C
Object D
A B C D
A B C D
A B C D
A B C D
A B C D
A B C D
A B C D
A B C D
Data is spread across the entire system (with and without RAID 5)
Figure 29. Scatter load on a single ASP AS/400 system
It is important to understand auxiliary storage pools (ASPs), because one of the tasks ASPs accomplish helps avoid potential scatter load concerns. ASPs are also required to implement a hierarchical storage solution to migrate, archive or retrieve data. Means of isolating objects An ASP is a group of disk units defined from all the available disk units that make up auxiliary storage. Non-configured drives are not assigned to an ASP. ASPs provide the means of isolating objects on a specific disk unit, or disk units, to prevent the loss of data due to a disk media failure on other disk units not included in the ASP. See Figure 30 on page 42 for a visual representation of a multiple ASP system with objects scattered only within each ASP. Disks are assigned to an ASP on a storage unit basis. When new disk units are physically attached to the system, the system initially treats each disk unit as a non-configured storage unit.
41
Object A
Object B
Object C
Object D
A C
A A C C
A C
A A C C
B D
B D
B D
Data is spread only within each ASP (with and without RAID 5)
Figure 30. Scatter load on a multi ASP AS/400 system
Through Dedicated Service Tool (DST) options you can allocate these non-configured storage units to either the system ASP or a user ASP. The individual storage units within the disk unit are identified through the address field on the DST Display Disk Configuration screen. When you allocate a non-configured storage unit to an ASP, the system assigns a number to the storage unit. Limited data loss with single disk failure If the system experiences a disk failure with data loss, recovery is required only for the information in the ASP containing the failed disk. System and user objects in other ASPs are protected from the disk failure. Possible performance improvement In addition to a recovery advantage, placing information in an ASP can improve performance because the system dedicates the disk units associated with that ASP to the objects in that ASP. Performance can improve by isolating heavily referenced objects in a user ASP or by removing lightly referenced objects from the system ASP. For example, in a heavy journaling environment, contention between the journal receivers and the files is reduced if they are in different ASPs. This separation of workload can improve journaling performance. It is often difficult to really predict whether multiple ASPs enhance (as in ability to use for journaling) or degrade (as in fewer arms available for high use system ASP) performance. Performance tools, such as PM400 and BEST/1, can assist you in sizing your system for DASD capacity needs.
42
Note
If the disk configuration contains disk units of significantly different capacities within an ASP, performance can degrade. Performance can also be significantly impacted by too few disk arms. The Disk Arm Requirements white paper offers more information and access to a tool to help assess this factor. You may also want to refer to the Version Performance Considerations white paper. Both white papers are available on the Web at:
http://www.ibm.com.as400/developer/performance
System ASP The System ASP (ASP 1) is created by the system when LIC is installed. It is always configured. ASP 1 contains the LIC, licensed programs, and system libraries. The System ASP also contains all other configured disk units that are not assigned to a User ASP. User ASPs A user ASP is created by grouping together a physical set of disk units and assigning them a unique number, 2 through 16 (ASP 1 is always reserved as the System ASP). User ASPs were originally developed for journaling, receivers, and save files. (Save files can store data, then offload to tape later, as in system backup, to reduce system down time). Later development allowed creating a library in a user ASP. This allowed pointers for the user ASP to be in the user ASP, allowing better ASP recovery. User ASPs can be used to isolate libraries and objects within these libraries from the system ASP. If a library exists in a user ASP, all objects in the library must be in the same ASP as the library. Refer to AS/400 Backup and Recovery, SC41-5304, for a list of object types that are not allowed in a user ASP. Overflowed user ASP When a user ASP becomes full, objects can overflow into the system ASP. If the user ASP overflows, the overflow status for the ASP should be handled as soon as possible because if a data-loss failure occurs that causes either the system ASP or the user ASP to be cleared, both ASPs are cleared. When creating user ASPs a threshold value can be defined using DST or SST menu options. From SST, select the Work with disk configuration option. Then, select the Work with ASP threshold option from the next menu and make your change. If the threshold is not specified, the default setting by the system is 90% for a system ASP or a user ASP. As of V2R2, if a user ASP overflows, as objects are deleted from the user ASP, the overflowed objects in the system ASP are copied back into the user ASP during an IPL, as space becomes available. Full system ASP If the system ASP fills to capacity, the system ends abnormally. You must IPL the system and take corrective action, such as deleting objects, to reduce the storage utilization within the system ASP. To avoid filling the system ASP, specify a threshold value for the ASP. Use the system value QSTGLOWLMT or use SST or DST screens by selecting the menu option Work with disk configuration. Then,
Chapter 2. Storage architecture
43
select the Work with ASP threshold. When the specified threshold value is reached, OS/400 warns the system operator of potential shortage of space. For example, if you set the threshold value at 80% for the system ASP (the value specified in QSTGLOWLMT), the system operator message queue (QSYSOPR) and optionally the system message queue (QSYSMSG, if it exists) are sent messages when the system ASP is 80% full. It is up to the operator to take steps to delete files or obtain additional DASD before the system ASP becomes full. Auxiliary Storage Lower Limit Action (QSTGLOWACN) is a system value that specifies the action to take when the available storage in the system ASP is below the amount specified in QSTGLOWLMT. The selected actions range from sending a message to the message queue, to a critical message queue, executing a program registered to handle the QIBM_QWC_QSTGLOWACN exit point, shutting the system down to a restricted state, to immediately powering down the system and restarting it. Read more about full system ASP and overflowed user ASPs in Chapter 8, Runaway DASD on page 121.
Use a journal to define what files and access paths you want to protect with journal management. You can have more than one journal on your system. A journal may define protection for more than one file. Conversely, a given file can be protected by more than one journal receiver. Figure 31 gives you a visual representation of one of the many uses of journaling.
44
MEMORY
Before image
After image
Journal
5 6
Receiver
Synch Point
ASP1
Figure 31. Journaling
ASP2
In journaling, the following processes occur: 1. The file to be edited is paged into memory. 2 and 3. A before image of the record is taken (this is optional). This before image copy is also taken for the access paths if access path journaling is also in effect. 4 and 5. After the edit, the after image record update is journaled. 6. A sync point is reached when either 50,000 transactions have occurred since the last sync point, or a Change Journal (CHGJRN) command is issued. Remote journal function The addition of the remote journal capability in OS/400 at V4R2 offers a reliable and fast method to transfer journal receiver data to a remote AS/400 system. This function is offered in the form of APIs at OS/400 V4R2. Remote journals are ideal for use in data replication or high availability environments. At V4R3 the functions were enabled through CL commands. Remote journals allow you to establish journals and journal receivers on a target system that are associated with specific journals and journal receivers on a source system. Once the remote journal function is activated, the source system continuously replicates journal entries to the target system. The remote journal function is a part of the base OS/400 system and is not a separate product or feature. It is implemented at the Licensed Internal Code layer. The benefits of the remote journal function include: It lowers the CPU consumption on the source machine by shifting the processing required to receive the journal entries from the source system to the target system.
45
It eliminates the need to buffer journal entries to a temporary area before transmitting them from the source machine to the target machine. This translates into less disk writes and greater DASD efficiency on the source system. Since it is implemented in microcode, it significantly improves the replication performance of journal entries and allows database images to be sent to the target system in real-time. This real-time operation is called the synchronous delivery mode. If the synchronous delivery mode is used, the journal entries are guaranteed to be in main storage on the target system prior to control being returned to the application on the source machine. It allows the journal receiver save and restore operations to be moved to the target system. This way, the resource utilization on the source machine can be reduced. For additional reading on remote journals, refer to the redbook AS/400 Remote Journal Function for High Availability and Data Replication, SG24-5189. 2.10.7.2 Clustering Cluster technology is implemented on the AS/400 to provide availability during both planned and unplanned outages. Starting from 2.1, Direct access storage device (DASD) on page 19, and onward, it should be clear that the AS/400 developers have spent a significant amount of design resource to enable high levels of availability in a single system environment. This highly reliable design (as measured in a Gartner Group report) has long been used for unplanned outages by the AS/400 customer. In today's world, however, it is becoming increasingly clear that there is no time for any unplanned outages, or even planned outages, for that matter. Clusters are implemented to reduce down time due to planned outages and site disasters. In an AS/400 installation, the lion's share of down time comes from planned outages. Providing system availability during planned outages results in increased unplanned outage coverage as a side benefit. To further address the needs of the continuous availability market, the AS/400 development team is investing in cluster technology. Significant advanced features and functions were introduced in V4R4 that put the AS/400 system in a leadership position. Cluster technology has been around for many years but only recently have common terms and concepts begun to emerge. The AS/400 system design has adopted these concepts and integrated the infrastructure needed to achieve a level of standardization, an advancement of cluster technology, and the involvement of the Solution Developer (SD) and the cluster middleware business partner in the total solution. While the AS/400 system provides the basic cluster infrastructure, the cluster middleware business partner provides data resiliency and the Solution Developer provides application resiliency. Together, these three parts provide the whole solution to continuous availability. Cluster Resource Services represents the cluster technology that AS/400 provides in V4R4. It consists of an open set of APIs which applications can use to create and manage a cluster. Data Resiliency is the maintaining of one or more copies of the application data on one or more separate systems. DataMirror, Lakeview Technology, and Vision Solutions have provided sophisticated data replication solutions for many years.
46
New or updated products that take advantage of cluster resource services are available by the cluster middleware business partners. DataMirror announced availability of their iCluster product suite beginning July 14, 1999. Vision Solutions announced availability of their Vision Suite Version 6.3 starting July 15, 1999. Cluster Management is new for V4R4. This is the entry point for the customer who has the responsibility for first choosing a cluster middleware business partner's product. When installed, the cluster management features are used to configure the customer's systems into a cluster and define how the systems participate in the backup strategy. Then the application which is to be activated as highly available is selected. Cluster Management handles ClusterProven for AS/400 applications, providing automatic configuration and activation. Vision Solutions Vision Suite version 6.3 handles ClusterProven for AS/400 applications. For a simple example configuration, refer to Figure 32 on page 48. To read more about clustering, visit these Web sites: http://www.as400.ibm.com/ha/sec2.htm http://www.as400.ibm.com/ha/sec23.htm http://www.as400.ibm.com/ha/sec24.htm 2.10.7.3 Multiple Systems Prior to the availability of a clustering implementation, duplication of systems was performed in a less efficient mannerthrough a communications link (Token-Ring, OptiConnect, dial-up, or other). With a central site or home office installation in place, a second (and sometimes third) system is separately maintained at a remote site location. The systems are kept in synchronization by periodic transmission of updates through the communication link. For example, the home office sends updates to the remote location for a duplicate set of data. The reverse could also be true. In this implementation of multiple systems, the system administrator is responsible for twice the amount of documentation and management. An example of a multiple system configuration can be observed in Figure 32.
47
System Unit
System Unit
2.10.7.4 Considerations for measuring availability The availability options described in this chapter may or may not be appropriate for your installation. There are many possible solutions available in the AS/400 product line. Each site must consider what best suits them. When measuring availability, a question to ask is, What is actually being measured? Single system availability measurements can be measurements of hardware reliability, or hardware and operating system software, or the measurement can include applications. Solution availability takes into account all these components. There is also a distinction to be made between two types of server outages: Planned outages take place when the operations staff takes the server offline to perform backups, upgrades, maintenance, and other planned events Unplanned outages occur due to unforeseen events such as a power loss, a hardware or software failure, system operator errors, security breaches, or a natural disaster. Measuring unplanned outage time reflects the inherent reliability of the system. Measuring planned outage time brings into focus the world of clusters. There are five general levels of system availability. The application running and the losses to occur in the event of a system outage determine which level you set a strategy for: Base availability: Systems are ready for immediate use, but will experience both planned and unplanned outages. High availability: Systems incorporate technologies that sharply reduce the number and duration of unplanned outages. Planned outages still occur, however, the servers include facilities that reduce their impact.
48
Continuous-operation environments: Use special technologies to ensure that there are no planned outages for upgrades, backups, or other maintenance activities. Companies use high-availability servers in these environments to reduce unplanned outages. Continuous-availability environments: Go a step further to ensure that there are no planned or unplanned outages. To achieve this level of availability, companies use dual servers or clusters of redundant servers in which one server automatically takes over if another server goes down. Disaster Tolerance environments: Require remote systems to take over in the event of a site outage. The distance between systems is very important to ensure no single catastrophic event affects both sites. However, the price for distance is loss of performance due to the latency time for the signal to travel the distance. To make an informed decision as to the appropriateness of these or any other options discussed in this redbook, refer to AS/400 Backup and Recovery, SC41-5304, for more detail.
WRKASP functions STRSST menu Work with disk units, Display disk status:
V4R3
V4R4
- Disk Units allocated to the ASP - Serial number - Disk unit type - Disk unit model type - Size
No No No No BRMS
OS/400 (0) OS/400 (0) OS/400 (0) OS/400 (0) BRMS, OS/400 (0)
49
WRKASP functions
V4R3
V4R4
- Save entire libraries - Save changed contents of libraries Print libraries in an ASP Print ASP analysis Display recovery for Access Paths List types of ASP (system-, object-, or library-based ASP) ASP overflowed (Yes/No) Size of ASP that is protected and unprotected % of ASP that is protected and unprotected ASP overflow amount ASP threshold message Move libraries from one ASP to another Copy libraries to another ASP
Work with contents of ASP:
BRMS BRMS No No OS/400 (DSPRCYAP) No OS/400 (0) OS/400 (0) No OS/400 (0) OS/400 (0) BRMS or OS/400 (QHSMMOVL API) No
- List the libraries in a library-based/system ASP - Copy library to ASP - Display - Print DB - Display description - Move library to ASP - Work with library - Check dependencies - Display overflow status - Reset overflowed objects
No
OS/400 QYASPOL API Open List of APIs No Investigating No Investigating BRMS or OS/400 (QHSMMOVL API) WRKLIB LIB ( ), ASP () OS/400 QHSMMOVL HSM API (2) QUSRTOOL (4) No
No No No No BRMS or OS/400 (QHSMMOVL API) No OS/400 QHSMMOVL HSM API (2) QUSRTOOL (4) No
50
WRKASP functions
V4R3
V4R4
Work with journal objects on the system Work with SAVF objects on the system Print disk mapping Allow naming (description) of an ASP
Codes: BRMS = Function is in BRMS/400 Product (5769-BR1) Investigating = We are considering this function for a future release Comments: (0) = New Retrieve ASP Function. (1) = Shows mirroring only. (2) = *Validate can be specified on the check object dependencies. (3) = WRKJRN and WRKJRNRCV can be used to work with journaled objects. (4) = QUSRTOOL contains the source for the DSPOVFOBJ which is a tool to help you find all the overflowed objects. (5) = Does not provide the mirror level of protection for a disk unit.
As you can see by the table, additional functions from WRKASP are being investigated to determine the feasibility of incorporation for future releases. Refer to Complementing AS/400 Storage Management Using HSM APIs, SG24-4450, for more information on ASP management.
2.12 Summary
This chapter explored many levels of the storage architecture in the AS/400 system environments. The other issue discussed in this chapter includes identifying and describing various means of DASD protection. The final choice remains that of the user. The intent of this chapter was to identify options available and offer an overview and description of each of them, and provide pointers to additional reading so that a decision can be made to meet your system requirements for availability and ease of recovery.
51
52
3.2 CD-ROM
AS/400e server code is distributed on CD-ROM media. The CD-ROM drive is standard on all AS/400 models and is therefore not identified with a separate feature on the system unit. It can also be used for alternate IPL, but not as a save and restore device for the system. A maximum of one CD-ROM can be ordered per expansion tower. LPAR support and CD-ROM feature descriptions See Table 2 on page 54 for specific feature code and installation rules and requirements.
53
Description/Rule
#4425
Installed in Storage/PCI Expansion Tower #5065. Used as alternate IPL (IBM distributed CD-ROM media only) and program distribution. One per secondary partition. This feature is customer-installable. #2748 Storage Device Controller in Slot 6 in the #5065.
Installed in System Unit Expansion (SUE) #5072, and #5073 for Models Sxx, 6xx, and 7xx. Maximum of one per I/O tower and Model 740. One per Model 730. Requires FC 2624 Storage device controller. Limits use of tape in same tower to #6380 and #6390.
Installed in Models S20, 620, and 720 or 9329 PCI Integrated Expansion Unit. Requires PCI disk unit controller - #2726, #2740, #2741 or #2748. Not supported in #9331 SPD Integrated Expansion Unit.
These CD-ROM features are only usable when installed in conjunction with the Logical Partitioning Support in OS/400. All features require OS/400 V4R4. For more detailed information regarding your CD-ROM options by individual system models reference the AS/400 System Builder, SG24-2155, or the AS/400 Installation and Upgrade Guide, SY44-5950.
54
CD-ROMS are single-sided disks and are the same size as those commonly used in audio CD players. The CD-ROM data format is identical to the one used with personal computers. Therefore, it may be possible to develop CD-ROMs for use on both personal computers and the AS/400 system. The other two forms (WORM and erasable) are two-sided disks that are contained within a cartridge shell. CD-ROM is a read-only format that is optimized for read performance. CD-ROMs are ideal for the wide-scale distribution of programs and data. Access to CD-ROM is supported through the Hierarchical File System, Integrated File System, and save and restore interfaces. All AS/400 Advanced Series systems include a rack-mounted CD-ROM drive that is ideal for program and data distribution. The CD-ROM drive is primarily intended as a program and data delivery device. Even though many users can potentially access it simultaneously, the drive accesses one CD-ROM at a time. WORM storage is an economical way to archive data, yet still have it quickly and easily accessible. WORM media is available in 1x (650 MB), 2x (1.3 GB), and 4x (2.6 GB) capacities. An erasable cartridge offers the most flexibility with the same capabilities as magnetic (DASD) storage, but with much higher capacities and lower cost. Erasable media is available in 1x (650 MB), 2x (1.3 GB), and 4x (2.6 GB) capacities. Both WORM and erasable cartridges have a sector size of 1024 bytes/sector. Optical media libraries come in a variety of configurations designed around the different forms of media and connection options. Optical media libraries range from a single cartridge standalone model through models that are capable of loading 258 optical cartridges and four disk drives. Optical media libraries may be directly connected to the AS/400 system for best functionality and performance. Or they may be connected through a LAN to allow independent access by PCs or other AS/400 systems. For additional reading on optical library solutions, especially the 3995 optical library, refer to this site on the Web:
http://www.storage.ibm.com/hardsoft/opticalstor/index.html
Optical storage device connectivity You can connect optical media libraries to your AS/400 system in two ways: directly attached and LAN attached. In the directly-attached method, a multi-wire cable connects the library to an I/O processor (IOP) card within the AS/400 system. Directly-attached libraries support nearly all Hierarchical File System (HFS) application programming interfaces, most Integrated File System commands, and AS/400 save and restore commands. These libraries may be accessed by other LAN-connected systems by using the Integrated File System. LAN-connected optical media libraries can be used only through the HFS interface. The libraries can be accessed simultaneously either by several AS/400 systems or any other devices on the LAN. LAN-connected optical media libraries have a controlling PC and do not require an AS/400 system that acts as a controller. LAN-attached optical media libraries are often referred to as optical servers.
55
3.5 Summary
For additional reading on storage options, visit the storage solutions Web site at: http://www.storage.ibm.com
56
57
protected, mirrored, or unprotected, the data stored on the disks has a tendency to be identified in bands, as illustrated in Figure 33. This means that there are physical contiguous areas of disk storage which fall under one of the following categories: Areas Areas Areas Areas where the data is actively read (a read-only band) of data that are both actively read and written to (a read/write band) that are frequently written to (a write-only band) of storage that are not frequently accessed (a random band)
This banding of data is accounted for in the design of EAC. The goal is to cache bands identified as read/write, and read-only. A band that is identified as write-only remains largely unaffected. EAC is also designed not to degrade the performance of large blocks of data that are either sequentially written or sequentially read. They are handled separately by the read buffer in the disk unit, OS/400 Expert Cache, and write cache on the #2748 disk controller. EAC is designed to work effectively with other caches in the system. Although the EAC works independently from Expert Cache and does not require Expert Cache to be activated, it takes the Expert Cache strategy into account as it tracks the physical read requests flowing to disk units. EAC is logically positioned directly below the write cache of the #2748 disk controller, as shown in Figure 34. As the write cache is tailored to ensure that 100% of disk write operations are cache write operations, EAC can optimize performance on read requests without degrading the write cache effectiveness.
58
The use of EAC improves the performance of database read operations, as well as all kinds of read operations. This includes read requests generated by other system components, such as the Integrated Netfinity Server, or AS/400 Integrated File System read requests. It also works effectively with a group of disks that have RAID-5 protection or mirroring active. However, EAC cannot be activated in a #2748 disk controller that has the disk compression function active, as the memory used for disk compression is the same as that used for the EAC algorithm. To realize the best performance improvement, use EAC with the group of disk units which are most active and performance-critical in nature. To obtain the full benefit of EAC, all disk units in this group should also be attached to the same #2748 disk controller as the RCD. A Commercial Processing Workload for EAC benchmark was conducted on the AS/400 4-way processor system model 620 with EAC. The results are shown in the following figures. Notice that EAC complements Expert Cache to improve response time.
59
CPW Performance Comparison CPW Performance Comparison 1414 10K RPM RAID DASD/2748 IOA 10K RPM RAID DASD/2748 IOA
With EAC, the response time remains below 0.4 second when the system throughput exceeds 1500 transactions per minute. This result indicates that EAC works well with Expert Cache.
60
The overall effectiveness of the EAC is best understood using the EAC Simulator. The EAC Simulator is a function of the #2748 disk controller that collects disk I/O statistics for an analysis by the Performance Tool/400 program product (5769-PT1). You can generate a Performance Tool/400 report from the simulator data to help estimate the performance improvement you can potentially gain from activating EAC. The collected I/O statistics come from the real I/O requests generated from the actual workload in your AS/400 system. The performance report is directly relevant to your system setting. You should run the Simulator for at least three hours under a heavily utilized system workload to get the best possible estimation. The EAC Simulator operates in the #2748 disk controller itself and uses the same algorithms that manage the EAC. It is activated through AS/400 Management Central V4R4 Collection Services.
Note
For instructions on how to run the EAC Simulator and generate a report, visit the Web site http://www.as400.ibm.com/infocenter. Select V4R4 , and click the GO button. Then look under System Administration and Maintenance for a topic of Estimating benefits of Extended Adaptive Cache. A PDF file of the instruction can also be downloaded from this Web site. Be sure to apply service pack SF58121 (or later) to Client Access Express code before starting the Collection Services. Otherwise, it collects performance data without EAC statistics.
Emulated performance results are shown for an actual workload over time on a per disk basis. The generated report also gives an estimated percent of response time improvement for each disk unit. The EAC Simulator can also be activated by the AS/400 Performance Monitor, which is a component of Performance Tools/400 product. Activation of the EAC Simulator does not itself improve your system performance. The simulator gathers statistical information for a prediction of performance improvement that the EAC could offer if EAC is activated. The EAC Simulator performance results are reported on a per disk unit basis within the Disk Activity section of the Component Report of Performance Tools/400. The following two fields are updated when the EAC Simulator is active: EACS Read (EAC Simulator Percent Read Hits): This is the percentage of the total reads that are directed to disk that would have instead been satisfied by the RCD. EACS Resp (EAC Simulator estimated percent response time improvement): This is an estimation of how much faster the device would run with the RCD installed. This is an approximation, since the Simulator makes basic assumptions about performance parameters that are in place when EAC is actually active. This percentage value represents the amount of reduction you can expect in the response time that is reported in the Performance Monitor
61
System Report for that disk unit. This projection is valid only when the System Report evaluates performance data that matches the characteristics of the performance data on which this Component Report is based. Refer to 4.4.1, A sample performance effect of the Read Cache Device on page 64, for more details.
Click on each of the following links: System Administration and Maintenance-> System maintenance->Storage I/O card modes and jumpers. The same information is provided on your AS/400 Information Center CD set, SK3T-2027. To retrieve this information, click on these same links. Refer to Table 3 for configuration and physical placement rules for the Read Cache Device.
62
Description/Rule
#4331
Allowed only in slots D01, D06, D11, D16, D21, D26 D31, D36, D46 of FC #5065 PCI Expansion Tower Uses one DASD slot Requires FC #2748 1.6 GB capacity
#6831
Not allowed in slot L01 of system unit Uses one DASD slot Requires FC #2748 1.6 GB capacity
63
If the #2748 disk controller has been switched to compression mode in the past, set the operation mode of the #2748 disk controller to Enhanced Mode when installing the RCD in your AS/400 system. Operation mode is determined by the position of a jumper switch located at the back of the controller adapter. Position C is for Compression mode, and position E is for Enhanced mode. Figure 37 shows a picture of the jumper switch setting.
A change of the jumper switch position can be done at any time. The operation mode takes effect only after a subsequent system IPL is complete.
Note
If you want to change from Compression to Enhanced mode, be sure to decompress any existing compressed disk units first.
64
Reminder
Expert cache is controlled by setting the Paging Option value of the subsystem pool to *FIXED (no expert cache) or *CALC (use expert cache). Use either the Work with System Status (WRKSYSSTS) command or the Change Shared Storage Pool (CHGSHRPOOL) command to change the Paging Option parameter.
We collected performance data and printed System Report-Disk Utilization and Component Report-Disk Activity reports to compare the results of running DEXPLUS with and without the RCD. The System Report-Disk Utilization and Component Report-Disk Activity of the DEXPLUS workload without the RCD in the server and without the Expert Cache option activated are shown in Figure 38 and Figure 39 on page 66 respectively.
System Report Disk Utilization EAC Simulator test NO RCD NO XCache Member . . . : Q291040003 Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . : XXXXXXXX Partition ID : 00 Feature Code . : 2385 Unit Unit Name Type ---- ---------- ----------0001 DD010 6717 0002 DD008 6717 0003 DD009 6717 0004 DD006 6717 0006 DD005 6717 0008 DD007 6717 0009 DD002 6717 0010 DD004 6717 Total Average Unit Unit Name Type Size (M) IOP Util IOP Name Dsk CPU Util ASP ID Percent Full HPercent Util Op per Second K Per I/O Average Service Time Average Wait Time Average Response Time Main storage . . : 1536.0 M Version/Release : 4/ 4.0
10/18/99 8:02:08 Page 0001 Started . . . . : 10/18/99 04:00:02 Stopped . . . . : 10/18/99 07:54:59
Size IOP IOP Dsk CPU ASP --Percent-Op Per K Per - Average Time Per I/O -(M) Util Name Util ID Full Util Second I/O Service Wait Response ------- ---- ------------ ------- --- ---- ---- --------- --------- ------- -----7,516 7,516 7,516 7,516 7,516 7,516 7,516 7,516 68,717 29.3 ---------------11.2 20.63 4.0 .0054 .0035 .0089 7.1 7.1 7.1 7.1 7.1 7.1 7.1 7.1 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 7.3 7.3 7.3 7.3 7.3 7.3 7.3 7.3 01 01 01 01 01 01 01 01 33.5 33.4 33.5 33.5 33.4 33.4 33.5 33.4 12.2 12.7 12.8 12.9 12.4 12.5 12.9 12.2 22.85 23.26 23.08 23.13 23.36 23.34 23.63 23.03 4.0 4.0 4.0 4.0 4.0 4.0 4.0 4.0 .0053 .0054 .0055 .0055 .0053 .0053 .0054 .0052 .0035 .0035 .0037 .0034 .0033 .0037 .0037 .0037 .0088 .0089 .0092 .0089 .0086 .0090 .0091 .0089
Disk arm identifier Disk arm resource name Type of disk Disk space capacity in millions of bytes Percentage of utilization for each Input/Output Processor Input/Output Processor resource name Percentage of Disk Processor Utilization Auxiliary Storage Pool ID Percentage of disk space capacity in use Average disk operation utilization (busy) Average number of disk operations per second Average number of kilobytes (1024) transferred per disk operation Average disk service time per I/O operation Average disk wait time per I/O operation Average disk response time per I/O operation
65
Component Report Disk Activity EAC Simulator test NO RCD NO XCache Member . . . : Q291040003 Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . :XXXXXXXX Partition ID : 00 Feature Code . :2385
Main storage . . : 1536.0 M Started . . . . : 10/18/99 04:00:02 Version/Release : 4/ 4.0 Stopped . . . . : 10/18/99 07:54:59
------------- Average Disk Activity Per Hour ------------- ------ Cache hit Statistics ------Srv ----------------- Disk Arm Seek Distance ----------------- Device Controller Write EACS EACS -Disk Capacity Unit Util Time 0 1/12 1/6 1/3 2/3 >2/3 Read Read Effic Read Resp MB Percent ---- ---- ----- --------- --------- --------- --------- --------- --------- ------- ---------- ----- ----- ----- ----------0001 12.2 .0053 3,826 72,410 541 51 221 118 6.2 .0 45.2 80.1 64.7 4,997 66.4 0002 12.7 .0054 4,073 73,197 1,378 84 249 113 5.3 .1 54.5 80.1 65.0 4,998 66.4 0003 12.8 .0055 3,868 72,623 1,584 119 267 106 5.6 .0 36.4 79.9 65.1 4,998 66.4 0004 12.9 .0055 3,518 74,085 926 184 307 105 5.4 .0 19.3 79.7 65.1 4,998 66.4 0006 12.4 .0053 4,229 72,596 1,026 99 261 111 5.8 .4 71.3 79.6 63.5 4,998 66.4 0008 12.5 .0053 4,380 73,110 1,099 103 133 67 5.6 .1 65.9 79.4 63.8 4,998 66.4 0009 12.9 .0054 3,870 73,300 1,370 131 313 120 5.5 .5 76.6 79.4 63.6 4,997 66.4 0010 12.2 .0052 3,889 72,492 1,004 26 386 153 5.8 .1 52.7 80.3 64.5 4,998 66.4 Column Total --------------------------- ---------------Util Srv Time Disk Arm Seek Distance 0 31,655 1/12 583,817 1/6 8,932 1/3 800 2/3 2,141 >2/3 898 Cache hit Statistics Device Read Controller Read Write Efficiency EACS Read EACS Resp Disk Capacity MB Percent 48,567 70.6 Average ---------------11.2 .0054
5.7 .1 <---- Cache hit rate, including RCD when present. 60.0 79.8 <---- An estimation of RCD hit rate if present. 64.4 <---- An estimation of disk I/O response time improvement if RCD present.
Unit Util Srv Time Disk Arm Seek Distance 0 1/12 1/6 1/3 2/3 >2/3 Cache hit Stastistics Device Read Controller Read Write Efficiency EACS Read EACS Resp Disk Capacity MB Percent
--------------------
Disk arm identifier Drive utilization Average service time per request in seconds Average seek distance distributions per hour Number of zero seeks Number of seeks between 0 and 1/12 of the disk Number of seeks between 1/12 and 1/6 of the disk Number of seeks between 1/6 and 1/3 of the disk Number of seeks between 1/3 and 2/3 of the disk Number of seeks greater than 2/ 3 of the disk Percent of device read hits for each arm Percent of controller cache read hits for each arm Percent of efficiency of write cache Extended Adaptive Cache Simulator percent read hits Extended Adaptive Cache Simulator estimated percent response time improvement Average amount of disk space used or available Millions of bytes available on the disk Percent of space available on the disk
Figure 40 and Figure 41 show the System Report-Disk Utilization and Component Report-Disk Activity of the DEXPLUS workload with the RCD in the server but without the Expert Cache option activated.
