IBM Total Storage ESS Application Programming Interface Reference
IBM Total Storage ESS Application Programming Interface Reference
GC35-0489-01
IBM TotalStorage Enterprise Storage Server
GC35-0489-01
Note:
Before using this information and the product it supports, read the information in “Notices” on page 261.
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . 1
ESS API overview . . . . . . . . . . . . . . . . . . . . . . . . 1
CIM Agent overview . . . . . . . . . . . . . . . . . . . . . . . 2
CIM Agent components . . . . . . . . . . . . . . . . . . . . . . 3
CIM concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 4
ESS CIM Agent installation requirements . . . . . . . . . . . . . . . . 5
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Workstation space . . . . . . . . . . . . . . . . . . . . . . . 5
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
ESS CIM Agent installation methods . . . . . . . . . . . . . . . . . 6
ESS CIM Agent security . . . . . . . . . . . . . . . . . . . . . . 6
Appendix C. CIM Agent class information for the ESS API . . . . . . . 141
CIM Agent class definitions quick reference . . . . . . . . . . . . . . 141
ESS API class definitions . . . . . . . . . . . . . . . . . . . . 147
ESS class definition schemas . . . . . . . . . . . . . . . . . . . 231
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service
for Windows . . . . . . . . . . . . . . . . . . . . . . . . 241
ESS API Support for Microsoft’s Volume Shadow Copy Service Overview 241
ESS API support for Microsoft Volume Shadow Copy Service installation
overview . . . . . . . . . . . . . . . . . . . . . . . . . . 242
ESS API support for Microsoft Volume Shadow Copy Service installation
requirements . . . . . . . . . . . . . . . . . . . . . . . . 242
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . 242
Software . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Installing ESS API support for Microsoft Volume Shadow Copy Service on
Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Verifying ESS API support for Microsoft Volume Shadow Copy Service
Windows installation . . . . . . . . . . . . . . . . . . . . . 252
Creating the VSS_FREE and VSS_RESERVED pools . . . . . . . . . . 252
Verifying ESS API support for Microsoft Volume Shadow Copy Service
Windows configuration . . . . . . . . . . . . . . . . . . . . . 253
ESS API support for Microsoft Volume Shadow Copy Service reconfiguration
commands . . . . . . . . . . . . . . . . . . . . . . . . . 253
Error codes returned by Microsoft Volume Shadow Copy Service . . . . . . 256
Uninstalling ESS API support for Microsoft Volume Shadow Copy Service on
Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Trademarks. . . . . . . . . . . . . . . . . . . . . . . . . . 262
Java Compatibility logo . . . . . . . . . . . . . . . . . . . . . 263
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Contents v
vi ESS API Reference
Tables
1. Conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . xii
2. Summary of CIM Agent commands . . . . . . . . . . . . . . . . . . . . . . . . 87
3. Summary of CIM Agent setuser and setdevice subcommands . . . . . . . . . . . . . . 91
4. GetClass method parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 126
5. GetInstance method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 126
6. DeleteInstance method parameters . . . . . . . . . . . . . . . . . . . . . . . 127
7. CreateInstance method parameters . . . . . . . . . . . . . . . . . . . . . . . 127
8. ModifyInstance method parameters . . . . . . . . . . . . . . . . . . . . . . . 128
9. EnumerateClasses method parameters . . . . . . . . . . . . . . . . . . . . . . 128
10. EnumerateClassNames method parameters . . . . . . . . . . . . . . . . . . . . 129
11. EnumerateInstances method parameters . . . . . . . . . . . . . . . . . . . . . 130
12. EnumerateInstanceNames method parameters . . . . . . . . . . . . . . . . . . . 130
13. ExecQuery method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 131
14. Associators method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 131
15. AssociatorNames method parameters. . . . . . . . . . . . . . . . . . . . . . . 132
16. References method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 132
17. ReferenceNames method parameters . . . . . . . . . . . . . . . . . . . . . . . 133
18. GetProperty method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 133
19. SetProperty method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 134
20. GetQualifier method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 134
21. SetQualifier method parameters . . . . . . . . . . . . . . . . . . . . . . . . . 135
22. Functional groups for the CIM Agent . . . . . . . . . . . . . . . . . . . . . . . 136
23. Return error codes for the CIMON . . . . . . . . . . . . . . . . . . . . . . . . 137
24. CIM Agent class definitions (quick reference) . . . . . . . . . . . . . . . . . . . . 141
25. IBMTSESS_StorageSystem class properties . . . . . . . . . . . . . . . . . . . . 147
26. IBMTSESS_VolumeSpace class properties . . . . . . . . . . . . . . . . . . . . . 148
27. IBMTSESS_Volume class properties . . . . . . . . . . . . . . . . . . . . . . . 150
28. IBMTSESS_FCPort class properties . . . . . . . . . . . . . . . . . . . . . . . 153
29. IBMTSESS_SCSIProtocolController class properties . . . . . . . . . . . . . . . . . 154
30. IBMTSESS_Privilege class properties . . . . . . . . . . . . . . . . . . . . . . . 155
31. IBMTSESS_StorageHardwareID class properties . . . . . . . . . . . . . . . . . . 156
32. IBMTSESS_StorageConfigurationService class properties . . . . . . . . . . . . . . . 157
33. IBMTSESS_LunMaskPrivilegeService class properties . . . . . . . . . . . . . . . . 171
34. IBMTSESS_StorageHardwareIDManagementService class properties . . . . . . . . . . . 174
35. IBMTSESS_Product class properties . . . . . . . . . . . . . . . . . . . . . . . 176
36. IBMTSESS_AllocatedFromStoragePool class properties . . . . . . . . . . . . . . . . 177
37. IBMTSESS_StorageSystemToVolume class properties . . . . . . . . . . . . . . . . 177
38. IBMTSESS_StorageSystemToPort class properties . . . . . . . . . . . . . . . . . . 177
39. IBMTSESS_StorageSystemToController class properties . . . . . . . . . . . . . . . . 178
40. IBMTSESS_ProtocolControllerForUnit class properties . . . . . . . . . . . . . . . . 178
41. IBMTSESS_ProtocolControllerForPort class properties . . . . . . . . . . . . . . . . 178
42. IBMTSESS_AuthorizedTarget class properties . . . . . . . . . . . . . . . . . . . 179
43. IBMTSESS_AuthorizedSubject class properties . . . . . . . . . . . . . . . . . . . 179
44. IBMTSESS_ConcreteDependencyPrivilege class properties. . . . . . . . . . . . . . . 180
45. IBMTSESS_ConcreteDependencyStorageHardwareID class properties . . . . . . . . . . 180
46. IBMTSESS_HostedService class properties . . . . . . . . . . . . . . . . . . . . 180
47. IBMTSESS_HostedService2 class properties . . . . . . . . . . . . . . . . . . . . 181
48. IBMTSESS_HostedService3 class properties . . . . . . . . . . . . . . . . . . . . 181
49. IBMTSESS_ElementSettingData class properties . . . . . . . . . . . . . . . . . . 181
50. IBMTSESS_ElementCapabilities class properties . . . . . . . . . . . . . . . . . . 181
51. IBMTSESS_HostedStoragePool class properties . . . . . . . . . . . . . . . . . . . 181
52. IBMTSESS_StorageCapabilities class properties . . . . . . . . . . . . . . . . . . . 182
53. IBMTSESS_StorageSetting class properties . . . . . . . . . . . . . . . . . . . . 184
© Copyright IBM Corp. 2004 vii
54. IBMTSESS_Chassis class properties . . . . . . . . . . . . . . . . . . . . . . . 185
55. IBMTSESS_ComputerSystemPackage class properties . . . . . . . . . . . . . . . . 186
56. IBMTSESS_ExtraCapacitySet class properties . . . . . . . . . . . . . . . . . . . 186
57. IBMTSESS_ConcreteIdentityCapSet class properties . . . . . . . . . . . . . . . . . 187
58. IBMTSESS_ProductPhysicalComponent class properties . . . . . . . . . . . . . . . 187
59. IBMTSESS_RemoteServiceAccessPoint class properties . . . . . . . . . . . . . . . 187
60. IBMTSESS_HostedAccessPoint class properties . . . . . . . . . . . . . . . . . . . 189
61. IBMTSESS_StorageProcessorCard class properties . . . . . . . . . . . . . . . . . 189
62. IBMTSESS_ComputerSystemPackageCard class properties . . . . . . . . . . . . . . 189
63. IBMTSESS_MemberOfCollection class properties . . . . . . . . . . . . . . . . . . 190
64. IBMTSESS_DiskDrive properties . . . . . . . . . . . . . . . . . . . . . . . . 190
65. IBMTSESS_PhysicalPackage class properties . . . . . . . . . . . . . . . . . . . 192
66. IBMTSESS_Realizes class properties . . . . . . . . . . . . . . . . . . . . . . . 193
67. IBMTSESS_SystemDevice class properties . . . . . . . . . . . . . . . . . . . . 193
68. IBMTSESS_ControllerConfigurationService class properties . . . . . . . . . . . . . . 193
69. IBMTSESS_HostedService4 class properties . . . . . . . . . . . . . . . . . . . . 199
70. IBMTSESS_DeviceMaskingCapabilities class properties . . . . . . . . . . . . . . . . 199
71. IBMTSESS_ElementCapabilitiesMasking class properties . . . . . . . . . . . . . . . 202
72. IBMTSESS_ConcreteDependencyController class properties . . . . . . . . . . . . . . 202
73. IBMTSESS_RegisteredProfile class properties . . . . . . . . . . . . . . . . . . . 203
74. IBMTSESS_SubProfileExtendsProfile class properties . . . . . . . . . . . . . . . . . 204
75. IBMTSESS_ElementConformsToProfile class properties . . . . . . . . . . . . . . . . 205
76. IBMTSESS_Location class properties . . . . . . . . . . . . . . . . . . . . . . . 205
77. IBMTSESS_PhysicalElementLocation class properties . . . . . . . . . . . . . . . . 205
78. IBMTSESS_StorageClientSettingData class properties . . . . . . . . . . . . . . . . 206
79. IBMTSESS_InitiatorElementSettingData class properties . . . . . . . . . . . . . . . . 206
80. IBMTSESS_StorageExtent class properties . . . . . . . . . . . . . . . . . . . . 207
| 81. IBMTSESS_MediaPresentExtent class properties . . . . . . . . . . . . . . . . . . 209
82. IBMTSESS_Component class properties . . . . . . . . . . . . . . . . . . . . . 209
83. IBMTSESS_PrimordialStoragePool class properties . . . . . . . . . . . . . . . . . 210
84. IBMTSESS_HostedPrimordialStoragePool class properties . . . . . . . . . . . . . . . 211
85. IBMTSESS_StorageSynchronized class properties . . . . . . . . . . . . . . . . . . 211
86. IBMTSESS_EltCapabilitiesStgPool class properties . . . . . . . . . . . . . . . . . . 211
87. IBMTSESS_Provider class properties . . . . . . . . . . . . . . . . . . . . . . . 212
88. IBMTSESS_VolumeStatistics class properties . . . . . . . . . . . . . . . . . . . . 213
89. IBMTSESS_VolumeSpaceStatistics class properties . . . . . . . . . . . . . . . . . 215
90. IBMTSESS_VolumeStatisticalData class properties . . . . . . . . . . . . . . . . . . 216
91. IBMTSESS_VolumeSpaceStatisticalData class properties . . . . . . . . . . . . . . . 217
92. IBMTSESS_PerformanceStatisticsService class properties . . . . . . . . . . . . . . . 217
93. IBMTSESS_HostedService6 class properties . . . . . . . . . . . . . . . . . . . . 219
94. IBMTSESS_RemoteVolume . . . . . . . . . . . . . . . . . . . . . . . . . . 219
95. IBMTSESS_RemoteSourceStorageSynchronized class properties . . . . . . . . . . . . 219
96. IBMTSESS_RemoteTargetStorageSynchronized . . . . . . . . . . . . . . . . . . . 220
97. IBMTSESS_PPRCPath . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
| 98. IBMTSESS_Pool2PrimordialPool . . . . . . . . . . . . . . . . . . . . . . . . 223
| 99. IBMTSESS_AsyncPPRCService . . . . . . . . . . . . . . . . . . . . . . . . . 223
100. Microsoft Volume Shadow Copy Service reconfiguration commands . . . . . . . . . . . 254
101. Return error codes for Microsoft Volume Shadow Copy Service . . . . . . . . . . . . . 256
This publication also lists the components of the Common Information Model (CIM)
and provides descriptions of the commands that you use during the installation and
configuration tasks.
Once the ESS CIM Agent is installed and configured on your machine, you can
implement the ESS API. Reference material in the appendixes includes the
following information that might assist you in writing your CIM-based applications for
the ESS API:
v ESS API component definitions
This appendix describes the elements, the namespace, and the object name for
the ESS API.
v CIM Agent communication with the ESS API
This appendix describes the concepts and methods for communication between
the ESS CIM Agent and the ESS API and lists error codes that the CIM object
manager (CIMOM) returns.
v ESS API object classes
This appendix provides ESS API object classes that are used by the ESS CIM
Agent to manage its model of the ESS. A visual representation of the ESS API
architecture for the ESS is also included.
v ESS API support for Microsoft Volume Shadow Copy Service Overview
This appendix provides instructions for installing and configuring Microsoft
Volume Shadow Copy Service on Windows. Microsoft Volume Shadow Copy
Service is used by the ESS CIM Agent for FlashCopy.
Note: See the IBM TotalStorage ESS Interoperability Web site for the availability
of Microsoft Volume Shadow Copy Service.
http://www.ibm.com/storage/hardsoft/products/ess/supserver.htm
Reference material for application programmers who write CIM-based ESS API
applications is in the appendixes.
Related information
The tables in this section list and describe the following publications:
v The publications that make up the IBM® TotalStorage™ Enterprise Storage
Server™ (ESS) library
v Other IBM publications that relate to the ESS
v Non-IBM publications that relate to the ESS
ESS library
The following customer publications make up the ESS library. Unless otherwise
noted, these publications are available in Adobe portable document format (PDF) on
a compact disc (CD) that comes with the ESS. If you need additional copies of this
CD, the order number is SK2T-8803. These publications are also available as PDF
files by clicking on the Documentation link on the following ESS Web site:
http://www-1.ibm.com/servers/storage/support/disk/2105.html
See “IBM publications center” on page xxi for information about ordering these and
other IBM publications.
Order
Title Description
Number
IBM TotalStorage This guide describes the commands that you can use from the ESS Copy SC26-7494
Enterprise Storage Services command-line interface (CLI) for managing your ESS (See Note.)
Server: Command-Line configuration and Copy Services relationships. The CLI application
Interfaces User’s Guide provides a set of commands that you can use to write customized scripts
for a host system. The scripts initiate predefined tasks in an ESS Copy
Services server application. You can use the CLI commands to indirectly
control peer-to-peer remote copy and FlashCopy® configuration tasks
within an ESS Copy Services server group.