66
System Report Disk Utilization RCD test NO Xcache Member . . . : T5WITHRCD Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . : XXXXXXXX Partition ID : 00 Feature Code . : 2385 Unit Size IOP Unit Name Type (M) Util ---- ---------- ---- ------- ----------0001 DD010 6717 7,516 7.2 0002 DD008 6717 7,516 7.2 0003 DD009 6717 7,516 7.2 0004 DD006 6717 7,516 7.2 0006 DD005 6717 7,516 7.2 0008 DD007 6717 7,516 7.2 0009 DD002 6717 7,516 7.2 0010 DD004 6717 7,516 7.2 Total Average 68,717 29.4 5.1 20.71 4.0 .0024 Main storage . . : 1536.0 M Version/Release : 4/ 4.0
10/18/99 11:24:52 Page 0001 Started . . . . : 10/18/99 08:21:34 Stopped . . . . : 10/18/99 11:20:00
IOP Dsk CPU ASP --Percent-Op Per K Per - Average Time Per I/O -Name Util ID Full Util Second I/O Service Wait Response ------------ ------- --- ---- ---- --------- --------- ------- -----CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 7.4 7.4 7.4 7.4 7.4 7.4 7.4 7.4 01 01 01 01 01 01 01 01 33.6 33.6 33.6 33.6 33.6 33.6 33.6 33.6 5.4 6.0 6.0 5.9 5.7 5.8 5.6 5.6 23.07 23.29 23.36 23.22 23.38 23.31 23.63 23.10 4.0 4.0 4.0 4.0 4.0 4.0 4.0 4.0 .0023 .0025 .0025 .0025 .0024 .0024 .0023 .0024 .0012 .0014 .0016 .0015 .0011 .0015 .0012 .0014 .0014 .0035 .0039 .0041 .0040 .0035 .0039 .0035 .0038 .0038
Figure 40. Workload without Expert Cache and with Read Adaptive Device Utilization
Component Report Disk Activity RCD test NO Xcache Member . . . : T5WITHRCD Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . :XXXXXXXX Partition ID : 00 Feature Code . :2385
Main storage . . : 1536.0 M Started . . . . : 10/18/99 08:21:34 Version/Release : 4/ 4.0 Stopped . . . . : 10/18/99 11:20:00
------------- Average Disk Activity Per Hour ------------- ------ Cache hit Statistics ------Srv ----------------- Disk Arm Seek Distance ----------------- Device Controller Write EACS EACS -Disk Capacity Unit Util Time 0 1/12 1/6 1/3 2/3 >2/3 Read Read Effic Read Resp MB Percent ---- ---- ----- --------- --------- --------- --------- --------- --------- ------ ---------- ----- ----- ----- ----------0001 5.4 .0023 1,153 8,071 66 18 170 91 44.0 80.2 53.8 .0 .0 4,988 66.3 0002 6.0 .0025 1,338 8,361 220 26 250 147 43.0 79.8 18.2 .0 .0 4,988 66.3 0003 6.0 .0025 1,436 8,463 259 45 183 117 41.0 79.9 59.8 .0 .0 4,988 66.3 0004 5.9 .0025 1,210 8,467 262 71 207 136 43.3 79.4 19.4 .0 .0 4,988 66.3 0006 5.7 .0024 1,467 8,579 232 65 182 160 40.7 79.7 61.9 .0 .0 4,988 66.3 0008 5.8 .0024 1,320 8,960 216 60 209 140 39.3 79.8 36.7 .0 .0 4,988 66.3 0009 5.6 .0023 1,273 8,760 166 58 164 162 41.5 79.8 70.2 .0 .0 4,987 66.3 0010 5.6 .0024 1,269 7,962 150 31 226 170 45.0 79.8 34.0 .0 .0 4,988 66.3 Column Total --------------------------- ---------------Util Srv Time Disk Arm Seek Distance 0 10,470 1/12 67,627 1/6 1,576 1/3 377 2/3 1,594 >2/3 1,127 Cache hit Statistics Device Read Controller Read Write Efficiency EACS Read EACS Resp Disk Capacity MB 48,488 Percent 70.5 Average ---------------5.1 .0024
Figure 41. Workload without Expert Cache and with Read Adaptive Device Disk Activity
67
Comparing the reports to determine what effects the RCD had on our 170 server, you can observe the following improvements: The average response time per disk I/O is reduced from 0.0089 second to 0.0038 second. This represents a 57% reduction. The average wait time per disk I/O is reduced from 0.0035 second to 0.0014 second, representing a 60% reduction. The average number of disk activities per hour is significantly reduced from 583,817 activities per hour to 67,627 activities per hour for the seek distance of 1/12. This is due to the fact that most data is available in the RCD. Therefore, fewer read I/O requests go to the disk units. Improvements also apply to the other seek distances. The RCD hit rate is very close to the EAC Simulator estimation of 79.8%. The average improvement of response time per disk I/O is 57.3%. This is fairly close to the EAC Simulator estimation of 64.4%. The average disk unit utilization reduced from 12% to 6%, representing a 50% decrease. The performance results are summarized in Table 4 on page 70.
Performance comparison of EAC and RCD We then explored how much improvement the Expert Cache had on the system performance compared to the RCD. We did this by assigning a main storage pool of 1 GB to the QDEX subsystem (up from 300 MB in the runs) where RCD is installed. The System Report-Disk Utilization and Component Report-Disk Activity of the DEXPLUS workload without the RCD, but with Expert Cache active, are shown in Figure 42 and Figure 43 on page 69 respectively.
System Report Disk Utilization EAC Simulator test with Expert cache NO RCD Member . . . : T5NRCDWXC Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . : XXXXXXXX Partition ID : 00 Feature Code . : 2385 Unit Unit Name Type ---- ---------- ----------0001 DD010 6717 0002 DD008 6717 0003 DD009 6717 0004 DD006 6717 0006 DD005 6717 0008 DD007 6717 0009 DD002 6717 0010 DD004 6717 Total Average Main storage . . : 1536.0 M Version/Release : 4/ 4.0
10/18/99 16:55:43 Page 0001 Started . . . . : 10/18/99 14:11:29 Stopped . . . . : 10/18/99 16:39:59
Size IOP IOP Dsk CPU ASP --Percent-Op Per K Per - Average Time Per I/O -(M) Util Name Util ID Full Util Second I/O Service Wait Response ------- ---- ------------ ------- --- ---- ---- --------- --------- ------- -----7,516 7,516 7,516 7,516 7,516 7,516 7,516 7,516 68,717 28.6 9.7 21.85 4.5 .0044 .0026 .0070 7.4 7.4 7.4 7.4 7.4 7.4 7.4 7.4 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 CMB01 9.1 9.1 9.1 9.1 9.1 9.1 9.1 9.1 01 01 01 01 01 01 01 01 32.7 32.7 32.7 32.7 32.7 32.7 32.7 32.7 9.6 11.2 11.3 11.4 11.2 11.3 10.9 10.8 22.21 24.91 24.84 25.11 25.17 25.00 24.88 24.56 4.9 4.5 4.4 4.5 4.5 4.4 4.5 4.5 .0043 .0044 .0045 .0045 .0044 .0045 .0043 .0043 .0028 .0024 .0026 .0026 .0026 .0025 .0024 .0027 .0071 .0068 .0071 .0071 .0070 .0070 .0067 .0070
Figure 42. Workload with Expert Cache and without Read Adaptive Device Utilization
68
Component Report Disk Activity EAC Simulator test with Expert cache NO RCD Member . . . : T5NRCDWXC Model/Serial . : 170/XX-XXXXX Library . . : EACPFR System name . . :XXXXXXXX Partition ID : 00 Feature Code . :2385
Main storage . . : 1536.0 M Started . . . . : 10/18/99 14:11:29 Version/Release : 4/ 4.0 Stopped . . . . : 10/18/99 16:39:59
------------- Average Disk Activity Per Hour ------------- ------ Cache hit Statistics ------Srv ----------------- Disk Arm Seek Distance ----------------- Device Controller Write EACS EACS -Disk Capacity Unit Util Time 0 1/12 1/6 1/3 2/3 >2/3 Read Read Effic Read Resp MB Percent ---- ---- ----- --------- --------- --------- --------- --------- --------- ------ ---------- ----- ----- ----- -----------0001 9.6 .0043 9,928 47,156 1,305 19 2,544 1,616 8.3 .2 75.6 78.8 42.8 5,053 67.2 0002 11.2 .0044 12,485 54,254 1,148 3 2,266 1,915 8.7 .0 74.8 81.3 47.4 5,053 67.2 0003 11.3 .0045 13,578 53,885 1,214 87 2,187 1,916 7.7 .0 74.6 81.3 47.7 5,053 67.2 0004 11.4 .0045 12,638 55,112 1,151 16 2,350 1,917 8.7 .1 74.0 81.2 47.7 5,053 67.2 0006 11.2 .0044 13,117 54,077 880 26 2,306 2,033 9.0 .1 74.7 81.6 47.1 5,053 67.2 0008 11.3 .0045 12,789 54,639 1,054 21 2,352 1,913 8.5 .3 74.3 81.0 47.6 5,053 67.2 0009 10.9 .0043 12,057 53,053 1,104 19 2,248 1,934 9.5 .1 75.9 81.1 46.1 5,053 67.2 0010 10.8 .0043 12,780 53,321 1,049 14 2,433 1,830 8.6 .0 74.2 81.4 47.2 5,053 67.2 Column Total --------------------------- ---------------Util Srv Time Disk Arm Seek Distance 0 99,374 1/12 425,502 1/6 8,909 1/3 209 2/3 18,689 >2/3 15,078 Cache hit Statistics Device Read Controller Read Write Efficiency EACS Read EACS Resp Disk Capacity MB 49,009 Percent 71.3 Average ---------------9.7 .0044
Figure 43. Workload with Expert Cache and without Read Adaptive Device Disk Activity
Comparing the reports to determine what effects the Expert Cache (without the RCD installed) had on the 170 server, observe the following improvements: The average response time per disk I/O reduced from 0.0089 second to 0.0070 second, representing a reduction of 21% (0.0038 second with the RCD). The average wait time per disk I/O reduced from 0.0035 second to 0.0026 second. The average wait time was measured at 25% (0.0014 second with the RCD). The average number of disk activities per hour is slightly reduced from 583,817 activities per hour to 425,502 activities per hour for the seek distance of 1/12. This represents a 27% reduction. Compare this to 67,627 activities per hour with the RCD. The average disk unit utilization reduced from 12% to 11% (compared to 6% with the RCD). The EAC Simulator estimates a substantial 46% disk I/O response time improvement to such situation if the RCD is installed.
69
Without RCD and without Expert Cache (300 MB subsystem pool) Average disk I/O response time Average disk unit utilization Average disk activities per hour for 1/12 distance seek Estimated disk I/O response time improvement with RCD
64%
--
46%
In summary, Expert Cache brings slight improvements to the DEXPLUS random-read intensive workload, compared to the RCD. This is because expert cache is designed to work better with sequential-read workloads than random-read workloads. The RCD can bring throughput and response time improvement to a system with a high volume of read-intensive workloads. Visit the Web page http://www.as400.ibm.com/beyondtech/ext_adapt_cache.htm for further information on EAC.
70
71
72
1. To create a UDFS on your AS/400 system, open Operations Navigator and expand the File Systems -> Integrated File System -> Root -> dev lines, as shown in Figure 44 on page 74.
73
Under the dev folder, QASPnn folders correspond to each ASP that exists on the system. The QASPnn directories are automatically created as ASPs when added to the system. There are three ASPs in our example: ASP01, ASP02, and ASP03. 2. To create a new UDFS object in ASP02, right-click QASP02 to invoke a pop-up menu. Then select New UDFS, as shown in Figure 45.
3. In the New User-Defined File System window, as shown in Figure 46, enter the name of the new UDFS and its description.
74
If you want all files in the UDFS to be addressed uniquely by case-sensitive names, check the Case sensitive file names box. For example, AbCfile and abcfile are different files if case-sensitivity is enabled. Click OK when the prompts are completed. Once created, the newly created UDFS object appears on the right side of the Operations Navigator window. A CL command equivalent to this step uses the Create UDFS (CRTUDFS) command from the OS/400 command line, as shown in Figure 47. CRTUDFS is shown with its parameters prompted.
Create User-Defined FS (CRTUDFS) Type choices, press Enter. User-defined file system . . . . UDFS Public authority for data . . . DTAAUT Public authority for object . . OBJAUT + for more values Auditing value for objects . . . CRTOBJAUD > '\dev\qasp02\myudfs.udfs' *INDIR *INDIR *SYSVAL
Additional Parameters Case sensitivity . . . . . . . . CASE Default file format . . . . . . DFTFILEFMT Text 'description' . . . . . . . TEXT
Figure 47. CRTUDFS command
4. To create an Integrated File System directory onto which the UDFS object will be mounted, move the mouse pointer to the Root file system, right-click it, and select New Folder. Specify \myifsdir as the name of the new Integrated File System directory. Click OK to create a new Integrated File System directory named myifsdir. This directory is used to map the file system in the user ASP to the Integrated File System root file system. A CL command equivalent to this step is:
MD \myifsdir
Now mount the UDFS to the Integrated File System directory just created. 5. Move the mouse pointer to the newly created UDFS object (myudfs.UDFS), and right-click it. Select Mount in the pop-up menu that appears, as shown in Figure 48 on page 76.
75
In the Mount User-Defined File System window that appears, specify the Integrated File System directory path on which mount the UDFS (it is \myifsdir in our example). Alternatively, click the Browse button to bring up a graphical directory tree of the system and select the Integrated File System directory of your choice. Then check the access type as read only or read/write. Click OK to finish. A CL command equivalent to this step uses the MOUNT command from the OS/400 command line, as shown in Figure 49, with the MOUNT command parameters prompted.
Add Mounted FS (MOUNT) Type choices, press Enter. Type of file system . . . . . . TYPE File system to mount . . . . . . MFS Directory to mount over . . . . MNTOVRDIR Mount options . . . . . . . . . OPTIONS Code page: CODEPAGE Data file code page . . . . . Path name code page . . . . .
Figure 49. MOUNT command
*BINARY *ASCII
Now the myudfs UDFS has the Where Mounted field filled with \myifsdir as its mounted position. When the UDFS is unmounted, the Where Mounted field is empty. 6. Move the mouse pointer to myudfs.UDFS object, right-click it, and select Properties to display various properties of the UDFS object as shown in Figure 50.
76
A CL command equivalent to this step uses the Display User-Defined FS command, for example: DSPUDFSD \dev\qasp02\myudfs.udfs entered on the OS/400 command line. As long as the UDFS object is mounted, any stream files put into the Integrated File System directory \myifsdir are stored in the ASP02 disk space of the \dev\qasp02\myudfs.udfs object. Unmount and delete the UDFS in the same manner that you create and mount it. In a 5250 session, the GO CMDUDFS menu provides access to help you with available commands for UDFS manipulation, as shown in Figure 51.
CMDUDFS
User-Defined FS Commands
Select one of the following: Commands 1. Create User-Defined FS 2. Delete User-Defined FS 3. Display User-Defined FS Related Command Menus 4. Mounted File System Commands 5. Network File System Commands
Figure 51. CMDUDFS menu
CMDMFS CMDNFS
77
Whenever possible, add the MOUNT command in the start-up program to help ensure the directory is accessible. Use the SAV command to save the entire UDFS object. Specify a full directory path name for the save device as shown in Figure 52.
78
Save Object (SAV) Type choices, press Enter. Device . . . . . . . . . . . . . DEV + for more values Objects: OBJ Name . . . . . . . . . . . . . Include or omit . . . . . . . + for more values Directory subtree . . . . . . . SUBTREE Save active . . . . . . . . . . SAVACT Output . . . . . . . . . . . . . OUTPUT Type of output information . . . INFTYPE
Figure 52. Saving UDFS
> '\qsys.lib\tap01.devd'
Only an unmounted UDFS object can be saved directly. Or you can save from the Integrated File System directory while the UDFS is mounted. However, in this case, the UDFS file system information itself is not saved. This means that although you save the Integrated File System directory and its contents, you lose the identity of the source UDFS object. Therefore, a direct save of UDFS is preferred. With this information, you are now ready to put the UDFS to its practical use for managing the disk storage of stream files. For further information on UDFS, refer to the AS/400e Information Center at
http://www.as400.ibm.com/infocenter or the Information Center CD, SK3T-2027,
79
80
81
Note: The target host name must exist either in the local AS/400 host table or in the domain name server (DNS) known to the local AS/400 system in order for the connection to be successfully established.
To access the target file system, use matching user IDs and passwords on both the local (or source) and target systems. \QFILESVR.400\ HostName in the source system represents the entire Root file system of the target system. The amount of data you can access depends on your authority on the target system. An example of how to use the QFILESVR.400 system to perform disk storage copy activities is in the following section.
82
Copy Object (CPY) Type choices, press Enter. Object . . . . . . . . . . . . . > '\usr\mydir\clref1of4.pdf' To directory . . . . . . . . . . > '\qfilesvr.400\itsosys2\dira' To object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . *NO *OBJ *OBJ *BINARY *NO, *YES 1-32767, *OBJ, *PCASCII 1-32767, *OBJ, *CALC... *BINARY, *TEXT
When the command parameter To directory is specified, the target file has the same name as the source file. If you want a different file name on the target, use the parameter To object instead. For example, to copy a target file named xyz.pdf to the same target directory, use the CPY command as shown in Figure 54.
Copy Object (CPY) Type choices, press Enter. Object . . . . . . . . . . . . . > '\usr\mydir\clref1of4.pdf' To directory . . . . . . . . . . '.'
To object . . . . . . . . . . . > '\qfilesvr.400\itsosys2\dira\xyz.pdf' Symbolic link From Code Page To Code Page . Data Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . *NO *OBJ *OBJ *BINARY *NO, *YES 1-32767, *OBJ, *PCASCII 1-32767, *OBJ, *CALC... *BINARY, *TEXT
Use the CPY command to copy objects in the QSYS.LIB file system. In this case, the CPY command views a file object in QSYS.LIB as a directory name and its members as file names. To copy a physical file object, a file with the same record format must already exist in the target system. For example, to copy a member named CUSTCDT of a physical file named QCUSTCDT from a local library named QIWS to a remote library named LIBA on the system ITSOSYS2, the CPY command is used as shown in the following example.
CPY OBJ('\qsys.lib\qiws.lib\qcustcdt.file\custcdt.mbr') TODIR('\qfilesvr.400\itsosys2\qsys.lib\liba.lib\customer.file')
For the Copy command to work successfully, the file CUSTOMER in the library LIBA must exist in the ITSOSYS2 system with its record format matching that of QCUSTCDT in the source system.
83
When the command parameter To directory is specified, the target member has the same name as the source member. For a different target member name, use the parameter To object. For example, to create a member named XYZ in the same target physical file as in the previous example, use the CPY command as shown in the following example:
CPY OBJ('\qsys.lib\qiws.lib\qcustcdt.file\custcdt.mbr') TOOBJ('\qfilesvr.400\itsosys2\qsys.lib\liba.lib\customer.file\xyz.mbr')
To copy multiple objects with a single command, use a wildcard (the symbol *). The following command copies all members of the LIBA/QCUSTCDT file to the target file LIBB/CUSTOMER in the system ITSOSYS2:
CPY OBJ('/qsys.lib/liba.lib/qcustcdt.file/*') TODIR('/QFileSvr.400/itsosys2/qsys.lib/libb.lib/customer.file')
2. Case-sensitive names depend on the specific file system accessed on the target system. For example, case-sensitivity is not supported for object searches over the QFILESVR.400 file system. 3. The QFILESVR.400 file system periodically checks every two hours to determine if there are any connections, which are not used (for example, no files opened associated with the connection). Connections that have no activity for a two-hour period are terminated automatically. 4. The QFILESVR.400 file system does not detect loops. The following path name is an example of a loop, where Remote1 is the local system:
/QFileSvr.400/Remote2/QFileSvr.400/Remote1/ QFileSvr.400/Remote2/...
When the path name containing a loop is specified, the QFILESVR.400 file system returns an error. The error indicates that a time-out has occurred. 5. The QFILESVR.400 file system uses an existing free session to communicate over a SNA LU 6.2 link. Start the mode and establish a session between systems to successfully connect QFILESVR.400 to the remote target system.
85
86
87
Identifying large objects that may contribute to an inefficient consumption of the system disk space helps keep this growth in check. In many situations, you can make a proper decision on what action to take to ensure an efficient usage disk space if you can identify all large database objects in your system. Display their current disk space consumption status by using the Display File Description (DSPFD) command. The DSPFD command provides a lot of information about the file, including its record length in bytes, the total number of active records, and the total number of deleted records which are not yet purged. For example, a file with a record length of 100 bytes, a total of one million (active) records, and a total of six million deleted records, means that the file is about 700 MB in size. 600 MB is occupied by the deleted records. In a situation like this, run the Reorganize Physical File Member (RGZPFM) command over the file with too many deleted data records. RGZPFM frees up the disk space the records occupy. You can also use the Change Physical File (CHGPF) command on the file and set the Reuse deleted record (REUSEDLT) attribute, if appropriate, to *YES. This prevents inefficient growth of the number of deleted records and thus prevents the need to run the RGZPFM command on specific files too often. Note that this action may require a change in operational or programming procedures dependent upon whether the applications using the file are designed with the REUSEDLT characteristic in mind. For detailed information on how to use the REUSEDLT attribute of a physical file, refer to AS/400 Database Programming, SC41-5701.
Tip
A situation where having reuse deleted record set to *YES is useful is when the average number of deleted records, over a reasonable period of time (per day or week), exceeds, or is about the same as, the average number of new records added. In such a case, *YES helps prevent new space allocation of the file and thus reduces the growth rate of the file size. If the average number of deleted records is less than the average number of new records added, *YES may not be as useful. Set reuse deleted record of a file to *NO if you need: To maintain arrival sequence of the added records. To implement first-in-first-out (FIFO) or last-in-first-out (LIFO) ordering for data records with duplicate key field value. To access the data record by the relative record number (RRN). This is a strategy from System/36 days. The RRN is reused when *YES is specified.
In another situation, you might use database journaling for transaction-oriented applications using commitment control. This can result in a situation where the journal receivers grow unnecessarily large. Set a limit on practical sizes for the receivers and have the system automatically delete the receivers that reach the size limit, by creating a new journal receiver with the Journal Receiver Threshold (THRESHOLD) attribute set to a proper size. Use the Change Journal (CHGJRN)
88
command to attach the new receiver, then set the Manage receivers (MNGRCV) attribute to *SYSTEM and the Delete receivers (DLTRCV) attribute to *YES. This helps control the maximum amount of allocated disk space for the journal receivers. Database journaling is designed for data recovery purposes. When the receivers grow too fast, use the CHGJRN command to set the Receiver size options (RCVSIZOPT) attribute of the journal to remove internal entries (*RMVINTENT). Use a minimum fixed length (*MINFIXLEN) for the journal entries to help control the growth rate of the receivers. Refer to AS/400 CL Reference, SC41-5722, for more information on the CHGJRN command.
Each time RTVDSKINF is run, the member QCURRENT is written over. To save existing information in QCURRENT for later use, rename the QAEZDISK file or duplicate the data into another file before you run RTVDSKINF.
PRTDSKINF produces a spooled print file containing a report of the disk consumption. Reports are selected based on: User profile (object owner) information Object information System object information Library information Folder information
The list of information in the report is sorted based on such criteria as: Object size in descending order Owner name in alphabetical order Object name in alphabetical order Last-change date in order of time Last-use date in order of time
89
Use the Submit Job (SBMJOB) command to run the RTVDSKINF and PRTDSKINF commands in batch mode. Or use the Disk Tasks menu (GO DISKTASKS) to initiate commands as shown in Figure 55.
DISKTASKS
System: ABCDERSD To select one of the following, type its number below and press Enter: 1. Collect disk space information 2. Print disk space information 10. Work with libraries 11. Work with folders 12. Work with objects by owner
Before you submit the RTVDSKINF command or use the DISKTASKS menu, make sure your user profile exists in OS/400 System Distribution Directory Entry. Use the Work with Directory Entries (WRKDIRE) command to add the necessary user profile or display entries. Otherwise, RTVDSKINF does not retrieve all information on system objects before ending, and PRTDSKINF does not have what it needs to produce output for the Specific object information portion of the report.
Tip
Do not run the RTVDSKINF command when the system is experiencing a heavy workload. The RTVDSKINF job cannot collect object information on objects in use. RTVDSKINF locks the objects while collecting information on them, which leads to file contention situations (locking and seize problems) if you run RTVDSKINF while your system is in heavy use. Off-hour operation is preferrable in most cases. Alternately, run the RTVDSKINF command after an IPL.
7.1.1.1 Disk information report using a 5250 session Follow this sample procedure to identify large objects in your system:
1. Enroll the user running this procedure in the system directory: a. From a command line, type the command WRKDIRE to invoke the Work with Directory Entries screen. b. Type 1 in the Opt field and fill in your User ID and Address. Press Enter. c. Fill in the Description field and specify your User profile, which is the same one you use to sign on to the system, and the user profile entered in the system directory as in the beginning of this procedure. Other fields are
90
optional. Press Enter when done. Then press the F3 key to return to the OS/400 command line. You are now ready to collect and print a report on disk space information. 2. Type the following command:
SBMJOB CMD(RTVDSKINF)
Then press Enter. RTVDSKINF does not have any parameters, so submit it right away. 3. Use the WRKSYSSTS command to monitor the status of your submitted job. Wait for the job to finish. This takes anywhere from a few minutes to a few hours, depending on the disk space allocation and overall system performance. Because the collected disk information is stored in the physical file QUSRSYS/QAEZDISK, you can wait until a later time to continue this procedure. 4. When RTVDSKINF finishes, produce a report by submitting the following command:
SBMJOB CMD(PRTDSKINF)
Then press F4 key twice to bring up parameters of the PRTDSKINF command as shown in Figure 56.
Print Disk Information (PRTDSKINF) Type choices, press Enter. Type of report . . . Objects . . . . . . Object types . . . . + for Smallest size . . . Sort by . . . . . . . . . . . . > *OBJ . . . . . . > *ALL . . . . . . *ALL more values . . . . . . 50000 . . . . . . *SIZE *LIB, *FLR, *OWN, *OBJ, *SYS Name, generic*, *ALL, *NONE *ALL, *ALRTBL, *AUTL... Size in 1000 bytes *SIZE, *OWNER, *LSTCHG...
5. Specify the Type of report that you wish to see. For example, to see a list of all objects in descending order of their size with a minimum of around 50 MB, specify: *OBJ for Type of report. *ALL for Objects and Object types. A value of 50000 for Smallest size. This field accepts a decimal value of five positions and specifies the size in kilobytes (1000 bytes). The maximum value you can specify is 99999, which is about 100 MB. *SIZE for Sort by. Press Enter when the parameters are filled in. 6. Wait for the job to finish. Then use the WRKSPLF command to locate and display the spool file named QUSRSYS/QPEZDISK. This report contains several disk space reports with information on: System components OS/400 items OfficeVision/400 items
91
Licensed Internal Code Space used by internal objects Specific object information Miscellaneous information
5769SS1 V4R4M0 990521 System Information Information collected . . . . . . . . . : Total disk space on system in 1,000,000 bytes . . . . . . . . . . . . . . . . : Main storage size in megabytes . . . . . : Machine type-model . . . . . . . . . . . : System serial number . . . . . . . . . . : 09/09/99 16:32:56 9836 128 9402-400 1X-XXXXXX
Customize options specified for this report: Report type . . . . . . . . . . . . . : *OBJ Objects . . . . . . . . . . . . . . . : *ALL Object types: *ALL
Size of smallest object . . . . . . . : Sort by . . . . . . . . . . . . . . . : Description User libraries User directories Folders and documents QSYS Other IBM libraries Licensed Internal Code Temporary space Unused space Internal objects Objects not in a library TOTAL % of Disk 11.26 5.80 .52 13.39 13.64 11.77 5.65 35.59 .61 3.00 101.23 Size in 1,000,000 bytes 1107.61 570.61 50.92 1316.72 1341.33 1157.81 555.88 3500.79 59.53 295.46 9956.66 % of Disk .04 .04 .10 .01 .12 .01 .02 .02 .00 .00 .00 .00 9.43 1.38 .01 .33 .55 .07 Size in 1,000,000 bytes 3.71 4.29 9.94 .88 12.17 1.18 2.22 2.08 .00 .00 .00 .00 927.79 135.27 .94 32.79 54.53 6.49
50000 *SIZE
Description OS/400 items reported: History files Journal receivers User profiles Configuration information System help (QHLPSYS) Calendars System directories Document files OfficeVision/400 items reported: Enrollment Mail files Text search Personal directories Licensed Internal Code: LIC and tables Dump space Error logs Trace tables VLIC logs VLIC control blocks * This list points out items of interest and does not contain all objects on the system. For more information, see AS/400 System Operation V3R6, SC41-4203.
92
Disk Space Report 5769SS1 V4R4M0 990521 System Information* Description Space used by internal objects: Additional configuration information Communications Data base Manage jobs Monitor performance Folders Mail OS/400 S/36 Environment Security SNADS and object distribution Spool Cross component Product installation Recovery of information Obsolete Internal system journals Miscellaneous items reported: Printer output & Spooling (QSPL) Replaced object library (QRPLOBJ) Storage affected by RCLSTG Reclaim storage library (QRCL) * This list points out items of interest and does not contain all objects on the system. For more information, see AS/400 System Operation V3R6, SC41-4203. Specific Object Information Object QAPMJOBS ISAJ000217 ISAJ000225 ISAJ000220 QTQIINIT TOTAL * * * * * END OF Library QPFRDATA QGPL QGPL QGPL QSYS Type *FILE *JRNRCV *JRNRCV *JRNRCV *SRVPGM Owner QPGMR DHQB DHQB DHQB QSYS % of Disk 3.76 1.07 .90 .90 .82 Size in Last 1000 bytes Change 369586.2 105545.7 88137.7 88133.6 80285.7 731688.9 L ISTING ** *** Last Use % of Disk .00 .07 .02 .31 .00 .00 .00 .06 .00 .00 .01 .06 .01 .00 .02 .00 .03 .49 .00 .00 .00
Size in 1,000,000 bytes .11 6.71 1.52 30.84 .00 .44 .00 6.23 .00 .11 .75 6.39 1.26 .09 1.98 .00 3.10 48.06 .34 .03 .00
Description
08/03/99 08/03/99 Job related performance data 02/25/99 09/09/99 06/07/99 09/02/99
The last portion shown on page 4 of the report is titled Specific Object Information. This section contains a list of objects in descending order of their size as specified in the PRTDSKINF command. In this example, we specified 50 MB as the lower limit of object size. All the objects displayed in this report are larger than 50 MB in size. You can see one large file and three large journal receivers in this portion of the sample report. Other useful information is also presented. For example, on page 1 of the report, you see a line indicating Objects not in a library. This primarily includes objects that are not fully created, or not fully deleted, and will be deleted from the system when the Reclaim Storage (RCLSTG) command is run. It also includes job message queues. Job message queues are traditional system objects, but do not reside in libraries. You can also identify if additional disk space can be gained after running RCLSTG. Look on page 4 for the line indicating Storage affected by RCLSTG under Miscellaneous items report.
93
With the information provided by the report, you can take an informed action in managing disk space utilization.
7.1.1.2 Disk information report using AS/400 Operations Navigator On V4R4 systems, the operations described in the preceding section are performed from Operations Navigator, if you prefer to do so.
On the PC side, use the Operations Navigator program code that comes with the shipped OS/400 V4R4 system, or from the Client Access Express V4R4 install CD. Run the STRTCPSVR SERVER(*MGTC) command to start the AS/400 server component of Management Central before using Operations Navigator from the PC. Use the Run Command function of the Management Central component of the Operations Navigator to submit an OS/400 command. Before using the Run Command function, create an endpoint system entry for the AS/400 system against which you run the command. See 7.3, Management Central disk resource utilization monitor on page 111, for information on how to create an endpoint system using Management Central. When the endpoint system is created, complete the following steps to run RTVDSKINF and PRTDSKINF: 1. Open Operation Navigator and enroll your user profile into the system Distribution Directory. Expand the target AS/400 system icon to view the functions available. Expand the User and Groups icon, and then click All Users (Figure 59). All user profiles in the system are displayed on the right side of the window.
2. Double-click your user profile to bring up the Properties window. Then click the Personal button (Figure 60).
3. Click the Mail tab to bring up the System Distribution Directory Entries information (Figure 61). All fields are already filled with default information for your user profile. Make any necessary changes. Then click OK .
If you are already enrolled in the Distribution Directory, the fields User ID and Address are displayed in gray background instead of white. Make changes if required. Otherwise, click OK to return to the User ID Properties window.
94
4. Click OK in the User ID Properties window to finish the enrollment. 5. On the left side of the Operation Navigator window, right click the target AS/400 endpoint system name to bring up the pop-up menu.
Note: You may need to expand the Management Central and AS/400 Endpoint Systems lines before you can see the system name. If you cannot see your system here, create it. See 7.3, Management Central disk resource utilization monitor on page 111, for steps on how to create an endpoint system using Management Central. Return to this step when finished.
6. Highlight the menu item Run command..., and click once to bring up the Run Command window (Figure 62).
7. Type the command RTVDSKINF (Figure 63 on page 96). Click the Check Syntax button to verify if the command format typed is correct. Click OK to submit the command to the AS/400 system immediately.
Note: In contrast to a 5250 session environment, you do not use the Submit Job (SBMJOB) command to submit the command in a Management Central environment. The command you submit under Management Central runs under its own environment in the QSYSWRK subsystem. Use the SBMJOB command if you prefer to run the job in other subsystems. However, when not running in QSYSWRK, you are not able to monitor the job status from Management Central - Task Activity.
95
8. Monitor the status of the submitted job to see when it finishes. Do this by clicking the Task Activity icon under Management Central. All the tasks initiated by Management Central are displayed on the right side of the window. A status of Started indicates a submitted task is in progress. Right-click the task icon, and select Status to see the detail of the status. This brings up another Run Command Status window that displays a few details of the task as shown in Figure 64.
9. Wait for the job to finish (as indicated when the Status field changes from Started to Completed). This takes anywhere from a few minutes to a few hours depending on the disk space allocation and system performance. Because the collected disk information is stored in the physical file QUSRSYS/QAEZDISK, you can wait until a later time to continue. While you wait for the task to finish, you can close the Operations Navigator and turn off your PC. Reopen it later to display the status of the task.
96
10.When the RTVDSKINF task finishes, produce a report by submitting the PRTDSKINF command. Use the same Run Command function as described in the preceding steps, that is:
PRTDSKINF RPTTYPE(*OBJ) OBJ(*ALL) OBJTYPE(*ALL) MINSIZE(50000) SORT(*SIZE) Note
Although there is a Check Syntax button available for use, there is no prompting function (F4) for a list of command parameters in the Operations Navigator environment, compared to 5250 session environment. Enter the command in a keyword format with all the required parameter keywords and values specified. 11.Wait for the job to finish. Right-click the completed task in the Task Activity list. Select Status to invoke the Run Command Status window as shown in Figure 65.
Figure 65. Management Central: Displaying the spooled output of a completed task
In this window, right-click the system name, and select Task Output to bring up the Printer Output - (System name) window. 12.In the Printer Output window, right-click the spooled file name listed under Output Name field. Select Open to invoke the AFP Viewer to display the content of the spool file. The same reports are produced as discussed in 7.1.1.1, Disk information report using a 5250 session on page 90.
97
The last portion of the report is titled Specific Object Information, as shown on page 4 in our example in Figure 66. This section lists the objects in descending order of their size, as specified in the PRTDSKINF command. In this example, we specified 50 Mbyte as the lower limit of the object size. So, all the objects displayed in this report are larger than 50 MB in size. Other useful information is also presented in this report. For example, on page 1 of the sample report, there is a line indicating Objects not in a library. This value primarily includes objects that are not fully created or not fully deleted. They would be deleted from the system if RCLSTG is executed. The report also includes job message queues. Job message queues are standard system objects but do not reside in libraries. Look for a line indicating Storage affected by RCLSTG on the Miscellaneous items report section. This information identifies if additional disk space could be gained by running RCLSTG. Refer to page 3 in the sample report. Refer to Management Central: A Smart Way to Manage AS/400 Systems, SG24-5407, for detailed information on how to use many functions delivered in Management Central.
98
Data_______Field___ Field Type DIOBLI CHAR DIOBNM CHAR DIPRFL CHAR DIOBTP CHAR DIOBAT CHAR DIOBSZ PACKED DIOBTX CHAR DICCEN CHAR DICDAT CHAR DICTIM CHAR DIOBUS CHAR DIUCEN CHAR DIUDAT CHAR DIUTIM CHAR DISTIN CHAR DIOBOW CHAR DIOBAS CHAR DIFLPT CHAR
Column Length 10 12 12 7 9 15 0 50 1 6 6 1 1 6 6 1 10 2 63
Heading Object Library Object Name Parent Folder Object Type Object Attribute Object Size Text Description Last Changed Century Last Changed Date Last Changed Time Object Use Indicator Last Used Century Last Used Date Last Used Time Status Indicator Object Owner Object ASP Folder Path
The field named DIOBSZ contains the object size in bytes. The object owner is in the DIOBOW field and the object type is in DIOBTP field. The field DIOBAT contains the object attribute, which further qualifies the object type. For example, a program object has an object attribute that clarifies what language it is compiled from (such as RPG, C, CBL, or CLP). Some object types do not have a further qualifier. To generate a report on how much disk space is consumed by RPG program objects which are owned by a particular user, run RTVDSKINF. When it finishes, run a query equivalent to the following SQL statement (or use the SQL statement itself):
SELECT SUM(DIOBSZ) FROM QUSRSYS.QAEZDISK WHERE DIOBOW=a_user_profile AND DIOBTP=PGM AND DIOBAT=RPG
The result of this SELECT statement is the total size in bytes of the RPG objects owned by a specific user profile. To list the file types available in QAEZDISK, run the following SQL statement:
SELECT DISTINCT(DIOBTP) FROM QUSRSYS.QAEZDISK
The example described in this section shows the flexibility available when customized reports are needed.
99
This section discusses the OS/400 V4R4 disk balance tool which can be used to balance information on the disk storage system. The disk balance tool is available on V4R4 systems.
Note: There is limited support for disk balance tools delivered as PTFs for V4R3, V4R2 and V4R1, as identified in 7.2.6, DSKBAL command on page 109.
The disk balance tool is useful in the following situations: When you add new disk units into an Auxiliary Storage Pool (ASP) and want to spread existing data onto the newly added units for an even space utilization on all disk units in the ASP. Prior to V4R1, to achieve a disk capacity balance, you save and restore the entire ASP. If this balance involves the system ASP, an entire system save and restore is necessary. This is not an efficient method in most customer settings. Therefore, in most cases, newly added disk units are left empty and OS/400 populates new data onto them as time goes by. This situation can cause a performance problem since most of the new data is allocated onto the new units, resulting in an uneven amount of I/O requests to the disk units in the same ASP. You may suspect that a particular group of frequently accessed database files are not evenly allocated on all disk units in the ASP. This causes a performance bottleneck because certain disk units have too many I/O requests compared to the rest of the disk units in the ASP. Use the Work with Disk Status (WRKDSKSTS) command, or collect performance data for an analysis of whether disk units have a balanced amount of I/O requests. For systems prior to V4R4, it is normally recommended that you save these objects onto tape media, rename them on the disk storage, and restore the original objects back. Delete the renamed objects if the restore completes normally. OS/400 tries to allocate the objects evenly to all disk units in the ASP, if possible, at restore time. However, this might be impractical because, in many cases, it takes much effort to identify the group of frequently accessed objects in the first place. Hardware disk compression lets you choose to compress disk units in a User ASP on a disk arm basis. An estimated two to three times the disk space is gained, dependent upon the characteristics of the data being compressed. An access time penalty of 0 to 30% is possible. Therefore, enable compression when disk storage capacity (or efficiency) is of higher priority than performance. Disk compression is available in V4R3 or later with hardware that supports compression. If compressed disk units are mixed with uncompressed ones in the same user ASP, you can place rarely accessed objects onto compressed the units. This preserves the uncompressed, better-performing disk units for objects that are accessed more frequently.
100
OS/400 V4R4 provides three types of disk balance processes: capacity, usage, and HSM balance. Each of these balance types is invoked by the Start ASP Balance (STRASPBAL) command. Capacity balancing : Capacity balancing is when the data on all disk units within the ASP is balanced so that each unit has an equal distribution of percentage used and percentage unused space, as pictured in Figure 68.
An even distribution of data can help reduce the chance of a disk unit overflow, assuming total disk storage is monitored for threshold. Capacity balancing is useful when new units are added to an ASP. Instead of having several units with the majority of the data and several new ones with a much lesser proportion of data, data is spread evenly across all disk units before using them in your normal system environment. A conceptual view of the capacity balancing process is shown in Figure 69.
Capacity balancing is started from System Service Tools (SST) or Dedicated Service Tools (DST). Use the Add units to ASPs and balance data menu option.
Note: When started from this menu option, if an IPL is performed before the capacity balancing process completes, balancing restarts automatically during the next IPL.
Usage balancing: Usage balancing is when the low-use pieces of data on all disk units in a specified ASP are redistributed. This helps prevent the
101
accumulation of high-use data on too few disk units, which in turn improves data access performance. High-use data is not moved. A conceptual view of the objective of usage balancing is shown in Figure 70.
25% busy
20% busy
20% busy
20% busy
30% busy
Based on the traced disk usage statistics, the usage balancing process reallocates the low-use data in such a way that it influences future data allocation requests on disk units in the ASP. This is done with an attempt to identify whether there are disk units that are statistically over utilized and under utilized. If so, the system tries to move existing low-use data from underutilized disk units onto overutilized disk units.
Note: To minimize a performance impact, *USAGE balancing does not move hot data.
Usage balancing prevents the system from allocating further data on the overutilized units and thus prevents additional utilization. This in turn leaves a larger amount of empty space on the underutilized disk units, which leads to the system allocating new data onto them. Finally, the underutilized units become better utilized from the presence of new high-use data. At the completion of the usage balancing process, all disk units in your system may not have equal percentage of used space because capacity balancing is not the focus of usage balancing. A conceptual view of the usage balancing process is shown in Figure 71.
102
45% busy
30% busy
7% busy
15% busy
After new data is created and becomes high-use data, some high-use data may become low-use
25% busy
20% busy
20% busy
20% busy
30% busy
Hierarchical Storage Management (HSM) balancing : Hierarchical Storage Management balancing requires there be compressed and uncompressed disk units in the same user ASP. The system ASP is not eligible for compression. As such, HSM balancing moves high used data to faster (uncompressed) disk units, and lesser used data to slower (compressed) units. A conceptual view of the HSM balancing process is shown in Figure 72 on page 104.
103
compressed
compressed
With HSM balancing, the system determines the amount and location of the high-use and low-use data on the disk units. The system then redistributes the disk unit data to prevent accumulation of the high-use data on too few disk units. With HSM balancing, the user ASP should contain a sufficient amount of uncompressed disk space to hold all the high-use data that HSM balancing moves onto. Otherwise, the goal might not be achieved. Refer to the Web page http://www.as400.ibm.com/beyondtech/hsm.htm and the redbook Complementing AS/400 Storage Management Using Hierarchical Storage Management APIs, SG24-4450, for more information on HSM usage.
Note
All three types of ASP balancing in V4R4 have restrictions on what object types or locations can be moved. Situations or object types which are restricted from movement by a balancing function include: The first gigabyte of the load source unit Storage Management directories area Journals and journal receivers Temporary objects Objects that are currently being used, or pinned in main storage (for caching purpose as an example)
This means that high-use data which falls into these categories remains where it is on disk storage when the ASP balance operation is in action. Reduce the amount of unmovable objects to a minimum by running the ASP balance function during off-hours or in a restricted state. A restricted state is initiated with the ENDSBS *ALL *IMMED command.
104
The STRASPBAL is where you may notice an impact. Therefore, it should be run in low activity periods.
Trace ASP Balance (TRCASPBAL) Type choices, press Enter. Auxiliary storage pool ID . . . > *ALL + for more values Trace option setting . . . . . . > *ON Time limit . . . . . . . . . . . *NOMAX
Figure 73. TRCASPBAL command
Tracing can be started for a specific ASP or for multiple ASPs. It can also be started for a specific length of time by specifying a value for the Time limit, or stopped at any time, by specifying TRCASPBAL SET(*OFF), and then restarted at a later time.
105
The collected statistics are cumulative. If the trace is started, ended at a later time, and then restarted without clearing the statistics, the second collection of statistics are added to the first group. Be careful when using TRCASPBAL. Do not mix the trace data gathered from a very low system workload period with data from a very high system workload period. This generates disk usage statistics which, when used by a usage balance process to select which piece of data to move, produces less efficient disk balancing. Use TRCASPBAL SET(*CLEAR) to clear the irrelevant trace data before starting a new trace for the next usage or HSM balancing process. Also clear the traced statistics if usage or HSM balance functions are partially completed (that is, they do not reach completion). Start a new trace. The TRCASPBAL process does not run as a batch job. It runs as low level tasks below the AS/400 Machine Interface. Use the Work System Activity (WRKSYSACT) command to monitor tasks with the names of SMIOCOLLECT and SMTRCTASK. WRKSYSACT is available when the Performance Tools/400 Licensed Program Product (5769-PT1) is installed. Messages are sent to the system history log (QHST) when the trace function starts, ends, and when trace statistics are cleared, as shown in Figure 74.
10 09:00:00
Message . . . . : ASP tracing successfully started for ASP 1. Cause . . . . . : The ASP tracing function successfully started for ASP 1. The tracing function will run until the time limit expires or the function is stopped by the user.
10 09:50:00
Message . . . . : ASP tracing for ASP 1 ended. Cause . . . . . : The ASP tracing function for ASP 1 ended. The function had an ending code of 1. For more information about the ending codes and possible recoveries see the Hierarchical Storage Management guide. The ending codes and their meanings are as follows: 1 - The time limit specified for the tracing has expired. 2 - The user requested the tracing be ended. 3 - The tracing function could not be started. 4 - The tracing function could not be started on an ASP that consists of only a single disk unit. 5 - The tracing function ended unexpectedly.
ASP tracing data successfully cleared for ASP 1. ASP tracing data has been successfully cleared for ASP 1.
Figure 74. Trace ASP Balance messages in the OS/400 history log
106
Start ASP Balance (STRASPBAL) Type choices, press Enter. Auxiliary storage pool ID . . . > *ALL + for more values Balance type . . . . . . . . . . > *CAPACITY Time limit . . . . . . . . . . . > *NOMAX
Figure 75. STRASPBAL command
Recommendation
Run the usage or HSM balance functions soon after the TRCASPBAL has finished collecting statistics. This ensures that the statistics apply directly to the data access characteristics of the system workload. Running the balance processes after leaving the statistics for too long may not be applicable to your system if there are substantial changes in the data access characteristics during this period. In general, run STRASPBAL in the off-hours of the same day that you run TRCASPBAL. If the statistics become useless because the data access characteristic of your workload has changed in a noticeable way, clear them by running TRCASPBAL SET(*CLEAR).
If you run the usage or HSM balance process but cannot see any tangible results when it finishes, this can mean that the trace statistics do not contain any substantially observable data for the balance process to take action. For example, your system may not have high-use data at all, or the workload is too light during the trace period. Clear the trace and run it again during a more representative time period. ASP balance processes run as low level tasks, below the AS/400 Machine Interface. The task names are SMDASDUTILTASK, SMBALUNIT, and SMEQnnnn, where nnnn is the ASP number the task is working on. Messages are sent to the system history log (QHST) when the ASP balance process starts and ends, as shown in Figure 76 on page 108.
107
10 09:08:27
Message . . . . : ASP balancing successfully started for ASP 1. Cause . . . . . : The ASP balancing function of type *CAPACITY successfully started for ASP 1. The balance function will run until the time limit expires, the ASP has been completely balanced, or the function is stopped by the user.
10 09:45:21
Message . . . . : ASP balancing for ASP 1 ended. Cause . . . . . : The ASP balancing function of type *CAPACITY for ASP 1 ended. The function had an ending code of 1. For more information about each ending code and possible recoveries see the Hierarchical Storage Management guide. The ending codes and their meanings are as follows: 1 - The ASP is completely balanced. 2 - The time limit specified for the balancing has expired. 3 - The user requested the balancing be ended. 4 - The balance function could not be started. 5 - The balance function could not be started on an ASP that consists of only a single disk unit. 6 - The balance function ended unexpectedly. 7 - The balance function could not be started on an ASP with no trace information. 8 - The balance function could not be started on an ASP that does not contain the correct mixture of high-performance and low-performance disk units(for example compressed disk units).
Figure 76. ASP Balance messages in OS/400 history log
Specify a time limit for the ASP balance function to run, or let it run to completion. If the ASP balance function runs for a certain period of time and then stops, it continues from where it left off when restarted at a later time. This allows the balancing to run outside of normal office hours, and over a period of several days, to prevent a negative system performance impact during normal office hours. Use the End ASP Balance (ENDASPBAL) command to end the ASP balancing function before the specified time limit expires, or when *NOMAX is used for the Time limit attribute. By default, you must have *ALLOBJ special authority to use these balance commands. Find additional information on ASP balancing in Hierarchical Storage Management, SC41-5351.
108
stream files in the Integrated File System are stored in the system ASP only, move them to a user ASP for the HSM balance to include this data.
To put stream files housed in the Integrated File System into a user ASP, use OS/400 User-Defined File System (UDFS). Refer to Chapter 5, Extending the Integrated File System with UDFS on page 73, for more information on UDFS.
Note: The Make Directory (MD) command does not work to place Integrated File System information in a user ASP because MD creates directories in the system ASP only.
Disk Balance (DSKBAL) Type choices, press Enter. Number of minutes 0-9999 ASP to balance . . . . . Balance how often: Every IPL, or once . . Minutes each sucessive . . . . . . . . . . . . IPL . . *CHECK *ALL *EVERYIPL 30 0-9999, *STOP, *CHECK, *SAME 1-16, *ALL *ONCE, *EVERYIPL 0-9999
The disk capacity balancing function is restricted to run at IPL time only. You can specify that it run only once at the following IPL, or run at every IPL until the balancing is complete. Specify a time duration for the function to run in minutes. While the function runs at IPL, a System Reference Code (SRC) of C6004257 is displayed on the control panel. The code runs until the percent used on the drives specified is equal, or the time specified has elapsed.
109
When the code terminates, it creates an LIC log entry VL100020C5. The entry contains the control block for the command and the following message, which summarizes the execution: SUCCESSFUL We completed in less time than was specified. TIME EXPIRED We terminated because we had run for the length of time specified. MOVE EXTENTS ERROR We received this message. Stop the DSKBAL function by typing:
DSKBAL BALTIM(*STOP)
Recommended run times The time necessary to move existing data depends on a number of factors. The most critical factor is the system configuration, including the type and size of existing DASD, the number of IOPs, etc. The current data allocation sizes also affect the time necessary to move the data. Given this, the results of the following formula should be used only as a guideline to how long it will take to balance the drives.
First, it is necessary to determine how much data will be moved. For the ASP to be balanced, multiply the size of the ASP (before the new DASD has been added) by the percent used. This is the amount of allocated storage. Divide this number by the size of the ASP after the new DASD is added. This is the percent used that the ASP will be after the new DASD is added. Multiply this number by the size of the new DASD. This is the amount of data to be moved. In IBM tests, it was found that it took one minute to move 10 MB of data. Dividing your last result above (assuming the amount of data to move was in MB) by ten yields the approximate number of minutes it will take to balance the ASP. Consider this example. The system is one ASP system that appears as shown in Figure 78 after the new DASD has been added.
Display Disk Configuration Capacity ----Protected--- ---Unprotected--Size %Used Size %Used 0 0.00% 5062 54.59% 0 0.00% 1967 68.45
ASP 1
IBM recommends that you let the DSKBAL command run as long as you are able. If it has not finished, create dummy files to even out the percent used of the new DASD. When there is time to run the command again, delete the dummy files and run the DSKBAL command as long as possible.
110
Follow these steps to set up the disk resource utilization monitor: 1. Invoke the Operations Navigator and supply sign-on information if necessary. 2. Click the plus sign (+) on the left of the line to expand the Management Central line. The expanded option is shown in Figure 79.
The system to be monitored must be defined as an endpoint system before you can create a monitor profile for it.
Note
The endpoint system must have a communication link to the central system and must run OS/400 V4R3 or later. For systems with V4R2 or earlier, install the PRPQ named Performance Investigator for OS/400 (product number 5799-RFD) to use Management Central functions.
3. If there is no endpoint system created for your target system, right-click the AS/400 Endpoint Systems line to invoke a pop-up menu. Select New Endpoint System... . The New Endpoint System window appears (Figure 80 on page 112).
111
4. Specify the name of the intended system in the New Endpoint System window. Also specify a brief description to describe this system as an endpoint system in a list of systems that exist. Click OK to finish creating a new endpoint system. Notice that the line AS/400 Endpoint Systems can be expanded with the newly added system name shown underneath.
Note
When you click OK in this step, Management Central checks for the existence of the endpoint system name specified. It searches the \WINDOWS\HOSTS file in your PC or in the Domain Name Server (DNS) specified in Windows TCP/IP configuration. If it cannot locate the system, a notification message is sent. Make sure the endpoint system name exists in either the PC HOSTS file or the DNS. 5. Move the mouse pointer to the Monitors icon, and right-click. Select New Monitor... to invoke the New Monitor window as shown in Figure 81.
112
6. On the General tab of the New Monitor window, specify the name for the new monitor profile to be created and type in the description. The Metrics to collect list box contains many resource utilization categories available for selection. There are six categories relating to disk utilization: Disk Disk Disk Disk Disk Disk Arm Utilization (Average) Arm Utilization (Maximum) Storage (Average) Storage (Maximum) IOP Utilization (Average) IOP Utilization (Maximum)
Click the check boxes in front of the items to select the items to monitor. To see the overall utilization of the disk resources over a period of time, choose the Average category. This category is used to verify a uniform distribution to all individual components of the category. To identify the highest utilization of an individual component at a specific moment, select the Maximum category. The objective is to see the Average and the Maximum at an equal level. This indicates a consistent utilization of the resource throughout. A large difference between the average and the maximum can indicate an inconsistent utilization over time, or among the individual components. The larger the difference, the more the inconsistency. 7. On the Actions tab, select threshold trigger and threshold reset actions.
113
8. Select the Metrics tab (Figure 82) to specify parameters to control the resource utilization categories selected in the General tab.
Matrix options include: Collection interval: Use the collection interval to control how often statistics are collected. Retention period: Use the retention period parameter to determine how long to keep the collected utilization statistics in the central system. This value determines how much space is allocated in the disk storage of the central system to hold the statistics. The longer the period, the larger the disk allocation. Maximum graphing value : The maximum graphing value controls the vertical dimension of the graph window. It is measured as a range of percentage of statistics seen at any time. Display time: The display time parameter controls the horizontal dimension of the graph window. It displays the range of statistics seen at any time. 9. To edit the threshold trigger for the reset actions taken when utilization reaches a certain level, click Edit Thresholds (as shown in Figure 83). Specify the threshold level and action to be taken. Click OK when done.
114
10.In the New Monitor windows, click OK to create a new monitor profile. The new monitor profile is the name which you specified in Figure 81 on page 113. It appears in the right side of the window. 11.Move the mouse pointer to the new monitor profile just created and right-click to bring up the pop-up menu. Select Start to begin real-time monitoring of the selected resource categories (Figure 84). You are prompted to select the endpoint system to be monitored.
12.Select the system, and click Add . Click OK when done. 13.Press F5 key to refresh the display. Notice that the status of the monitor profile changes from stopped to starting and then to started.
Chapter 7. OS/400 disk storage management tools
115
14.To display the real-time resource utilization monitor window, move the mouse pointer to the monitor profile name and right-click to bring up the pop-up menu. Select Open . You see information windows similar to those shown in Figure 85.
The information window displays three levels of sampled data: The first level of data is on the left side of the window. Shown as a line graph, it depicts the average or maximum utilization collected over time. Move the mouse pointer to a point of interest in the first level data. Click to see the second level of detail on the top half of the right side of the window. Shown as a bar graph, it displays the utilization of each individual component in descending order. Click an individual bar of interest. The third level of detail shows in the bottom half of the window. This table lists the properties of the individual component collected at that specific point in time. Move the mouse pointer to the property line of interest. Right-click, and select Whats this to display an explanation on what that property is. In the second level information window (as shown in Figure 85), you can see there are a total of seven disk units in our sample system. There are two units with the same disk arm number of 0001. These are in the mirrored pair of the Load Source Unit (LSU). The LSU assumes disk number 0001 in every system.
116
At that particular point in time, unit number 0002 has the highest percent busy of about 13%. Unit numbers 0003, 0004, and 0001 appear in descending order of utilization. Disk units 0005 and 0006 appear to be idle. The third level information is about disk number 0002 in particular because it is the most utilized unit at that moment (13.3%). In our example, it has read 11,232 blocks, written 256 blocks, executed 379 read commands, 27 write commands, and so on. Use this third-level information to analyze performance-related information or the availability-related status of each of the individual components. This helps the administrator identify if further action should be taken to rectify any issues uncovered from this report. 15.Close the real-time monitor window. To display it again later, keep the monitor running.
Note: If you leave the monitor running continuously, be aware that the amount of AS/400 disk space used by the monitor depends on the length of time you specify as retention period as shown in Figure 82 on page 114.
16.To end the monitor, right-click the monitor profile icon as shown in Figure 84 on page 115, and select Stop. Management Central is a user-friendly, graphical interface to help monitor disk resources utilization. Refer to Management Central: A Smart Way to Manage AS/400 Systems, SG24-5407, for detailed information on how to use many functions delivered in Management Central.
There is a tool shipped as a PTF that does the equivalent of the STRDSKRGZ command. The difference is that the action occurs during the next IPL. The command is called DEFRAG.
Refer to Figure 86 on page 118 for a conceptual view of the disk reorganization function.
117
A A A B B B C C C A B B B
STRDSKRGZ
A B B B B B B A A A C C C A A A A C C C C
Used block of disk space
A A A A C C C C
Empty block of disk space
Figure 86. Disk reorganization: A conceptual view
This tool helps accommodate the future allocation of large objects on the disk space such that the allocated objects are not scattered into multiple small chunks of disk space. As such, a negative performance impact for data accesses is lessened. An example where disk reorganization is useful is for an Electronic Documents Management application, such as Imageplus WAF/400. This type of application migrates rarely-used electronic documents from disk to optical storage, freeing up space for new documents. Typical electronic documents are 5 to 100 KB in size. When a large number of these documents are removed from disk storage, a lot of small empty disk chunks are left scattered throughout the ASP. Gathering the empty disk chunks into one area improves performance and storage efficiency. Using the Hierarchical Storage Management (HSM) APIs (available in OS/400 in V4R3 or later), automatic migration or archival of objects can leave free space scattered on the disk units. The disk reorganization tool is useful to consolidate the free space into one area for this application, as well. Refer to http://www.as400.ibm.com/beyondtech/hsm.htm on the Web and the redbook Complementing AS/400 Storage Management Using Hierarchical Storage Management APIs, SG24-4450, for further information on HSM and these APIs.
118
STRDSKRGZ can run during a normal system operation, however, off-hour operation is preferred. The reorganization process runs as a low level background task. It is named SMDEFRAGTA by System Licensed Internal Code (SLIC). Use the ENDDSKRGZ command to stop the disk reorganization task at any time before its run-time limit is reached. An all-object special authority is necessary on the user profile to run this command. Specify SPCAUT(*ALLOBJ) on the user profile running the job. Messages CPI1472 and CPI1473 are sent to the system history log (QHST) to indicate the start and end of the reorganization function for each ASP. Refer to Figure 87 for an example.
00 21:16:41
Message . . . . : Disk reorganization started for all configured ASP's. Cause . . . . . : Disk reorganization has been started for all ASP's configured on the system. It will run until the time limit has expired, the ASP has been completely reorganized, or the function is stopped by the user.
00 21:16:43
Message . . . . : Disk reorganization for ASP 1 ended. Cause . . . . . : The disk reorganization function for ASP 1 has been ended The function had ending code 5. The ending codes and their meanings are as follows: 1 - The ASP is completely reorganized. 2 - The time specified for reorganization has expired. 3 - The user requested that reorganization be ended. 4 - The reorganization function could not be started. 5 - The reorganization function cannot be started on an ASP that consists of only one unit. 6 - The reorganization function ended unexpectedly.
Figure 87. Disk reorganization messages in OS/400 history log
Note: The disk reorganization commands are available from OS/400 V4R2 onward.
119
The Work With Job Schedule Entries (WRKJOBSCDE) command. Use WRKJOBSCDE to set up daily, weekly, or monthly schedules for a single AS/400 system. Management Central - Command Definition. Management Central is used to schedule running the same processes for multiple AS/400 endpoint systems at the same time. To support this function, all endpoint systems must have communication links to the same central system. Daily, weekly, or monthly schedules are supported. Use Job Scheduler for AS/400 (5769-JS1) Licensed Program Product for more complex scheduling (for example, to schedule an event that is contingent upon the completion of another event). Refer to AS/400 Work Management Guide, SC41-5306, for additional information on WRKJOBSCDE. Refer to the redbook Management Central - A Smart Way to Manage AS/400 Systems, SG24-5407, for more information on Management Central. Refer to AS/400 Job Scheduler, SC41-5300, for additional information on the Job Scheduler licensed program.
120
The information described in this chapter is based on OS/400 Version 4 Release 4 of OS/400 and is by no means exhaustive.
The most common cause of DASD consumption problems is natural business growth. An increase in business generates more transactions, which in turn require more disk space to store them. This is referred to as controlled growth.
Uncontrolled growth
There are times when jobs consume more DASD than would usually be expected. For example, an application software bug causes a program to add a lot more records to a database file than it should. This growth is referred to as uncontrolled growth.
121
Runaway DASD
In extreme cases, Uncontrolled Growth consumes DASD at such a rate that, unless stopped, causes an application or system outage. This uncontrolled growth is referred to as Runaway DASD.
122
% CPU used . . . . Elapsed time . . . Jobs in system . . % addresses used: Permanent . . . Temporary . . .