IBM TotalStorage This guide provides guidelines and work sheets for planning the logical SC26-7477
Enterprise Storage configuration of an ESS that attaches to open-systems hosts. (See Note.)
Server: Configuration
Planner for
Open-Systems Hosts
IBM TotalStorage This guide provides guidelines and work sheets for planning the logical SC26-7476
Enterprise Storage configuration of an ESS that attaches to either the IBM S/390® and IBM (See Note.)
Server: Configuration ERserver zSeries™ host system.
Planner for S/390 and
IBM ERserver zSeries
Hosts
IBM TotalStorage This guide provides guidelines for attaching the ESS to your host system SC26-7446
Enterprise Storage and for migrating to fibre-channel attachment from either a small computer (See Note.)
Server: Host Systems system interface or from the IBM SAN Data Gateway.
Attachment Guide
IBM 2105 TotalStorage This publication provides an overview of the ESS and highlights its unique SC26-7440
Enterprise Storage capabilities. It also describes Data Facility Storage Management (See Note.)
Server: DFSMS Subsystems (DFSMS) software support for the ESS, including support for
Software Support large volumes.
Reference
IBM TotalStorage This guide introduces the ESS product and lists the features you can GC26-7444
Enterprise Storage order. It also provides guidelines for planning the installation and
Server: Introduction and configuration of the ESS.
Planning Guide
http://www-1.ibm.com/servers/storage/support/disk//2105.html
Order
Title Description
Number
Data-copy services
z/OS DFSMS Advanced This publication helps you understand and use IBM Advanced Copy SC35-0428
Copy Services Services functions. It describes three dynamic copy functions and several
point-in-time copy functions. These functions provide backup and recovery
of data if a disaster occurs to your data center. The dynamic copy functions
are peer-to-peer remote copy, extended remote copy, and coupled
extended remote copy. Collectively, these functions are known as remote
copy. FlashCopy, ShapShot, and concurrent copy are the point-in-time copy
functions.
DFSMS/MVS V1: This publication provides guidelines for using remote copy functions with SC35-0169
Remote Copy Guide and S/390 and zSeries hosts.
Reference
IBM Enterprise Storage This publication, from the IBM International Technical Support Organization, SG24-5465
Server introduces the ESS and provides an understanding of its benefits. It also
describes in detail the architecture, hardware, and functions, including the
advanced copy functions, of the ESS.
Implementing Copy This publication, from the IBM International Technical Support Organization, SG24-5680
Services 0n S/390 tells you how to install, customize, and configure Copy Services on an ESS
that is attached to an S/390 or zSeries host system. Copy Services
functions include peer-to-peer remote copy, extended remote copy,
FlashCopy®, and concurrent copy. This publication describes the functions,
prerequisites, and corequisites and describes how to implement each
function into your environment.
IBM TotalStorage ESS This publication, from the IBM International Technical Support Organization, SG24-5757
Implementing Copy tells you how to install, customize, and configure ESS Copy Services on
Services in an Open UNIX, Windows NT®, Windows 2000, Sun Solaris, HP-UX, Tru64,
Environment OpenVMS, and iSeries host systems. The Copy Services functions that are
described include peer-to-peer remote copy and FlashCopy. This
publication describes the functions and shows you how to implement them
into your environment. It also shows you how to implement these functions
in a high-availability cluster multiprocessing environment.
Fibre channel
Fibre Channel This publication provides information about the fiber-channel I/O interface. SA24-7172
Connection (FICON) I/O This book is also available as a PDF file from the following Web site:
Interface: Physical Layer
www.ibm.com/servers/resourcelink/
Fibre-channel This publication tells you how to attach the IBM xSeries™ 430 and No order
Subsystem Installation NUMA-Q® host systems with fibre-channel adapters to the ESS. number
Guide
Contact your sales representative to obtain this publication.
Fibre Transport Services This publication provides information about fibre-optic and ESCON-trunking GA22-7234
(FTS): Physical and systems.
Configuration Planning
Guide
IBM SAN Fibre Channel This guide explains how to convert the IBM SAN Fibre Channel Managed SY27–7616
Managed Hub: 3534 Hub from a Fibre-Channel Arbitrated Loop (FC-AL) configuration to a
Service Guide fabric-capable switched environment.
www.ibm.com/servers/resourcelink/
IOCP User’s Guide, IBM This publication describes the Input/Output Configuration Program that SB10-7037
Eserver zSeries supports the zSeries server. This publication is available in PDF format by
accessing ResourceLink at the following Web site:
www.ibm.com/servers/resourcelink/
S/390: Input/Output This publication describes the Input/Output Configuration Program that GC38-0401
Configuration Program supports ESCON architecture and the ESCON multiple image facility.
User’s Guide and
ESCON
Channel-to-Channel
Reference
IBM z/OS Hardware This guide provides conceptual and procedural information to help you use SC33-7988
Configuration Definition the z/OS Hardware Configuration Definition (HCD) application. It also
User’s Guide explains:
v How to migrate existing IOCP/MVSCP definitions
v How to use HCD to dynamically activate a new configuration
v How to resolve problems in conjunction with MVS/ESA HCD
OS/390: Hardware This guide provides detailed information about the input/output definition SC28-1848
Configuration Definition file and about how to configure parallel access volumes. This guide
User’s Guide discusses how to use Hardware Configuration Definition for both OS/390®
and z/OS V1R1.
OS/390 V2R10.0: MVS This publication lists OS/390 MVS™ system messages ABA to ASA. GC28-1784
System Messages
Volume 1 (ABA - ASA)
Using IBM 3390 Direct This publication provides device-specific information for the various models GG26-4575
Access Storage in a VM of the 3390 and describes methods you can use to manage storage
Environment efficiently using the VM operating system. It provides guidance on
managing system performance, availability, and space through effective
use of the direct access storage subsystem.
Using IBM 3390 Direct This publication helps you use the 3390 in a VSE environment. It includes GC26-4576
Access Storage in a planning information for adding new 3390 units and instructions for
VSE Environment installing devices, migrating data, and performing ongoing storage
management activities.
Using IBM 3390 Direct This publication helps you use the 3390 in an MVS environment. It GC26-4574
Access Storage in an includes device-specific information for the various models of the 3390 and
MVS Environment illustrates techniques for more efficient storage management. It also offers
guidance on managing system performance, availability, and space
utilization through effective use of the direct access storage subsystem.
z/Architecture Principles This publication provides a detailed definition of the z/Architecture™. It is SA22-7832
of Operation written as a reference for use primarily by assembler language
programmers and describes each function at the level of detail needed to
prepare an assembler language program that relies on a particular
function. However, anyone concerned with the functional details of
z/Architecture will find this publication useful.
The IBM publications center offers customized search functions to help you find the
publications that you need. Some publications are available for you to view or
download free of charge. You can also order publications. The publications center
displays prices in your local currency. You can access the IBM publications center
through the following Web site:
www.ibm.com/shop/publications/order/
If you want to subscribe, you can access the publications notification system from
the IBM publications center at the following Web site:
www.ibm.com/shop/publications/order/
Non-IBM publications
Other related publications are not available through IBM ordering systems. To order
them, contact the sales representative at the branch office in your locality.
Title Description
Quick Start Guide: An Example with Network File System This guide tells you how to configure the Veritas Cluster
(NFS) Server. See also the companion document, Veritas
Cluster Server User’s Guide.
Veritas Cluster Server Installation Guide This guide tells you how to install the Veritas Cluster
Server. See also the companion document, Veritas
Cluster Server Release Notes.
Veritas Cluster Server Release Notes These release notes tell you how to install the Veritas
Cluster Server. See also the companion document,
Veritas Cluster Server Installation Guide.
Veritas Cluster Server User’s Guide This guide tells you how to configure the Veritas Cluster
Server. See also the companion document, Quick Start
Guide: An Example with Network File System (NFS).
Veritas Volume Manager Hardware Notes These hardware notes tell you how to implement multiple
paths dynamically.
Veritas Volume Manager Installation Guide This guide tells you how to install VxVM.
Veritas Volume Manager Storage Administrators Guide This guide tells you how to administer and configure the
disk volume groups.
Web sites
The following Web sites provide information about the ESS and other IBM storage
products.
Click Documentation.
FlashCopy for S/390 and zSeries http://www.storage.ibm.com/software/sms/sdm/
host systems
Host system models, operating http://www-1.ibm.com/servers/storage/support/disk/2105.html
systems, and adapters that the ESS
supports Click Interoperability matrix.
IBM storage products http://www.storage.ibm.com/
IBM version of the Java (JRE) that is http://www-106.ibm.com/developerworks/java/jdk/
often required for IBM products
Multiple Device Manager (MDM) http://www.ibm.com/servers/storage/support/
New Information
This edition includes the following new information:
v Asynchronous Peer-to-Peer Remote Copy (PPRC) is supported by the ESS API.
Asynchronous PPRC provides a two-site extended distance remote copy solution
that is suitable for disaster recovery.
v Two FlashCopy withdraw options: commit and revert, are supported by the ESS
API. Withdraw FlashCopy Commit is a feature that makes the FlashCopy relation
no longer revertible, commits the new relation data, updates the FlashCopy
bitmap, and resets source “Write Inhibited”. Withdraw FlashCopy Revert is a
feature that reverts the relation to the state saved by the last Establish Revertible
FlashCopy command and resets source “Write Inhibited”.
Changed Information
No information has changed significantly.
Moved Information
No information has moved.
Deleted Information
No information has been deleted.
The ESS API helps integrate ESS configuration management support into storage
resource management (SRM) applications, which allow customers to benefit from
existing SRM applications and infrastructures. The ESS API also enables the
automation of configuration management through customer-written applications.
Either way, the ESS API presents another option for managing ESSs by
complementing the use of the IBM TotalStorage Enterprise Storage Server
Specialist web-based interface, the ESS command-line interface, and the Copy
Services command-line interface.
You must implement the ESS API through the IBM TotalStorage Common
Information Model Agent (CIM Agent), a middleware application that provides a
CIM-compliant interface. The ESS API uses the CIM technology to manage
proprietary devices as open system devices through storage management
applications. The ESS API allows these storage management applications to
communicate with an ESS.
The CIM Agent is available for the AIX, Linux, and Windows 2000, or later,
operating system environments. The ESS API must be used on ESSs with Fibre
ports.
Related topics:
v Appendix D, “ESS API support for Microsoft Volume Shadow Copy Service for
Windows,” on page 241
A CIM agent consists of the components shown in Figure 1. The main components
are the CIM object manager (CIMOM), the service location protocol (SLP) and the
device provider. A device can be a storage server such as your IBM Enterprise
Storage Server (ESS). The CIM Agent registers itself with SLP to enable discovery
by the Client application. The SLP is a directory service that a client application
calls to locate the CIM Object Manager. The client application and the CIMOM
communicate through CIM Messages. The CIMOM and device provider
communicate through method calls made from the CIMOM to the provider. The
device provider communicates with the device through proprietary calls.
Client
Application
SLP
CIMMessages encoded
within XML
CIMOM
CIM Agent
Method calls made from
CIMOM to Provider
Device Provider
Proprietary calls
Device
Note: You can access the white paper and other SNIA reports from this Web
site. Contact SNIA regarding access to the specification.
Conformance to these specifications allows a CIM Agent to act as an open-system
standards interpreter, allowing other CIM-compliant storage resource management
applications (IBM and non-IBM) to interoperate with each other.
When you have installed, configured, and enabled the CIM Agent on a host server
or an administrator’s workstation within your network, that host server or workstation
can communicate with your ESS through the CIM Agent. This allows CIM-compliant
applications like the ESS API to manage the data on your ESS. See the appendixes
to this guide for reference information about the ESS API.
Chapter 1. Introduction 3
CIM concepts
The common information model (CIM) is an open approach to the management of
systems and networks. The CIM provides a common conceptual framework
applicable to all areas of management including systems, applications, databases,
networks, and devices. The CIM specification provides the language and the
methodology used to describe management data.
The CIM defines a set of classes with properties and associations which in turn
provide a conceptual framework. The framework enables the organization of data
for a specific managed environment, such as data storage. CIM Schema 2.7 for
Managing a Storage Array, provides information about enabling management
applications to manage data in a common way. For more information about the CIM
specifications and standards visit the following Web site:
| http://www.dmtf.org/standards/cim
The CIM standards and the DMTF specification provide information about
Web-based enterprise management (WBEM) operations over HTTP. For additional
information about CIM operations over HTTP, visit the following Web site:
| http://www.dmtf.org/standards/documents/WBEM/dsp200.html
A client application finds the location of the CIMOM by calling an SLP directory
service. When the CIMOM first starts, it registers itself to the SLP and provides
information about its location (IP address and port) and the type of service it
provides. After obtaining this information, the client application opens direct
communication with the CIMOM.
A client sends requests to a CIMOM in the context of a CIM model. The model is
defined by the CIM schema and loaded into the repository of the CIMOM. Figure 2
shows how the schema is loaded into the data store of the CIMOM. The managed
object format (MOF) compilation and creation of the data store is handled
automatically during installation.
As requests arrive, the CIMOM validates and authenticates each request. Requests
are either directed to the appropriate functional component of the CIMOM or
directed to a device-specific handler called a provider.
Figure 2. The MOF compiler stores the model in the CIMOM data store.
Note: All prerequisite software must be installed before you start the installation
of the ESS CIM Agent. The ESS CIM Agent installation program will check
for the existence of the ESS CLI. If the program does not detect the ESS
CLI, the installation of the ESS CIM Agent will not complete successfully.
Hardware
The following hardware is required:
v Personal computer, workstation, or server with Intel® Pentium® III or higher
processor (Linux and Windows only)
v CD-ROM drive
v Video graphics adapter display or better
Workstation space
The following space on your workstation is required:
v 256 megabytes (MB) of random-access memory (RAM) minimum depending on
your system configuration
v 1 gigabyte disk space minimum
Note: You might need to increase the total available disk space on your hard
drives if the ESS CIM Agent and other associated products are split
between more than one logical drive. Also, the ESS CIM Agent might
require additional memory to operate if you configure it to manage many
devices or devices with large configurations.
v 1 gigahertz processor speed minimum
v Up to 50 MB of temporary disk space for installation purposes
Chapter 1. Introduction 5
Software
The following software is required:
v Operating systems:
– Windows 2000 or later
– AIX 5.1 or later
| – Linux RedHat 7.2 and later
v ESS CLI level 2.3.0.13. This software is on the ESS CLI CD.
v Common Information Model (CIM) Agent. This software is on the CIM Agent for
ESS CD.
v Transmission Control Protocol/Internet Protocol (TCP/IP)
v Adobe Acrobat Reader version 4.0 or later
You need the Adobe Acrobat Reader to read License Agreement and product
information from the ESS CIM Agent LaunchPad. You can download the Adobe
Acrobat Reader from the following Web site:
– http://www.adobe.com/support/downloads/main.html
The following list of installation and configuration tasks are discussed in the order in
which they should be performed:
1. Before you install the CIM Agent on an AIX operating system, check the
hardware and software requirements listed in “ESS CIM Agent installation
requirements” on page 5.