. . . : . . . : . . . : . . . : . . . :
Work with System Status xxxxxxxxxxx xxITSOSYS1 09/24/99 09:55:13 99.3 Auxiliary storage: 00:00:01 System ASP . . . . . . : 6.88 G 423 % system ASP used .. . : 96.6918 Total . . . . . . . . : 9.83 G .010 Current unprotect used : 487 M .010 Maximum unprotect . . : 494 M
Type changes (if allowed), press Enter. System Pool Reserved Max -----DB----- ---Non-DB--Pool Size (M) Size (M) Active Fault Pages Fault Pages 1 50.00 24.70 +++++ .0 .0 14.0 19.1 2 61.25 .01 30 .0 .0 .7 5.1 3 .75 .00 2 .0 .0 .0 .0 4 16.00 .00 6 .0 .0 6.6 7.3 Bottom Command ===> F3=Exit F4=Prompt F11=Display transition data
F5=Refresh F12=Cancel
How the 100% used mark is reached DASD consumption problems due to a permanent storage issue include situations such as:
Too much data is restored to the system from tape or optical Too much data is received over a communication link The overflow of a user ASP continues unchecked DASD consumption problems due to a temporary storage issue includes situations such as when a large query continues to create more and more temporary storage to accommodate work files.
Note
One side effect of DASD utilization nearing the 100% mark is that System Network Architecture Distribution Services (SNADS) ceases to function. Messages and mail no longer flow in or out of the system. SNADS ends because we can no longer be sure that there is sufficient storage available to store incoming data. This is one reason IBM recommends DASD consumption remains below a 70 to 75% threshold.
123
Your system is slowing down. Your system has stopped An example of each scenario is given and recovery procedures are discussed in order to help you determine what action to take next.
Additional Message Information Message ID . . . . . . : Message type . . . . . : Date sent . . . . . . : CPI099C Information 09/17/99 Severity . . . . . . . : Time Sent . . . . . . : 90 10:20:15
Message . . . . : Critical storage lower limit reached. Cause . . . . . : The amount of storage used in the system auxiliary storage pool has reached the critical lower limit value. The system will now take the action specified in the QSTGLOWACN system value: &5. The possible actions are: *MSG -- No further action is taken. *CRITMSG -- Message CPI099B is sent to the user specified by the CRITMSGUSR service attribute. *REGFAC -- A job is submitted to run the exit programs registered for the QIBM_QWC_QSTGLOWACN exit point. *ENDSYS -- The system is ended to the restricted state. *PWRDWNSYS -- The system is powered down immediately and restarted. More... Press Enter to continue. F3=Exit F6=Print F9=Display message details F21=Select Assistance Level
Figure 89. System operator message
F12=Cancel
All AS/400 systems have a threshold that can be set for each ASP user and system. The auxiliary storage threshold for an ASP determines when the system warns you that the space allocated for the ASP has reached the point where action needs to be taken to keep disk usage at a level less than (or equal to) a user-defined limit. The default value for an ASP threshold is 90%.
124
Note
The threshold value of the system ASP is changed by changing the Auxiliary Storage Lower Limit system value (QSTGLOWLMT). Use Dedicated Service Tools (DST) or System Service Tools (SST) to change the threshold for each of the fifteen user ASPs. For more information on changing auxiliary storage thresholds, refer to 8.2.2, How to Change the Storage Threshold for an Auxiliary Storage Pool, in AS/400 Backup and Recovery, SC41-5304.
When the auxiliary storage threshold is reached, the system takes the action specified in the Auxiliary Storage Lower Limit Action system value (QSTGLOWACN). The alternatives are: *MSG: To send message CPI099C to QSYSMSG (if it has been defined) and the QSYSOPR message queue. *CRITMSG : To send critical message CPI099B to the user specified in the service attribute to receive critical messages. CPI099B indicates that a critical storage condition exists. *REGFAC : To submit a job to call the exit programs registered for the QIBM_QWC_QSTGLOWACN exit point. *ENDSYS : To end the system to a restricted state. *PWRDWNSYS : To power down the system immediately (a *IMMED option) and restart it. Review these options and ensure that QSTGLOWACN contains the most appropriate setting for your installation.
Note: CPI099C is sent for all actions defined for QSTGLOWACN. What to do next If exceeding the threshold is not a surprise (you are monitoring disk capacity and have seen a gradual increase due to natural business growth, for example), the action to take depends on the urgency:
1. If the increase in storage does not require immediate attention, use the DISKTASKS menu detailed in the System Operation Guide, SC41-4203, to determine storage usage. Use the Disk Information Tools to manage disk capacity until a disk upgrade can be installed. Refer to 8.4.1, Using disk information tools on page 142, for a description of tools available. 2. If storage use requires prompt attention, check active jobs for any specific restore jobs or communication jobs receiving a large amount of data onto the system. 3. Check for queries consuming lots of temporary storage. To determine the growth of temporary storage, check the Temp Storage field under Run Attributes when working with such a job. See Figure 90 on page 126 for an example.
125
Display Job Run Attributes Job: QPADEV0003 User: ITSCID20xxxxxx Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . : : : : : : : : : : System: 032001 50 5000 *YES 30 *NOMAX 9803 *NOMAX 999580 *NOMAX 1 ITSOSYS1
Run priority . . . . . . . . . . . . . Time slice in milliseconds . . . . . . Eligible for purge . . . . . . . . . . Default wait time in seconds . . . . . Maximum CPU time in milliseconds . . . CPU time used . . . . . . . . . . . . Maximum temporary storage in megabytes Temporary storage used . . . . . . . Maximum threads . . . . . . . . . . . . Threads . . . . . . . . . . . . . . .
Press Enter to continue. F3=Exit F5=Refresh F9=Change job F12=Cancel F16=Job menu
If you cannot isolate an offending job, then you may have a Runaway DASD problem. Consider ending the system to a restricted state to control additional storage growth and to allow time for problem analysis. Refer to 8.4, Analyzing DASD consumption problems on page 142, for other tools to help you find the source of the problem.
The following sections describe how to use the first three of these disk storage monitoring methods and suggest additional follow-up actions to take.
Note
If there is an error log posted to the Licensed Internal Code log related to a rapid increase in disk storage, the associated dump (from the VLOG entry) may provide further information.
8.3.2.1 Using the WRKSYSACT display With Performance Tools for AS/400 (5769-PT1), View 4 lists, at V4R4, the allocated and deallocated storage assigned to a job or task. if the run away
126
DASD job is a long running job, you can identify it from the WRKSYSACT display. For an example, see Figure 95 on page 131.
8.3.2.2 Using the WRKSYSSTS display The Work with System Status display (as shown in Figure 91) shows a set of statistics depicting the current status of the system. One field displayed is the percentage of the system auxiliary storage pool (ASP) currently in use.
The statistical information is gathered during an identified time interval (shown as the elapsed time). The data can be updated by extending the measurement time interval (use F5), or it can be reset and a new time interval started to gather a new set of data (use F10).
% CPU used . . . . Elapsed time . . . Jobs in system . . % addresses used: Permanent . . . Temporary . . .
. . . : . . . : . . . : . . . : . . . :
Work with System Status xxxxxxxxxxxxxxITSOSYS1 09/24/99 09:55:13 99.3 Auxiliary storage: 00:00:01 System ASP . . . . . . : 6.88 G 423 % system ASP used . . : _96.6918 Total . . . . . . . . : 9.83 G .010 Current unprotect used : 487 M .010 Maximum unprotect . . : 494 M
Type changes (if allowed), press Enter. System Pool Reserved Max -----DB----- ---Non-DB--Pool Size (M) Size (M) Active Fault Pages Fault Pages 1 50.00 24.70 +++++ .0 .0 14.0 19.1 2 61.25 .01 30 .0 .0 .7 5.1 3 .75 .00 2 .0 .0 .0 .0 4 16.00 .00 6 .0 .0 6.6 7.3 Bottom Command ===> F3=Exit F4=Prompt F5=Refresh F11=Display transition data F12=Cancel Critical storage condition reached.
8.3.2.3 Using Management Central Management Central is a suite of graphical systems management functions. Management Central is an optionally-installable component of Operations Navigator, the strategic graphical user interface for IBM AS/400 systems. These functions are available with OS/400 Version 4 Release 3 (V4R3) and later releases.
127
Note
To get information about Operations Navigator, including how to set up Management Central, refer to the AS/400e Information Center. The Information Center provides a path to AS/400 technical information using the power of browsers and online technology. You can access numerous pages of information within the Information Center, as well as link to a wide variety of Internet sites with crucial technical content. If you prefer not to rely on the Internet, access the Information Center from the CD-ROM (publication number SK3T-2027 for the English version). It arrives with your system software. The Information Center is located on the Web at:
http://www.as400.ibm.com/infocenter
One function within Management Central is the ability to monitor real-time system performance using detailed graphs to visualize what is going on with your system. This DASD monitor function can be used to display Disk Storage Information, as illustrated in Figure 92.
The Monitor DASD screen shows the average and maximum percentage of storage full on all disk arms during the collection interval.
128
Clicking on an individual time interval displays a chart for that interval. This detailed chart shows the percentage of storage full on each disk arm. Use this display to see how full your system is and whether all of the disk arms are evenly loaded.
Unit 1 1 2 3 4 6 5
F5=Refresh
F12=Cancel
F24=More keys
2. Use the System Service Tool (STRSST) command to verify your ASP configuration and usage, as illustrated in Figure 94 on page 130. Investigate that all user libraries are where they should be.
129
Display Disk Configuration Capacity ----Protected--- ---Unprotected-Size % Used Size % Used 6884 96.94% 0 0.00% 1967 97.48% 0 0.00% 1967 97.48% 0 0.00% 1967 96.65% 0 0.00% 1475 96.81% 0 0.00% 1475 96.72% 0 0.00% 1475 2.82% 0 0.00% 1475 2.82% 0 0.00% 1475 0.21% 0 0.00% 1475 0.21% 0 0.00%
ASP Unit 1 1 1 2 3 4 2 6 3 5
Type Model Threshold 90% 6606 030 6606 030 6606 070 6606 074 6606 074 90% 6606 074 90% 6606 074
Overflow No
No No
Press Enter to continue. F3=Exit F5=Refresh F10=Display disk unit details F11=Display disk configuration protection F12=Cancel
Figure 94. Display Disk Configuration Capacity
3. If you do not have multiple ASPs, or have performed the previous steps and still have a problem, then you may have a Runaway DASD problem. Refer to 8.4, Analyzing DASD consumption problems on page 142, for other tools to help you find the source of the problem. 4. Add non-configured disk units to the system ASP, or remove a unit from a user ASP. Then, add it to the system ASP.
130
Automatic refresh in seconds . . . . . . . . . . . . . . Elapsed time . . . . : 00:00:05 Average CPU util Number of CPUs . . . : 2 Maximum CPU util Minimum CPU util Type options, press Enter. 1=Monitor job 5=Work with job Job or Opt Task User QPADEV0003 SUSAN2 QPADEV0011 TVB ITRTR00012 SMPOL001 VTMTS002
---------Storage----------Allocated Deallocated 26 0 03 0 0 0 0 0 0 0
F11=View 2
F12=Cancel
Note
Many storage management tasks execute at the highest priority. Higher priority tasks consume more CPU.
8.3.4.1 What to do next As your system noticeably slows down, you may not have time to use Disk Tools to determine storage usage. Try one or more of the following suggested actions:
Check active jobs for restore or communication jobs that may be writing a large amount of data onto the disk. Check for queries that may be consuming lots of temporary storage. To check for temporary storage consumption, check the Temp Storage field under Run Attributes when working with such a job. See Figure 90 on page 126 for an example. If you cannot isolate an offending job, then you may have a Runaway DASD problem. In this case, you should: Consider ending the system to restricted state for further problem analysis. Refer to 8.4, Analyzing DASD consumption problems on page 142, for other tools to help you find further information about the problem.
8.3.4.2 Resource contention and performance of system When a resource is not available for your job, or when multiple users request the same resource concurrently, OS/400 manages the resource to preserve the integrity of the data. Contentions can occur when a system limit is reached.
131
To get around some limits that are job related, one solution is to have the job re-submit itself when it reaches the maximum. Another solution is to start the job with a different user profile and switch to the desired profile. The problem with this second approach is that the objects (for example, spooled file listing) are not as easily accessible as when they are stored under the current job. In the case of a print job, the application must direct the output to a specific output queue and monitor the queue itself, or use a data queue (if the spooled files are in a ready state) to monitor the output queue.
Note: Use security auditing of the spooled files to identify the spooled file generated.
On systems with a very active spool environment, a locking situation can be caused by a contention bottleneck on the output queue, the spool control block of the job, or the print spooled file internal indexes. A locking bottleneck can occur due to multiple jobs running either a WRKSPLF *ALL or WRKSPLF command on a user with many thousands of spooled files, and the default wait time on the class description expires. A message is issued indicating the necessary resource is not available (CPF3330) and that the lock operation for the object was not satisfied in the specified time interval (MCH5802). To manage this event, you can perform the following steps: 1. Increase the default wait time in the class description. 2. Make sure latest PTFs for OS/400 programs managing spooled files are applied, specifically SF58933 for V4R4 and SF58419 for V4R3. 3. Refrain from doing a WRKSPLF *ALL as much as possible. 4. Spread the spooled files across multiple output queues and access the spooled files through the WRKOUTQ interface rather than WRKSPLF.
Note: There is a maximum of 9,999 spooled files per job on any V4R4 system.
Refer to The System Administrator's Companion to AS/400 Availability and Recovery, SG24-2161, for an appendix listing the system limits for V4R2 systems. V4R4 system limits are available at http://www.redbooks.ibm.com as an download for SG24-2161 under the Additional Material option.
Once the system stops with any of these SRCs, you are forced to perform an IPL to recover.
8.3.5.1 Recovering your system Follow these steps to recover your system:
1. Put the system in manual mode and power it off. 2. Return the system to normal mode and power it back on. 3. IPL the machine to a restricted state by taking a Y for the Start System to a restricted state option on the IPL Options Display. Refer to Figure 105 on page 140 for an example. This starts only the console and prevents other jobs from starting that may consume what little free space available. 4. If your system fails to IPL, refer to 8.3.5.3, What to do if your system fails to IPL on page 138. 5. If the IPL completes and the system is returned to a command line, issue a WRKSYSSTS command to determine the current storage level (that is, % system ASP used). Refer to Figure 91 on page 127 for an example.
If the storage level has dropped below the lower limit threshold After the IPL, if the storage level drops below the lower limit threshold, there was a temporary storage problem. Enough storage was recovered during the IPL to keep below threshold. The immediate problem of storage consumption has been resolved.
You now have to play detective to determine the cause of the disk consumption, as not a lot of clues are available after an IPL. Suggested actions include: 1. Analyze history information for evidence of unusual storage growth. 2. Check history files for critical storage condition errors, as described in 8.3.5.2, Analyzing historical information on page 134. 3. If you cannot find an obvious cause, allow the users back on to the system. Closely monitor active jobs for high disk I/O or high DASD consumption. Use the tools described in 8.4, Analyzing DASD consumption problems on page 142.
If the storage level is still higher than the Storage Lower Limit If there is a permanent storage problem, not much storage is recovered during the IPL. You need to determine what is consuming storage. Refer to the Disk Tools described in 8.4.1, Using disk information tools on page 142.
RTVDSKINF gives you information about all of the files on the system sorted in descending size order. It also provides you with the date last changed of the file and the user profile that created it. Using this information and your application knowledge, you should be able to identify any unusually large files and investigate further the programs that created these files.
Note: If you choose to use the RTVDSKINF tool, make sure you have enough room for its temporary and spool files (usually less than 50,000 bytes).
133
8.3.5.2 Analyzing historical information To analyze the history files, follow these steps:
This is done by entering the command DSPLOG on the command line and pressing F4. Change the beginning date to *BEGIN and press F10 for additional parameters. See Figure 96 for an example.
Display Log (DSPLOG) Type choices, press Enter. Log . . . . . . . . . . . . Time period for log output: Start time and date: Beginning time . . . . . . Beginning date . . . . . . End time and date: Ending time . . . . . . . Ending date . . . . . . . Output . . . . . . . . . . . . . QHST QHST
. . . . . . . . . .
Time, *AVAIL Date, *CURRENT, *BEGIN Time, *AVAIL Date, *CURRENT, *END *, *PRINT, *PRTWRAP
Bottom F12=Cancel
Next, page down to display the additional parameters, and enter CPF0907 in the message identifier field, as shown in Figure 97.
134
Additional Parameters Jobs to display User . . . . . Number . . . . + . . . . . . for . . . . . . . . . . . . . . . . . . more values *NONE Name, *NONE Name 000000-999999
cpf0907
Name, *ALL
F5=Refresh
F12=Cancel
Press the Enter key. A list of all CPF0907 messages in the history log is displayed, as shown in Figure 98.
Display History Log Contents Serious Serious Serious Serious Serious storage storage storage storage storage condition condition condition condition condition may may may may may exist. exist. exist. exist. exist. Press Press Press Press Press HELP. HELP. HELP. HELP. HELP.
Searching on the CPF0907 message allows the determination of how long the problem has taken place. To find out when the first message occurred, display additional message information by putting the cursor under the first message (as shown in Figure 98) and press F1 for help (Figure 99 on page 136).
Chapter 8. Runaway DASD
135
Additional Message Information Message ID . . . . . . : Message type . . . . . : Date sent . . . . . . : CPF0907 Inquiry 09/28/99 Severity . . . . . . . : Time sent . . . . . . : 80 10:35:32
Message . . . . : Serious storage condition may exist. Press HELP. Cause . . . . . : The amount of available auxiliary storage in the system auxiliary storage pool has reached the threshold value. This is a potentially serious system condition. The auxiliary storage capacity is 77,301,000 bytes. The auxiliary storage used is 70,807,716 bytes. The thresholdis90.00percent.Theauxiliarystorageavailableis9.40percent. Recovery . . . : Use the WRKSYSSTS command to monitor the amount of storage used. The use of storage can be reduced by the following actions: Save objects by specifying STG(*FREE); delete any unused objects. Save the old log versions of QHST that are not currently used and then delete them; either write or delete spooled files on the system. Failure to reduce the storage usage may lead to a situation requiring initialization of auxiliary storage and loss of user data. The System Service Tools function can be used to display and change the threshold value. See the Backup and Recovery book, SC41-5304, for more information. Press Enter to continue. F3=Exit F6=Print F9=Display message details F21=Select assistance level
Figure 99. Additional message information
F12=Cancel
Once you know when the problem started, list the jobs that may have been responsible. Get a list of the active jobs before the first message and compare it to the list of those still active at the time the system stopped due to the 100% auxiliary storage threshold being reached. Repeat the above procedure, but adjust the ending date and time to the date and time the first CPF0907 message occurred.
Tip
Search on messages CPF1124 and CPF1164. This gives you the starting and ending times of all jobs prior to the first CPF0907 message.
Match pairs of messages with the same job number. The unmatched start messages give you the active jobs at the time of the first CPF0907 message. Refer to Figure 100 for an example.
136
Display History Log Contents Job 031744/ALISON/QTTFT00897 ended on 09/28/99 at 06:05:33; 1 seconds used; end Job 031743/ANNE/QTTFT01884 ended on 09/28/99 at 06:35:34; 1 seconds used; end c Job 031752/GEN/QTTFT02017 started on 09/28/99 at 06:35:33 in subsystem QSYS Job 031706/SUE/QTTFT04471 ended on 09/28/99 at 07:05:34; 2 seconds used; end co Job 031753/CHAPPO/QTTFT00916 started on 09/28/99 at 07:35:34 in subsystem QSYS Job 031754/JAMES/QTTFT00927 started on 09/28/99 at 07:35:34 in subsystem QSYS Job 031750/ROB/QTTFT00888 ended on 09/28/99 at 08:05:34; 1 seconds used; end co Job 031752/GEN/QTTFT02017 ended on 09/28/99 at 08:35:34; 1 seconds used; end co Job 031757/JOANNE/QPADEV0008 started on 09/28/99 at 09:29:05 in subsystem QINTER Job 031746/SELINA/QTFTP01245 ended on 09/28/99 at 09:33:39; 4 seconds used; end Job 031753/CHAPPO/QTTFT00916 ended on 09/28/99 at 09:35:34; 1 seconds used; end Job 031754/JAMES/QTTFT00927 ended on 09/28/99 at 10:05:34; 1 seconds used; end Job 031759/MANDY/QPADEV0004 started on 09/28/99 at 10:08:56 in subsystem QINTER Bottom
2. Check the job logs of these jobs for any clues. Look for a large number of files, large number of members within files, growth within the file or member, or journals being created. Consider running each job again individually and closely monitor for disk I/Os and temporary storage consumption. 3. If storage starts to climb, use the WRKACTJOB command and type 5 to work with the suspected job, followed by 3 for Run Attributes. The amount of temporary auxiliary storage (in K) that is currently allocated to this job is displayed. Refer to Figure 101 on page 138 for an example.
137
Display Job Run Attributes System: ITSOSYS1 Job: QPADEV0004 User: ITSCID20 . . . . . . . . . . . . . . . . . . . . Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . : : : : : : : : : : 031759 20 2000 *YES 30 *NOMAX 47579 *NOMAX 292 *NOMAX 1
Run priority . . . . . . . . . . . . . Time slice in milliseconds . . . . . . Eligible for purge . . . . . . . . . . Default wait time in seconds . . . . . Maximum CPU time in milliseconds . . . CPU time used . . . . . . . . . . . . Maximum temporary storage in megabytes Temporary storage used . . . . . . . Maximum threads . . . . . . . . . . . . Threads . . . . . . . . . . . . . . .
Press Enter to continue. F3=Exit F5=Refresh F9=Change job F12=Cancel F16=Job menu
The F5 key refreshes the display and allows you to check if the temporary storage continues to increase. 4. If you are unable to determine the problem using these methods, use one of the more detailed analysis methods described in 8.4, Analyzing DASD consumption problems on page 142.
8.3.5.3 What to do if your system fails to IPL After you have performed the steps described in 8.3.5.1, Recovering your system on page 133, if the system fails to IPL to a command line, but stops with an SRC code again instead, then there is a permanent storage capacity problem. Space has to be freed up during the IPL.
To do this, start another IPL by putting the system back in Manual mode and powering the system off. Power on with the system still in Manual mode.
Note: Manual mode is not a typical nor recommended daily action. Refer to AS/400 System Operation, SC41-4203, for instructions on how to place the system into manual mode and power off.
Complete the following steps to IPL the system to a restricted state: 1. At the first screen, IPL or Install the System as shown in Figure 102. Enter option 1 (Perform an IPL).
138
Perform an IPL Install the operating system Use Dedicated Service Tools (DST) Perform automatic installation of the operating system Save Licensed Internal Code
2. When the Signon screen is displayed (as shown in Figure 103), sign on with a user profile with *SECOFR authority, for example QSECOFR.
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
3. On the Select Products to Work with PTFs screen (Figure 104 on page 140), press F3 (Exit) to continue.
139
Type options, press Enter. Press F21 to select all. 1=Select Product Opt Product Option Release _ 5769999 *BASE V4R3M0 _ 5769SS1 *BASE V4R3M0
F3=Exit
4. The next screen is called IPL Options. It allows the clearing of permanent objects such as job queues, incomplete job logs and output queues. Specify a Y option for any of these that you wish to clear. Figure 105 shows an example.
IPL Options
Type choices, press Enter. System date . . . . . . . . . . . . . . System time . . . . . . . . . . . . . . Clear job queues . . . . . . . . . . . . Clear output queues . . . . . . . . . . Clear incomplete job logs . . . . . . . Start print writers . . . . . . . . . . Start system to restricted state . . 07 / 26 / 88 12 : 00 : 00 N N N Y N
Y Y
140
Important
A Y for output queues clears all spooled files. This can potentially free up a lot of disk space as spool file entries can consume a lot of storage. Be sure this is what you want to do before selecting this option! 5. Bring the system up in Restricted State by selecting a Y for the Start system to restricted state option. This starts only the console and stops other jobs starting that may use up what little free space is available. Once the system is back up and you have ensured there is enough free space, you can restart the rest of the system. 6. After you select the desired options, press Enter. 7. You may get one more screen called Edit Rebuild of Access Paths (Figure 106). Press Enter.
IPL threshold . . . . . . . . . . . . . 50 | Type sequence, press Enter. | Sequence: 1-99, *OPN, *HLD | | Seq Status | 25__ IPL
0-99
------------Access Paths---------- Unique Rebuild File Library Member Keyed Time QAPZSYM2 QSYS QAPZSYM2 NO 00:00:01
8. When you get the main menu screen, put the system back into Normal mode. Follow the diagnosis routines listed in 8.3.5.2, Analyzing historical information on page 134. 9. If the system fails to IPL using the preceding method, another recovery option is available if a spare disk unit is available. Add the spare non-configured disk unit to the ASP requiring space. Alternately, remove units from one user ASP and add it to another ASP.
Note: This assumes information from the moved unit is either saved or can be cleared prior to the move.
141
Library Information % of Disk Size in 1000 bytes 12556632.1 12426780.7 3986702.3 2086912.0 1996321.3 1232277.5 1118879.7 827768.8 659501.1 516313.1 433287.2 431468.5 423206.9 417390.6 343560.2 Last Change 09/24/99 09/24/99 07/26/99 09/27/99 09/27/99 09/14/99 04/22/99 09/15/99 09/13/99 08/04/99 08/12/99 09/27/99 04/26/99 09/27/99 Last Use 08/25/99 09/08/99 08/06/99 09/27/99 09/27/99 09/22/99 04/22/99 09/15/99 09/22/99 08/25/99 09/08/99 04/26/99 09/27/99 Spool Library Temp Library
Library R3PRDDATA R3DEVDATA R3DEVOFR QGPL QSYS QPEXDATA QUSRADSM *NOLIBRARY QSTURT249999 QSTURT81KKKK QSTURT6T R3DEVOPT QSPL WXYZS QUSRSYS TOTAL
Description COLLECTION - created by SQL COLLECTION - created by SQL Library for *savf System Library Performance Explorer Data Library adsm400 licpgm5769sv3
11.24 11.13 3.57 1.87 1.79 1.10 1.00 .74 ASHLEYE .59 ALLISON xxxxxxxxx.46 ADRIANNExxxxxxxx .39 R3OWNER .39 QSPL .38 WXYZS .37 QSYS .31
43288994.3 * * * * * E N D
O F
L I S T I N G
* * * * *
142
Disk Space Report xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxPage 990521 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxITSOSYS1 09/28/99 Specific Object Information % of Disk 3.57 .94 .59 .52 .52 .46 .40 .40 .40 .32 .32 .27 .27 .27 .26 Size in 1000 bytes 3986702.3 1049645.1 661262.3 585314.3 582168.6 515506.2 448352.3 445853.7 445853.7 353570.8 353570.8 302268.4 302268.4 301482.0 295714.8 Last Change Last Use
Object R3DEVDATA BACKUP01 QAYPEMBRKT D010S D010S QAYPETIDX QAPMDMPT DOKCLU DOKCLU DD03L DD03L ACMEDS1 BACK FSIOP S5769AS1PA TOTAL
Library R3DEVOFR QUSRADSM QPEXDATA R3DEVDATA R3PRDDATA QPEXDATA LOCK R3DEVDATA R3PRDDATA R3DEVDATA R3PRDDATA JJLIBLE JJLIBXE WXYZS QGPL
Type *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE
Owner DEVOWNER WXYZS QSYS DEVOWNER PRDOWNER QSYS QPGMR TERRYxER SUSANNER SCOTTNER STACYNER STEVEGE MIKETEE TODDS QSYI
Description
07/26/99 08/06/99 Library R3DEVDATA 04/21/99 04/22/99 09/14/99 09/14/99 PEX MI Bracketing Event 07/29/99 Defaults changed by R3 07/14/99 08/25/99 Defaults changed by R3 09/14/99 09/14/99 PEX Trace Index Data 09/13/99 09/22/99 Performance trace dump 07/29/99 09/08/99 Defaults changed by R3 07/14/99 08/25/99 Defaults changed by R3 07/19/99 07/22/99 Defaults changed by R3 07/14/99 08/03/99 Defaults changed by R3 08/23/99 08/23/99 08/23/99 08/23/99 04/22/99 04/22/99 09/21/99 09/21/99
* * * * *
E N D
19836485.7 O F L I S T I N G
* * * * *
Disk Space Report 5769SS1 V4R4M0 990521 Folder Information % of Disk .01 .01 .01 .00 .00 .00 .00 .00 .00 .00 .00 .00 Size in 1000 bytes 14351.4 12361.7 8883.2 5550.6 4818.4 4075.5 3411.5 2594.8 2190.3 1835.0 1606.7 1116.2 Last Change 09/23/99 09/23/99 09/23/99 09/23/99 09/23/99 09/23/99 09/23/99 09/23/99 09/26/99 09/23/99 09/23/99 09/23/99
4 13:52:25
Folder DLL BBBDF QSVNOS2 QFPBSYS1 QFPNTWE UNITABLE OS2 QFPBSYS2 BBBFF PSFONTS QFPNTWI DLL TOTAL
Owner QSECOFR QUMB QSYS QSECOFR QSYS QSYS QSECOFR QSECOFR ITSCID19 QSECOFR QSECOFR QSECOFR
Folder Path QFPBFLR.001/QFPBSYS2/OS2 QUMBREPO QFPBFLR.001 QBKBOOKS QFPBFLR.001/QFPBSYS2 QFPBFLR.001 QUMBREPO QFPBFLR.001/QFPBSYS1 QFPBFLR.001/QFPBSYS4 QFPBFLR.001/QFPBSYS2/IBMCOM
62795.3 * * * * * E N D
O F
L I S T I N G
* * * * *
143
Disk Space Report 5769SS1 V4R4M0 990521 System Information Information collected 9406-720 . . . . . . . . . : 09/27/99 07:39:05
System serial number . . . . . . . . . . : Total disk space on system in 1,000,000 bytes . . . . . . . . . . . . . . . . : Main storage size in megabytes . . . . . : 111669 4096 % of Disk 34.62 7.78 .07 1.80 4.63 2.36 1.58 46.09 .15 .74 99.82
Customize options specified for this report: Report type . . . . . . . . . . . . . : *SYS Size in 1,000,000 bytes 38664.88 8689.22 73.27 2008.18 5165.49 2639.89 1765.14 51472.91 168.44 827.77 111475.19
Description User libraries User directories Folders and documents QSYS Other IBM libraries Licensed Internal Code Temporary space Unused space Internal objects Objects not in a library TOTAL
Disk Space Report 5769SS1 V4R4M0 990521 System Information % of Description OS/400 items reported: History files Journal receivers User profiles Configuration information System help (QHLPSYS) Calendars System directories Document files OfficeVision/400 items reported: Enrollment Mail files Text search Personal directories Licensed Internal Code: LIC and tables Dump space Error logs Trace tables VLIC logs VLIC control blocks Disk .02 .01 .03 .00 .03 .00 .00 .00 .00 .00 .00 .00 .88 .23 .00 1.06 .18 .01
Size in 1,000,000 bytes 25.56 11.72 30.27 2.61 33.78 1.32 2.35 3.08 .11 .34 .97 .48 977.24 252.71 3.24 1189.15 201.33 16.22
* This list points out items of interest and does not contain all objects on the system. For more information, see AS/400 System Operation V3R6, SC41-4203.
144
System Information
Description Space used by internal objects: Additional configuration information Communications Data base Manage jobs Monitor performance Folders Mail OS/400 S/36 Environment Security SNADS and object distribution Spool Cross component Product installation Recovery of information Obsolete Internal system journals Miscellaneous items reported: Printer output & Spooling (QSPL) Replaced object library (QRPLOBJ) Storage affected by RCLSTG Reclaim storage library (QRCL)
% of Disk .00 .01 .00 .10 .00 .00 .00 .01 .00 .00 .00 .02 .01 .00 .00 .00 .01 .38 .00 .00 .04
Size in 1,000,000 bytes .13 6.77 .16 111.89 .00 .51 .02 9.60 .07 2.15 1.35 19.35 7.77 .09 .82 .00 7.76 423.43 .95 .00 40.18
* This list points out items of interest and does not contain all objects on the system. For more information, see AS/400 System Operation V3R6, SC41-4203. * * * * * E N D O F L I S T I N G
* * * * *
This information is useful in identifying the biggest objects on the system. Investigate each object further to see if its size can be reduced by: Deleting it, if it is obsolete. Archiving it to tape or compressed disk, if it is rarely used. Then delete it. Reorganizing it, if it has a large number of deleted records. Refer to Chapter 7, OS/400 disk storage management tools on page 87, for a detailed description of how to run the RTVDSKINF and PRTDSKINF tools.
145
8.4.2.1 The Work with System Activity (WRKSYSACT) command The WRKSYSACT command allows you to interactively work with the jobs and tasks currently running in the system.
The initial view (Figure 113) shows the total number of synchronous and asynchronous physical disk input/output (I/O) operations performed by the job or task during the elapsed time.
Note
These displays do not have a refresh key, so the information you see is not cumulative. They contain information on what has happened on the system during the elapsed time interval only. They do not contain the total I/O counts for the job.
ITSOSYS1 10/13/99 14:17:40 Automatic refresh in seconds . . . . . . . . . . . . . . . . . 60 Elapsed time . . . . : 00:01:49 Overall CPU util . . : 40.6 Work with System Activity
Type options, press Enter. 1=Monitor job 5=Work with job Job or Opt Task QDFTJOBD QDFTJOBD CFINT01 QPADEV000C SMPOL001 IPRTR00013 QBATCH RMTMSAFETA CPU Util 31.9 4.9 2.5 .7 .1 .0 .0 .0 Total Total Sync Async PAG I/O I/O Fault 180 413 0 3182 23 0 0 0 0 84 21 0 0 243 0 0 0 0 19 5 0 0 0 0 More... F19=Automatic refresh
User Number Thread Pty ITSCID20 009533 0000001E 50 ITSCID69 xxx009534 00000022 10 0 ITSCID20 009531 00000020 20 100 0 QSYS 008780 00000001 0 0 F11=View 2 F12=Cancel
The Total Sync I/O value is the sum of the synchronous database and non-database reads and writes. This is shown in view 2. See Figure 114 for an example.
146
ITSOSYS1 10/13/99 14:17:40 Automatic refresh in seconds . . . . . . . . . . . . . . . . . 60 Elapsed time . . . . : 00:01:49 Overall CPU util . . : 40.6 Work with System Activity
Type options, press Enter. 1=Monitor job 5=Work with job Job or Opt Task QDFTJOBD QDFTJOBD CFINT01 QPADEV000C SMPOL001 IPRTR00013 QBATCH RMTMSAFETA --------Synchronous--------DB DB Non-DB Non-DB Thread Read Write Read Write 0000001E 0 125 2 53 00000022 2 0 3174 6 0 0 0 0 00000020 0 11 18 55 0 0 0 0 0 0 0 0 00000001 0 0 17 2 0 0 0 0 More... 3 F12=Cancel F19=Automatic refresh
QSYS
008780
F11=View
The Total Async I/O value is the sum of the asynchronous database and non-database reads and writes. This is shown in view 3. See Figure 115 for an example.
ITSOSYS1 10/13/99 14:17:40 Automatic refresh in seconds . . . . . . . . . . . . . . . . . 60 Elapsed time . . . . : 00:01:49 Overall CPU util . . : 40.6 Work with System Activity
Type options, press Enter. 1=Monitor job 5=Work with job Job or Opt Task QDFTJOBD QDFTJOBD CFINT01 QPADEV000C SMPOL001 IPRTR00013 QBATCH RMTMSAFETA --------Asynchronous-------DB DB Non-DB Non-DB Thread Read Write Read Write 0000001E 0 409 0 4 00000022 0 0 21 2 0 0 0 0 00000020 0 2 2 17 0 7 0 236 0 0 0 0 00000001 0 0 0 5 0 0 0 0 More... 4 F12=Cancel F19=Automatic refresh
QSYS
008780
F11=View
The display can be sorted over these fields so that the jobs with the highest I/O counts during the elapsed time are easily identified.
147
8.4.2.2 Performance reports There are a number of reports available in Performance Tools that show detailed information about disk utilization and disk capacity. An example is the Disk Activity section of the Component Report.
This report gives the average disk activity per hour and the disk capacity for each disk. Refer to Figure 116 for an example.
STD I, B, then java/threads Member . . . : Q983150757 Model/Serial . : 510-2144/10-99999xx Main storage . . : 512.0 M Started . . . . : 11/11/98 07:58:01 Library . . : PFRRES42 System name . . : ABSYSTEM Version/Release : 4/ 2.0 Stopped . . . . : 11/11/98 08:18:43 ---------------- Average Disk Activity Per Hour ---------------- ----- Cache hit Statistics ---Srv ------------------ Disk Arm Seek Distance ---------------------- Device Controler Write -Disk CapacityUnit Util Time 0 1/12 1/6 1/3 2/3 >2/3 Read Read Efficiency MB Percent ---- ---- ----- --------- --------- --------- --------- --------- --------- ------- --------- ---------- ------- ------0001 A 1.8 .0012 2,367 1,435 406 75 574 95 .0 .0 .0 446 22.6 0001 B 1.5 .0009 2,375 1,897 507 95 243 2 .0 .0 .0 446 22.6 0003 .4 .0002 3,156 870 435 1,131 1,618 217 17.0 .1 33.5 374 25.3 0004 .9 .0003 3,457 1,395 690 983 1,757 403 30.7 .0 15.9 378 25.6 0005 .8 .0004 3,272 887 510 936 1,746 362 18.6 .0 14.9 374 25.3 0006 .8 .0003 2,897 1,099 365 1,084 1,435 229 40.2 .1 39.4 381 25.8 0007 2.0 .0002 6,329 2,294 1,006 1,450 2,660 835 57.1 .1 59.4 814 25.8 0008 .6 .0002 4,911 1,372 1,053 1,316 1,734 481 20.5 .1 49.8 803 25.5 0009 5.0 .0002 7,484 4,650 1,357 2,149 2,233 501 73.9 .0 81.8 814 25.8 0010 .5 .0002 4,832 2,039 760 1,433 1,644 304 29.0 .1 2.2 811 25.7 Column Total --------------------------- ---------------Util Srv Time Disk Arm Seek Distance 0 41,085 1/12 17,941 1/6 7,092 1/3 10,657 2/3 15,650 >2/3 3,434 Cache hit Statistics Device Read Controller Read Write Efficiency Disk Capacity MB 5,641 Percent 25.1 Unit Util Srv Time Disk Arm Seek Distance 0 1/12 1/6 1/3 2/3 >2/3 Cache hit Stastistics Device Read Controller Read Write Efficiency Disk Capacity MB Percent -----------------Average ---------------1.4 .0003
52.8 .0 59.5
Disk arm identifier Drive utilization Average service time per request in seconds Average seek distance distributions per hour Number of zero seeks Number of seeks between 0 and 1/12 of the disk Number of seeks between 1/12 and 1/6 of the disk Number of seeks between 1/6 and 1/3 of the disk Number of seeks between 1/3 and 2/3 of the disk Number of seeks greater than 2/ 3 of the disk Percent of Device Read Hits for each arm Percent of Controller Cache Read Hits for each arm Percent of Efficiency of write Cache Average amount of disk space used or available Millions of bytes available on the disk Percent of space available on the disk
While this information is useful in analyzing performance-related disk problems such as disk access time or disk IOP throughput, it does not provide detailed information about real time DASD consumption.
148
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Opt Job User QINTER QSYS QPADEV000B ITSCID20 QPADEV000D ITSCID20 QPADEV000C ITSCID20
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1692 1 QINTER 1593 3 QINTER 989 2 3 QINTER 279 25991 2
Bottom F3=Exit F5=Refresh F6=Sort by DB I/O F8=Sort by Aux I/O F12=Cancel F7=Sort by Temp Stor
The WRKDASD command can be obtained using one of the following methods: Order, load, and apply PTF Sxxxxxx. Follow the instructions in the cover letter to activate the command. Download it from the Web at: http://www.as400service.ibm.com Create it yourself by using the source code and programming instructions contained in Appendix D, WRKDASD sample code on page 201.
Note
149
Once you have the command installed on your system, make sure that libraries QGY and WRKDASD are in your library list. If not, use ADDLIBLE QGY and ADDLIBLE WRKDASD to add them to your library list. To run the command, type WRKDASD and press F4 to prompt. Refer to Figure 118 for an example.
Work with DASD (WRKDASD) Type choices, press Enter. Output . . . . . . . . . . . . . Subsystem Name . . . . . . . . . * *ALL *, *PRINT Name, *ALL
F5=Refresh
F12=Cancel
You can display the information dynamically on the screen or produce a printout. Jobs can be selected by individual subsystem or *ALL.
Note
Select individual subsytems until you become familiar with the WRKDASD command. Selecting all jobs on the system can take a few minutes to calculate the cumulative database I/O figures. This is due to the fact that there is no API available at the time of publication of this redbook to identify which database files are currently in use by a particular job. It is expected that this limitation will be overcome in future releases of OS/400, and, therefore, the performance of this command will be significantly improved.
Make your selections, and then press Enter. A Work with DASD screen appears, as shown in Figure 119. We have used Output = * and Subsystem Name = QINTER for the following examples.
150
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1692 1 QINTER 1593 3 QINTER 989 2 3 QINTER 279 25991 2
Bottom F3=Exit F5=Refresh F6=Sort by DB I/O F8=Sort by Aux I/O F12=Cancel F7=Sort by Temp Stor
The default sort criteria for the WRKDASD command is Auxiliary I/O. Use F6 to change to Database I/O (as shown in Figure 120) or Temporary Storage or use F7 (as shown in Figure 121 on page 152).
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 279 25991 2 QINTER 989 2 3 QINTER 1692 1 WRKSYSACT QINTER 1593 3
Bottom F3=Exit F5=Refresh F6=Sort by DB I/O F8=Sort by Aux I/O F12=Cancel F7=Sort by Temp Stor
151
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1593 3 QINTER 989 2 3 QINTER 279 25991 2 QINTER 1692 1
Bottom F3=Exit F5=Refresh F6=Sort by DB I/O F8=Sort by Aux I/O F12=Cancel F7=Sort by Temp Stor
The WRKDASD command contains a number of options that provide further information about each job to help with problem analysis. Option 5 provides you with a list of open database files for the selected job and the database I/O count for each file. To access this information, enter option 5 from the main WRKDASD display, as shown in Figure 122. Press Enter. These two screens help you determine which of the files used by the job are generating high I/O rates
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Program
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1692 1 WRKSYSACT QINTER 1593 3 WRKDASD QINTER 989 2 3 NEP QINTER 279 25991 2
152
File I/O ----Open--- Relative Type Count Opt Shr-Nbr Record DSP 13 IO NO PHY 25991 IO NO 13000
Press Enter to continue. F3=Exit F5=Refresh F11=Display scoping data F12=Cancel F16=Job menu
Option 6 provides a list of spooled files for the selected job, and the total pages generated for each spooled file. To access this information, enter option 6 from the main WRKDASD display as shown in Figure 124. Press Enter.
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1692 1 QINTER 1593 3 QINTER 989 2 3 QINTER 279 25991 2
As shown in the example in Figure 125 on page 154, this screen helps you determine if a job is generating large numbers of pages or large spooled files.
153
Work with Job Spooled Files Job: QPADEV000D User: ITSCID20 Number: 009541
Type options, press Enter. 1=Send 2=Change 3=Hold 4=Delete 5=Display 8=Attributes 9=Work with printing status Device or Queue
6=Release
7=Messages
Opt File QSYSPRT QSYSPRT QPDSPJOB QPDSPJOB QPDSPJOB QPDSPJOB QPDSPJOB QPDSPJOB QPDSPJOB
Total Current Status Pages Page Copies FIN QPRINT WRKDASD OPN 659xxxxxxxxxxxxxxx 1 FIN FIN FIN FIN FIN FIN FIN More... Parameters for options 1, 2, 3 or command ===> F3=Exit F10=View 3 F11=View 2 F12=Cancel F22=Printers F24=More keys User Data
Option 7 provides you with a list of job locks for the selected job, and the type and status of each lock. To access this information, enter option 7 from the main WRKDASD display, as shown in Figure 126. Press Enter.
Work with DASD Type options, press Enter. 5=Work with Open Files 6=Work with Spool Files
Aux I/O DB I/O Temp Subsystem Request Request Storage QINTER 1692 1 QINTER 1593 3 QINTER 989 2 3 QINTER 279 25991 2
154
Work with Job Locks Job: QPADEV000C ACTIVE User: ITSCID20 Number: System: 009542 ITSOSYS1
Job status:
Opt Object BBLIB DATAFILE ITSCID20 MAIN QDUI80 QGPL QGSPWRKF QHLPSYS
Member Lock Status Locks *SHRRD HELD *SHRRD HELD YES *SHRRD HELD *SHRNUP HELD *SHRNUP HELD *FILE-DSP *SHRNUP HELD *LIB *SHRRD HELD *PNLGRP *SHRNUP HELD *LIB *SHRRD HELD More... F11=Display thread data
Printing Entering *PRINT for the output option on the WRKDASD prompt screen (Figure 128) produces a detailed report, as shown in Figure 129 and Figure 130 on page 157.
Work with DASD (WRKDASD) Type choices, press Enter. Output . . . . . . . . . . . . . Subsystem Name . . . . . . . . . * *, *PRINT *PRINT xxxxxx Name, *ALL
F5=Refresh
F12=Cancel
Note that the print option can also be run in batch or be scheduled to run on a regular basis. The jobs are listed in descending order of Auxiliary I/O Requests.
155
Date 10/14/99 Time 10:27:03 Page 1 Aux I/O Requests 56,912 45,816 6,024 4,544 3,104 2,962 2,933 2,492 2,116 1,961 1,864 1,803 1,768 1,726 1,408 1,369 1,196 1,153 1,142 1,135 1,113 1,090 877 845 822 807 767 754 633 494 476 441 426 389 375 373 371 355 349 306 301 298 296 268 254 243 230 226 219 214 201 184 182 DB I/O Requests 0 0 0 0 381 0 879 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 95 0 0 0 0 0 0 0 0 0 0 0 0 0 Temporary Storage 0 18 1 2 0 53 0 0 0 0 20 1 1 1 1 2 2 1 1 2 2 2 1 3 1 1 0 1 0 1 2 2 1 1 1 2 3 0 3 2 0 9 0 1 20 2 0 1 2 1 1 1 1
Job Name QSPLMAINT SCPF QIJSSCD QPWFSERVSO QDBSRVXR QZDASOINIT QDBSRVXR2 QSYSSCD QFILESYS1 QSYSCOMM1 QZDAINIT QSYSARB QJOBSCD QINTER QTVDEVICE QSYSWRK QSERVER QCTL QALERT QTMSNMP QTCPIP QSNMPSA QTVDEVICE QNPSERVR QBATCH QUSRWRK QPFRADJ QPWFSERVSD QDBSRV01 QCMN QZSOSMAPD QSERVER QLUS QZBSEVTM QTVDEVICE QZSOSGND QNPSERVS QCMNARB02 QZLSSERVER QPADEV000B QPASVRP QSYSARB3 QSYSARB5 QTPOP01198 QZDASSINIT QZSCSRVR QCMNARB03 QDBSRV02 QPWFSERVS2 QCMNARB01 QZRCSRVSD QNEOSOEM DAILYQUERY
User Name Job Number QSYS 008736 QSYS 000000 QIJS 008797 QUSER 009468 QSYS 008741 QUSER 008830 QSYS 008745 QPGMR 008772 QSYS 008740 QSYS 008746 QUSER 008782 QSYS 008721 QSYS 008737 QSYS 008774 QTCP 008814 QSYS 008752 QSYS 008767 QSYS 008751 QSYS 008738 QTCP 008811 QTCP 008799 QTCP 008820 QTCP 008813 QUSER 008794 QSYS 008780 QSYS 008768 QSYS 008735 QUSER 008801 QSYS 008728 QSYS 008788 QUSER 008834 QPGMR 008783 QSYS 008726 QUSER 008761 QTCP 008816 QUSER 008829 QUSER 008823 QSYS 008748 QPGMR 008808 ITSCID20 009561 QSYS 008765 QSYS 008723 QSYS 008725 QTCP 008835 QUSER 008832 QUSER 008796 QSYS 008749 QSYS 008729 QUSER 008771 QSYS 008747 QUSER 008827 QUSER 008777 WITTSM 007401
Program
Subsystem
QIJSCMON
QEZSCNEP
QCTL
QSERVER
QTVDEVMG
QINTER QSYSWRK QSYSWRK QSERVER QCTL QSYSWRK QSYSWRK QSYSWRK QSYSWRK QCMN QBATCH QUSRWRK QSERVER QCMN QSYSWRK QSERVER
QZBSEVTM QTVDEVMG
WRKDASD QPASVRP
QNEOSOEM DAILYQUERY
156
QDBSRV04 QZSCSRVS QTMSNMPRCV QSYSARB4 QTFTP01394 QPWFSERVSS QPWFSERV QDBSRV03 QDBSRV05 QMSF QTVTELNET QSPL QZSCSRVSD QNEOSOEM QZRCSRVR DAILYQUERY QNEOSOEM QSYSARB2 QPWFSERV QNMAPINGD QZDASRVSD QPASVRS QNMAREXECD QZHQSRVD QPWFSERV QTCPMONITR QNPSERVD QTFTP01505 QTFTP00920 QPASVRS QZLSFILE QTPOP00809 QZHQSSRV QTLPD02966 QTVDEVICE QTLPD03029 Q400FILSVR QACSOTP QPASVRS QTPOP00753 QZSOSIGN QPASVRS QTFTP00932 QZRCSRVS QQQTEMP1 QLZPSERV QDCPOBJ2 QIWVPPJT QLUR QTFPJTCP QQQTEMP2 QDCPOBJ1 QDCPOBJ1
QSYS QUSER QTCP QSYS QTCP QUSER QUSER QSYS QSYS QMSF QTCP QSYS QUSER QUSER QUSER WITTSM QUSER QSYS QUSER QUSER QUSER QSYS QUSER QUSER QUSER QTCP QUSER QTCP QTCP QSYS QUSER QTCP QUSER QTCP QTCP QTCP QSYS QUSER QSYS QTCP QUSER QSYS QTCP QUSER QSYS QUSER QSYS QUSER QSYS QUSER QSYS QSYS QSYS
008731 008818 008817 008724 009557 008773 008778 008730 008732 008798 008812 008766 008819 008760 008795 007397 008779 008722 008775 008790 008833 008784 008791 008822 008776 008802 008824 009558 009562 008789 008781 008837 008821 008803 008815 008804 008742 008792 008786 008836 009503 008787 009559 009498 008743 008793 008734 008825 008739 008831 008744 008733 008733
QTOSRCVR
QSYSWRK QSYSWRK QSPL QSYSWRK QSYSWRK QCMN QBATCH QSYSWRK QSERVER QCMN QSERVER QSYSWRK QCMN QSYSWRK QSERVER QSYSWRK QSYSWRK QSYSWRK QSYSWRK QSYSWRK QSERVER QSYSWRK QUSRWRK QSYSWRK QSYSWRK QSYSWRK QCMN QSYSWRK QSYSWRK QUSRWRK QSYSWRK QSYSWRK QUSRWRK QCMN QSYSWRK QSERVER
QPASVRS
QTOCMON
QPASVRS
QTVDEVMG
QPASVRS
QPASVRS
177 170 170 170 163 162 157 155 150 147 146 141 129 122 120 118 111 109 103 99 97 97 88 86 69 64 62 62 52 51 50 42 42 42 38 38 29 25 25 22 22 21 18 18 16 15 15 14 12 8 5 2 2
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 2 2 0 3 2 2 1 0 0 2 1 1 2 1 1 1 0 2 1 1 0 2 1 2 1 1 3 3 0 2 1 1 1 1 2 1 0 0 1 2 0 3 1 0 0 0 1 0 1 0 0 0
157
Tool monitor function. They both collect data. However, PEX provides a greater level of detail. Note that PEX does not do any analysis for you. The collection functions and related commands of Performance Explorer are part of the OS/400 operating system. The reporting function and its associated commands are part of the Performance Tools for AS/400 Licensed Product, the Manager feature. To use PEX, access the IBM Performance Tools Main Menu, as shown in Figure 131, by typing GO PERFORM on the command line.
PERFORM
Select one of the following: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Select type of status Collect performance data Print performance report Capacity planning/modeling Performance utilities Configure and manage tools Display performance data System activity Performance graphics Advisor
Selection or command ===> 5 F3=Exit F4=Prompt F9=Retrieve F16=System main menu (C) COPYRIGHT IBM CORP.
Figure 131. Performance Tools Main menu
F12=Cancel
F13=Information Assistant
From this menu, enter option 5 (Performance utilities) as shown in Figure 132.
Performance Utilities Select one of the following: 1. Work with job traces 2. Work with Performance Explorer 3. Select file and access group utilities
158
From this menu, enter option 2 (Work with Performance Explorer) as shown in Figure 133.
xxxxxxxxxxxxxxxxxxxxxxxxWork with Performance Explorer Select one of the following: 1. 2. 3. 4. 5. 6. 7. Add Performance Explorer Definition (ADDPEXDFN) Change Performance Explorer Definition (CHGPEXDFN) Remove Performance Explorer Definition (RMVPEXDFN) Start the Performance Explorer (STRPEX) End the Performance Explorer (ENDPEX) Print Performance Explorer Reports (PRTPEXRPT) Delete Performance Explorer Data (DLTPEXDTA)
Again, while this information can be useful in analyzing performance-related disk problems, such as disk access time or disk IOP throughput, it does not provide detailed information about real time DASD consumption.
The Enhanced PEX Trace utility is intended for use only by AS/400 customers, IBM Service Professionals, and Business Partners experienced in performance investigation on the AS/400 system. Analysis of the results requires a thorough understanding of the AS/400 factors, including user application design.
Refer to the following section for information as to how to obtain the enhanced PEX Trace commands.
8.4.5.1 Getting Enhanced PEX Trace commands The Enhanced PEX Trace collection and reporting commands are provided through a set of glossary and real PTFs.
There are PEX Trace PTFs for OS/400 V4R4 and V4R3. The delivery vehicle for the PEX library (named QYPINT) is APAR MA19096. The PTFs to install include:
159
These are not full, real PTFs. They do not fix code. They provide new function. Do not attempt a LODPTF or APYPTF. Follow the instructions in the PTF cover letters exactly. These PTFs include two libraries: Library QYPINT This library contains the PEX Trace Main Menu (PEXTRC01) and the supporting commands to simplify the collection and reporting of detailed PEX Trace data. Library SMTRACE This library contains the reports (queries) over data collected using the PEX Trace commands from the PEX Trace Main Menu in library QYPINT.
Note
The *SAVFs (save files) for these libraries can also be downloaded from the Web at: http://www.as400service.ibm.com/p_dir/pexgui.nsf
Other considerations Ensure that you have installed the latest PTFs for Performance Tools/400, Performance Explorer and real PTFs for Enhanced PEX Trace prior to running any PEX functions.
Ensure that you have sufficient disk space available. The Enhanced PEX Trace collection stage can generate large disk files, depending on the selection criteria.
Note
If you are unsure how to address these considerations, call your service provider for more in-depth assistance.
8.4.5.2 Collecting Enhanced PEX Trace information Once you have installed the Enhanced PEX Trace commands, follow these steps to collect Enhanced PEX Trace information:
1. Make sure that QYPINT is in your library list. If not, use ADDLIBLE QYPINT to add it to your library list. 2. Type GO PEXTRC01 to get to the PEX Trace Main Menu (as shown in Figure 134).
160
AS/400 Disk Storage Topics and Tools
3. Prior to collecting any Trace data, verify that there are no other PEX sessions (collections) currently active. To do this, enter option 1 (Display Active PEX Session Name) from the PEX Main Menu (as shown in Figure 134). The Display Active PEX Sessions display appears (Figure 135).
Display Active PEX Session Name Start PEX Trace Data Collection End PEX Trace Data Collection PEX Trace Reports Menu Query Active PEX Session Status
6. Display Collected PEX Session Names 7. Display PEX Trace Run Information for a Session 8. Display PEX Trace Run Time for a Session 9. Work with Submitted Jobs 10. Delete PEX Trace Session Data Selection or command ===> F3=Exit F4=Prompt F9=Retrieve F12=Cancel F13=Information Assistant F16=AS/400 main menu
Figure 134. PEX Trace Main Menu
Bottom F3=Exit
Figure 135. Display Active PEX Sessions
If an active PEX session exists, it must be ended. Enter option 3 (End PEX Trace Data Collection) before a new PEX Trace session is started.
161
When there are no active PEX sessions, PEX Trace data can be collected. Enter option 2 (Start PEX Trace Data Collection). A prompt screen (Figure 136) appears.
V4R4 VERSION OF SMTBCH (SMTBCH) Type choices, press Enter. Definition/MBR name . . . . . Type of problem . . . . . . . Length of trace in minutes . . Maxdata to collect . . . . . . Library for collected data . . Min CPU sample (milliseconds) Trace MI CALL Events? . . . . I/O Counts/Details . . . . . . Break MSG when time is up? . . Submit job to batch? . . . . . Job queue name . . . . . . . . Job queue library . . . . . . Trace specific jobs/tasks? . . Convert PEX Trace Data? . . . PRTPEXRPT & CPYSPLF to LIB? . Job Priority for PRTPEXRPT . . F3=Exit F4=Prompt F24=More keys . . . . . . . . . . . . . . . . DFN PROBLEM DURATION MAXDATA DATALIB CPUSAMPLE MIBRACKET PDIOTIMDTL BREAKMSG SBMJOB JOBQ JOBQLIB ADDJOBS CVTPEX PRTPEX PRTPEXPTY F12=Cancel
500000 QYPINT 200 *NONE *NONE N Y QCTL *LIBL N N N 51 Bottom F13=How to use this display
F5=Refresh
The values you specify for the parameters on this command define the type and amount of information that the PEX Trace collects. 4. Specify values using the recommendations in Table 5 for collecting DASD consumption information.
Table 5. PEX Trace recommended parameter values
Parameter
Description
Recommended value
DFN
Definition/Member Name
User choice. We recommend that you include a reference to the date and type of information collected. *DISKSPACE for DASD consumption information. 30 to 60 minutes for *DISKSPACE. If you specify a library name other than QYPINT, the library is created if it does not already exist. Specify *ENTEXTMI if you want to see application program names in your PEX reports. Y - This automatically generates the QAYPExxxx database files into your library
Type of information to collect The elapsed time (in minutes) before the collection ends Library for collected data
MIBRACKET
CVTPEX
162
All values that are not explicitly mentioned in Table 5 should be left as the default value, unless otherwise recommended by your service provider. 5. Press Enter to submit the PEX Trace data collection to batch. 6. When the collection stage is complete, you are ready to start printing DASD consumption reports.
8.4.5.3 Printing Enhanced PEX Trace reports Although not specifically designed for DASD consumption problems, Enhanced PEX Trace reports can be tuned, using the NETSIZE reporting command, to find DASD consumption information. This section explains how to do this, gives examples of useful reports, and helps you understand how to interpret these reports.
You can also write your own queries over the database files produced during the PEX collection phase. Refer to 8.4.5.5, Writing your own queries on page 167, for a list of the files generated, and Appendix B.12 of the AS/400 Work Management Guide, SC41-5306, for detailed file layouts.
Using the NETSIZE reporting command Once you have collected PEX information, create and print Enhanced PEX Trace reports by following these steps:
1. From the PEX Trace Main Menu, as shown in Figure 134 on page 161, enter option 4 (PEX Trace Reports Menu). Refer to Figure 137 for an example.
PEXTRC02
Select one of the following: 1. 2. 3. 4. 5. 6. 7. 8. 9. Full File Opens Physical Disk IOs Activation Group Creates Faults Disk Space Consumption Address Consumption Size of Objects Used During PEX Trace Collection CPU Utilization Program Activations and Deactivations
Selection or command ===> 5 F3=Exit F4=Prompt F9=Retrieve F12=Cancel F13=Information Assistant F16=AS/400 main menu
Figure 137. PEX Trace Reports Menu
2. Enter option 5 (Disk Space Consumption) and a prompt screen appears (Figure 138).
163
Object/Segment size changes (NETSIZE) Type choices, press Enter. PF132 and PEX files mbr name PF132 and PEX file library . Submit as batch job? . . . . Force rescan of PF132 mbr? . TDE num (16 *HEX* digits) . Include all threads of TDE? Starting Date-Time . . . . . Ending Date-Time . . . . . . Number of intervals . . . . Both TEMPs and PERMs? . . . TEMP segment/objects? . . . PERM segments/objects? . . . . . . . . . . . . . . . . . . . . . . . . . . . *FIRST Name, *FIRST Name *YES, *NO *YES, *NO
F5=Refresh
F12=Cancel
3. Specify the member name and library used during the PEX data collection stage. Leave all other values as the default.
Note
Refer to AS/400 Performance Explorer Tips and Techniques, SG24-4781, Section 6.6.5 for detailed information about the NETSIZE command.