2. Install the prerequisite ESS CLI 2105 for AIX software as instructed in “Installing
the ESS CLI on AIX.”
Attention: If you are upgrading from a previous version of the ESS CIM Agent,
you must upgrade the ESS CLI software to the new level required which is a
minimum level of 2.3.0.13.
3. You can choose to install the CIM Agent either in graphical mode with the help
of a wizard or in unattended mode (also known as silent mode), which involves
customizing a response file and issuing a command. To mount the CIM Agent
for ESS CD for either mode, perform the instructions in “Mounting the CD on
AIX” on page 9.
a. If you want to install the CIM Agent in graphical mode, perform the
instructions in “Installing the CIM Agent on AIX in graphical mode” on page
10.
b. If you want to install the CIM Agent in unattended mode, perform the
instructions in “Installing the CIM Agent on AIX in unattended (silent) mode”
on page 19.
4. Configure the CIM Agent by performing the instructions in “Configuring the CIM
Agent on AIX” on page 22. You might want to revisit this section in the future as
you add, change, or delete CIMOM authentication and ESS information.
5. Enable the CIM Agent by performing the instructions in “Verifying connection to
the ESS” on page 25.
6. For instructions about removing the CIM Agent, see “Removing the CIM Agent
on AIX” on page 27. You only need to perform this optional task if you get errors
during installation verification or if the CIM Agent did not set the environment
variables.
Perform the following steps to install the ESS CLI for AIX:
1. Select the ESS CLI CD.
This ESS CLI CD contains the ESS CLI installation packages and the IBM
TotalStorage Enterprise Storage Server Command-Line Interfaces User’s
Guide.
2. Insert the ESS CLI CD, but do not mount the CD device.
3. Type the following command to list the installation packages:
smitty install_update
4. Select the Install and Update from ALL Available Software option.
5. Use the list command (F4) to list all of the devices and then select the
system’s CD-ROM drive, for example, /dev/cd0 (16 Bit SCSI Multimedia
CD-ROM Drive).
6. When you return to the panel, use the list command (F4) on the “*SOFTWARE
to Install” line to list all the software on the CD-ROM.
7. Select the ibm2105esscli package, which is at the bottom of the list:
@ 2.3.0.13 IBM 2105 ESS Storage Management CLI (Includes the CS CLI)
Attention
There are two packages: ibm2105esscli and ibm2105cli. You must select
and install the ibm2105esscli package. This package contains both the
ESS CLI and the Copy Services CLI. Do not select the ibm2105cli
because this file contains only the Copy Services CLI, not the ESS CLI.
The following example output indicates that the esscli is installed at level
2.3.0.13 in /usr/opt/ibm2105cli.
ibm2105esscli.rte 2.3.0.13 /usr/opt/ibm/ibm2105cli/esscli
Type the following command from a Command Prompt window to see a listing
of the esscli commands:
#/usr/opt/ibm/ibm2105cli/esscli
DiskGroup Category:
-------------------
list DiskGroup [-d "ess=EssId"]
[-fmt server,dg,loc,raid,width,cap,rpm,dd,status]
WebUserAccount Category:
------------------------
list WebUserAccount [-d "ess=EssId"]
[-fmt user,acclvl,iprange,comments]
create WebUserAccount -d "ess=EssId user=UserId pwd=Password
acclvl=AccessLevel iprange=IPRange comments=’Comments’"
set WebUserAccount -d "ess=EssId user=UserId
(newuser=NewUserId|newpwd=NewPassword|
newacclvl=NewAccessLevel|newiprange=NewIPRange|
newcomments=’NewComments’)*"
delete WebUserAccount -d "ess=EssId user=UserId"
Steps:
Perform the following steps to mount the CIM Agent for ESS CD.
Note: You must mount the CIM Agent for ESS CD for both a graphical and
unattended installation.
1. Log on as a user with root authority.
# mkdir /cdrom
3. Type the following command to mount the CD file system at the desired mount
point:
# cd /cdrom/AIX
You can choose to install the CIM Agent in graphical mode with the help of an
installation wizard or in unattended (silent) mode, which involves customizing a
response file and issuing a command. If you want to install the CIM Agent in
unattended mode, see “Installing the CIM Agent on AIX in unattended (silent) mode”
on page 19, otherwise continue with this section. After the completion of either kind
of installation, you will then verify the installation of the CIM Agent in section,
“Verifying the CIM Agent installation on AIX” on page 21. Before you install the CIM
Agent on AIX, you should check the hardware and software requirements listed in
“ESS CIM Agent installation requirements” on page 5.
Steps:
This task will assist you with the installation of the CIM Agent in your AIX
environment using the graphical mode.
Perform the following steps to install the CIM Agent on your AIX operating system:
1. Log on as a user with root authority.
2. You can run the wizard from either the main console or from a remote X server.
If you run it from a remote X server, perform the following steps prior to running
the wizard:
a. Set the DISPLAY variable to hostname:displaynumber.screennumber
where:
hostname
The host name of the platform on which the X server runs and from
which the wizard starts.
displaynumber
Use the number 0 if X server controls more than one keyboard and
monitor unit, for instance, a network of X terminals.
screennumber
This specifies which monitor to use in a multiple monitor setup.
<hostname>:<displaynumber.screennumber>
export DISPLAY=x_server_hostname:displaynumber.screennumber
3. The CIM Agent installation in graphical mode begins with a LaunchPad facility to
launch the installation program wizard. The LaunchPad facility provides links for
you to view various text files, such as the product overview, product readme,
post installation tasks, and various Adobe Acrobat files, such as the Installation
guide, product license agreement, and a browser link to the IBM storage
product technical support page.
The Installation guide and license agreement are in Adobe Acrobat file format
(.pdf). In order for the LaunchPad to provide links to the Adobe Acrobat files,
your system must have Adobe Acrobat Reader installed. In order for the
browser to link to the IBM storage product technical support page, you must
have a browser installed on your system where you start the LaunchPad facility.
If you wish to use the LaunchPad facility links to view the Adobe Acrobat files,
you must have the Adobe Acrobat Reader bin location in your PATH
environment variable. You can verify this by running the following command:
echo $PATH
Locate the Adobe Acrobat Reader bin location in the PATH, for example,
usr/lpp/Acrobat5/bin. If the Adobe Acrobat Reader bin location is not in the
environment path, you can set it by typing the following command:
export PATH=$PATH:/usr/lpp/Acrobat5/bin
This will start the CIM Agent LaunchPad, a small program that launches the
wizard.
5. Choose from the following options in the LaunchPad window:
CIM Agent overview
Offers information about the CIM Agent.
Readme file
Offers any last minute product information that did not make it into this
installation guide.
Installation guide
Offers instructions on how to install the CIM Agent.
License Agreement
Offers information about the license of the CIM Agent.
CIM Agent Web site
Offers information from the product Web site.
Installation wizard
Starts the CIM Agent installation program.
Post installation tasks
Offers information about configuring the users and device
communications.
Exit Exits the LaunchPad program.
The LaunchPad window remains open (behind the wizard) during the
installation. You can access product information after the installation has started.
The LaunchPad returns to the foreground when the installation is complete. You
can click Exit to close the LaunchPad.
6. Check the readme file by clicking the Readme file on the LaunchPad window or
by viewing the README.aix file located in the AIX directory on the CIM Agent
installation CD. The readme file might provide additional information that
supersedes information in this guide.
You can also find this installation guide on the CIM Agent CD under the file
name installguide.pdf in the doc subdirectory.
7. Click Installation wizard to start the installation program.
8. The Welcome window text suggests which documentation to review prior to
installation. Click Next to continue or Cancel to exit.
10. The Product Installation Check window opens and the wizard verifies that
your machine meets the installation requirements.
v If you have a service location protocol (SLP) daemon that is different from
the SLP that the CIM Agent requires, the wizard displays an error and asks
you to stop the installation and remove this SLP daemon from the system.
11. The Destination Directory window opens. Click Next to accept the default
directory, or click Browse to select a different directory for installation and then
click Next.
netstat -a
14. The Installation Progress window opens indicating how much of the installation
has been completed. Installation usually takes 3 - 10 minutes depending on
your machine configuration. If you do not want to continue with the installation,
click Cancel to exit.
16. Exit the LaunchPad program by clicking Exit on the LaunchPad window. If you
have not done so already, continue with the post installation tasks for the ESS
Related topics:
v “Verifying the CIM Agent installation on AIX” on page 21
v “Installing the CIM Agent on AIX in unattended (silent) mode”
v “Removing the CIM Agent on AIX” on page 27
You can choose to install the CIM Agent in unattended (silent) mode, which involves
customizing a response file and issuing a command or in graphical mode with the
help of an installation wizard. If you want to install the CIM Agent in graphical mode,
see “Installing the CIM Agent on AIX in graphical mode” on page 10, otherwise
continue with this section. After the completion of either kind of installation, you will
then verify the installation of the CIM Agent in section, “Verifying the CIM Agent
installation on AIX” on page 21.
Context:
Steps:
Perform the following steps to install the CIM Agent in your AIX environment using
the unattended (silent) mode:
1. Log on as a user with root authority.
2. Locate the responsefile file on your CIM Agent for ESS CD.
3. Retrieve and copy the responsefile file to your hard disk drive by typing the
following commands:
# mkdir /tmp/cimagent
# cp -p /cdrom/AIX/responsefile /tmp/cimagent
Note: If the installation fails before the target <dest-path> directory is created,
you can find the temporary log in /tmp/cimagent/install.log.
10. Close the command prompt window by entering a command, for example exit.
Continue with the post installation tasks for the ESS CIM Agent in the following
sections. “Verifying the CIM Agent installation on AIX” is the next task. You can
also continue the post installation tasks using the following option:
a. Open the LaunchPad from the AIX directory of the CIM Agent for ESS CD
by typing # ./launchpad_aix.
b. Click Post installation tasks on the LaunchPad window. Continue with the
post installation tasks for the ESS CIM Agent by following the instructions
in this file.
Related topics:
v “Verifying the CIM Agent installation on AIX”
v “Installing the CIM Agent on AIX in graphical mode” on page 10
v “Configuring the CIM Agent on AIX” on page 22
v “Removing the CIM Agent on AIX” on page 27
Steps:
# <dest-path>/startcimom
where <dest-path> is the destination directory where the CIM Agent is installed.
4. When you are finished with the CIM Agent CD, you can release the CD with the
umount command, for example,
Note: If you are currently residing in /cdrom/AIX, you must exit out of the
/cdrom directory by typing cd /. You will not be able to unmount the CD if
you are residing in /cdrom/AIX.
# umount /dev/cd0
# umount /cdrom
Result:
If you are able to perform all of the verification tasks successfully, then the CIM
Agent has been successfully installed on your AIX operating system.
Related topics:
v “Configuring the CIM Agent on AIX”
Context:
This task is performed after successful installation of the CIM Agent. This
installation program performs the following tasks:
v Copies the directories and files from the ESS CIM Agent CD-ROM into the
chosen destination directory
v Updates some script files using the selected destination
Note: For a client installation, you must copy this certificate from the server and
install it in the destination directory on the client machine if you intend to
run in secure mode.
Steps:
Note: In addition to the configuration steps below, you can use the modifyconfig
command to change the configuration of some of the parameters that were
configured during installation. You can change the CIM Agent port value,
protocol (HTTP/HTTPS), and enable or disable the debug option. See
“modifyconfig” on page 122 for a description of the modifyconfig command
syntax.
1. Configure the CIM Agent for each ESS that the CIM Agent can access.
a. Type the following command:
# <dest-path>/setdevice
b. Obtain an IP address, user name, and password for each ESS that the CIM
Agent will manage.
c. Type the following command for each ESS:
>>>addess <9.111.111.111> <essuser> <esspass>
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is a sample output:
An ess provider entry for IP 9.111.111.111 successfully added
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
# <dest-path>/startcimom
where <dest-path> is the destination path where the CIM Agent is installed.
The following is a sample output:
Application setuser started in interactive mode
To terminate the application enter: exit
To get a help message enter: help
>>>
Restriction: You cannot delete or modify the current user logged in using
the setuser command.
c. Obtain a user name and password for each user that can manage the
CIMOM. Type the following command for each user:
>>>adduser <cimuser> <cimpass>
where
v cimuser represents the new user name to access the ESS CIM Agent
CIMOM
v cimpass represents the password for the new user name to access the
ESS CIM Agent CIMOM
The following is a sample output:
Result:
If you are able to perform all of the configuring tasks successfully, the CIM Agent
has been successfully installed on your AIX operating system.
Related topics:
v “Verifying connection to the ESS”
Steps:
Prerequisites:
| where:
| v -s primaryservername represents the IP address or the complete host name of
| an ESS Copy Services server.
| v -v designates that all responses from the server be displayed.
| This following example is output that you receive if the CLI.CFG is set correctly
| (sltb0c0 is the ESS primary Copy Services server in this example):
| [root@bluegrass ibm2105cli]# ./rsTestConnection.sh -v -s sltb0c0
| rsWebTest: Using sltb0c0 as server name
| rsWebTest: HeartBeat to the server was successful.
| rsWebTest: command successful
||
Issue the esscli list server command from a Command Prompt window to confirm
connectivity to the rest of the ESSs in the domain.
esscli -u <essuser> -p <esspass> -s <9.111.111.111> list server
where:
v essuser is an Enterprise Storage Server Specialist user name.
v esspass is the Enterprise Storage Server Specialist password for that user name.
v 9.111.111.111 is the IP address of the Enterprise Storage Server.
Note: The ESS CLI does not set the PATH variable. Update the PATH environment
variable using the path where the CLI for ESS 2105 is installed. See
“Installing the ESS CLI on AIX” on page 7 for more information.
A response similar to the following is displayed:
Thu Oct 09 13:20:40 PDT 2003 IBM ESSCLI 2.3.0.1
Steps:
Perform the following to start and verify the service location protocol (SLP) daemon
and the CIMOM.
1. Type the following command to see if the SLP daemon is started:
If the SLP daemon is not started, continue with the next step. If the SLP
daemon is started, go to step 3.
2. Start the SLP daemon, if it is not started, by typing the following command from
a separate window.
# /etc/rc.slpd
This session will remain active until you stop it. You should keep it running as
long as the CIM Agent is running.
3. Type the following command to see if the CIMOM is started:
# <dest-path>/startcimom
Where <dest-path> is the destination directory where the CIM Agent is installed.
The default is to start the secure CIMOM. It will register itself with SLP and
accept requests on Port 5989.
Result:
Prerequisites:
Steps:
# <dest-path>/stopcimom
where <dest-path> is the destination directory where the product was installed.
4. Type the following command to see if SLP daemon is running:
5. Type the following command to stop the service location protocol (SLP):
# kill 24452
6. Run the removal program in graphical mode (see “Removing in graphical
mode”) or in unattended (silent) mode (see “Removing in unattended (silent)
mode” on page 32) to remove the CIM Agent and Service Location Protocol.
# <dest-path>/_uninst/uninstaller
where <dest-path> is the destination directory where the CIM Agent is installed.
2. If the removal program was not created during the CIM Agent installation, type
the following command:
where <dest-path> is the destination directory where the CIM Agent is installed.
3. The Welcome window opens. Click Next to continue with the removal program,
or click Cancel to exit the removal program.
6. The Finish window opens displaying information about the result of removal
(successfully or failed).
Perform the following steps to remove the CIM Agent in unattended (silent) mode:
1. Stop SLP, CIMOM, and all related processes.
2. Type the following command to run the removal program from the _uninst
subdirectory:
<dest-path>/_uninst/uninstaller -silent
where <dest-path> is the destination directory where the CIM Agent is installed.
If the program detects that the service location protocol (SLP) or the IBM CIM
Object Manager (CIMOM) services are running, it displays an error message
and the uninstallation fails. You can look for details in the
/tmp/cimagent/uninstall.log file. However, if you want the program to
automatically stop the services, you must set the stopProcessesResponse
option to yes in the command line:
Post-processing requirements:
The CIM Agent removal process does not remove configuration files, logs, and
similar files that are created during or after the installation process. They are
located in the destination path where CIM Agent was installed. For example, the
default destination path is /opt/IBM/cimagent.
Remove the directory and all of its contents (especially if you plan to reinstall the
CIM Agent).
Note: If you want to keep the old configuration files, save them in another location
on your system before removing them from the installation destination path,
so you can restore them later.
To remove the directory, cimagent, you must type the following command, for
example, from the IBM directory.
# rm -r /opt/IBM/cimagent
Note: The recursive remove is used in this example because the CIM Agent has a
deep directory structure. The recursive remove is very powerful and
dangerous. You should use the fully qualified directory name.
The following list of installation and configuration tasks are discussed in the order in
which they should be performed:
1. Before you install the CIM Agent on a Linux operating system, check the
hardware and software requirements listed in “ESS CIM Agent installation
requirements” on page 5.
2. Install the prerequisite ESS CLI 2105 for Linux software as instructed in
“Installing the ESS CLI on Linux.”
Attention: If you are upgrading from a previous version of the ESS CIM Agent,
you must uninstall the ESS CLI software that the previous CIM Agent required
and reinstall the latest ESS CLI software, which is level 2.3.0.13.
3. You can choose to install the CIM Agent either in graphical mode with the help
of a wizard or in unattended mode (also known as silent mode), which involves
customizing a response file and issuing a command.
a. If you want to install the CIM Agent in graphical mode, perform the
instructions in “Installing the CIM Agent on Linux in graphical mode” on page
35.
b. If you want to install the CIM Agent in unattended mode, perform the
instructions in “Installing the CIM Agent on Linux in unattended (silent)
mode” on page 43.
4. Configure the CIM Agent by performing the instructions in “Configuring the CIM
Agent on Linux” on page 47. You might want to revisit this section in the future
as you add, change, or delete CIMOM authentication and ESS information.
5. Enable the CIM Agent by performing the instructions in “Verifying connection to
the ESS” on page 51.
6. For instructions about removing the CIM Agent, see “Removing the CIM Agent
on Linux” on page 52. You only need to perform this optional task if you get
errors during installation verification or if the CIM Agent did not set the
environment variables.
Perform the following steps to install the ESS CLI on Linux (Red Hat 7.2):
1. Select the ESS CLI CD.
This ESS CLI CD contains the ESS CLI installation packages and the IBM
TotalStorage Enterprise Storage Server Command-Line Interfaces User’s Guide.
2. Select the IBMesscli-2.3.0.13-0.i386.rpm package.
where
v V represents the CLI version number
v R represents the release number
v M represents the number of times that the release package was built
v F represents the fix level
v X represents the number of times that the release package was built
Issue the following command to remove the earlier version of the ESS CLI:
# rpm -e IBMesscli -V.R.M.F-X
where
v V represents the CLI version number
v R represents the release number
v M represents the number of times that the release package was built
v F represents the fix level
v X represents the number of times that the release package was built
4. Verify that the required version of the ESS CLI is installed.
Review the installed programs on your Red Hat Linux system. The level of the
ESS CLI software must be 2.3.0.13 or later. To check the level, type the
following command:
# rpm -qa | grep IBMesscli
where 2.3.0.13-0 is the level reported from the rpm -qa command in step
4.
To verify if the ESS CLI is operational, type the following command:
# /opt/ibm2105cli/esscli
DiskGroup Category:
-------------------
list DiskGroup [-d "ess=EssId"]
WebUserAccount Category:
------------------------
list WebUserAccount [-d "ess=EssId"]
[-fmt user,acclvl,iprange,comments]
create WebUserAccount -d "ess=EssId user=UserId pwd=Password
acclvl=AccessLevel iprange=IPRange comments=’Comments’"
set WebUserAccount -d "ess=EssId user=UserId
(newuser=NewUserId|newpwd=NewPassword|
newacclvl=NewAccessLevel|newiprange=NewIPRange|
newcomments=’NewComments’)*"
delete WebUserAccount -d "ess=EssId user=UserId"
[root@store03 ibm2105cli]#
You can choose to install the CIM Agent in graphical mode with the help of an
installation wizard or in unattended (silent) mode, which involves customizing a
response file and issuing a command. If you want to install the CIM Agent in
unattended mode, see “Installing the CIM Agent on Linux in unattended (silent)
mode” on page 43, otherwise continue with this section. After the completion of
either kind of installation, you will then verify the installation of the CIM Agent in
section, “Verifying the CIM Agent installation on Linux” on page 47. Before you
install the CIM Agent on Linux, you should check the hardware and software
requirements listed in “ESS CIM Agent installation requirements” on page 5.
Steps:
Note: The description of commands in this task have the convention of optional
and substitution parameters between greater than “>” and less than “<”
symbols. You should become familiar with the explanation before entering
the command.
Perform the following steps to install the CIM Agent on your Linux system:
1. Log on as a user with root authority.
2. Insert the CIM Agent for ESS CD.
3. Create a mount point or choose an existing mount point.
Type the following command to create a mount point called /mnt/cdrom:
# mkdir /mnt/cdrom
4. Type the following command to mount the CD-ROM file system at the desired
mount point:
# mount/dev/cdrom/mnt/cdrom
5. Change the current directory to the mount point for the CD drive, in the LINUX
directory. For example, if the CD was mounted at the /mnt/cdrom mount point,
type the following command:
# cd /mnt/cdrom/LINUX
6. Check the README.linux file located in the LINUX directory on the CIM Agent
for ESS CD. The README.linux file can provide additional information that
supersedes information in this guide.
You can also find this installation guide on the CIM Agent for ESS CD under
the file name installguide.pdf in the document subdirectory.
7. The CIM Agent installation in graphical mode begins with a LaunchPad facility
to launch the installation program wizard. The LaunchPad facility provides links
for you to view various text files, such as the product overview, product
readme, post installation tasks, and various Adobe Acrobat files, such as, the
Installation guide, product license agreement and a browser link to the IBM
storage product technical support page.
The Installation guide and license agreement are in Adobe Acrobat file format
(.pdf). In order for the LaunchPad to provide links to the Adobe Acrobat files,
your system must have Adobe Acrobat Reader installed. In order for the
browser to link to the IBM storage product technical support page, you must
have a browser installed on your system where you start the LaunchPad
facility.
If you wish to use the LaunchPad facility links to view the Adobe Acrobat files,
you must have the Adobe Acrobat Reader bin location in your PATH
environment variable. You can verify this by running the following command:
echo $PATH
Locate the Adobe Acrobat Reader bin location in the PATH, for example,
/usr/opt/Acrobat5/bin. If the Adobe Acrobat Reader bin location is not in the
environment path, you can set it by typing the following command:
export PATH=$PATH:/usr/opt/Acrobat5/bin
# ./launchpad_linux
This command starts the CIM Agent LaunchPad, a small graphical program
that launches the wizard.
9. The LaunchPad window opens. Choose from the following options:
CIM Agent overview
Offers information about the CIM Agent.
Readme file
Offers any last minute product information that did not make it into this
installation guide.
Installation guide
Offers instructions on how to install the CIM Agent.
License Agreement
Offers information about the license of the CIM Agent.
CIM Agent Web site
Offers information from the product Web site.
Installation wizard
Starts the CIM Agent installation program.
Post installation tasks
Offers information about configuring the users and device
communications.
Exit Exits the Launchpad program.
The LaunchPad window remains open (behind the wizard) during the
installation. You can access product information after the installation has
started. The LaunchPad returns to the foreground when the installation is
complete. You can click Exit to close the LaunchPad.
13. The Product Installation Check window opens and the wizard verifies that your
machine meets the installation requirements.
v If you have a service location protocol (SLP) service that is different from
the SLP that the CIM Agent requires, the wizard displays an error and asks
you to stop the installation and remove this SLP service from the system.
v The wizard checks whether the ESS CLI client is installed on your machine.
v The wizard checks whether a version of the CIM Agent is already installed.
If the CIM Agent is installed, it checks if the SLP service and the IBM CIM
Object Manager (CIMOM) service is started. If these services are started
and you want to continue the installation program, select the Next button.
Or, if you want to exit the installation program, select the Cancel button. If
you choose to continue, you must stop all of the daemons and dependent
applications that use these services. You can save the old configuration (for
example, user names, passwords, and device IP addresses) by selecting
the check box that you see on the window.
netstat -a
16. The Installation Confirmation window opens. Click Install to confirm the
installation directory and file size, or click Cancel to exit the wizard.
18. The Finish window opens and notifies you whether the installation was
successful. Check the View post installation tasks check box if you want to
continue with post installation tasks when the wizard closes. Click Finish to
42 ESS API Reference
exit the wizard. You can view the installation log under <des-
path>/logs/install.log, where <des-path> is your destination directory.
19. Exit the LaunchPad program by clicking Exit on the LaunchPad window. If you
have not done so already, continue with the post installation tasks for the ESS
CIM Agent in the following sections. “Verifying the CIM Agent installation on
Linux” on page 47 is the next task. You can also continue the post installation
tasks using the following option:
a. Click Post installation tasks on the LaunchPad window.
b. Continue with the post installation tasks for the ESS CIM Agent by
following the instructions in this file.
20. When you are finished with the CIM Agent for ESS CD, type the following
command to remove the CD:
# umount/mnt/cdrom
Related topics:
v “Installing the CIM Agent on Linux in unattended (silent) mode”
v “Verifying the CIM Agent installation on Linux” on page 47
v “Installing the CIM Agent on Linux in graphical mode” on page 35
v “Removing the CIM Agent on Linux” on page 52
Context:
Steps:
Perform the following steps to install the CIM Agent in your Linux environment using
the unattended (silent) mode:
1. Log on as a user with root authority.
2. Type the following commands to locate the responsefile file on your CIM Agent
for ESS CD.
# cd /mnt/cdrom
# cd LINUX
3. Copy the responsefile file to your hard disk drive by typing the following
command:
# cp ./responsefile /root/xxxx
9. Close the command prompt window by entering a command, for example exit.
Continue with the post installation tasks for the ESS CIM Agent in the following
sections. “Verifying the CIM Agent installation on Linux” on page 47 is the next
task. You can also continue the post installation tasks using the following option:
a. Open the LaunchPad from the Linux directory of the CIM Agent for ESS CD
by typing # ./launchpad_linux.
b. Click Post installation tasks on the LaunchPad window. Continue with the
post installation tasks for the ESS CIM Agent by following the instructions in
this file.
Related topics:
v “Verifying the CIM Agent installation on Linux” on page 47
v “Installing the CIM Agent on Linux in graphical mode” on page 35
v “Configuring the CIM Agent on Linux” on page 47
v “Removing the CIM Agent on Linux” on page 52
Steps:
b. If the CIMOM is not started, issue the following command to run the
startcimom file.
<dest-path>/startcimom
Result:
If you are able to perform all of the verification tasks successfully, then the CIM
Agent has been successfully installed on your Linux system.
Related topics:
v “Configuring the CIM Agent on Linux”
Context:
Note: For a client installation, you must copy this certificate from the server and
install it in the destination directory on the client machine if you intend to
run in secure mode.
Steps:
Note: In addition to the configuration steps below, you can use the modifyconfig
command to change the configuration of some of the parameters that were
configured during installation. You can change the CIM Agent port value,
protocol (HTTP/HTTPS), and enable or disable the debug option. See
“modifyconfig” on page 122 for a description of the modifyconfig command
syntax.
1. Configure the CIM Agent for each ESS that the CIM Agent can access.
a. Type the following command:
# <dest-path>/setdevice
b. Obtain an IP address, user name, and password for each ESS that the CIM
Agent will manage.
c. Type the following command for each ESS:
>>>addess <9.111.111.111> <essuser> <esspass>
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is a sample output:
An ess provider entry for IP 9.111.111.111 successfully added
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents teh Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is a sample output:
An essserver entry for IP 9.111.111.111 successfully added
# <dest-path>/startcimom
where <dest-path> is the destination path where the CIM Agent is installed.
Restriction: You cannot delete or modify the current user that is logged in
using the setuser command.
c. Obtain a user name and password for each user that can manage the
CIMOM. Type the following command for each user:
>>>adduser <cimuser> <cimpass>
where
v cimuser represents the new user name to access the ESS CIM Agent
CIMOM
v cimpass represents the password for the new user name to access the
ESS CIM Agent CIMOM
The following is a sample output:
An entry for user cimuser successfully added
Result:
If you are able to perform all of the configuring tasks successfully, then the CIM
Agent has been successfully installed on your Linux system.
Related topics:
v “Verifying connection to the ESS” on page 51
Prerequisites:
| where:
| v -s primaryservername represents the IP address or the complete host name of
| an ESS Copy Services server.
| v -v designates that all responses from the server be displayed.
| This following is an example of the output you receive if the CLI.CFG is set
| correctly (sltb0c0 is the ESS primary Copy Services server in this example):
| [root@bluegrass ibm2105cli]# ./rsTestConnection.sh -v -s sltb0c0
| rsWebTest: Using sltb0c0 as server name
| rsWebTest: HeartBeat to the server was successful.
| rsWebTest: command successful
||
Issue the esscli list server command from a Command Prompt window to confirm
connectivity to the rest of the ESSs in the domain.
esscli -u <essuser> -p <esspass> -s <9.111.111.111> list server
where:
v essuser is an Enterprise Storage Server Specialist user name.
v esspass is the Enterprise Storage Server Specialist password for that user name.
v 9.111.111.111 is the IP address of the Enterprise Storage Server.