4. A job is then submitted to the batch queue which produces four reports that provide information about DASD consumption during the collection period. These reports are: Net size Net size Net size Net size change (in bytes) of individual segments change, grouped by (name, object type, segment type) change, grouped by (object, segment description) change by job or task
164
Net size change (in bytes) of individual segments. (total size change at bottom of report) QUERY NAME . . . . . NETSIDRPT LIBRARY NAME . . . . SMTRACE FILE LIBRARY MEMBER FORMAT NETSIDOBJ2 JIMPEXDTA R000000001 NETSIDOBJ2 DATE . . . . . . . . 09/21/99 TIME . . . . . . . . 14:22:25 Net size change (in bytes) 20,480 CTL SPACE 16,384 16,384 16,384 8,192 CTL SPACE 8,192 8,192 8,192 4,096 4,0968,19216,38416,384FINAL TOTALS TOTAL * * * E N D O F D57023646C00 E17EEA6D3D00 C3214DE9A500 CB416DED5700 CFF68325B200 C03A54884C00 E8689E536700 80989AE20100 T T T T T T T T WMHQ Data Queue Cach TNCDFNDIR HEAP DATA SEG TYPE COOK *DESTROYED *DESTROYED *DESTROYED *DESTROYED 19EF 19EF 0000 0EC4 0000 0000 0000 0000 0001 0001 20D6 0002 0000 0000 0000 0000 TEMPORARY - SPACE TEMPORARY - SPACE HEAP DATA SEG INTERACTIVE PROFILE DA5D3791ED00 E3B3891B0C00 F2CF52BFA200 D006F418B200 T T T T QWCJOBINDEX COOK QWCSBSINDEX QPADEV000LCOOK 0EEF 0EC4 0EEF 1AEF 0001 0001 0001 007D TEMPORARY INTERACTIVE TEMPORARY TEMPORARY INDEX PROFILE INDEX PROCESS Object/segment address SID type Object/segment name Object type Segment type Description
D202D4DDCA00
QPADEV000LCOOK
1AEF
007C
TEMPORARY - PROCESS
61,440 R E P O R T * * *
Net size change, grouped by (name, obj-type, seg-type). (total net change at bottom of report) QUERY NAME . . . . . NETOBJRPT2 LIBRARY NAME . . . . SMTRACE FILE LIBRARY MEMBER NETOBJRPT1 JIMPEXDTA R000000001 DATE . . . . . . . . 09/21/99 TIME . . . . . . . . 14:22:25 Net size change (bytes) 20,480 16,384 16,384 16,384 8,192 8,192 8,192 8,192 4,096 45,056FINAL TOTALS TOTAL * * * E N D Object/Segment name, obj type, seg type QPADEV000LCOOK QWCSBSINDEX QWCJOBINDEX CXXK WMHQ Data Queue Cach TNCDFNDIR QPADEV0000069K HEAP DATA SEG TYPE BAZZAGOWER QPADEV003 *DESTROYED 1AEF 0EEF 0EEF 0EC4 19EF 19EF 1AEF 0000 0EC4 0000 007C 0001 0001 0001 0001 0001 007D 20D6 0002 0000 Description
FORMAT NETOBJRPT1
TEMPORARY - PROCESS CTL SPACE TEMPORARY - INDEX TEMPORARY - INDEX INTERACTIVE PROFILE TEMPORARY - SPACE TEMPORARY - SPACE TEMPORARY - PROCESS CTL SPACE HEAP DATA SEG INTERACTIVE PROFILE
O F
61,440 R E P O R T * * *
Figure 140. Net size change, grouped by (name, object type, segment type)
165
Net size change, grouped by Object/Segment description. Destroyed and unknown types group under a blank description. Total net size change at bottom of report. QUERY NAME . LIBRARY NAME FILE NETDSCRPT1 DATE . . . . TIME . . . . 09/21/99 14:22:26 Net size change (bytes) 32,768 28,672 20,480 16,384 8,192 45,056FINAL TOTALS TOTAL * * * E N D Description TEMPORARY - INDEX TEMPORARY - PROCESS CTL SPACE INTERACTIVE PROFILE TEMPORARY - SPACE HEAP DATA SEG . . . . NETDSCRPT2 . . . . SMTRACE LIBRARY MEMBER JIMPEXDTA R000000001 . . . . 09/21/99 . . . . 14:22:26 PAGE 1
FORMAT NETDSCRPT1
O F
61,440 R E P O R T * * *
Net size change by Job or Task. QUERY NAME . . . . . NETTDERPT2 LIBRARY NAME . . . . SMTRACE FILE LIBRARY MEMBER NETTDERPT1 JIMPEXDTA R000000001 TASKINFO JIMPEXDTA JIM0914A DATE . . . . . . . . 09/21/99 TIME . . . . . . . . 14:22:26 Net size change (bytes) 86,016 8,19216,384FINAL TOTALS TOTAL * * * E N D Job/Task task count 000000000001456E 00000000000006FD 0000000000000045 Job/Task name QPADEV000L IPRTR00008 RMSRVCTKLO Job user COOK
O F
61,440 R E P O R T
* * *
Note
The AS/400 Performance Explorer Tips and Techniques, SG24-4781, redbook provides additional examples of the Performance Explorer functions and examples of the Enhanced Performance Explorer trace support. A good source of detailed information on how to interpret enhanced PEX Trace reports is contained in Chapter 8.
8.4.5.4 Interpreting Enhanced PEX Trace reports The reports identify which objects and which jobs used the most DASD during the collection period. However, as you can see from the sample reports listed in
166
8.4.5.3, Printing Enhanced PEX Trace reports on page 163, PEX reports contain a lot of detailed technical data. The flexibility of the tool allows you to produce many customized reports. To build a report specific to performance, capacity, or utilization, contact an AS/400 performance consultant for recommendations. Assess whether this DASD usage is normal or excessive. Investigate the application programs you suspect of contributing to the DASD consumption problem.
8.4.5.5 Writing your own queries You can write your own queries over the database files produced by the collection phase of Enhanced PEX Trace. To do this, you need to understand:
Which files are generated by each type of problem selected in the collection stage. See Figure 136 on page 162. What information is stored in each file.
Files generated Table 6 shows a list of all files generated by the PEX Trace collection stage.
Table 6. Files generated by PEX Trace
File name
Description
QAYPEANAL QAYPEASM QAYPEBASE QAYPECICFG QAYPECOCFG QAYPEDASD QAYPEDSRV QAYPEEVENT QAYPEFQCFG QAYPEHEAP QAYPEHMON QAYPEHTOT QAYPEHWCFG QAYPEHWMAP QAYPEJVA QAYPEJVCI QAYPEJVMI QAYPEJVNI QAYPELBRKT QAYPELCPLX
Analysis Tracking File Auxiliary Storage Management Event Data Base Event Data Basic Configuration Data Common Configuration Data DASD Event Data DASD Server Event Data Event Mapping Data Hardware Configuration Frequency Data Heap Event Data Hardware Data Hardware Instruction Totals Data Hardware Configuration Data Hardware Mapping Data Java Event Data Java Class Info Java Method Info Java Name Info Lic Bracketing Data Complex MI Instruction List
167
File name
Description
QAYPELICI QAYPELJOB QAYPELLIC QAYPELMET QAYPELMI QAYPELNAMT QAYPELNUMT QAYPEMBRKT QAYPEMICPX QAYPEMII QAYPEMIPTR QAYPEMIUSR QAYPENLIC QAYPENMI QAYPEPERD QAYPEPGFLT QAYPEPPANE QAYPEPSUM QAYPEPWDW QAYPERLS QAYPERMPM QAYPERMSL QAYPERUNI QAYPESAR QAYPESEGI QAYPESTATS QAYPESTCFG QAYPES36 QAYPETASKI QAYPETIDX QAYPETRCFG QAYPETRCPT QAYPEUNKWN QAYPEUSRDF
Lic Name Mapping Data Job List Lic Procedure List Metric List MI Program List Task Name List Task Number List MI Bracketing Event Data Complex MI Instruction Mapping Table MI Name Mapping Data MI Pointer Data MI User Event Data Lic Name Data MI Name Data Periodic Mode Event Data Page Fault Event Data Profile Pane Data Profile Summary Data Profile Window Data Database Level Indicator File Resource Mgmt Process Mgmt Event Data Resource Mgmt Seize Lock Event Data General Run Data Segment Address Range Event Data Segment Mapping Data Statistics Data Stats Configuration Data Advanced/36 Event Data Task Data Trace Index Data Trace Configuration Data Trace Point Data Unknown Event Data User-Defined Event Data
168
Data file layouts A complete list of PEX Trace file layouts is contained in Appendix B.12 of the AS/400 Work Management Guide, SC41-5306.
8.5 Summary
As previously mentioned, the information described in this chapter is based on Version 4 Release 4 of OS/400. It is by no means exhaustive. The IBM tools described in this chapter may be enhanced, or new ones provided, in future releases of the operating system. Further information and assistance in identifying and addressing DASD consumption problems may be available from your local service provider.
169
170
Appendix A. Architecture
The system processors role is to run the programs and perform the calculations related to the unique business application programs for your AS/400 system. The service processors role is to manage accessing the hardware. The system processor says I want or I want to do and the service processor says Ill go get it for you or Ill do that for you, rather like a husband and wife relationship. This appendix provides a more detailed accounting of the theory and functions associated with various AS/400 system components for those readers requiring more technical depth. While this detailed knowledge is not necessary to operate the AS/400 system, a background knowledge of the technical architecture is useful to visualize what goes on under the covers. We discuss the architecture of these components in this appendix: Buses SPCN AS/400 IOP/IOAs DASD I/O cabling Device controllers
Main Storage
Main Storage
IOP
DFCI Bus
IOP
SCSI Bus
IOP
SCSI Wide Bus Ultra SCSI Bus
IOP
CMN. IOP
A bus is a physical facility on which data is transferred to all destinations. One or more conductors are used for transmitting signals or power on the bus.
171
Buses used on the AS/400 system include: Private bus Main storage bus I/O (system I/O) bus: Both SPD and PCI architecture IOP to device bus SPD: Both DFCI and SCSI standards PCI: SCSI standard System Power Control Network bus (SPCN)
Interfaces are the cabling that connect the IOP and IOAs to the device controllers. The controller passes information to the I/O devices as a permanent record, in the form of printed, displayed, or written information.
Interface types include the Device Function Controller Interface (DFCI) and the Small Computer System Interface (SCSI). Three variations are referenced in Figure 143 on page 171.
172
PCI is an industry standard format that allows the AS400 to choose from a wide range of devices to integrate into the system. PCI technology is gaining popularity. All system buses on the AS/400 system available through 1999 are SPD technology. Several of the interfaces between IOP/IOA and individual device buses are available in PCI technology.
PCI SPD
Figure 144. Typical SPD and PCI IOP/IOA packaging
Most functions supported with SPD cards have equivalent function cards in PCI format. For example, IOP or IOA to device buses come in both SPD and PCI technologies. The fundamental bus architecture of the AS/400 system remains unchanged when using PCI adapters. The AS/400 IOP continues to: Offload the main processors workload Isolate the host from adapter and network errors Manage, configure, and service the adapters PCI architecture offers advantages in flexibility for non-AS400 system structures.
Appendix A. Architecture
173
Some products are designated Customer Setup (CSU). Customer Installable Features (CIF) was introduced on the Model 600, 170 and 150 for orders of additional features, such as disk features, PCI I/O cards, and external cables. PCI cards enable an implementation of CIF. SPD and PCI buses are further distinguished with different technologies, as discussed in A.2.1, Device Function Controller Interface (DFCI) bus on page 174, and A.2.2, Small Computer System Interface (SCSI) bus on page 174. Whether SPD or PCI is available depends on the system model. Early models, in particular, only have SPD technology. Many models, manufactured beginning with OS/400 V4R1, may have only SPD, or may have a mix of SPD and PCI, or may have all PCI components. The system model number referenced determines which technology is available. The number of processors are too numerous to mention in this redbook. For a listing of current SPD and PCI processor choices, refer to the AS/400 System Builder, SG24-2155, or the AS/400e System Handbook, GA19-5486.
These device types are explained in A.2.2, Small Computer System Interface (SCSI) bus on page 174.
174
system processor issues a command to the device and disconnects from the device before the device completes the requested function. This frees the system processor and the IOP/IOA to go on with other tasks, while the device completes the requested function. This improved speed increases the amount of system throughput.
A.2.2.1 SCSI options on the AS/400 system SCSI architecture is implemented in several forms on the AS/400: SCSI wide, SCSI1 and SCSI2.
Low-end AS/400 models use SCSI to connect to tape and disk devices. Mid- and high-end AS/400 models connect these SCSI device types: 2440 tape unit 2800 and 2801 integrated disk units 2802 integrated disk units (SCSI wide) 636x tape unit 7208 tape unit 9346 tape unit 9348 tape unit 9337 disk unit models (0XX and 1XX use SCSI) 9337 disk unit models (2XX, 4XX, and 5XX use SCSI wide) All internal disk unit models
SCSI wide bus The SCSI wide bus is the same architecture as the SCSI bus, except the SCSI wide bus has a wider bandwidth on which to transfer data.
SCSI wide is used on the 9337 model 2XX, 4XX, 5XX, and storage units of some Advance Series and eSeries system models.
SCSI 1 and SCSI 2 The different types of SCSI (SCSI-1 and SCSI-2) refer to the driver and receiver used.
The number 2 in SCSI-2 implies that it is the second version of SCSI standards. SCSI-2 supports SCSI-1 since it consists of the SCSI 1 basics. All interfaces on the internal and external devices on Stage 1 processors (that is, the AS/400 Model B) use SCSI-1. Beginning with Stage 2 systems (as in the AS/400 Model D, E, and F models), interfaces on the integrated (internal) devices supported by the base Multi-Function IOP (MFIOP) are SCSI-2. The SCSI-2 interface supports SCSI-1 devices, such as the #2800 and #2801 disk unit devices. The #2802 is a SCSI-2 device running on the same MFIOP. Internal DASD installed in a #5051, #5052 or #5058, utilize the SCSI-2 interface (except repackaged #2800 and #2801 DASD). The #5051 or #5052 and all storage expansions manufactured subsequently run on an IOP to provide a SCSI-2 interface. SCSI-1 devices are supported in the first seven logical slots.
Appendix A. Architecture
175
External storage developed for the AS/400 system, beginning with the model 2XX 9337s and continuing with the Enterprise Storage and Versatile Storage Servers, attach using SCSI-2 interfaces. The following lists distinguish SCSI-1 from SCSI-2: SCSI-1 is single-ended. Characteristics include: Low cost. Do not require twisted pair wire. Maximum cable length of 19.605 feet. Susceptible to electrical noise. Used primarily for connections within a cabinet. Termination is done at the end of each cable or on the device. Distance between device and bus must be less than 3.921 inches. Distance between device and device must be at least 13.070 inches. SCSI-2 has a differential end. Characteristics include: Higher cost. Maximum cable length 81.688 feet. Twisted pair wire recommended. Less susceptible to electrical noise than SCSI single-ended. Primarily used for connections external to a cabinet. Termination is done at the end of each cable or on the device. Distance between device and bus must be less than 26.140 inches. Distance between device and device must be at least 13.070 inches.
176
Operating System
Service Processor
Tower or Rack 4
Unit Node
Battery Display
Unit Node
Unit Node
Unit Node
Primary Tower or Rack (1)
Unit Node
SPCN
Figure 145. SPCN bus architecture
Most integrated units and internal devices in AS/400 systems use SPCN. SPCN uses microprocessors and a serial communication network to connect power in the rack and rack-mounted units. SPCN permits the operating system access to system power status and faults which are not available otherwise.
A.2.3.1 SPCN power components The primary hardware components of SPCN, in addition to standard power components, are SPCN nodes and the SPCN interface. Refer to Figure 145 to observe that the power system in each tower/rack and each tower- or rack-installed device unit contains an SPCN node. An SPCN node is a microprocessor placed in the SPCN network, making the connecting points necessary for distributing power, sending commands, and reporting status. A SPCN node interfaces to the units power supply and local display panel. Each tower/rack node has its own power supply and remains powered on as long as there is building power available to the rack.
The location of a node in the network determines what interface it has to the power supply, power backup units, display panels, and rack emergency power-off (EPO) circuits.
Appendix A. Architecture
177
Master node The master node is the interface between the operating system and the serial network. The master node is a microprocessor located in the primary system tower or rack. The master node is programmed to issue network commands and poll for status from other SPCN nodes in the network.
The master node communicates with the operating system (through the control panel), exchanging commands and network status. The master node monitors power and status of the power supply. During power interruption the master node starts backup power. The master node is powered on as long as building power is available to the tower or rack. Command responses and error status from the SPCN network are collected by the master node and formatted for return to the operating system.
Tower or rack node A tower or rack SPCN node is located in each tower or rack. It receives power-on and power-off commands from the master node for switching AC power (on or off) to the tower- or rack-mounted units. Each tower or rack node controls power switching to outlets within racks, and to power connections within towers. The outlets are switched on or off in groups of five. Unit node The unit node is a microprocessor located inside an AS/400-attached device (with SPCN circuits). Each unit node is programmed to report device status and respond to commands from the master node.
178
MAIN STORAGE
SYSTEM PROCESSOR
SERVICE PROCESSOR
I/O Processor
I/O Processor
I/O Processor
I/O Interface
DASD
Tape Communication
Workstation
When the main system processor encounters a request for data to be written to or read from any I/O device, the request is delegated to a particular microprocessor dedicated to that I/O device. The device handles the operation, while the system processor continues with another application program. On a fully configured Model 740, for example, there can be approximately 12 system processors, one service processor, and 237 I/O microprocessors on the system. This hierarchy of microprocessor design provides the AS/400 system with outstanding performance in the commercial, transaction-based environment. Microprocessor technology is easily used and updated any time without disrupting the rest of the system.
A.4.2 Input output processor (IOP) and input output adapter (IOA)
A DASD subsystem attachment consists of one or more IOA functions and one IOP function. The DASD subsystem performs the following operations:
Appendix A. Architecture
179
Sends and receives data while performing the following checks: I/O bus parity read/write Read data parity and write data parity on the interface Parity of all data passed through the IOP/IOA card Stores the status of error conditions Some error recovery routines The DASD IOP converts I/O bus directives to DASD controller directives using Licensed Internal Code (LIC). On AS/400 systems, the DASD I/O processor is also called a storage controller or a magnetic storage device controller. The magnetic storage device controller card is a combination I/O processor and I/O adapter card. It permits the attachment of one or more magnetic storage devices to the AS/400 system. The IOP is varied on during a system initial microcode program load (IMPL). The IOP vary on basic assurance test (BAT) checks the IOP hardware and the IOP memory, and then loads the IOP memory with the subsystem Licensed Internal Code (LIC). Every disk enclosure on the AS/400 system is attached to a supported feature IOP. Some storage IOPs support only one disk enclosure, and some support many. The selection of the proper DASD IOP depends on the level of system availability protection needed, potential growth requirements, system performance, and whether any existing DASD units are migrated as a part of a system upgrade. It is important to understand the relationships between the various storage IOPs and their supported disk enclosures. A reference for storage IOPs and the DASD they support is the AS/400e System Handbook , GA19-5486. There are three different methods of supporting DASD on AS/400 systems: Multifunction IOP (MFIOP) IOPs which support internal DASD units beyond the capability of the MFIOP External DASD All of these have different types of DASD IOPs.
A.4.2.1 Service processor and MFIOPs The AS/400 system uses an architecture which combines multiple functions within some IOPs. One of the IOPs with this ability is the base Multi-Function IOP (MFIOP). Not only is it an input/output processor, but it also has the service processor incorporated within its hardware. The MFIOP is a standard feature on Stage 2 AS/400 systems.
MFIOPs support up to 20 integrated DASD units. They also support tape devices and communication adapters, and in some cases, workstation adapters. These adapters most often attach the workstation to function as the system console. The tape device attached to the MFIOP is used as the default Alternate IPL load source. One of the communication adapters is often used to connect to Electronic Customer Support (ECS).
180
Service processor The service processor is similar to the system processor in how it operates. However, the functions it performs are quite different from those of the system processor.
The service processor functions are much the same for all models of the system. However, the logic performing those functions is packaged considerably different on the B30 through B70 models of the system than on other models of the system. On the B30 through B70 models, the service processor functions are performed by a processor that is more or less dedicated to just those functions. When service processor functions are not performed, that processor is idle. On other models of the system, the service processor functions are performed by a Multi-Function Input/Output Processor (MFIOP). The MFIOP provides service processor functions on the system, and serves as the IOP for some of the I/O devices on the system.
Multifunction IOP (MFIOP) All AS/400 systems must have a base MFIOP. The MFIOP type is determined by the workstation controller requirements.
Prior to OS/400 Version 4, all MFIOPs use SPD technology. Beginning with OS/400 V4, some MFIOPs are SPD and some are PCI. Which technology is used depends on the model to which it is referred.
Terminology tip
A base MFIOP comes standard on all AS/400 models. Beginning with the AS/400e series systems, however, other IOP cards support several functions. So the term MFIOP is not limited to the base MFIOP. All references to MFIOP in this redbook refer to the base MFIOP. The Integrated PC Server and Integrated Netfinity Server are later generation MFIOPs.
SPD MFIOPs All DXX, EXX, FXX, 2XX, 3XX, 4XX and 5XX models of the AS/400 system use SPD MFIOPs. Refer to Figure 147 on page 182 for a diagram. These MFIOPs incorporate both the service processor and a SCSI bus (on which the load source disk unit resides, on PowerPC models the alternate load source CD-ROM resides, and one alternate load source tape unit can reside). The MFIOP incorporates up to two communication ports and may incorporate a workstation adapter port.
Appendix A. Architecture
181
SCSI Bus
6147 or 9149 port A
bottom of card
Tape
Port
Port
For additional detail regarding the earlier technology IOPs, refer to the AS/400 System Builder, SG24-2155. Refer to the AS/400e System Handbook, GA19-5486, for the current version and release supported models.
Advanced MFIOP With the introduction of the e-Series model 6XX models, some models continued to use SPD base MFIOPs and other models moved to the PCI base MFIOP. The PCI-based MFIOP was integrated into the system.
Removable PCI feature adapters determine what features the MFIOP supports. In effect, the PCI MFIOP became a system board that PCI adapters plug into. Beginning with OS/400 V4R1, the base MFIOP gained many advanced functions. This includes the SPD MFIOPs used in the Models Model X40s, X30s and X50s and also the PCI MFIOPs used in the models X20s. Refer to Figure 148 to observe these functions.
182
Improved functionality
Integrated LAN Integrated RAID-5 capability Integrated DASD Fast Write Cache Supports up to 20 DASD devices Integrated twinax option Token ring and Ethernet LAN options Packaging efficiency, I/O slot savings
Improved functionality
PCI Multifunction IOP for all models without SPD MFIOPs Beginning with OS/400 V4R1, models of AS/400 system from the smallest up through the model S20/620 use the integrated base MFIOP. Only models X30 and above use SPD. The transition to PCI continues to the future.
Configuration tip
With PCI technology, there must be careful planning about where to physically place PCI adapters. If configuration rules are not followed, feature adapters and their supported devices may not function and/or may not show up in hardware configuration screens. One configuration rule is the minimum Version/Release required to support the installed hardware components. Devices, adapters or features may not function, may not show up in hardware configuration screens, or may work unpredictably unless the prerequisite OS/400 code is installed. These problems can appear to be hardware component failures. However, the hardware component is not failing. It is a configuration or installation failure. For help in planning placement of IOAs in a PCI board, refer to the AS/400 Installation Guide for your system model.
For a listing of IOPs supporting disk, refer to the AS/400e System Handbook, GA19-5486, for products available for the current product line, or AS/400 System Builder, SG24-2155 , for all products since the AS/400 system inception in 1988.
183
A.4.2.2 Considerations when installing DASD IOPs The physical placement of an IOP affects the performance of devices attached to it, as well as other controllers on the same bus. Consider the following rules regarding DASD IOPs and placement for best performance: Physical location
For proper configuration, locate DASD IOPs directly on the bus. Disk units experience timing failures when installed on a bus extension, because the bus extensions clocking function differs from that of the bus.
LIC on IOPs
Licensed Internal Code is loaded to the IOP during an IPL of the system. On occasion, an IOP loses the LIC stored in volatile memory on the IOP card. LIC is restored to some IOPs without an IPL. When the RESET parameter on the VRYCFG command is set to *YES, the VRYCFG command reloads LIC to workstation controller IOPs and communication controller IOPs.
Note: The microcode for magnetic storage controller IOPs cannot be reset with a VRYCFG. An IPL is necessary to reload LIC to a magnetic storage controller IOP.
Note: The 9336 I/O cable is DFCI even though the 9336 drive itself is a SCSI drive. This is because the #6112 IOP driving the 9336 uses DFCI protocol. SCSI (Small Computer System Interface)
I/O cables from the #6500 IOP to the 9337 models 0XX and 1XX DASD carry data/information using the SCSI protocol.
SCSI wide
The 9337 2XX and 4XX models use the SCSI wide protocol. The #6501, #6502 and #6512 IOP supports SCSI wide. SCSI wide has a wider bandwidth, thus enabling more data throughput. Because of the wider bandwidth, the cable that the 2XX, 4XX and 5XX models use is physically different than the model 0XX or 1XX. When upgrading from a 0XX or 1XX model to a 2XX, 4XX, or 5XX model, be sure you have the appropriate cable available.
Cable lengths
IBM I/O cables come in standard lengths. For example, the 9337 model 2XX IOP cables come in lengths of 2, 4, 6, or 20 meters. However, if the standard IBM cables do not meet the customer's needs, cables can be special ordered from IBM, as long as they meet industry standards. Industry standards, set by ANSI, for these same cables allow for 25 meters. If a customer needs the
184
extra 5 meters, the longer lengths can be ordered through a request for price quotation (RPQ). IBM Marketing specialists can access the online sales information system to obtain more information on this.
Do not bypass the RPQ process by ordering the parts separately, thinking they will cost less. Installing a set of parts can leave the unit, as well as the system, in an unsupported status. RPQ provides the support structure required to protect the customers investment.
Current technology storage units have the controller either integrated into the storage units logic card, or into the IOP that is driving the storage unit. The 280x disk units have the controller integrated into the disk units logic card. On these integrated storage units, the controllers are addressed by the system as 00 through 07 based on the units physical location on each SCSI bus. The physical location of the card book determines controller address (slot 23/24 or slot 25/26), as well as the position of the disk unit within the card book. Usual replacement procedure for the 280x units is to replace the unit as a whole, (the logic card and head disk assembly (HDA)), rather than to replace the separate components. However, the logic card can be ordered separately if circumstances warrant. Early disk units, such as the 9332, have their own controller housed within the device. It is a card located above the storage unit slots. The controller is addressed through a switch setting at the back of the box.
Appendix A. Architecture
185
The 9335, model A01, is a separately housed controller used to control up to four 9335 model B01 disk units, each with two storage units. Because of controller contention, performance requirements can dictate that the A01 controllers attach no more than two B01 disk units. The A01 controller is addressed through a switch setting at the back of the box.
The number of storage units per disk unit varies by disk unit type and model. For example, the 9332 Model 400 has two storage units. Storage units are addressable by the system based upon the possible number of storage units within a disk unit. For example, the 9335 disk unit has device addresses 0 through 7, and the 9332 disk unit has device addresses 0 through 1.
Head disk assemblies (HDAs) Storage units are housed in a head disk assembly (HDA).
HDA Casting
Servo Head
0 2 4 6 8 10 12
1 3 5 7 9 11 13
Disks
On all current model disk technology, a single storage unit is enclosed in one HDA. The one-to-one ratio makes it possible to replace a single storage unit without affecting a second storage unit and its data. In some examples, multiple storage units are enclosed in a single HDA. For example, the 9335 has two storage units per HDA.
186
DASD tracks Information is written on narrow rings on disk platter surfaces. Each ring is called a track . There are numerous tracks on a given disk platter surface. When a read/write head needs to either read information from or write information to a disk unit, it positions itself over a single track.
Refer to Figure 150 for a visual representation of the DASD track as it relates to the individual platter.
R/W Head
Track
DASD cylinders To improve performance, several heads are manufactured in tandem on a single access mechanism (often referred to as an arm). Multiple parts of an object are written or read simultaneously as each head reads its track.
The collective total of a given track on each platter is called a cylinder. For example, track 1 on the first platter along with track 1 on all other platters within the same HDA, comprise cylinder one. Refer to Figure 151 on page 188 for a graphic, which shows the relationship between a track and cylinder.
Appendix A. Architecture
187
Track X
Access Mechanism
Cylinder X
DASD sectors Each data track is divided into several sectors. At the beginning of the group of sectors is an index mark to identify the beginning of the sectors on a track. Refer to Figure 152 for a visual representation of this arrangement.
Index
Sector
188
The type of IOP the DASD is attached to determines the sector format the data is written in. Figure 153 shows the two types of formats used on DASD attached to the AS/400 system.
520-Byte Format 8-Byte Header 512-Byte Data 522-Byte Format 8-Byte Header
Figure 153. DASD sector format
512-Byte Data
2-Byte Trailer
The 520-byte format is associated with internal DASD attached to IOPs installed in the CISC platform, with one exception: The 520-byte format structure is used with the internal DASD attached to the MFIOP up through the AS/400 5xx models. The 522-byte format is used for disk units that have compression enabled, and for RAID-capable internal DASD. RAID-capable disk units are those disks installed in a #5051 or a #5052 (when a RAID-capable IOP is used). DASD using the 520-byte structure does not support RAID. The extra two bytes of information in the trailer area denote this to the system.
Header
BYTE BYTE BYTE BYTE BYTE BYTE BYTE BYTE 0 1 2 3 4 5 6 7
Trailer
BYTE BYTE 8 9
8 Bytes
Figure 154. Header information
Figure 154 provides a visual representation of the header area found on a disk. The header contains information about the sector, for example, that the data on the sector is unprotected, checksummed, DPY protected, or mirror protected.
Appendix A. Architecture
189
There are bits that contain flags to indicate if data within the sector is damaged. There is an address for the sector. And there is much more sector information contained within the header. Depending on the IOP card that the drive is attached to, the disk is formatted to either a 520- or 522-byte format. The sector format is controlled by the code on the IOP or IOA and is transparent to storage management. Each format creates an 8-byte header. The data is always 512 bytes. The extra 2 bytes on the 522-byte format are used internally. From a user perspective, the block size is 512, always. Most of the newer IOPs, when running the later versions of LIC, use a 522-byte format. These newer IOPs can read from or write to a drive that has been previously formatted to 520, but the drive does not take advantage of DPY or caching advantages that the IOP card could have provided. The compression sector size is 522 bytes.
Rotation
Track 1
190
Rotation
Rotation
When the index position is detected, the disk controller starts reading data.
Figure 157. Read/write data read (3)
Appendix A. Architecture
191
Rotation
When the desired sector is under the read write head, the controller begins transmitting data.
Figure 158. Read/write data transmission (4)
192
Address The location in the storage of a computer where particular data is stored. Auxiliary Storage Pool (ASP) A group of storage units defined from the disk units that make up auxiliary storage. ASPs provide a means of isolating certain objects on a specific disk unit as a method to prevent the loss of data due to disk media failures on other disk units. Extent
This is a variable-sized piece of DASD to which a virtual address range has been assigned.
Free space directory This is a pageable machine index which tracks all unassigned sectors on all disk units. It is used in CISC systems only. Magnetic tape Plastic tape coated on one side with a magnetic material that stores information as varying patterns of magnetization. Main storage pool A division of main storage which allows the user to reserve main storage for processing a job or group of jobs, or to use the pools defined by the system. As of OS/400 V4R4, up to 64 pools can be set up in one AS/400 system. Page (noun) A page is made up of eight disk sectors (4 KB) or 4 KB of main memory. Page (verb)
An action of moving a page of data from main memory to disk or vice versa.
Permanent address An address used to locate a piece of data that survives an IPL. Permanent directory Used by storage management to keep track of permanent addresses currently being used and their corresponding locations on DASD. Real address (storage) Main storage. Sector
The smallest amount of information that can be written to or read from a disk or diskette during a single read or write operation. A sector consists of 512 bytes of data and an 8-byte sector header to give a total size of 520 bytes. There are some other bits that belong to hardware (used when disk compression is activated, for example), but they can be ignored for the purposes of storage management.
Segment Identifier (SID) Refers to the 4 or 5 high-order bytes of an 8-byte virtual storage address. The big SID is composed of a 5-byte SID and 3-byte offset. It encompasses an address range of 16 MB with 4096 occurrences of 4 193
KB pages. The little SID consists of 5 bytes called the Segment Group Identifier (SGID), which addresses 16 MB of storage. One SGID consists of up to 256 little SIDs, each of which addresses 64 KB of storage. The number of little SIDs is expressed in byte 5 (bits 40 to 47) of the address.
Static directory This is used to store VLIC persistent data such as the disk locations of the permanent directory and so on. Storage
Devices such as disks and tapes that store data magnetically or optically. Although slower than a computers internal electronic memory, storage devices provide virtually unlimited capacity and preserve data integrity.
Temporary address An address used to locate a piece of data that does not survive an IPL. Temporary directory Used by storage management to keep track of temporary addresses currently being used and their corresponding locations on DASD. Temporary library A library that is automatically created for each job to contain temporary objects that are created by the system for that job. The objects in the temporary library are deleted when the job ends. The system name for the temporary library is QTEMP. Temporary objects Objects, such as data paths or compiler work areas, that are automatically deleted by the system when the operating system is loaded. Virtual address (storage) An addressing scheme that allows external disk storage to appear as main storage.