Note: The ESS CLI does not set the PATH variable. Update the PATH environment
variable using the path where the CLI for ESS 2105 is installed. See
“Installing the ESS CLI on Linux” on page 33 for more information.
A response similar to the following is displayed:
Thu Oct 09 11:26:32 PDT 2003 IBM ESSCLI 2.3.0.1
Steps:
Perform the following to start and verify the service location protocol (SLP) daemon
and the CIMOM.
1. If the SLP daemon is not started, type the following command from a separate
Command Prompt window:
# /etc/init.d/slpd start
This session will remain active until you stop it. You should keep it running as
long as the CIM Agent is running.
2. If the CIMOM is not started, start it by performing the following steps:
a. Run the startcimom file in a Command Prompt window, by typing the
following command:
# <dest-path>/startcimom
where <dest-path> is the destination directory where the CIM Agent is
installed.
b. The default is to start the secure CIMOM. It will register itself with SLP and
accept requests on port 5989.
3. Enter the following command to locate all WBEM services (for example,
CIMOMs) in the local network, display them and then call the CIMOMs on the
local machine only requesting information about whether the CIMOMs know of
any ESS.
Run the following command from a Command Prompt window:
# <dest-path>/verifyconfig -u <user> -p <password>
Where <user> and <password> are the user and password of a cimom userid
created with setuser command.
Here is a sample output:
# verifyconfig -u guest -p guest
Verifying configuration of ESS CIM Agent...
Communicating with SLP to find WBEM services...
1 WBEM services found
host=kirchhofer, port=5989
Connecting to ESS CIM Agent, host=kirchhofer, port=5989
Found 1 IBMTSESS_StorageSystem instances
Verification Successful
Result:
Steps:
If the CIMOM daemon is started, type the following command to stop it:
# <dest-path>/stopcimom
# kill 61026
4. Run the removal program in graphical mode (see “Removing in graphical
mode”) or in unattended (silent) mode (see “Removing in unattended (silent)
mode” on page 57) to remove the IBM CIM Object Manager Service and
Service Location Protocol.
6. The Finish window opens displaying information about the result of removal
(successfully or failed).
Perform the following step to remove the CIM Agent in unattended (silent) mode:
1. You can invoke the unattended (silent) uninstall program by issuing the
following commands:
# <dest-path>/_uninst/uninstaller -silent
If the CIMOM Agent server or the Service Location Protocol are still running, the
uninstall will fail. In this case, you must stop both of those services or run the
uninstall program with -G stopProcessesResponse=“yes”:
Post-processing requirements:
The CIM Agent removal process does not remove configuration files, logs, and
similar files that are created during or after the installation process. They are
located in the destination path where CIM Agent component was installed. For
example, the default target directory is /opt/IBM/cimagent.
Remove the directory and all of its contents (especially if you plan to reinstall CIM
Agent).
Note: If you want to keep the old configuration files, before removing them from the
installation destination path, save them in another location on your system to
restore them later.
To remove the directory cimagent you must type the following command:
# rm -Rf /opt/IBM/cimagent
Note: The recursive remove is used in the example because the CIM Agent has a
deep directory structure. The recursive remove is very powerful and
dangerous. You must use the fully qualified directory name.
The following list of installation and configuration tasks are in the order in which
they should be performed:
1. Before you install the ESS CIM Agent for Windows, you should check the
hardware and software requirements listed in “ESS CIM Agent installation
requirements” on page 5.
2. Install the prerequisite ESS CLI software, as instructed in “Installing the ESS
CLI for Windows” on page 60.
Attention: If you are upgrading from a previous version of the ESS CIM Agent,
you must uninstall the ESS CLI software that was required by the previous CIM
Agent and reinstall the latest ESS CLI software, which is level 2.3.0.13.
3. You can choose to install the ESS CIM Agent either in graphical mode with the
help of an installation wizard or in unattended mode (also known as silent
mode), which involves customizing a response file and issuing a command.
a. If you want to install the ESS CIM Agent in graphical mode perform the
instructions in “Installing the ESS CIM Agent on Windows in graphical mode”
on page 61.
b. If you want to install the ESS CIM Agent in unattended mode perform the
instructions in “Installing the ESS CIM Agent on Windows in unattended
(silent) mode” on page 69.
4. Verify the installation by performing the instructions in “Verifying the ESS CIM
Agent Windows installation” on page 71.
5. Configure the ESS CIM Agent for Windows by performing the instructions in
“Configuring the ESS CIM Agent for Windows” on page 72. You might want to
revisit this section in the future as you add, change, or delete CIMOM
authentication and ESS information.
6. Configure the ESS CIM Agent to run in secure mode by performing the optional
instructions in “Configuring the ESS CIM Agent to run in unsecure mode” on
page 75. Verify connection to your ESS by performing the instructions in
“Verifying connection to the ESS” on page 76.
7. Remove the ESS CIM Agent by performing the instructions in “Removing the
ESS CIM Agent for Windows” on page 80. You only need to perform this
optional task if you get errors during installation verification or if the ESS CIM
Agent did not set the environment variables.
Steps:
Perform the following steps to install the ESS CLI for Windows:
1. Insert the CD for the ESS CLI in the CD-ROM drive.
The ESS CLI software can be found on the CD with the label ESS CLI.
Note: The ESS CLI installation wizard detects if you have an earlier level of the
ESS CLI software installed on your system and uninstalls the earlier
level. After the uninstallation, you must restart the ESS CLI installation
program to install the current level of the ESS CLI.
2. Open the document IBM TotalStorage Enterprise Storage Server:
Command-Line Interfaces User’s Guide on the ESS CLI CD. (The ESS CLI is
referred as the Storage Management CLI in this Guide.)
3. Follow the instructions in the guide for installing the ESS CLI on a Windows
operating system. The product you need can be found in the winCLI\IBMesscli
subdirectory of the ESS CLI installation CD.
4. Respond Yes if you are prompted by the ESS CLI installation program to have it
set the system path for you.
5. Reboot your system now or before proceeding with the ESS CIM Agent
installation. You must do this because the ESS CLI is dependent on
environmental variable settings which will not be effective for the ESS CIM
Agent. This is because the CIM Agent runs as a service unless you reboot your
system.
6. Verify that the ESS CLI is installed:
a. Click Start –> Settings –> Control Panel.
b. Double-click the Add/Remove Programs icon.
c. Verify that there is an “IBM ESS CLI” entry.
7. Verify that the ESS CLI is operational and can connect to the ESS. For
example, from a command prompt window, issue the following command:
esscli -u essuser -p esspass -s 9.111.111.111 list server
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for the
user name
The following response is displayed:
Thu Oct 09 11:22:28 PDT 2003 IBM ESSCLI 2.3.0.1
Post-processing requirements:
If the ESS CLI is installed, but the environmental variable PATH that is available to
the parent process does not include the IBM ESS CLI directory location, the
program might display an error message. This can occur when the ESS CLI is
invoked from the IBM ESS CLI directory in the Command Prompt window that was
opened before the ESS CLI was installed, for example:
C:\Program Files\IBM>esscli
“esscli” is not recognized as an internal or external command, operable program or
batch file.
If the ESS CLI was recently installed, the INSTALL environmental variable will not
be available to processes which started before the CLI installation such as
Command Prompts or the Windows Services Manager. You may see the following
message in a Command Prompt window which was started before the installation of
the ESS CLI.
C:\Program Files\IBM ESS CLI>esscli
esscli: No value is specified for the <INSTALL> system variable. If the CLI was recently
installed,it might be necessary to reboot in order to refresh the INSTALL environment
variable.
If you receive error messages similar to these, you must reboot the system to
ensure that the ESS CLI environmental variables take effect.
Steps:
Note: If you are viewing the folder with Windows Explorer with the option
selected to hide file extensions for known file types, find the
LaunchPad file with the file type of MS-DOS Batch File.
3. The following options are displayed when the LaunchPad window opens:
CIM Agent Overview Offers information about the ESS CIM Agent
Readme file Offers any last minute product information that
did not make it into this installation guide
Installation guide Offers instructions on how to install the ESS
CIM Agent (a softcopy of this document)
License agreement Offers information about the license for the ESS
CIM Agent
CIM Agent Web site Offers information from the product Web site
Installation wizard Starts the ESS CIM Agent installation program
Post installation tasks Offers information about configuring users and
device communication
Exit Exits the ESS CIM Agent LaunchPad program
Note: The LaunchPad window remains open behind the installation wizard so
that you can access product information during the installation process.
Click Exit if you want to close the LaunchPad.
6. There might be a slight delay while the software loads on your system. After the
software loads a DOS prompt window opens to display the following message:
Initializing InstallShield Wizard...
Preparing Java (tm) Virtual Machine ............................. .
......................................................
7. The Welcome window opens suggesting what documentation you should review
prior to installation. Click Next to continue, or click Cancel to exit the
installation.
netstat -a
12. The Installation Confirmation window opens. Click Install to confirm the
installation location and file size. Click Cancel to exit the installation wizard or
go back to the previous window by clicking Back.
Note: If you click Cancel a popup window opens asking you to confirm the
cancellation of the installation wizard: “Cancel the current operation?
Yes No”. Be aware that if you confirm the cancellation by clicking Yes,
the information you entered or selected in previous windows is not
saved. You must start the installation again from the first step.
Related topics:
v “Installing the ESS CIM Agent on Windows in unattended (silent) mode”
v “Verifying the ESS CIM Agent Windows installation” on page 71
v “Configuring the ESS CIM Agent for Windows” on page 72
v “Configuring the ESS CIM Agent to run in unsecure mode” on page 75
v “Verifying connection to the ESS” on page 76
v “Removing the ESS CIM Agent for Windows” on page 80
Steps:
Perform the following steps to install the ESS CIM Agent in your Windows
environment using the unattended mode:
1. Log on as local administrator user.
2. Insert the CIM Agent for ESS CD.
3. Locate the response file (named responsefile) on your CIM Agent for ESS CD in
the W2K directory.
4. Using Windows Explorer or a command prompt, copy the response file to your
hard drive.
5. Using a text editor modify the default options in the response file with the values
you want:
v Remove the # character from the beginning of a line if you do not want to
use the default value. Change the default value to the value that you want for
that option. You must enclose all values in double quotation marks (″″).
v The <-P product.installLocation> option defines the default directory where
the product is to be installed. To specify a destination directory other than the
default, remove the # character from the corresponding line and replace the
default directory with the desired directory.
10. Close the command prompt window by entering a command, for example exit.
Continue with the post installation tasks for the ESS CIM Agent using the
instructions in the following sections. “Verifying the ESS CIM Agent Windows
installation” is the next task. You can also continue the post installation tasks
using the following option:
a. Open the LaunchPad from the command prompt window by typing
LaunchPad.
b. Click Post installation tasks on the LaunchPad window. Continue with the
post installation tasks for the ESS CIM Agent by following the instructions
in this file.
Related topics:
v “Verifying the ESS CIM Agent Windows installation”
v “Installing the ESS CIM Agent on Windows in graphical mode” on page 61
v “Configuring the ESS CIM Agent for Windows” on page 72
v “Configuring the ESS CIM Agent to run in unsecure mode” on page 75
v “Verifying connection to the ESS” on page 76
v “Removing the ESS CIM Agent for Windows” on page 80
Steps:
Perform the following steps to verify your ESS CIM Agent installation:
1. Verify the installation of the Service Location Protocol (SLP).
a. Verify that the Service Location Protocol is started. Select Start -> Settings
-> Control Panel. Double-click the Administrative Tools icon. Double-click
the Services icon.
Result:
If you are able to perform all of the verification tasks successfully, the ESS CIM
Agent has been successfully installed on your Windows system. Next, perform the
configuration tasks in “Configuring the ESS CIM Agent for Windows.”
Related topics:
v “Configuring the ESS CIM Agent for Windows”
v “Configuring the ESS CIM Agent to run in unsecure mode” on page 75
v “Verifying connection to the ESS” on page 76
v “Removing the ESS CIM Agent for Windows” on page 80
Note: In addition to the configuration steps below, you can use the modifyconfig
command to change the configuration of some of the parameters that were
configured during installation. You can change the CIM Agent port value,
protocol (HTTP/HTTPS), and enable or disable the debug option. See
“modifyconfig” on page 122 for a description of the modifyconfig command
syntax.
1. Configure the ESS CIM Agent for each Enterprise Storage Server to which the
ESS CIM Agent can have access. Open a Command Prompt window and
change directory into the ESS CIM Agent directory, for example: C:\Program
Files\IBM\cimagent. Type the following command to start the interactive
setdevice tool to identify ESSs servers to the CIMOM:
setdevice
Obtain an IP address, user name, and password for each device (such as, an
ESS) that the ESS CIM Agent is to manage:
a. Type the following command for each ESS:
>>>addess 9.111.111.111 essuser esspass
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is a sample output:
An ess provider entry for IP 9.111.111.111 successfully added
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is a sample output:
An essserver entry for IP 9.111.111.111 successfully added
Note: You might see an error message popup window labeled “java.exe -
Application Error”. You must click OK to close that window to
continue.
If the CIMOM has stopped successfully, the following message is displayed:
The IBM CIM Object Manager - ESS service was stopped successfully.
Note: The users which you will configure to have authority to use the CIMOM
are uniquely defined to the CIMOM software and have no required
relationship to operating system user names, the ESS Specialist user
names, or the ESS Copy Services user names.
Upon installation of the CIM Agent for ESS, the provided default user name is
“superuser” with a default password of “passw0rd”. The first time you use the
setuser tool, you must use this user name and password combination. Once
you have defined other user names, you can start the setuser command by
specifying other defined CIMOM user names.
Note: The CIMOM must have been started to run the setuser command.
a. Open a Command Prompt window and change directory to the ESS CIM
Agent directory, for example:
C:\Program Files\IBM\cimagent
b. Type the following command at the command prompt to start the setuser
interactive session to identify users to the CIMOM:
setuser -u superuser -p passw0rd
c. Type the following command in the setuser interactive session to define
new users:
>>>adduser cimuser cimpass
where
Note: Unlike the setdevice actions, you do not need to stop and restart the
CIMOM to make the setuser actions take effect.
Result:
If you were able to perform all of the configuring tasks successfully, the ESS CIM
Agent has been successfully installed and configured on your Windows system.
Related topics:
v “Configuring the ESS CIM Agent to run in unsecure mode”
v “Verifying connection to the ESS” on page 76
v “Removing the ESS CIM Agent for Windows” on page 80
Perform the following steps to configure the ESS CIM Agent to run in unsecure
mode:
1. Using the Windows Start Menu facility, stop the CIMOM by selecting Start ->
Programs -> IBM TotalStorage CIM Agent for ESS -> Stop CIMOM service.
2. Using the Windows Services facility, stop and start the Service Location
Protocol (SLP) service by selecting Start -> Settings -> Control Panel.
Double-click Administrative Tools and double click Services. Right click
Service Location Protocol in the Name column and select Stop in the menu.
After the SLP stops, start it again by right-clicking on Service Location Protocol
in the Name column and selecting Start in the menu. After the SLP starts, close
the Services Window and the Administrative Tools Window.
3. Find the cimom.properties file and edit it with a tool such as notepad, setting the
properties as shown in the following example:
Port=5988
ServerCommunication=HTTP
DigestAuthentication=False
Once the CIMOM starts, it accepts requests over HTTP using basic
authentication.
Related topics:
v “Verifying connection to the ESS”
v “Removing the ESS CIM Agent for Windows” on page 80
If you see other messages indicating that the request has timed out, see
your Network Administrator for help on establishing network connectivity
from the system where the ESS CIM Agent is installed.
2. Verify that the ESS CLI is operational and can connect to the ESS. To do this,
perform the following steps:
a. Open a Command Prompt Window.
b. Issue the following command:
essc i -u essuser -p esspass
-s 9.111.111.111 list server
where
v 9.111.111.111 represents the IP address of the Enterprise Storage Server
v essuser represents the Enterprise Storage Server Specialist user name
v esspass represents the Enterprise Storage Server Specialist password for
the user name
The following is an example of a successful response:
Thu Oct 09 11:22:28 PDT 2003 IBM ESSCLI 2.3.0.1
Server Mode Mfg WWN CodeEC Cache NVS Racks
---------- ----- --- ---------------- --------- ----- ----- -----
2105.22232 800 013 5005076300C09470 2.3.0.357 8GB 2GB
| c. Verify that the CLI.CFG file is set correctly. From the command prompt
| window, issue the following command:
| rsTestConnection.exe /s /v primaryservername
| where
| v /s primaryservername represents the IP address or the complete host
| name of an ESS Copy Services server.
| v /v designates that all responses from the server be displayed.
Note: It has been found in some cases that the ESS CLI will not work correctly
unless the system has been rebooted following the new installation of the
ESS CLI.
3. Using the Windows Services Facility, verify that the SLP is active by selecting
Start -> Settings -> Control Panel. Double-click the Administrative Tools
icon. Double-Click the Services icon.
v Find the Service Location Protocol (SLP) in the Name column.
For this component, the Status column should be marked Started and the
Startup Type column should be marked Manual.
Otherwise, the window tracks the progress of the starting of the CIMOM. Be
aware that the starting of the CIMOM might take a while because it is
connecting to the defined ESS servers and is caching that information for future
use. When the CIMOM has completed starting, the following message is
displayed:
The IBM CIM Object Manager - ESS service was started successfully
Note: If the verification of the CIMOM registration is not successful, stop and
restart the SLP and CIMOM services.
6. Use the verifyconfig command to locate all WBEM services in the local
network. This command verifies that you have configured the ESS CIM Agent
and can connect to at least one ESS.
Type the verifyconfig command in another command prompt window in the
directory where the ESS CIM Agent was installed, for example:
c:\program files\ibm\cimagent
verifyconfig -u <username> -p <password>
where username is the user name and password is the password for the user
name that you configured to manage the CIMOM.
If successful, output similar to the following is displayed:
C:\program files\ibm\cimagent>verifyconfig -u guest -p guest
Verifying configuration of ESS CIM Agent...
Communicating with SLP to find WBEM services...
1 WBEM services found
host=kirchhofer, port=5989
Connecting to ESS CIM Agent, host=kirchhofer, port=5989
Found 1 IBMTSESS_StorageSystem instances
Verification Successful
You can find more information about the possible cause of this error message
by examining the cimomx.log (where x can be a number from 1 - 9).
If you have a network connection problem or you have set an incorrect IP
address for the ESS while using the setdevice tool, the ESS CLI cannot
connect to the ESS. A message pair similar to the following can appear in the
log:
2003-10-30 08:37:03,PST-08:00 E CIMOM[com.ibm.provider.ess.EssCLICmdHandler.
outputEssCliError(Unknown Source)]: ESSCLI Error
[java.lang.Object{esscli 204: The connection to the specified server was
not established.}]
If you have entered an incorrect user name or password for the ESS while
using the setdevice tool, the ESS CLI can connect to the ESS but will not be
able to authenticate. A message pair similar to the following can appear in the
log:
2003-10-30 10:32:53,PST-08:00 E CIMOM[com.ibm.provider.ess.EssCLICmdHandler.
outputEssCliError(Unknown Source)]: ESSCLI Error
[java.lang.Object{esscli 510: Access was denied by the server.}]
If you did not reboot after installing the ESS CLI or before you ran the ESS
CIM Agent verifyconfig program, the ESS CLI will have a problem finding an
environmental variable. A message similar to the following can appear in the
log:
v Error Type 4. No ESS CIM Agent running or registered with SLP on current
host
If the ESS CIM Agent is not started or it has not registered with SLP on the
current host, the following message is displayed in the output messages in
the Command Prompt window:
No ESS CIM Agent running or registered with SLP on current host
Result:
Steps:
4. The Welcome window for the Uninstaller opens. Click Next to continue or click
Cancel to stop the removal of the ESS CIM Agent.
Note: If the SLP service was installed by a CIM Agent other than the ESS
CIM Agent, only the SLP files that were copied during the ESS CIM
Agent installation are removed and the SLP windows service will not
be uninstalled.
7. The Uninstallation Progress window opens. Wait for the program to remove the
ESS CIM Agent product.
If the program could not remove some information from the system, the
Restart window opens. You will need to restart your system. At the restart, the
previously locked files are released and automatically deleted.
9. Close the Add/Remove Programs window.
10. Restart the system (now or later) to complete the removal process.
Note: If you want to keep the old configuration files, save them in another
location on your system to restore them later before removing them from
the installation destination path.
4. Perform other cleanup tasks:
a. Close both the Services and the Add/Remove Program windows if you have
not already done so.
b. Empty your Windows Recycle Bin to reclaim the disk space that was made
available during the removal process.
Before you use the commands, refer to the appropriate chapter for your operating
system for information about how to install or configure and enable the CIM Agent:
v AIX: Chapter 2, “CIM Agent on AIX,” on page 7
v Linux: Chapter 3, “CIM Agent for Linux,” on page 33
v Windows 2000 or later: Chapter 4, “ESS CIM Agent for Windows,” on page 59
Description of commands
You can use several commands on the CIM Agent command line interface to
perform various tasks within the CIM Agent. Table 2 lists the commands that you
can use with the CIM Agent.
Table 2. Summary of CIM Agent commands
Command Type of Description
command
modifyconfig Configuration Updates the cimom.properties configuration
file.
mkcertificate Utility Runs during installation to ensure that your
security is not compromised.
setdevice Configuration Updates the configuration of the managed
devices
setuser Configuration Updates the configuration for the users of the
Enterprise Storage Server.
slpd Utility Starts automatically during installation and
registers itself with the SLP daemon and
enables the client code to find the ESS CIM
Agent service.
startcimom Operational Starts the CIM Agent
stopcimom Operational Stops the CIM Agent
verifyconfig Utility Locates all WBEM services in the local
network and displays them, then calls the
CIMOMs on the local machine to request
information about the ESS.
Syntax diagrams
A syntax diagram uses symbols to represent the elements of a command and to
specify the rules for using these elements. This section shows you how to read the
syntax diagrams that represent the CIM Agent commands. In doing so, it defines
the symbols that represent the CIM Agent command elements.
Main path line
Begins on the left with double arrowheads (>>) and ends on the right with
two arrowheads facing each other (><). If a diagram is longer than one line,
each line to be continued ends with a single arrowhead (>) and the next
line begins with a single arrowhead. Read the diagrams from left-to-right,
top-to-bottom, following the main path line.
Keyword
setuser
adduser
Indicate the parameters or arguments you must specify for the command.
Required keywords appear on the main path line. Required keywords that
cannot be used together are stacked vertically.
Optional keywords
-h
-help
-?
on
-cre off
newports ALL
PortId1,PortId2,...
Represents a parameter or argument that you can specify more than once.
A repeatable keyword or value is represented by an arrow returning to the
left above the keyword or value.
parameter values
user password
chuser password
Fragment name
Fragment name:
( fragment details )
Breaks up syntax diagrams that are too long, too complex, or repetitious.
The fragment name is inserted in the main diagram, and the actual
fragment is shown below the main diagram.
Emphasis
The following typefaces are used to show emphasis:
boldface Text in boldface represents menu items and command names.
italics Text in italics is used to emphasize a word. In command syntax, it
is used for variables for which you supply actual values.
monospace Text in monospace identifies the data or command instances that you
type, samples of command output, examples of program code or
messages from the system, or names of command flags,
parameters, arguments, and name-value pairs.
Configuration commands
The following sections describe the following CIM agent configuration commands
that you can invoke in interactive mode:
v setuser
v setdevice
v modifyconfig
Description of subcommands
You can use several subcommands on the CIM Agent configuration commands to
perform various configuration tasks within the CIM Agent. Table 3 describes of the
subcommands that you can use with the CIM Agent configuration commands in
interactive mode:
Table 3. Summary of CIM Agent setuser and setdevice subcommands
Command Subcommands and description
setuser
adduser Adds a user entry to the password file.
chuser Changes the user entry in the password
file.
lsuser Lists the users that currently exist in the
password file.
rmuser Removes the user from the password file.
setentry Lists or sets the -create, -quiet, or -equiv
options globally.
setoutput Lists or sets the -hdr option globally.
exit Terminates the interactive session and
exits from the application.
help or ? Lists the available subcommands.
You can use the following subcommands with the setuser command:
v adduser
v chuser
v lsuser
v rmuser
v setentry
v setoutput
v exit
v help or ?
Syntax
setuser -u user -p password
This section describes the syntax for the options and values that you can use with
the setuser subcommand.
Parameters
[-u] Use -u with your username to log on to CIMOM and modify accounts.
[-p] Use -p with your password to log on to CIMOM and modify accounts.
Examples
When you type the following subcommand, using the setuser command in
interactive mode,
>>>adduser jsmith abcdef
Syntax
adduser
-h -q on
-help -quiet off
user password
Parameters
This section describes the syntax for the options and values you can use with the
adduser subcommand.
[-h | -help]
Displays a help message.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input if it is
to replace an existing entry.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input if it is to replace an existing entry.
Examples
When you type the following subcommand, using the setuser command in
interactive mode,
>>>adduser jsmith abcdef
Syntax
chuser
-h -q on
-help -quiet off
user password
Parameters
This section describes the syntax for the options and values you can use with the
chuser subcommand.
[-h | -help]
Displays a help message.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the subcommand executes effectively.
Examples
When you type the following subcommand using the setuser command in
interactive mode:
>>>chuser jsmith xyztuv
Syntax
lsuser
-h -hdr on user
-help off
Parameters
This section describes the syntax for the options and values you can use with the
lsuser subcommand.
[-h | -help]
Displays a help message.
[-hdr on | off]
Use -hdr to specify whether or not the lsuser subcommand displays the header
line.
If you set the value to on, the lsuser subcommand displays a header line
before the lines containing information about the users.
If you set the value to off, the lsuser subcommand does not display the header
line.
Examples
When you type the following subcommand using the setuser command in
interactive mode:
>>>lsuser -hdr on
Syntax
rmuser user
-h -q on
-help -quiet off
Parameters
This section describes the syntax for the options and values you can use with the
rmuser subcommand.
[-h | -help]
Displays a help message.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the command executes effectively.
Examples
When you type the following subcommand using the setuser command in
interactive mode:
>>>rmuser jsmith
Syntax
setentry
-h -q on
-help -quiet off
Parameters
This section describes the syntax for the options and values you can use with the
setentry command.
[-h | -help]
Displays a help message.
[-q[uiet] on | off]
Use -quiet in interactive mode to set the -quiet option to on or off for the
subsequent commands in the interactive session. It applies as a default to the
subsequent adduser, chuser or rmuser subcommands, except for the
subcommands that explicitly specify the -quiet option.
Notes:
1. When the setuser command starts, the -quiet option is set to either the
value that is specified as command options (if present in the command line)
or to the following initial default value: -quiet on.
2. The setentry subcommand without any argument displays the current state
of the options -quiet.
Examples
When you type the following subcommand and parameters using the setuser
command in interactive mode:
>>>setentry
Syntax
setoutput
-h -hdr on
-help off
Parameters
This section describes the syntax for the options and values you can use with the
setoutput command.
[-h | -help]
Displays a help message.
[-hdr on | off]
Use -hdr in interactive mode to set the -hdr option to on or off for the
subsequent commands in the interactive session. It applies as a default to the
subsequent lsuser commands, except for the commands that explicitly specify
the -hdr option.
Notes:
1. When the setuser command starts, the -hdr option is set to the value
specified as command option (if present in the command line) or to the
following initial default value: -hdr on.
2. The setentry subcommand without any argument displays the current state
of the option -hdr.
Examples
When you type the following subcommand and parameters using the setuser
command in interactive mode:
>>>setoutput
You can use the following commands with the setdevice command:
v addess
v addessserver
v chess
v chessserver
v lsess
v lsessserver
v rmess
v rmessserver
v setentry
v setoutput
v exit
v help or ?
Syntax
addess
-h -cre on
-help -create off
-q on -e on
-quiet off -equiv off
ip user password
Parameters
This section describes the syntax for the options and values you can use with the
addess subcommand.
[-h | -help]
Use -h or -help to display the help for the adduser subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-e[quiv] on | off]
Use -e or -equiv to specify whether or not the addess and chess
subcommands are equivalent.
If you set the value to on, the addess and chess subcommands are equivalent.
The commands create an entry if an entry with the same key does not exist. Or,
the command updates the existing entry if an entry with the same key already
exists.
If you set the value to off, addess and chess are not considered equivalent.
You get an error message when you use addess if an entry with the same key
already exists. Or, you get an error message when you use chess if an entry
with the same key does not exist.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input if it is to replace an existing entry (assuming -equiv on).
Syntax
addessserver
-h -cre on
-help -create off
-q on -e on
-quiet off -equiv off
ip user password
Parameters
This section describes the syntax for the options and values you can use with the
addessserver subcommand.
[-h | -help]
Use -h or -help to display the help for the adduserserver subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-e[quiv] on | off]
Use -e or -equiv to specify whether or not the addessserver and chess
subcommands are equivalent.
If you set the value to on, the addessserver and chess subcommands are
equivalent. The commands create an entry if an entry with the same key does
not exist. Or, the command updates the existing entry if an entry with the same
key already exists.
If you set the value to off, addessserver and chess are not considered
equivalent. You get an error message when you use addessserver if an entry
with the same key already exists. Or, you get an error message when you use
chess if an entry with the same key does not exist.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input if it is to replace an existing entry (assuming -equiv on).