194
C.1.1 280X
The DASD described in this section are not all supported in current AS/400 systems. The #2800 and #2801 repackaged DASD are not supported in the current AS/400e series systems. The #2802 DASD is supported in the AS/400e series. The internal DASD storage units are available in three capacities: 1.3 GB, 988 MB, and 320 MB. Each card book contains two storage units of the same capacity. The AS/400 system has a minimum configuration of 1.2 GB of internal storage. This is accomplished with two #2800 card books, one #2801, or one #2802 card book. If a #2801 or #2802 card book is used as the base configuration, then an additional, optional #2800, #2801 or #2802 can be included. The system is capable of accommodating a maximum of two card books. As the AS/400 DASD evolves, more and more circuitry that was formerly on separate field replaceable units (FRUs) are a part of the base unit. For example, the read/write control cards that were attached to the 9335 HDA are included in the logic card of the #2800. The controller that is housed in a separate model of the 9335 is also included in the same logic card on the 2800. The individual disk units have become an entire separate subsystem within themselves. The 9337 High Availability (HA) model (another term sometimes used in place of device parity protection (DPY) models) is an example of this.
195
93 3 7 D A S D w ith D P Y a ctiv e
Bus
W rite-C ac he (2xx, 4 xx, and 5xx m o dels )
N ote: F irst four logical files have parity, 1xx, 2xx, 4xx and 5xx m odels in H A m ode only
Pow e r
1
B ase m o de ls
Pow e r Pow e r
F ea tu re s p o sition s
The supported models are those that attach to the feature #6501 Magnetic Storage Controller IOP only. Each #6501 IOP supports up to two of the 9337-2XX, 4XX or 5XX models. Every 9337 model has a built-in storage controller as well as redundant power supplies which permit continued operation if one of the three power supplies fails. All 9337 models use 3.5-inch disk technology and offer better performance than previous external DASD models. When in device parity (DPY) mode also known as High Availability (HA) mode, a non-volatile Write Cache on the storage controller of the 2XX, 4XX and 5XX models takes the place of the write assist drive (WAD) storage unit of the 1XX models. This provides better performance. It is important to be aware that on the device parity protected models, not all the physical capacity is usable for customer data, and is not observable on disk configuration capacity screens. The base storage units (those that contain the parity stripes) display a lower capacity than the others. The capacity used by the parity stripes is deducted from the total physical capacity. The capacity shown on system displays is the capacity available for customer data. For additional detail per subsystem, refer to the AS/400 System Builder, SG24-2155.
9337 Dynamic RAID Spare function (Hot spare) The Dynamic RAID Spare function, otherwise known as a hot spare, allows one of the disk drives to be assigned as a spare in the 9337 subsystem when in RAID-5 mode. It is not addressable by the AS/400 system, thus reducing the maximum number of addressable disk drives in the 9337 from eight to seven.
In the event of a single disk drive failure in a 9337 with hot spare, the 9337 automatically and immediately begins restoring the failed disk drive data to the hot spare, again by using the parity data areas from the other disk drives.
196
A customer can activate a hot spare feature in RAIDable 9337s when RAID is activated. Hot spare is not an option if mirror protection is used. In a 9337 with hot spare, if a single disk unit fails, the data of the failed unit is rebuilt on the spare drive from the parity stripes of the others. This is done automatically and may often be completed before the service representative arrives. Since the data rebuild process can begin before the failed disk drive is physically replaced, it reduces the time that the 9337 is in the exposed mode to the time it takes to rebuild the hot spare. The exposed mode is when there is the potential of another disk drive failing in the same 9337 which could cause the 9337 to cease operation. After physical replacement of the failed drive, it becomes the new hot spare. This Dynamic RAID Spare Function is also available on 9337 210, 215, 220, 225, or 240 models that do not have the 4M cache installed on the controller as an RPQ (843795). How to define a hot-spare configuration is documented in the Backup and Recovery Guide, SC41-5304.
197
The VSS attaches to the AS/400 system using a #6501 Magnetic Storage Controller (SPD). The #6501 requires V3R1 or later. When attached to the #6501, the Versatile Storage Server emulates the 9337-580 or 9337-590 based on the size of the disk unit installed.
Notes
Each connection to an AS/400 system using a #6501 supports a maximum of sixteen disk units. There can be a maximum of eight #3001 Host Interface Adapters per 2105 VSS. If eight #6501s are attached to eight #3001s, this dedicates the 2105 VSS to the AS/400 system and gives a maximum capacity of 536.3 GB when emulating 9337-580s, 1099.5 GB when emulating 9337-580s, and 1099.5 GB when emulating 9337-590s. In most cases, the minimum cache memory of 512 MB is best for use with the AS/400 system, but the expert cache function of OS/400 normally provides better performance. The Versatile Storage Server Expansion Enclosure includes space for seven 7133-010, 7133-020, 7133-D40 drawers and a power control system.
Note: The version and release references in the following list of IOPs indicates minimum level required for that IOP.
SPD IOPs available for internal DASD include: #6502: 2 MB cache RAID/Mirroring/Unprotected (V3R2) #6530: No cache Mirror protection only (V3R2) #6512: 4 MB cache RAID/Mirroring/Unprotected (V3R6, V3R7) #6532: 4 MB cache RAID/Mirroring/Unprotected (V4R1)
198
#6533: 4 MB cache RAID/Mirroring/Unprotected (V4R2), integrated hardware disk compression enabled with V4R3 #9751 MFIOP with RAID (Ultra SCSI) V4R1 #9754 MFIOP with RAID (Ultra SCSI) V4R2, integrated hardware disk compression enabled with V4R3 Refer to A.4, AS/400 IOP and IOA on page 179, for details of the IOP cards and their capabilities. For a complete listing of internal DASD, refer to AS/400 Installation and Upgrade, SY44-5950. Locate and reference Appendix C, Configuration Rules for AS/400 Models, and find the chart for internal DASD devices. Be certain to reference the correct level of documentation for your system.
199
(supporting up to three PCI RAID Disk Unit Controllers) and two removable media slots. The #5065 Tower requires V4R4, and attaches to models 720, 730, and 740 (plus 6XX and SXX) via an SPD optical bus. With the #2748 IOP installed, the Read Cache Device can be installed and utilized. For additional restrictions and considerations for use of this tower refer to the AS/400e System Handbook, GA19-5486, or the AS/400 System Builder, SG24-2155.
200
2. Create CMD, CL, DDS and RPG source files using the following commands:
CRTSRCPF CRTSRCPF CRTSRCPF CRTSRCPF FILE(WRKDASD/QCMDSRC) TEXT('CMD Source Members') FILE(WRKDASD/QCLSRC) TEXT('CL Source Members') FILE(WRKDASD/QDDSSRC) TEXT('DDS Source Members') FILE(WRKDASD/QRPGLESRC) TEXT('RPGILE Source Members')
3. Create a source member, with member type PF, in the QDDSSRC source file for each of the following files: DATAFILE (Figure 161 on page 202) DBIOFILE (Figure 162 on page 203) HOLDFILE (Figure 163 on page 203) 4. Create the physical files using the following commands:
CRTPF FILE(WRKDASD/DATAFILE) SRCFILE(WRKDASD/QDDSSRC) CRTPF FILE(WRKDASD/DBIOFILE) SRCFILE(WRKDASD/QDDSSRC) CRTPF FILE(WRKDASD/HOLDFILE) SRCFILE(WRKDASD/QDDSSRC)
5. Create a source member, with member type DSPF, in the QDDSSRC source file for the WRKDASD display file (Figure 164 on page 204). 6. Create the WRKDASD display file using the following command:
CRTDSPF FILE(WRKDASD/WRKDASD) SRCFILE(WRKDASD/QDDSSRC) DFRWRT(*NO)
7. Create a source member, with member type CLP, in the QCLSRC source file for the GETDBIO program (Figure 166 on page 205). 8. Create the GETDBIO program using the following command:
CRTCLPGM PGM(WRKDASD/GETDBIO) SRCFILE(WRKDASD/QCLSRC)
9. Create a source member, with member type RPGLE, in the QRPGLESRC source file for the WRKDASD program (Figure 177 on page 216). 10.Create the WRKDASD RPG program using the following command:
CRTBNDRPG PGM(WRKDASD/WRKDASD) SRCFILE(WRKDASD/QRPGLESRC)
11.Create a source member, with member type CMD, in the QCMDSRC source file for the WRKDASD command (Figure 178 on page 216). 12.Create the WRKDASD command using the following command:
CRTCMD CMD(WRKDASD/WRKDASD) PGM(WRKDASD/WRKDASD) SRCFILE(WRKDASD/QCMDSRC)
After completing these instructions you, should end up with the following objects in your library.
201
5769SS1 V4R4M0 990521 Library . . . . . Type . . . . . . Number of objects ASP . . . . . . . Create authority Text description Object GETDBIO WRKDASD DATAFILE DBIOFILE HOLDFILE QCLSRC QCMDSRC QDDSSRC QRPGLESRC WRKDASD WRKDASD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . : : : : : :
Display Library WRKDASD PROD 11 2 *SYSVAL Work with DASD command Size 36864 335872 45056 49152 45056 20480 20480 69632 90112 8192 4096 815104 O F L I S T I N G
14:50:42 Page 1
Type *PGM *PGM *FILE *FILE *FILE *FILE *FILE *FILE *FILE *FILE *CMD
Description Get Database I/O Information Work with DASD by job Data File for WRKDASD Database File I/O Information File that holds a copy of DATAFILE CL Source Members Command Source Members DDS SOURCE MEMBERS RPG Source Member File Display File for WRKDASD Program Work with DASD Command
* * * * *
E N D
* * * * *
SOURCE FILE . . . . . . . WRKDASD/QDDSSRC MEMBER . . . . . . . . . DATAFILE SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 A***************************************************************** 200 A* * 300 A* This file contains all of the information required for * 400 A* the WRKDASD display and report * 500 A* * 600 A***************************************************************** 700 A* 800 A R DATAF 900 A* 1000 A KEYFLD1 7 0 TEXT('Primary Key field') 1100 A KEYFLD2 7 0 TEXT('Secondary Key field') 1200 A QJOB 10 TEXT('Job Name') 1300 A QUSR 10 TEXT('User Name') 1400 A QJNUM 6 TEXT('Job Number') 1500 A QPROG 10 TEXT('Program Name') 1600 A QSBS 10 TEXT('Subsystem Name') 1700 A QIO 7 0 TEXT('Auxiliary I/O') 1800 A QDBIO 7 0 TEXT('Database I/O') 1900 A QSTOR 7 0 TEXT('Temporary Storage') 2000 A K KEYFLD1 DESCEND 2100 A K KEYFLD2 DESCEND * * * * E N D O F S O U R C E * * * * Figure 161. Source listing for the physical file DATAFILE
202
xSOURCE FILE . . . . . . . WRKDASD/QDDSSRC MEMBER . . . . . . . . . DBIOFILE SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 A***************************************************************** 200 A* * 300 A* This file contains the output from CPYSPLF of the spool * 400 A* file produced by the WRKJOB OPTION(*OPNF) command * 500 A* * 600 A***************************************************************** 700 A* 800 A R DBIOF 900 A* 1000 A FLD1 1 TEXT('Spacer') 1100 A DBFILE 10 TEXT('File Name') 1200 A FLD2 2 TEXT('Spacer') 1300 A DBLIB 10 TEXT('Library Name') 1400 A FLD3 2 TEXT('Spacer') 1500 A DBMBR 10 TEXT('Member Name') 1600 A FLD4 14 TEXT('Spacer') 1700 A DBTYPE 3 TEXT('File Type') 1800 A FLD5 2 TEXT('Spacer') 1900 A DBIO 7 TEXT('Database I/O') 2000 A FLD6 71 TEXT('Spacer') 2100 A K DBIO 2200 A K DBFILE * * * * E N D O F S O U R C E * * * *
SOURCE FILE . . . . . . . WRKDASD/QDDSSRC MEMBER . . . . . . . . . HOLDFILE SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 A***************************************************************** 200 A* * 300 A* This file holds a copy of the DATAFILE during * 400 A* resequencing * 500 A* * 600 A***************************************************************** 700 A* 800 A R HOLDF 900 A* 1000 A KEYFLD1 7 0 TEXT('Primary Key field') 1100 A KEYFLD2 7 0 TEXT('Secondary Key field') 1200 A QJOB 10 TEXT('Job Name') 1300 A QUSR 10 TEXT('User Name') 1400 A QJNUM 6 TEXT('Job Number') 1500 A QPROG 10 TEXT('Program Name') 1600 A QSBS 10 TEXT('Subsystem Name') 1700 A QIO 7 0 TEXT('Auxiliary I/O') 1800 A QDBIO 7 0 TEXT('Database I/O') 1900 A QSTOR 7 0 TEXT('Temporary Storage') 2000 A K KEYFLD1 DESCEND 2100 A K KEYFLD2 DESCEND * * * * E N D O F S O U R C E * * * *
203
SOURCE FILE . . . . . . . WRKDASD/QDDSSRC MEMBER . . . . . . . . . WRKDASD SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 A***************************************************************** 200 A* * 300 A* This is the display file used by the WRKDASD program * 400 A* * 500 A* * 600 A***************************************************************** 700 A* 800 A* Command Key Definition 900 A* 1000 A CF03(03 'End of Program') 1100 A CF05(05 'Refresh') 1200 A CF06(06 'Sort by DB I/O') 1300 A CF07(07 'Sort by Temp Stor') 1400 A CF08(08 'Sort by Aux I/O') 1500 A CF12(12 'Cancel') 1600 A* 1700 A* Heading Screen 1800 A* 1900 A R HEADING OVERLAY 2000 A 1 33'Work with DASD' 2100 A DSPATR(HI) 2200 A 3 2'Type options, press Enter.' 2300 A COLOR(BLU) 2400 A 4 4'5=Work with Open Files 6=Work wi2500 A th Spool Files 7=Work with Job Lo2600 A cks' 2700 A COLOR(BLU) 2800 A 6 57'Aux I/O DB I/O Temp' 2900 A COLOR(WHT) 3000 A 7 2'Opt Job User Number P3100 A rogram Subsystem Request Reques3200 A t Storage' 3300 A COLOR(WHT) 3400 A* 3500 A* 3600 A* Subfile Detail Screen 3700 A* 3800 A R SUBFILE SFL 3900 A* 4000 A OPT 1 I 8 3VALUES(' ' '5' '6' '7') 4100 A QJOB 10 O 8 6 4200 A QUSR 10 O 8 17 4300 A QJNUM 6 O 8 28 4400 A QPROG 10 O 8 35 4500 A QSBS 10 O 8 46 4600 A QIO 7 0O 8 57EDTCDE(Z) 4700 A QDBIO 7 0O 8 65EDTCDE(Z) 4800 A QSTOR 7 0O 8 73EDTCDE(Z) 4900 A* 5000 A* 5100 A* Subfile Control Screen 5200 A* 5300 A R CONTROL SFLCTL(SUBFILE) 5400 A* 5500 A 55 SFLDSPCTL 5600 A 50 SFLDSP 5700 A N50 LOCK 5800 A SFLSIZ(12) 5900 A SFLPAG(12) 6000 A ROLLUP(31 'Roll up') 6100 A N60 ROLLDOWN(32 'Roll down') 6200 A 59 SFLEND(*MORE) 6300 A 60 SFLCLR 6400 A OVERLAY PROTECT 6500 A RCDNBR 2 0H SFLRCDNBR(CURSOR) 6600 A*
Figure 164. Source listing for the display file WRKDASD (Part 1 of 2)
204
6700 6800 6900 7000 7100 7200 7300 7400 7500 7600 7700 7800 7900 8000 8100
A A A A A A A A A A A A A A A
91 91 92 92 97 97 98 98
22 2'F3=Exit F5=Refresh F6=Sortby DB I/O F7=Sort by Temp Stor' COLOR(BLU) 23 2'F8=Sort by Aux I/O F12=Cancel' COLOR(BLU) 24 2'*** Retrieving Job Information - Please Wait ***' COLOR(RED) 24 2'*** Retrieving Database I/O information - Please Wait ***' COLOR(RED) 24 2'*** Already at top of list ***' COLOR(RED) 24 2'*** Already at bottom of list ***' COLOR(RED) * * * * E N D O F S O U R C E * * * *
Figure 165. Source listing for the display file WRKDASD (Part 2 of 2)
SOURCE FILE . . . . . . . WRKDASD/QCLSRC MEMBER . . . . . . . . . GETDBIO SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 /*********************************************************************/ 200 /* */ 300 /* This program creates a spool file containing open file */ 400 /* information for the job specified by the input parameters: */ 500 /* */ 600 /* QJOB = Job Name */ 700 /* QUSR = User Name */ 800 /* QJNUM = Job Number */ 900 /* */ 1000 /* It then copies the spool file to the physical file DBIOFILE */ 1100 /* and replaces the existing records. */ 1200 /* */ 1300 /* The spool file is then deleted. */ 1400 /* */ 1500 /*********************************************************************/ 1600 /**/ 1700 PGM PARM(&QJOB &QUSR &QJNUM) 1800 1900 DCL VAR(&QJOB) TYPE(*CHAR) LEN(10) 2000 DCL VAR(&QUSR) TYPE(*CHAR) LEN(10) 2100 DCL VAR(&QJNUM) TYPE(*CHAR) LEN(6) 2200 2300 OVRPRTF FILE(QPDSPJOB) HOLD(*YES) 2400 DSPJOB JOB(&QJNUM/&QUSR/&QJOB) OUTPUT(*PRINT) + 2500 OPTION(*OPNF) 2600 MONMSG MSGID(CPF0000) 2700 2800 CPYSPLF FILE(QPDSPJOB) TOFILE(WRKDASD/DBIOFILE) + 2900 SPLNBR(*LAST) 3000 MONMSG MSGID(CPF0000) 3100 3200 DLTSPLF FILE(QPDSPJOB) SPLNBR(*LAST) 3300 MONMSG MSGID(CPF0000) 3400 DLTOVR FILE(*ALL) 3500 3600 ENDPGM * * * * E N D O F S O U R C E * * * *
205
SOURCE FILE . . . . . . . WRKDASD/QRPGLESRC MEMBER . . . . . . . . . WRKDASD SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 F********************************************************************** 200 F* * 300 F* PROGRAM: Work with DASD * 400 F* * 500 F* LANGUAGE: ILE RPG * 600 F* * 700 F* DESCRIPTION: This program: * 800 F* * 900 F* (1) Retrieves a list of active jobs, using the * 1000 F* QGYOLJOB API, and stores them in a userspace * 1100 F* in the QTEMP library. * 1200 F* (2) Retrieves open file information for each job, * 1300 F* by using the CL program GETDBIO, and stores * 1400 F* it in the database file DBIOFILE. * 1500 F* (3) Extracts the relevant information and stores * 1600 F* it in an indexed physical file called DATAFILE. * 1700 F* (4) Displays or prints the extracted information. * 1800 F* * 1900 F* * 2000 F* The parameters passed to the program are: * 2100 F* * 2200 F* OUTPUT (* = Screen, or *PRINT = Listing) * 2300 F* SUBSYS (*ALL = All Subsysts Selected, or Name) * 2400 F* * 2500 F* * 2600 F* APIS USED: QGYOLJOB - Gets the active jobs on the system * 2700 F* QUSROBJD - Checks if the user space exists * 2800 F* QUSCRTUS - Creates a user space * 2900 F* QGYGETLE - Retrieves a records from the user space * 3000 F* * 3100 F* * 3200 F********************************************************************** 3300 F********************************************************************** 3400 F* 3500 F* 3600 FWRKDASD CF E WORKSTN SFILE(SUBFILE:RECNO) USROPN 3700 FDATAFILE UF A E K DISK USROPN 3800 FHOLDFILE IF E K DISK USROPN 3900 FDBIOFILE IF E K DISK USROPN 4000 FQSYSPRT O F 132 PRINTER OFLIND(*INOF) 4100 F* 4200 D* 4300 DQCMDEXC PR EXTPGM('QCMDEXC') 4400 D CMD 200A OPTIONS(*VARSIZE) CONST 4500 D CMD 15P 5 CONST 4600 D* 4700 DCOMMAND S 80A DIM(2) PERRCD(1) CTDATA 4800 D* 4900 D***************************************************************** 5000 D* 5100 D* Record structore for OLJB0200 format (Receiver Variable) 5200 D* 5300 D***************************************************************** 5400 D* 5500 DOLJB0200 DS 5600 D* 5700 D QJOB 1 10 5800 D* JOB NAME USED 5900 D QUSR 11 20 6000 D* USER NAME USED 6100 D QJNUM 21 26 6200 D* JOB NUMBER USED 6300 D QIJID 27 42 6400 D* INTERNAL JOB IDENTIFIER 6500 D QSTAT 43 52 6600 D* STATUS 6700 D QJTYPE 53 53 6800 D* JOB TYPE 6900 D QJSUB 54 54 7000 D* JOB SUBTYPE
Figure 167. Source listing for the RPG program WRKDASD (Part 1 of 11)
206
7100 7200 7300 7400 7500 7600 7700 7800 7900 8000 8100 8200 xxxxxD* 8300 8400 8500 8600 8700 8800 8900 9000 9100 9200 9300 9400 9500 9600 9700 9800 9900 10000 10100 10200 10300 10400 10500 10600 10700 10800 10900 11000 11100 11200 11300 11400 11500 11600 11700 11800 11900 12000 12100 12200 12300 12400 12500 12600 12700 12800 12900 13000 13100 13200 13300 13400 13500 13600 13700 13800 13900 14000 14100 14200 14300 14400
D QRES1 55 56 D QJSTAT 57 57 D QRES2 58 60 D QPROG 61 70 D QDATA2 73 73 D QAUXIO 77 80B 0 D QSBSD 81 100 D QTMPST 101 104B 0 D* D***************************************************************** D* Record structure for sort information format D* D***************************************************************** D* DSORT DS D* D KFNUM 1 4B 0 INZ(1) D KFSTAR 5 8B 0 INZ(24) D KFLEN 9 12B 0 INZ(4) D KFTYPE 13 14B 0 INZ(9) D KFORD 15 15 INZ('2') D KFRESV 16 16 INZ(X'00') D* D* D***************************************************************** D* D* RECORD STRUCTURE FOR JOB SELECTION INFORMATION FORMAT D* D***************************************************************** D* DOLJS0100 DS D* D JNAME 1 10 INZ('*ALL ') D UNAME 11 20 INZ('*ALL ') D JNUM 21 26 INZ('*ALL ') D JTYPE 27 27 INZ('*') D JRES 28 28 INZ(X'00') D JPOFF 29 32B 0 INZ(60) D JPNUM 33 36B 0 INZ(1) D JAOFF 37 40B 0 INZ(70) D JANUM 41 44B 0 INZ(0) D JQOFF 45 48B 0 INZ(74) D JQNUM 49 52B 0 INZ(0) D JQNOFF 53 56B 0 INZ(84) D JQNNUM 57 60B 0 INZ(0) D JPJS 61 70 INZ('*ACTIVE ') D JAJS 71 74 INZ('RUN ') D JJQS 75 84 D JJQN 85 104 D* D* D***************************************************************** D* D* RECORD STRUCTURE FOR RECEIVER VARIABLE DEFINITION FORMAT D* D***************************************************************** D* DVARDEF DS D* D VNUM 1 4B 0 D V1FLEN 5 8B 0 D V1KEY 9 12B 0 D V1TYPE 13 13 D V1RES 14 16 D V1DLEN 17 20B 0 D V1DISP 21 24B 0 D V2FLEN 25 28B 0 D V2KEY 29 32B 0 D V2TYPE 33 33 D V2RES 34 36 D V2DLEN 37 40B 0 D V2DISP 41 44B 0 D V3FLEN 45 48B 0
Figure 168. Source listing for the RPG program WRKDASD (Part 2 of 11)
207
14500 14600 14700 14800 14900 15000 15100 15200 15300 15400 15500 15600 15700 15800 15900 16000 16100 16200 16300 16400 16500 16600 16700 16800 16900 17000 17100 17200 17300 17400 17500 17600 17700 17800 17900 18000 18100 18200 18300 18400 18500 18600 18700 18800 18900 19000 19100 19200 19300 19400 19500 19600 19700 19800 19900 20000 20100 20200 20300 20400 20500 20600 20700 20800 20900 21000 21100 21200 21300 21400 21500 21600 21700 21800
D V3KEY 49 52B 0 D V3TYPE 53 53 D V3RES 54 56 D V3DLEN 57 60B 0 D V3DISP 61 64B 0 D V4FLEN 65 68B 0 D V4KEY 69 72B 0 D V4TYPE 73 73 D V4RES 74 76 D V4DLEN 77 80B 0 D V4DISP 81 84B 0 D V5FLEN 85 88B 0 D V5KEY 89 92B 0 D V5TYPE 93 93 D V5RES 94 96 D V5DLEN 97 100B 0 D V5DISP 101 104B 0 D* D* D***************************************************************** D* D* Record structure for error code format D* D***************************************************************** D* DQUSBN DS D* D QUSBNB 1 4B 0 INZ(100) D QUSBNC 5 8B 0 D QUSBND 9 15 D QUSBNF 16 16 D QUSBNG 17 100 D* D* D***************************************************************** D* D* Record structure for keys format D* D***************************************************************** D* DKEYS DS D* D KEY1 1 4B 0 INZ(0601) D KEY2 5 8B 0 INZ(0602) D KEY3 9 12B 0 INZ(1401) D KEY4 13 16B 0 INZ(1906) D KEY5 17 20B 0 INZ(2009) D* D* D***************************************************************** D* D* Record structure for List Information format D* D***************************************************************** D* DLSTINF DS D* D LTOTAL 1 4B 0 D LRETND 5 8B 0 D LRHAND 9 12 D LRLEN 13 16B 0 D LCOMP 17 17 D LDATE 18 30 D LSTAT 31 31 D LRES1 32 32 D LILEN 33 36B 0 D LFIRST 37 40B 0 D LRES2 41 80 D* D***************************************************************** D* D* Stand-Alone Field Definitions D* D*****************************************************************
Figure 169. Source listing for the RPG program WRKDASD (Part 3 of 11)
208
21900 22000 22100 22200 22300 22400 22500 22600 22700 22800 22900 23000 23100 23200 23300 23400 23500 23600 23700 23800 23900 24000 24100 24200 24300 24400 24500 24600 24700 24800 24900 25000 25100 25200 25300 25400 25500 25600 25700 25800 25900 26000 26100 26200 26300 26400 26500 26600 26700 26800 26900 27000 27100 27200 27300 27400 27500 27600 27700 27800 27900 28000 28100 28200 28300 28400 28500 28600 28700 28800 28900 29000 29100 29200 29300 29400 29500
D* D DS DAPINAM 1 10 DEXTATR 31 40 INZ('QSYSLOBJP ') DRJOBDF 68 75 INZ('OBJD0100') DSPCAUT 76 85 INZ('*ALL ') DSPCDMN 86 95 INZ('*USER ') DSPCINT 96 96 INZ(X'00') DSPCNAM 97 116 INZ('ACTJOB QTEMP ') DSPCREP 117 126 INZ('*YES ') DSPCTXT 127 176 DSPCTYP 177 186 INZ('*USRSPC ') DRCVLEN 197 200B 0 INZ(8) DSPCSIZ 205 208B 0 INZ(2000) D* D DS DRECLEN 1 4B 0 INZ(104) DNUMREC 5 8B 0 INZ(-1) DSELSIZ 9 12B 0 INZ(104) DNUMFLD 13 16B 0 INZ(5) DVARLEN 17 20B 0 INZ(104) D* D DS DGETNUM 1 4B 0 INZ(1) DGETSTA 5 8B 0 INZ(1) D* DRCVVAR DS 2000 D* D* D* C***************************************************************** C* C* START OF MAINLINE C* C *ENTRY PLIST C PARM OUTPUT 6 C PARM SUBSYS 10 C* C SAVEKEY KLIST C KFLD SAVEKEY1 7 0 C KFLD SAVEKEY2 7 0 C* C EXSR INIT C OUTPUT CASEQ '*' PROC_SCREEN C OUTPUT CASEQ '*PRINT' PROC_PRINT C ENDCS C EXSR DONE C* C***************************************************************** C* C* START OF SUBROUTINES C* C***************************************************************** C* C* C* This subroutine does all the necessary initialization for C* the program C* C* C INIT BEGSR C* C TIME CLOCK 6 0 C* C* Screen Output C OUTPUT IFEQ '*' C Z-ADD 1 RCDNBR C *IN05 IFEQ '0' C OPEN WRKDASD C MOVE 'AUXIO' MODE 5 C ENDIF C WRITE HEADING C* Show Job Message C EVAL *IN55='1' C EVAL *IN91='1' C WRITE CONTROL C EVAL *IN55='0' C EVAL *IN91='0'
Figure 170. Source listing for the RPG program WRKDASD (Part 4 of 11)
209
29600 29700 29800 29900 30000 30100 30200 30300 30400 30500 30600 30700 30800 30900 31000 31100 31200 31300 31400 31500 31600 31700 31800 31900 32000 32100 32200 32300 32400 32500 32600 32700 32800 32900 33000 33100 33200 33300 33400 33500 33600 33700 33800 33900 34000 34100 34200 34300 34400 34500 34600 34700 34800 34900 35000 35100 35200 35300 35400 35500 35600 35700 35800 35900 36000 36100 36200 36300 36400 36500 36600 36700 36800 36900
C* C C C C C C* C* C* C C C C C C C C* C C C C C C C C C C C C C* C C C C C C C C C C* C* C* C C C C C C C C C C C C C C C* C C C C C* C* C C C* C* C C C C C C C
Printer Output ELSE EVAL EVAL EXCEPT ENDIF *IN20='0' *IN21='1' PRINTH Check if User Space Exists CALL PARM PARM PARM PARM PARM PARM QUSBNC QUSBND IFGT IFEQ CALL PARM PARM PARM PARM PARM PARM PARM PARM PARM IFGT MOVEL EXSR ENDIF ELSE MOVEL EXSR ENDIF ENDIF 'QUSROBJD' RCVVAR RCVLEN RJOBDF SPCNAM SPCTYP QUSBN Create User Space 0 'CPF9801' 'QUSCRTUS' SPCNAM EXTATR SPCSIZ SPCINT SPCAUT SPCTXT SPCREP QUSBN SPCDMN 0 'QUSCRTUS' APIERR 'QUSROBJD' APIERR APINAM
QUSBNC
APINAM
Get active job information and put in user space CALL PARM PARM PARM PARM PARM PARM PARM PARM PARM PARM PARM PARM PARM QUSBNC IFGT MOVEL EXSR ENDIF MOVE CALLP OUTPUT IFEQ EVAL EVAL WRITE EVAL EVAL ENDIF 'QGYOLJOB' 'OLJB0200' OLJB0200 RECLEN FORMAT VARDEF VARLEN LSTINF NUMREC SORT OLJS0100 SELSIZ NUMFLD KEYS QUSBN APINAM Clear Database File COMMAND(1) STRING 80 QCMDEXC (STRING:%SIZE(STRING)) Show DB I/O Message '*' *IN55='1' *IN92='1' CONTROL *IN55='0' *IN92='0' 8
0 'QSYLOBJP' APIERR
Figure 171. Source listing for the RPG program WRKDASD (Part 5 of 11)
210