Syntax
chess
-h -cre on
-help -create off
-q on -e on
-quiet off -equiv off
ip user password
Parameters
This section describes the syntax for the options and values you can use with the
chess subcommand.
[-h | -help]
Use -h or -help to display the help for the chess subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-e[quiv] on | off]
Use -e or -equiv to specify whether or not the addess and chess
subcommands are equivalent.
If you set the value to on, the addess and chess subcommands are equivalent.
The commands create an entry if an entry with the same key does not exist. Or
the command updates the existing entry if an entry with the same key already
exists.
If you set the value to off, addess and chess are not considered equivalent.
You get an error message when you use addess if an entry with the same key
already exists. Or, you get an error message when you use chess if an entry
with the same key does not exist.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the command executes successfully.
Syntax
chessserver
-h -cre on
-help -create off
-q on -e on
-quiet off -equiv off
ip user password
Parameters
This section describes the syntax for the options and values that you can use with
the chessserver subcommand.
[-h | -help]
Use -h or -help to display the help for the chessserver subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-e[quiv] on | off]
Use -e or -equiv to specify whether or not the addessserver and chessserver
subcommands are equivalent.
If you set the value to on, the addessserver and chessserver subcommands
are equivalent. The commands create an entry if an entry with the same key
does not exist. Or, the command updates the existing entry if an entry with the
same key already exists.
If you set the value to off, addessserver and chessserver are not considered
equivalent. You get an error message when you use addessserver if an entry
with the same key already exists. Or, you get an error message when you use
chessserver if an entry with the same key does not exist.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the command executes successfully.
Syntax
lsess
-h -hdr on
-help off
ip
user
Parameters
This section describes the syntax for the options and values you can use with the
lsess subcommand.
[-h | -help]
Use -h or -help to display the help for the lsess subcommand.
[-hdr] on | off]
Use -hdr to control the display of the header line when using the lsess
subcommand.
If you set the value to on, the lsess subcommand displays a header line before
the lines containing information about the ESS entries.
If you set the value to off, the lsess subcommand does not display the header
line before the lines containing information about the ESS entries.
Examples
When you type the following subcommand and parameters using setdevice
command in interactive mode:
>>>lsess -hdr off 1.2.3.4
Syntax
lsessserver
-h -hdr on
-help off
ip
user
Parameters
This section describes the syntax for the options and values you can use with the
lsess subcommand.
[-h | -help]
Use -h or -help to display the help for the lsessserver subcommand.
[-hdr] on | off]
Use -hdr to control the display of the header line when using the lsessserver
subcommand.
If you set the value to on, the lsessserver subcommand displays a header line
before the lines that contain information about the ESS Copy Services entries.
If you set the value to off, the lsessserver subcommand does not display the
header line before the lines that contain information about the ESS Copy
Services entries.
Examples
When you type the following subcommand and parameters using setdevice
command in interactive mode:
>>>lsessserver -hdr off 1.2.3.4
Syntax
rmess
-h -cre on
-help -create off
ip
-q on
-quiet off
Parameters
This section describes the syntax for the options and values you can use with the
rmess subcommand.
[-h | -help]
Use -h or -help to display the help for the rmess subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the command executes effectively.
Examples
When you type the following subcommand and parameters using the setdevice
command in interactive mode:
>>>rmess -q on 1.2.3.4
Syntax
rmessserver
-h -cre on
-help -create off
ip
-q on
-quiet off
Parameters
This section describes the syntax for the options and values you can use with the
rmessserver subcommand.
[-h | -help]
Use -h or -help to display the help for the rmessserver subcommand.
[-cre[ate] on | off]
Use -cre or -create to create the configuration file if it does not already exist.
If you set the value to on, the command automatically creates the configuration
file if it does not already exist.
If you set the value to off and the configuration file does not already exist, you
get an error message and the operation stops.
[-q[uiet] on | off]
Use -q or -quiet to prevent the dialog for confirmation or parameter input.
If you set the value to on, you do not get a prompt that requests that you
confirm the parameter input.
If you set the value to off, you get a prompt that requests that you confirm the
parameter input before the command executes effectively.
Examples
When you type the following subcommand and parameters using the setdevice
command in interactive mode:
>>>rmessserver -q on 1.2.3.4
Syntax
setentry
-h -q on
-help -quiet off
Parameters
This section describes the syntax for the options and values you can use with the
setentry subcommand.
[-h | -help]
Displays a help message.
[-q[uiet] on | off]
Use -quiet in interactive mode to set the -quiet option to on or off for the
subsequent subcommands in the interactive session. It applies as a default to
the subsequent addess, chess or rmess subcommands, except for the
subcommands that explicitly specify the -quiet option.
Notes:
1. When the setdevice command starts, the -quiet option is set to the values
that are specified as command options (if present in the command line) or
to the initial default value of -quiet on.
2. The setentry subcommand without any argument displays the current state
of the -quiet option.
Examples
When you type the following subcommand and parameters using the setdevice
command in interactive mode,
>>>setentry
Syntax
setoutput
-h -hdr on
-help off
Parameters
This section describes the syntax for the options and values you can use with the
setoutput subcommand.
[-h | -help]
Displays a help message.
[-hdr on | off]
Use -hdr in interactive mode to set the -hdr option to on or off for the
subsequent subcommands in the interactive session. It applies as a default to
the subsequent lsuser subcommands, except for the subcommands that
explicitly specify the -hdr option.
Notes:
1. When the setdevice command starts, the -hdr option is set to the value
specified as command option (if present in the command line), or to the
initial default value: -hdr on.
2. The setentry subcommand without any argument displays the current state
of the option -hdr.
Examples
When you type the following subcommand and parameters using the setdevice
command in interactive mode,
>>>setoutput
Syntax
startcimom
Description
Use the startcimom command to run the CIM Agent code. When you use the
startcimom command, it registers itself with SLP and accepts requests on the port
specified in the cimom.properties file (by default 5989).
This command starts the ESS CIM Agent when the ESS CIM Agent is installed.
Generally it is installed as a service or part of the system inittab. In most cases,
there is no reason to start the ESS CIM Agent manually; however, this command
will start the ESS CIM Agent, if needed.
The certificate used by the ESS CIM Agent must also be made available to each
client software product that intends to communicate with the ESS CIM Agent.
Syntax
stopcimom
Parameters
There are no options for the stopcimom command.
Description
Use the stopcimom command to stop the ESS CIM Agent.
Related topics
v See “startcimom” on page 116 for the startcimom command.
Syntax
mkcertificate
Description
The mkcertificate runs at install time and can be rerun whenever the user feels
that security might be compromised. The mkcertificate command creates an X.509
certificate and places it in a certificate store called truststore. The certificate is
required by client code that communicates with the ESS CIM Agent using SSL
secure communication. If you have installed a product that uses this type of
communication with the ESS CIM Agent, you must be sure that the certificate that is
created with the mkcertificate command is available to all clients and software
products that communicate with the ESS CIM Agent.
| Note: If you get error message CMMOMO116E when you try to connect to
| CIMOM, ensure that the following files are in the same directory where the
| client program resides:
| v truststore
| v cimom.properties
| v niClientLogging.properties
| v logger.properties
Syntax
slpd
Description
The SLP daemon starts automatically by the installation program or at the system
reboot, but you can also start it manually if it is not already running. The ESS Agent
registers itself with the SLP daemon to enable client code to find the ESS CIM
Agent service. You should always keep the SLP daemon running.
The Service Agents (SA) communicate with each other on one subnet of an IP
network to find each other’s services. If you install products that use the ESS CIM
Agent but the products run on multiple subnets, consider designating one of your
SLP daemons to act as a Directory Agent (DA). To do this, change the configuration
that is used by each SLP daemon (slpd.conf) to point to the IP address of the SLP
daemon that is to act as the DA. To do this, change the isDA configuration variable
so that the slpd.conf is true. See the documentation for Open SLP at
http://www.openslp.org/Documentation.
Syntax
verifyconfig
-b
-u
-p
Parameters
This section describes the syntax for the options and values you can use with the
verifyconfig command.
-b Gets basic authentication if authentication is disabled.
-u The username used to log into CIMOM.
-p The password for the username.
Description
The verifyconfig command is used to locate all WBEM services (for example,
CIMOMs) in the local network, display them and then call the CIMOMs on the local
machine only requesting information about whether the CIMOMs know of any ESS.
Locates all WBEM services in the network. These may include ESS CIM Agents or
CIM Agents of other hardware devices. It then communicates with the WBEM
service (that is, CIMOM) running on the local machine, if it is found, and attempts to
retrieve some basic instance information from the CIMOM running there.
Syntax
modifyconfig
-h -cre on
-help -create off
file propertiesfile
-p port -c http
-port https
user password
-d on
-debug off
Parameters
This section describes the syntax for the options and values you can use with the
modifyconfig command.
[-h | -help]
Displays a help message.
[-cre[ate] on | off]
If you set the value to on, the command automatically creates the properties file
if it does not already exist.
If you set the value to off and the properties file does not already exist, you get
an error message and the operation stops.
[-file propertiesfile]
Use -file flag to specify the properties file, if you want to use a file other than
the default (cimom.properties) file, that must be used by this command.
[-p[ort] port]
Use the -p flag to update the port property value. The port parameter specifies
the value of the port property.
[-c http|https]
Use the -c flag to update the communication protocol value. The possible
values are http or https.
[-d[ebug] on|off]
Use -d or -debug to specify the debug mode. If you set the value to on, the
debug is enabled. If you set the value to off, the debug is disabled.
Examples
When you type the following subcommand, using the modifyconfig command in
interactive mode:
modifyconfig -p 5989 -d on
Elements:
The ESS API consists of the following elements: schemas, classes, properties,
methods, indications, associations, references and qualifiers. The following list
describes each type of element:
Schema A group of classes defined to a single namespace. Within the CIM
Agent, the schemas that are supported are the ones loaded through
the managed object format (MOF) compiler.
Class The definition of an object within some hierarchy. Classes can have
methods and properties and be the target of an association.
Property A value used to characterize instances of a class.
Method An implementation of a function on a class.
Indication An object representation of an event.
Association A class that contains two references which define a relationship
between two objects.
Reference The role that an object plays in an association.
Qualifier Additional information about other elements, classes, associations,
indications, methods, method parameters, instances, properties, or
references.
Namespace: A namespace defines the scope over which an ESS API schema
applies. The only namespace supported by the CIM Agent is root/cimv2. An ESS
API schema or version is loaded into a namespace when that schema is compiled
by the Managed Object Format compiler. ESS API operations always execute within
the context of a namespace. The namespace must be specified within the message
that the client sends to the CIM Agent.
Object name: An object name consists of a namespace path and a model path.
The namespace path provides access to the ESS API implementation managed by
the CIM Agent. The model path provides navigation within the implementation. An
example of an object name is:
http://cimom.storage.sanjose.ibm.com/root/cimv2:CIMDisk.key1=value1, key2=value2
Related topics:
v “CIM Agent communication concepts” on page 125
v “CIM Agent Communication methods” on page 126
v “Error codes returned by the CIMOM” on page 137
v “ESS API class definitions” on page 147
v “ESS class definition schemas” on page 231
Client communication:
A client application communicates with the CIM Agent through operation request
messages encoded within XML. The CIM Agent returns responses with operation
response messages. Requests and responses are sub- elements of the CIM
<MESSAGE> element.
The CIM Agent supports simple requests and simple responses. Simple requests
are operation request messages that contain the <SIMPLEREQ> XML tag. Simple
responses are operation response messages that contain the <SIMPLERSP> tag. A
client application determines that the CIM Agent only supports simple operation
requests and responses by examining the results of running the OPTIONS method.
All operations on the CIM Agent are performed by running one or more methods. A
method is either an intrinsic method or an extrinsic method. Intrinsic methods are
supported by the CIM Agent itself. These methods are included within XML
<IMETHODCALL> tags sent in messages to the CIM Agent. Extrinsic methods are
defined by the schema supported by the CIM Agent. These methods are included
within XML <METHODCALL> tags sent in messages to the CIM Agent.
Client applications can call on the CIM Agent using the methods described in “CIM
Agent Communication methods” on page 126. These methods fall within certain
functional groups that might or might not actually be supported by the CIM Agent.
Related topics:
v Appendix A, “ESS API component definitions,” on page 123
v “CIM Agent Communication methods” on page 126
v “Error codes returned by the CIMOM” on page 137
v “ESS API class definitions” on page 147
v “ESS class definition schemas” on page 231
GetClass:
Table 4 defines the properties of the GetClass method, which is used to return a
single class from the target namespace.
Table 4. GetClass method parameters
Parameter Type Description
ClassName String Defines the name of the class to retrieve.
LocalOnly Boolean TRUE returns all properties, methods, and qualifiers overridden within the
definition of the class.
IncludeQualifiers Boolean TRUE returns all qualifiers for the class, its properties, methods, or
method parameters. FALSE returns no qualifiers.
IncludeClassOrigin Boolean TRUE returns the CLASSORIGIN attribute of the class.
Return values: Either a single class or one of the following error codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_FAILED
GetInstance:
Table 5 defines the properties of the GetInstance method, which is used to return a
single instance from the target namespace.
Table 5. GetInstance method parameters
Parameter Type Description
InstanceName String Defines the name of the instance to retrieve.
LocalOnly Boolean TRUE returns all properties and qualifiers overridden within the definition
of the class.
IncludeQualifiers Boolean TRUE returns all qualifiers for the class, its properties, methods, or
method parameters. FALSE returns no qualifiers.
IncludeClassOrigin Boolean TRUE returns the CLASSORIGIN attribute of the class.
Return values: Either a single class or one of the following error codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
DeleteClass:
The DeleteClass method is used to delete a single class from the target
namespace.
DeleteInstance:
Table 6 defines the properties of the DeleteInstance method, which is used to delete
a single instance from the target namespace.
Table 6. DeleteInstance method parameters
Parameter Type Description
InstanceName String Defines the name of the instance to delete.
Return values: The named instance is deleted or one of the following error codes
is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_INVALID_CLASS
v CIM_ERR_NOT_FOUND
v CIM_ERR_FAILED
See Table 23 on page 137 for an explanation of the error codes.
CreateClass:
The CreateClass method is used to create a new class from the target namespace.
CreateInstance:
ModifyClass:
ModifyInstance:
EnumerateClasses:
EnumerateClassNames:
Return values: If successful, zero or more class names are returned. Otherwise,
one of the following error codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_INVALID_CLASS
v CIM_ERR_FAILED
See Table 23 on page 137 for an explanation of the error codes.
EnumerateInstances:
EnumerateInstanceNames:
ExecQuery:
Table 13 on page 131 defines the properties of the ExecQuery method, which is
used to execute a query against the target namespace.