37000 37100 37200 37300 37400 37500 37600 37700 37800 37900 38000 38100 38200 38300 38400 38500 38600 38700 38800 38900 39000 39100 39200 39300 39400 39500 39600 39700 39800 39900 40000 40100 40200 40300 40400 40500 40600 40700 40800 40900 41000 41100 41200 41300 41400 41500 41600 41700 41800 41900 xx41900 xx41900 x 42000 42100 42200 42300 42400 42500 42600 42700 42800 42900 43000 43100 43200 43300 43400 43500 43600 43700 43800 43900 44000 44100 44200 44300 44400
C* C* Retrieve each active C* job and process C OPEN DATAFILE C Z-ADD 0 GETSTA C GETSTA DOUEQ LTOTAL C ADD 1 GETSTA C* Get the next record C* from the list C CALL 'QGYGTLE' C PARM OLJB0200 C PARM RECLEN C PARM LRHAND C PARM LSTINF C PARM GETNUM C PARM GETSTA C PARM QUSBN C* C QUSBNC IFGT 0 C MOVEL 'QGYGTLE' APINAM C EXSR APIERR C ENDIF C* C* Check which records C* to select C MOVEL QSBSD QSBS C EVAL *IN77='0' C SUBSYS CABEQ '*ALL' SKIP 77 C SUBSYS CABEQ QSBS SKIP 77 C SKIP TAG C* C* Get Database file C* names and I/O counts C* and update DATA file C *IN77 IFEQ '1' C Z-ADD QAUXIO QIO C Z-ADD QTMPST QSTOR C EXSR GETDBIO C Z-ADD QIO KEYFLD1 C Z-ADD QDBIO KEYFLD2 C WRITE DATAF C ENDIF C ENDDO C* C ENDSR C* C* C***************************************************************** C* C* This subroutine gets Database File I/O information C* Replace the code in this subroutime with new API C* when it becomes available C* C* C GETDBIO BEGSR C* C Z-ADD 0 QDBIO C* C CALL 'GETDBIO' C PARM QJOB C PARM QUSR C PARM QJNUM C* C OPEN DBIOFILE C READ DBIOFILE C DOW %EOF=*OFF C DBTYPE IFEQ 'PHY' C MOVE DBIO DBIO# 7 0 C ADD DBIO# QDBIO C ENDIF C READ DBIOFILE C ENDDO C* C CLOSE DBIOFILE C ENDSR C* C*
Figure 172. Source listing for the RPG program WRKDASD (Part 6 of 11)
211
44500 44600 44700 44800 44900 45000 45100 45200 45300 45400 45500 45600 45700 45800 45900 46000 46100 46200 46300 46400 46500 46600 46700 46800 46900 47000 47100 47200 47300 47400 47500 47600 47700 47800 47900 48000 48100 48200 48300 48400 48500 48600 48700 48800 48900 49000 49100 49200 49300 49400 49500 49600 49700 49800 49900 50000 50100 50200 50300 50400 50500 50600 50700 50800 50900 51000 51100 51200 51300 51400 51500 51600 51700 51800 51900
C***************************************************************** C* C* This subroutine processes Screen output C* C* C PROC_SCREEN BEGSR C* C Z-ADD 9999999 SAVEKEY1 C Z-ADD 9999999 SAVEKEY2 C SAVEKEY SETLL DATAFILE C* Read next 12 records C EXSR READ12 C* C *INLR DOUEQ '1' C* C* Display Screen C EVAL *IN50='1' C EVAL *IN55='1' C EXFMT CONTROL C EVAL *IN50='0' C EVAL *IN55='0' C EVAL *IN88='0' C EVAL *IN98='0' C* Exit(F3 or F12) C *IN03 IFEQ '1' C *IN12 OREQ '1' C EVAL *INLR='1' C ENDIF C* Refresh Datafile C *IN05 IFEQ '1' C EXSR REFRESH C ENDIF C* Sort Datafile C *IN06 IFEQ '1' C *IN07 OREQ '1' C *IN08 OREQ '1' C EXSR SORTDATA C EVAL *IN97='0' C ENDIF C* Option Selected C *INLR IFEQ '0' C *IN05 ANDEQ '0' C *IN06 ANDEQ '0' C *IN07 ANDEQ '0' C *IN08 ANDEQ '0' C EXSR OPTION C *IN88 IFEQ '0' C EVAL *IN97='0' C ENDIF C ENDIF C* C* Roll Down C *IN31 IFEQ '1' C EVAL *IN97='0' C *IN59 IFEQ '1' C EVAL *IN98='1' C ELSE C* Clear Subfile C EVAL *IN60='1' C WRITE CONTROL C EVAL *IN60='0' C* Read next 12 records C EXSR READ12 C ENDIF C ENDIF C* Roll Up C *IN32 IFEQ '1' C *IN97 ANDEQ '0' C* C Z-ADD KEYFLD1 SAVEKEY1 C Z-ADD KEYFLD2 SAVEKEY2 C* Read previous 12 recs C 1 DO SCREEN# C READP DATAFILE 97 C ENDDO
Figure 173. Source listing for the RPG program WRKDASD (Part 7 of 11)
212
52000 52100 52200 52300 52400 52500 52600 52700 52800 52900 53000 53100 53200 53300 53400 53500 53600 53700 53800 53900 54000 54100 54200 54300 54400 54500 54600 54700 54800 54900 55000 55100 55200 55300 55400 55500 55600 55700 55800 55900 56000 56100 56200 56300 56400 56500 56600 56700 56800 56900 57000 57100 57200 57300 57400 57500 57600 57700 57800 57900 58000 58100 58200 58300 58400 58500 58600 58700 58800 58900 59000 59100 59200 59300 59400 59500
*IN97 IFEQ '1' C SAVEKEY SETGT DATAFILE C ELSE C* Clear Subfile C EVAL *IN60='1' C WRITE CONTROL C EVAL *IN60='0' C 1 DO 12 C* Read previous 12 recs C READP DATAFILE 79 C ENDDO C *IN79 IFEQ '1' C Z-ADD 9999999 SAVEKEY1 C Z-ADD 9999999 SAVEKEY2 C SAVEKEY SETGT DATAFILE C ENDIF C* Read next 12 records C EXSR READ12 C ENDIF C ENDIF C* No option selected C *IN88 IFEQ '1' C *IN05 ANDEQ '0' C *IN31 ANDEQ '0' C *IN32 ANDEQ '0' C EVAL *INLR='1' C ENDIF C* C ENDDO C* C ENDSR C* C* C* C* C***************************************************************** C* C* This subroutine reads the next 12 records from DATAFILE C* C* C READ12 BEGSR C* C EVAL *IN59='0' C Z-ADD 12 SCREEN# 5 0 C* C 1 DO 12 RECNO 5 0 C READ DATAFILE 59 C *IN59 IFEQ '0' C WRITE SUBFILE C Z-ADD RECNO SCREEN# C Z-ADD KEYFLD1 SAVEKEY1 C Z-ADD KEYFLD2 SAVEKEY2 C ENDIF C ENDDO C* C *IN59 IFEQ '1' C SAVEKEY SETLL DATAFILE C ENDIF C* C ENDSR C* C* C***************************************************************** C* C* This subroutine processes all entries until they are complete C* C* C PROC_PRINT BEGSR C* C 9999999 SETLL DATAFILE C* C *IN59 DOUEQ '1' C READ DATAFILE 59 C OF EXCEPT PRINTH C EXCEPT PRINTL C ENDDO
Figure 174. Source listing for the RPG program WRKDASD (Part 8 of 11)
213
59600 59700 59800 59900 60000 60100 60200 60300 60400 60500 60600 60700 60800 60900 61000 61100 61200 61300 61400 61500 61600 61700 61800 61900 62000 62100 62200 62300 62400 62500 62600 62700 62800 62900 63000 63100 63200 63300 63400 63500 63600 63700 63800 63900 64000 64100 64200 64300 64400 64500 64600 64700 64800 64900 65000 65100 65200 65300 65400 65500 65600 65700 65800 65900 66000 66100 66200 66300 66400
C* C ENDSR C* C* C***************************************************************** C* C OPTION BEGSR C* C* This subroutine checks if an Option has been selected C* C* C READC SUBFILE 88 C DOW %EOF=*OFF C* C MOVE *BLANKS STRING C 'WRKJOB JOB(' CAT QJNUM STRING C STRING CAT '/':0 STRING C STRING CAT QUSR:0 STRING C STRING CAT '/':0 STRING C STRING CAT QJOB:0 STRING C STRING CAT ') OPTION(':0 STRING C* C SELECT C WHEN OPT='5' C STRING CAT '*OPNF)':0 STRING C WHEN OPT='6' C STRING CAT '*SPLF)':0 STRING C WHEN OPT='7' C STRING CAT '*JOBLCK)':0 STRING C ENDSL C* C CALLP QCMDEXC (STRING:%SIZE(STRING)) C* C MOVE *BLANK OPT C UPDATE SUBFILE C WRITE HEADING C* C READC SUBFILE C ENDDO C* C ENDSR C* C* C***************************************************************** C* C SORTDATA BEGSR C* C* This subroutine sorts the Datafile in a different order C* C* C* Copy DATFILE to C* HOLDFILE C* C CLOSE DATAFILE C MOVE COMMAND(2) STRING C CALLP QCMDEXC (STRING:%SIZE(STRING)) C* C* Clear DATAFILE C* C MOVE COMMAND(1) STRING C CALLP QCMDEXC (STRING:%SIZE(STRING)) C* C* C OPEN DATAFILE C OPEN HOLDFILE C READ HOLDFILE 44 C *IN44 DOUEQ '1' C* C SELECT
Figure 175. Source listing for the RPG program WRKDASD (Part 9 of 11)
214
66500 66600 66700 66800 66900 67000 67100 67200 67300 67400 67500 67600 67700 67800 67900 68000 68100 68200 68300 68400 68500 68600 68700 68800 68900 69000 69100 69200 69300 69400 69500 69600 69700 69800 69900 70000 70100 70200 70300 70400 70500 70600 70700 70800 70900 71000 71100 71200 71300 71400 71500 71600 71700 71800 71900 72000 72100 72200 72300 72400 72500 72600 72700 72800 72900 73000 73100 73200 73300 73400 73500 73600 73700 73800 73900
C WHEN *IN06='1' C Z-ADD QDBIO KEYFLD1 C Z-ADD QIO KEYFLD2 C MOVE 'DBIO ' MODE C WHEN *IN07='1' C Z-ADD QSTOR KEYFLD1 C Z-ADD QIO KEYFLD2 C MOVE 'TSTOR' MODE C WHEN *IN08='1' C Z-ADD QIO KEYFLD1 C Z-ADD QDBIO KEYFLD2 C MOVE 'AUXIO' MODE C ENDSL C* C WRITE DATAF C READ HOLDFILE 44 C ENDDO C* C CLOSE HOLDFILE C* Clear Subfile C EVAL *IN60='1' C WRITE CONTROL C EVAL *IN60='0' C* Read first 12 records C* C Z-ADD 9999999 SAVEKEY1 C Z-ADD 9999999 SAVEKEY2 C SAVEKEY SETLL DATAFILE C EXSR READ12 C* C ENDSR C* C* C***************************************************************** C* C REFRESH BEGSR C* C* This subroutine clears current information and re-gathers it C* C* C CLOSE DATAFILE C EXSR INIT C* C SELECT C WHEN MODE='DBIO ' C EVAL *IN06='1' C WHEN MODE='TSTOR' C EVAL *IN07='1' C WHEN MODE='AUXIO' C EVAL *IN08='1' C ENDSL C* C ENDSR C* C* C***************************************************************** C* C DONE BEGSR C* C* This subroutine performs end of job processing C* C* C OUTPUT IFEQ '*PRINT' C EXCEPT ENDLST C ENDIF C EVAL *INLR='1' C* C ENDSR C* C* C***************************************************************** C* C APIERR BEGSR C* C* This subroutine prints error messages
Figure 176. Source listing for the RPG program WRKDASD (Part 10 of 11)
215
74000 C* 74100 C* 74200 C APINAM DSPLY 74300 C QUSBND DSPLY 74400 C EXSR DONE 74500 C* 74600 C ENDSR 74700 C* 74800 OQSYSPRT E PRINTH 1 02 74900 O 58 'Work with DASD' 75000 O 109 'Date' 75100 O UDATE Y 118 75200 O 123 'Time' 75300 O CLOCK 132 ' : : ' 75400 O E PRINTH 2 75500 O 123 'Page' 75600 O PAGE Z 132 75700 O E PRINTH 1 75800 O 69 'Aux I/O' 75900 O 83 'DB I/O' 76000 O 101 'Temporary' 76100 O E PRINTH 2 76200 O 8 'Job Name' 76300 O 21 'User Name' 76400 O 33 'Job Number' 76500 O 42 'Program' 76600 O 57 'Subsystem' 76700 O 70 'Requests' 76800 O 85 'Requests' 76900 O 100 'Storage' 77000 O E PRINTL 1 77100 O QJOB 10 77200 O QUSR 22 77300 O QJNUM 31 77400 O QPROG 45 77500 O QSBS 58 77600 O QIO J 70 77700 O QDBIO J 85 77800 O QSTOR J 101 77900 O E ENDLST 2 2 78000 O 132 '*** End of Listing ***' 78100 O* 78200 O* 78300 **CTDATA COMMAND 78400 CLRPFM FILE(WRKDASD/DATAFILE) 78500 CPYF FROMFILE(WRKDASD/DATAFILE) TOFILE(WRKDASD/HOLDFILE) MBROPT(*REPLACE) * * * * E N D O F S O U R C E * * * * Figure 177. Source listing for the RPG program WRKDASD (Part 11 of 11)
SOURCE FILE . . . . . . . WRKDASD/QCMDSRC MEMBER . . . . . . . . . WRKDASD SEQNBR*...+... 1 ...+... 2 ...+... 3 ...+... 4 ...+... 5 ...+... 6 ...+... 7 ...+... 8 ...+... 9 ...+... 0 100 CMD PROMPT('Work with DASD') 200 PARM KWD(OUTPUT) TYPE(*CHAR) LEN(6) RSTD(*YES) + 300 DFT(*) VALUES(* *PRINT) MIN(0) + 400 PROMPT('Output' 1) 500 PARM KWD(SUBSYS) TYPE(*NAME) DFT(*ALL) + 600 SPCVAL((*ALL)) MIN(0) PROMPT('Subsystem + 700 Name') * * * * E N D O F S O U R C E * * * *
216
Select Additional materials, and open the directory that corresponds with the redbook form number.
217
218
219
This document contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples contain the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. Reference to PTF numbers that have not been released through the normal distribution process does not imply general availability. The purpose of including these reference numbers is to alert IBM customers to specific information relative to the implementation of the PTF when it becomes available to each customer according to the normal IBM PTF distribution process. The following terms are trademarks of the International Business Machines Corporation in the United States and/or other countries: AFP AS/400 CT
IBM
Information Warehouse
NetView OfficeVision/400
AIX AT DB2 ImagePlus Netfinity OfficeVision OS/400 S/390 StorWatch System/38 Versatile Storage Server 3090 400
The following terms are trademarks of other companies: Tivoli, Manage. Anything. Anywhere.,The Power To Manage., Anything. Anywhere.,TME, NetView, Cross-Site, Tivoli Ready, Tivoli Certified, Planet Tivoli, and Tivoli Enterprise are trademarks or registered trademarks of Tivoli Systems Inc., an IBM company, in the United States, other countries, or both. In Denmark, Tivoli is a trademark licensed from Kjbenhavns Sommer - Tivoli A/S. C-bus is a trademark of Corollary, Inc. in the United States and/or other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. PC Direct is a trademark of Ziff Communications Company in the United States and/or other countries and is used by IBM Corporation under license. ActionMedia, LANDesk, MMX, Pentium and ProShare are trademarks of Intel Corporation in the United States and/or other countries.
220
UNIX is a registered trademark in the United States and other countries licensed exclusively through The Open Group. SET and the SET logo are trademarks owned by SET Secure Electronic Transaction LLC. Other company, product, and service names may be trademarks or service marks of others.
221
222
AS/400 System Builder, SG24-2155 The System Administrators Companion to AS/400 Availability and Recovery, SG24-2161 IBM Versatile Storage Server, SG24-2221 DB2/400 Advanced Database Functions, SG24-4249 Using Tivoli Storage Management to Back Up Databases , SG24-4335 Complementing AS/400 Storage Management Using Hierarchical Storage Management APIs, SG24-4450 Using ADSM to Back Up Lotus Domino, SG24-4534 Using ADSM Hierarchical Storage Management , SG24-4631 A Practical Approach to Managing Backup Recovery and Media Services for OS/400, SG24-4840 DB2/400: Mastering Data Warehousing Functions, SG24-5184 AS/400 Consolidation Strategies and Implementation, SG24-5186 AS/400 Remote Journal Function for High Availability and Data Replication, SG24-5189 AS/400 Client Access Express for Windows: Implementing V4R4M0 , SG24-5191
The AS/400 NetServer Advantage, SG24-5196
SAP Business Information Warehouse on the AS/400 System, SG24-5200 Management Central: A Smart Way to Manage AS/400 Systems, SG24-5407 Slicing the AS/400 with Logical Partitioning: A How to Guide, SG24-5439 Introduction to Storage Area Network, SAN, SG24-5470 The following publications are available in soft copy only from the redbooks Web site: http://www.redbooks.ibm.com/ Implementing IBM SAA ImagePlus WAF/400 File Cabinet and Optical Libraries, GG24-4188 IBM SAA ImagePlus Workfolder Application Facility/400 and Remote 3995 Library, GG24-4413 AS/400 Performance Explorer Tips and Techniques , SG24-4781 Data Warehousing Solutions on the AS/400 , SG24-4872
223
System/390 Redbooks Collection Networking and Systems Management Redbooks Collection Transaction Processing and Data Management Redbooks Collection Lotus Redbooks Collection Tivoli Redbooks Collection AS/400 Redbooks Collection Netfinity Hardware and Software Redbooks Collection RS/6000 Redbooks Collection (BkMgr Format) RS/6000 Redbooks Collection (PDF Format) Application Development Redbooks Collection IBM Enterprise Storage and Systems Management Solutions
940x 170, 6xx, 7xx, and Sxx System Installation and Upgrade, SY44-5950 Problem Analysis Guide, SY44-5955 The following publications are available in soft copy only by visiting the Web site at: http://publib.boulder.ibm.com/pubs/html/as400/online/homeeng1.htm
AS/400 Performance Capabilities Reference V4R4, SC41-0607
224
LPAR information: http://www.as400.ibm.com/lpar/ Information on clustering: http://www.as400.ibm.com/ha/sec2.htm http://www.as400.ibm.com/ha/sec23.htm http://www.as400.ibm.com/ha/sec24.htm IBM storage home page: http://www.storage.ibm.com Information on Storage Area Network (SAN):
http://www.storage.ibm.com/ibmsan/index.htm
The Storage Area Networks: Putting Data to Work for e-businesses white paper: http://www.storage.ibm.com/ibmsan/whitepaper/strategy.htm The Disk Arm Requirements and Version Performance Considerations white papers: http://www.ibm.com.as400/developer/performance Site Preparation and Physical Planning at the AS/400 Technical Studio site at:
http://www.as400.ibm.com/tstudio/planning/plngstrt.htm
225
226
Fax Orders United States (toll free) Canada Outside North America 1-800-445-9269 1-403-267-4455 Fax phone number is in the How to Order section at this site: http://www.elink.ibmlink.ibm.com/pbl/pbl
This information was current at the time of publication, but is continually subject to change. The latest information may be found at the Redbooks Web site.
IBM Intranet for Employees
IBM employees may register for information on workshops, residencies, and Redbooks by accessing the IBM Intranet Web site at http://w3.itso.ibm.com/ and clicking the ITSO Mailing List button. Look in the Materials repository for workshops, presentations, papers, and Web pages developed and written by the ITSO technical professionals; click the Additional Materials button. Employees may access MyNews at http://w3.ibm.com/ for redbook, residency, and workshop announcements.
227
First name
Last name
Company
Address
City
Card issued to
Signature
We accept American Express, Diners, Eurocard, Master Card, and Visa. Payment by credit card not available in all countries. Signature mandatory for credit card payment.
228
Index Symbols
#2748 disk controller 57 #2748 PCI RAID 62 #4331 feature code 62 #5065 Storage/PCI Expansion Tower 62, 199 #508x Storage Expansion Tower 199 #6831 feature code 62 *CRITMSG 125 *ENDSYS 125 *MSG 125 *PWRDWNSYS 125 *REGFAC 125 *USAGE 105 CHGPF (Change Physical File) command 88 CISC (Complex Instruction Set Computing) 3 Client Access Express 94 Cluster Resource Services 46 cluster technology 46 clustering 46 Complex Instruction Set Computing (CISC) 3 concurrent maintenance 33 configuration rules 36 continuous-availability environments 49 continuous-operation environments 49 control panel interface 4 controlled growth 121 cylinder 187
Numerics
2105 Versatile Storage Server (VSS) 25 4331 feature code 63 520 byte format 189 522 byte format 189 6831 feature code 63 7133 Serial Disk Subsystem 25 9337 DASD 195 9337 Dynamic RAID Spare function 196
D
DASD (direct access storage device) 19 DASD cylinders 187 DASD I/O cabling 171 DASD maintenance 121 DASD management strategy 121 DASD sector format 189 DASD subsystem 179 DASD terminology 186 DASD tracks 187 data bus 172 data compression 38 data management 23 data replication 45 Data Resiliency 46 Database and File Systems category (Information Center) 23 DataMirror 46 DB2 Universal Database (UDB) 23 device controllers 171 Device Exerciser Plus (DEXPLUS) 64 Device Function Controller Interface (DFCI) 174, 184 Device Parity Protection (DPY) 29 Device Parity Protection (RAID-5 or DPY) 31 DEXPLUS (Device Exerciser Plus) 64 DFCI (Device Function Controller Interface) 174, 184 Digital Versatile Disk-Random Access Memory (DVD-RAM) 53 Digital VideoDisc (DVD) 24 direct access 19 direct access storage device (DASD) 19 direct select address (DSA) 10, 11 disaster tolerance environments 49 disk balance capacity 101 HSM 103 usage 101 Disk Balance (DSKBAL) 87, 109 disk balance tool 100 disk compression 33 disk consumption 123 disk information
A
actuators 186 address 193 addressable storage units 186 addressing 10 addressing, physical and logical 10 arm 187 AS/400 IOP/IOA 171 ASP (Auxiliary Storage Pool) 39, 122, 193 ASP 1 43 Auxiliary Storage Lower Limit 125 Auxiliary Storage Pool (ASP) 39, 122, 193 auxiliary storage threshold 124 availability options 26
B
Backup Recovery Media Services/400 (BRMS/400) 49 base availability 48 Basic Assurance Tests (BATs) 4 BATS (Basic Assurance Tests) 4 BRMS/400 (Backup Recovery Media Services/400 49 bus 171
C
cable length 184 cache 19 capacity balancing 101, 109 CD-ROM 53 Change Physical File (CHGPF) command 88 checksum protection 29
229
PRTDSKINF 142 RTVDSKINF 142 disk subsystem 179 Display Disk Configuration screen 36 Display File Description (DSPFD) command 88 DPY (Device Parity Protection) 29, 31 DSA (direct select address) 10, 11 DSKBAL (Disk Balance) 87, 109 DSPFD (Display File Description) command 88 DVD (Digital VideoDisc) 24 DVD-RAM (Digital Versatile Disk-Random Access Memory) 53 Dynamic RAID Spare function 196
I
I/O bus 172 IBM Performance Tools 145 identifying large objects 88 IFS (Integrated File System) 108 IMPI architecture 8 Integrated File System 24, 73, 81 Integrated File System (IFS) 108 Integrated Hardware Disk Compression (IHDC) 38 interfaces 172 internal buses 172 internal DASD storage 195
EAC (Extended Adaptive Cache) 20, 57 EAC Simulator 57, 61 EACS Read (EAC Simulator Percent Read Hits) 61 EACS Resp 61 ECS (Electronic Customer Support 180 Electronic Customer Support (ECS) 180 End ASP Balance (ENDASPBAL) command 87 End Disk Reorganization (ENDDSKRGZ) 87, 117 ENDASPBAL (End ASP Balance) command 87 ENDDSKRGZ (End Disk Reorganization) 87, 117 Enhanced Mode 63 Enhanced PEX Trace 159 Enterprise Storage Server (ESS) 26, 197 ESS (Enterprise Storage Server) 26 events during IPL 5 Expert Cache 19, 57 Extended Adaptive Cache (EAC) 20, 21, 57, 62 Extended Adaptive Cache (EAC) Simulator 60 extent 193
J
Journal 88 journal management 44 Journal receiver threshold (THRESHOLD) attribute 88 journaling 44 jumper switch 64
L
Lakeview Technology 46 LIC (Licensed Internal Code) 5 license management 22 Licensed Internal Code (LIC) 5 HLIC 9 PLIC 9 VLIC 9 logical addressing 11 logical bus unit addressing 10 Logical Partition (LPAR) 7 logical partitioning 22 LPAR (Logical Partition) 7 LPAR support 53
F
File Server file system (QFILESVR.400) 81 files generated 167 free space directory 193
M
magnetic storage device controller 180 main storage bus 172 main storage pool 193 Manage receivers (MNGRVC) attribute 89 Management Central 94, 111, 120, 127 Management Central Disk Resource Utilization Monitor 87 management strategy 121 master node 177, 178 MFIOP 180, 181, 182, 183 MFIOP (Multifunction IOP) 180 MINFIXLEN (minimum fixed length) 89 minimum fixed length (MINFIXLEN) 89 mirrored protection 27 mirroring 27 MNGRVC (Manage receivers) attribute 89 Multifunction IOP (MFIOP) 180
H
hardware data compression 34 Hardware Service Manager (HSM) 178 HDA (head disk assembly) 186 HDC (Integrated Hardware Disk Compression) 38 head disk assembly (HDA) 186 Hierarchical Storage Management (HSM) 37 Hierarchical Storage Management (HSM) balancing 103 high availability 45, 48 HLIC (Horizontal Licensed Internal Code) 9 Horizontal Licensed Internal Code (HLIC) 9 hot spare 196 HSM 105 HSM (Hardware Service Manager) 178 HSM (Hierarchical Storage Management) 37 HSM (Hierarchical Storage Management) balancing 103 Hypervisor 7
N
NETSIZE 163
230
Operations Navigator 73, 94, 111, 128 optical library 84 optical storage 84
RTVDSKINF 142 RTVDSKINF (Retrieve Disk Information) command 87, 89 Runaway DASD 122
S P
page (noun) 193 Partitioning LIC (PLIC) 7 PCI (Peripheral Component Interconnect) 172 performance 42 Performance Explorer (PEX) 157 Performance Tool/400 61 Performance Tools 158 Peripheral Component Interconnect (PCI) 172 permanent address 193 permanent directory 193 PEX (Performance Explorer) 157 PLIC (Partitioning LIC) 7 power domain mirroring 27 Print Disk Information (PRTDSKINF) command 89 private bus 172 PRTDSKINF 142 PRTDSKINF (Print Disk Information) command 89 sample code 201 SAN (Storage Area Network) 25 scatter load 40 SCSI (Small Computer System Interface) 174, 184 SCSI 1 175 SCSI 2 175 SCSI Wide 184 sector 193 sector size 189 Segment Group Identifier (SGID) 194 Segment Identifier (SID) 193 service processor 4, 171, 179, 180, 181 SID (Segment Identifier) 193 single address architecture 39 Single Level Storage (SLS) 39, 122 SLS (Single Level Storage) 122 Small Computer System Interface (SCSI) 174, 184 software data compression 34 SPCN 171 SPCN (system power control network) 176 SPCN interfaces 178 SPCN node 177, 178 SPD Systems Products Division 172 Start ASP Balance (STRASPBAL) command 87, 107 Start Disk Reorganization (STRDSKRGZ) command 87, 117 static directory 194 Storage Area Network (SAN) 25 storage concepts 122 storage controller 180 storage units 186 STRASPBAL (Start ASP Balance) command 87, 107 STRDSKRGZ (Start Disk Reorganization) command 87, 117 stream files 109 system architecture 3 system ASP 73, 122 system power control network (SPCN) 176 system processor 171, 179 System Products Division (SPD) 172
QAEZDISK 89, 98 QCURRENT 89 QFILESVR.400 (File Server file system) 81 QSTGLOWLMT 44, 125 QSYSMSG 44 QSYSOPR 44
R
rack SPCN node 178 RAID 197 RAID-5 21 RCD (Read Cache Device) 21, 57, 63 RCLSTG (Reclaim Storage) 89 RCVSIZOPT (Receiver size options) attribute 89 Read Cache Device 62 Read Cache Device (RCD) 21, 57, 63 real address 193 Receiver size options (RCVSIZOPT) attribute 89 Reclaim Storage (RCLSTG) 89 Reduced Instruction Set Computing (RISC) 3 remote journal 45 remote mirroring 28 removable storage (tape) 56 Reorganize Physical File Member (RGZPFM) command 88 Retrieve Disk Information (RTVDSKINF) command 87, 89 Reuse deleted record (REUSEDLT) attribute 88 REUSEDLT (Reuse deleted record) attribute 88 RGZPFM (Reorganize Physical File Member) command 88 RISC (Reduced Instruction Set Computing) 3 RPQ 841958 28 RPQ cost 185
T
TCP/IP 82 Technology Independent Interface 40 Technology Independent Machine Interface (TIMI) temporary address 194 temporary directory 194 temporary library 194 temporary objects 194 THRESHOLD (Journal receiver threshold) attribute TIMI (Technology Independent Machine Interface) tower node 178 tower/rack node 177 Trace ASP Balance (TRCASPBAL) command 87, 6
88 6
105
231
U
UDB (DB2 Universal Database) 23 UDFS (User-Defined File System) 73, 109 uncontrolled growth 121 unit address 11 unit node 177, 178 usage balancing 101 user ASP 35, 43, 73, 122 User-Defined File System (UDFS) 73, 109
V
Versatile Storage Server (VSS) 197 Vertical Licensed Internal Code (VLIC) 9 virtual address 194 Vision Solutions 46 VLIC (Vertical Licensed Internal Code) 9 VSS (Versatile Storage Server) 25, 197
Work with DASD (WRKDASD) command 152, 201 Work with Job Schedule Entries (WRKJOBSCDE) command 120 Work with System Activity (WRKSYSACT) command 146 WRKASP 49 WRKDASD (Work with DASD) command 152, 201 WRKJOBSCDE (Work with Job Schedule Entries) command 120 WRKSYSACT (Work with System Activity) command 146
232
SG24-5693-00 AS/400 Disk Storage Topics and Tools Topics and Tools
What other subjects would you like to see IBM Redbooks address?
Please rate your overall satisfaction: Please identify yourself as belonging to one of the following groups:
O Very Good
O Good
O Average
O Poor
O Customer O Business Partner O Solution Developer O IBM, Lotus or Tivoli Employee O None of the above
Your email address: The data you provide here may be used to provide you with information from IBM or our business partners about our products, services or activities. Questions about IBMs privacy policy?
O Please do not use the information collected here for future marketing or promotional contacts or other communications beyond the scope of this transaction.
The following link explains how we protect your personal information. http://www.ibm.com/privacy/yourprivacy/
233
SG24-5693-00
SG24-5693-00