Associators:
References:
ReferenceNames:
Return values: If successful, the return value specifies the value of the requested
property. Otherwise, one of the following error codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_INVALID_CLASS
v CIM_ERR_NOT_FOUND
v CIM_ERR_NO_SUCH_PROPERTY
v CIM_ERR_FAILED
See Table 23 on page 137 for an explanation of the error codes.
GetProperty:
Table 18 defines the properties of the GetProperty method, which is used to retrieve
a single property value from an instance in the target namespace.
Table 18. GetProperty method parameters
Parameter Type Description
InstanceName String Defines the name of the instance.
Property String The name of the property whose value is to be returned from the instance.
Return values: If successful, the return value specifies the value of the requested
property. Otherwise, one of the following return codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_INVALID_CLASS
v CIM_ERR_NOT_FOUND
v CIM_ERR_NO_SUCH_PROPERTY
SetProperty:
Table 19 defines the properties of the SetProperty method, which is used to set a
single property value within an instance in the target namespace.
Table 19. SetProperty method parameters
Parameter Type Description
InstanceName String Defines the name of the instance.
PropertyName String The name of the property whose value is to be updated.
GetQualifier:
Table 20 defines the properties of the GetQualifier method, which is used to retrieve
a single qualifier declaration from the target namespace.
Table 20. GetQualifier method parameters
Parameter Type Description
QualifierName String Defines the qualifier whose declaration is to be returned.
Return Values: If successful, the value of the qualifier is returned. Otherwise, one
of the following return codes is returned:
v CIM_ERR_ACCESS_DENIED
v CIM_ERR_INVALID_NAMESPACE
v CIM_ERR_INVALID_PARAMETER
v CIM_ERR_NOT_FOUND
v CIM_ERR_FAILED
See Table 23 on page 137 for an explanation of the error codes.
SetQualifier:
Table 21 on page 135 defines the properties of the SetQualifier method, which is
used to create or update a qualifier declaration in the target namespace.
DeleteQualifier:
The DeleteQualifier method is used to delete a single class from the target
namespace.
EnumerateQualifiers:
Related topics:
v “CIM Agent communication concepts” on page 125
v Appendix A, “ESS API component definitions,” on page 123
v “Error codes returned by the CIMOM” on page 137
v “ESS API class definitions” on page 147
v “ESS class definition schemas” on page 231
v “CIM Agent Functional Groups” on page 136
Related topics:
v “CIM Agent communication concepts” on page 125
v Appendix A, “ESS API component definitions,” on page 123
v “CIM Agent Communication methods” on page 126
v “Error codes returned by the CIMOM” on page 137
v “ESS API class definitions” on page 147
v “ESS class definition schemas” on page 231
The CIMOM might return status to the client application in one of two ways:
v Through HTTP status messages or
v Through error codes contained within <METHODRESPONSE> or
<IMETHODRESPONSE> XML tags
Table 23 describes the status codes that the CIMON might return.
Table 23. Return error codes for the CIMON
Symbolic Name Code Definition
CIM_ERR_FAILED 1 A general error occurred that is not covered
by a more specific error code.
CIM_ERR_ACCESS_DENIED 2 Access to a CIM resource was not available
to the client.
CIM_ERR_INVALID_NAMESPACE 3 The target namespace does not exist.
CIM_ERR_INVALID_PARAMETER 4 One or more parameter values passed to the
method were invalid.
CIM_ERR_INVALID_CLASS 5 The specified class does not exist.
CIM_ERR_NOT_FOUND 6 The requested object could not be found.
CIM_ERR_NOT_SUPPORTED 7 The requested operation is not supported.
CIM_ERR_CLASS_HAS_CHILDREN 8 The operation cannot be carried out on this
class because it has instances.
CIM_ERR_CLASS_HAS_INSTANCES 9 The operation cannot be carried out on this
class because it has instances.
CIM_ERR_INVALID_SUPERCLASS 10 The operation cannot be carried out since the
specified superclass does not exist.
CIM_ERR_ALREADY_EXISTS 11 The operation cannot be carried out because
an object already exists.
CIM_ERR_NO_SUCH_PROPERTY 12 The specified property does not exist.
CIM_ERR_TYPE_MISMATCH 13 The value supplied is incompatible with the
type.
CIM_ERR_QUERY_LANGUAGE_NOT_SUPPORTED 14 The query language is not recognized or
supported.
CIM_ERR_INVALID_QUERY 15 The query is not valid for the specified query
language.
CIM_ERR_METHOD_NOT_AVAILABLE 16 The extrinsic method could not be executed.
CIM_ERR_METHOD_NOT_FOUND 17 The specified extrinsic method does not exist.
CIM_ERR_LOW_ON_MEMORY 20 There is not enough memory.
XMLERROR 21 An XML error has occurred.
CIM_ERR_LISTNER_ALREADY_DEFINED 22 The listener is already defined`.
CIM_ERR_INDICATION_NOT_COLLECTED 23 The indications are not collected.
CIM_ERR_NO_METHOD_NAME 24 The method name is null.
Related topics:
v “CIM Agent communication concepts” on page 125
v Appendix A, “ESS API component definitions,” on page 123
v “CIM Agent Communication methods” on page 126
v “ESS API class definitions” on page 147
v “ESS class definition schemas” on page 231
Appendix C. CIM Agent class information for the ESS API 143
Table 24. CIM Agent class definitions (quick reference) (continued)
Related
IBMTSESS class name Description section
IBMTSESS_MediaPresentExtent The association between a media access device Table 81 on
and the StorageExtent. The page 209
IBMTSESS_MediaPresentExtent is derived from
the CIM_MediaPresent class.
IBMTSESS_PerformanceStatisticsService Includes methods that enable and disable the Table 92 on
collection of performance statistics. In addition, it page 217
supports a method to retrieve the statistics file
for ESS volumes and volume spaces. The
IBMTSESS_PerformanceStatisticsService is
derived from the CIM_Service class.
IBMTSESS_PhysicalElementLocation A description of the association between a Table 77 on
physical element with a location object for page 205
inventory or replacement purposes. The
IBMTSESS_PhysicalElementLocation is derived
from the CIM_PhysicalElementLocation class.
IBMTSESS_PhysicalPackage A representation of physical elements that Table 65 on
contain or host other components; derived from page 192
the CIM_PhysicalPackage class.
| IBMTSESS_Pool2PrimordialPool An association describing how VolumeSpaces Table 98 on
| are allocated from PrimordialStoragePool. The page 223
| IBMTSESS_Pool2PrimordialPool is derived from
| the AllocatedFromStoragePool class.
IBMTSESS_PPRCPath Derived from the CIM_LogicalDevice class. Table 97 on
page 221
IBMTSESS_PrimordialStoragePool Derived from the CIM_StoragePool class. Table 83 on
page 210
IBMTSESS_Privilege Derived from the CIM_Privilege class. Table 30 on
page 155
IBMTSESS_Product A representation of the top-level description of Table 35 on
physical components that make up a product, in page 176
this case, the entire ESS; derived from the
CIM_Product class.
IBMTSESS_ProductPhysicalComponent An association that indicates that the referenced Table 58 on
physical element is acquired as part of a page 187
product; derived from the
CIM_ProductPhysicalComponent class.
IBMTSESS_ProtocolControllerForPort An association that defines a relationship Table 41 on
between a protocol controllers and a port. The page 178
IBMTSESS_ProtocolControllerForPort is derived
from the CIM_ProtocolControllerForPort class.
IBMTSESS_ProtocolControllerForUnit An association that defines a relationship Table 40 on
between a protocol controllers and an exposed page 178
logical unit (for example, a storage volume). The
IBMTSESS_ProtocolControllerForUnit is derived
from the CIM_ProtocolControllerForUnit class.
IBMTSESS_Provider Derived from the CIM_Provider class. Table 87 on
page 212
IBMTSESS_Realizes An association that associates a logical device Table 66 on
and the physical elements that implement them; page 193
derived from the CIM_Realizes class.
Appendix C. CIM Agent class information for the ESS API 145
Table 24. CIM Agent class definitions (quick reference) (continued)
Related
IBMTSESS class name Description section
IBMTSESS_StorageProcessorCard A representation of a type of physical container Table 61 on
that can be plugged into another card or hosting page 189
board, or is itself a hosting board or mother
board in a chassis. Each ESS has two instances
of IBMTSESS_StorageProcessorCard; derived
from the CIM_Card class.
IBMTSESS_StorageSynchronized An association that indicates that two storage Table 85 on
objects were replicated at the specified point in page 211
time. The IBMTSESS_StorageSynchronized is
derived from the CIM_StorageSynchronized
class.
IBMTSESS_StorageSystem A representation of the entire ESS machine in Table 25 on
the configuration; derived from the page 147
CIM_ComputerSystem class.
IBMTSESS_StorageSystemToController An association that associates a controller with a Table 39 on
storage subsystem; derived from the page 178
CIM_SystemDevice.
IBMTSESS_StorageSystemToPort An association that associates a port with a Table 38 on
storage subsystem; derived from the page 177
CIM_SystemDevice class.
IBMTSESS_StorageSystemToVolume An association that associates a volume with a Table 37 on
storage subsystem; derived from the page 177
CIM_SystemDevice class.
IBMTSESS_SubProfileExtendsProfile Derived from the CIM_ReferencedProfile class. Table 74 on
page 204
IBMTSESS_SystemDevice An association that describes the aggregation of Table 67 on
logical devices by a system; derived from the page 193
CIM_SystemDevice class.
IBMTSESS_Volume A representation one storage volume for the Table 27 on
ESS; derived from the CIM_StorageVolume page 150
class.
IBMTSESS_VolumeSpace A representation of an ESS volume group from Table 26 on
which storage volumes can be created; derived page 148
from the CIM_StoragePool class.
IBMTSESS_VolumeStatisticalData A connection is made from the Table 90 on
IBMTSESS_Volume with its corresponding page 216
statistics instance.The
IBMTSESS_VolumeStatisticalData is derived
from the CIM_ElementStatisticalData class.
IBMTSESS_VolumeSpaceStatisticalData A connection is made between Table 91 on
IBMTSESS_VolumeSpace with its corresponding page 217
statistics instance. The
IBMTSESS_VolumeSpaceStatisticalData is
derived from the CIM_ElementStatisticalData
class.
IBMTSESS_VolumeSpaceStatistics Derived from the CIM_StatisticalData class. Table 89 on
page 215
IBMTSESS_VolumeStatistics Derived from the CIM_StatisticalData class. Table 88 on
page 213
Appendix C. CIM Agent class information for the ESS API 147
Table 25. IBMTSESS_StorageSystem class properties (continued)
Qualifier or
Property Type Parameter Description
Name String Key, MaxLen(256) Serves as the key of a System instance in an enterprise
environment.
Appendix C. CIM Agent class information for the ESS API 149
Table 27. IBMTSESS_Volume class properties
Qualifier or
Property Type Parameter Description
CIM_ManagedElement
ElementName String Enables each instance to define a
user-friendly name in addition to its key
properties or identity data, and description
information.
Appendix C. CIM Agent class information for the ESS API 151
Table 27. IBMTSESS_Volume class properties (continued)
Qualifier or
Property Type Parameter Description
ConsumableBlocks uint64 Describes the maximum number of blocks, of
size BlockSize, that are available for
consumption when layering StorageExtents
using the BasedOn association.
Appendix C. CIM Agent class information for the ESS API 153
Table 28. IBMTSESS_FCPort class properties (continued)
Qualifier or
Property Type Parameter Description
DeviceID String Key, Describes an address or other identifying information to
MaxLen(64) uniquely name the LogicalDevice. In this case, it is the
port number.
Appendix C. CIM Agent class information for the ESS API 155
Table 30. IBMTSESS_Privilege class properties (continued)
Qualifier or
Property Type Parameter Description
CIM_Privilege
InstanceID String Key Identifies a unique instance of Privilege.
Appendix C. CIM Agent class information for the ESS API 157
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
Name String Key, MaxLen(64) Describes an address or other identifying
information to uniquely name the
LogicalElement.
Appendix C. CIM Agent class information for the ESS API 159
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
IBMTSESS_VolumeSpace REF Pool Parameter of As an input parameter: if null, creates a
CreateOrModifyStorage new StoragePool. else modifies the
Pool storagePool
VolType String Parameter of As an input parameter: It specifies the
CreateOrModifyStorage ESS logical volume type. If null, a new
Pool StoragePool with Format as FB will be
created. If not null, the a new
StoragePool with specified Format will be
created. The possible value of VolType
will be 3380, 3390, or FB.
LssNum uint16 Parameter of As an input parameter: It specifies the
CreateOrModifyStorage LSS where the volumespace will be
Pool created. LssNum is unavoidable if the
VolType is either 3380 or 3390. The
LssNum is in decimal: 0 to 21 (from 0x00
to 0x15)
Return values — Return Values of Description of return values:
CreateOrModifyStorage
Pool 0 Success
Appendix C. CIM Agent class information for the ESS API 161
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
Return values — Return values of Description of return values
ModifySynchronization
0 Success
4 Failed
5 Invalid parameter for either
Synchronization or
RemoteSynchronization.
0x8013 Invalid Operation
0x8014 Synchronization Or
RemoteSynchronization does
not exist.
0x8016 Current copyType doesn’t
provide specified option under
given operation
0x8017 Specified operation does not
provide the given option
Appendix C. CIM Agent class information for the ESS API 163
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
| Return values — Return values of Description of return values
| ModifySynchronizations
| 0 Success
| 4 Failed
| 0x8014 Synchronization Or
| RemoteSynchronization does
| not exist.
Appendix C. CIM Agent class information for the ESS API 165
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
IBMTSESS_VolumeSpace REF Target Parameter of ObjectPath reference to an ESS
DetachPaths VolumeSpace representing the target
logical subsystem from which one or
more paths are to be removed.
Options[] uint16 Parameter of Options: ForceIfPairsExist. All default
DetachPaths values are No), ValueMap {1}, Values
{ForceIfPairsExist}
TargetLSSNumber String Parameter of “LSS Number of LSS on target ESS”
DetachPaths (This parameter is optional. It can be
specified if the target ESS is not
managed by ICAT)
TargetSSID String Parameter of “SSID for the LSS on the target ESS, in
DetachPaths hexadecimal ranging from 0x0001
through 0xFEFF” (This parameter is
optional. It can be specified if the target
ESS is not managed by ICAT)
TargetESSSequenceNumber String Parameter of “ESS Sequence (5 to 12-character
DetachPaths alphanumeric string, right-justified with
leading zeroes removed. ex. 21975)”
(This parameter is optional. It can be
specified if the target ESS is not
managed by ICAT)
Return values — Return values of Description of return values:
DetachPaths
0 Success
5 Invalid parameter
AttachReplica uint32 Method Create a StorageSynchronized
relationship between two existing storage
objects.
CIM_ConcreteJob REF Job Parameter of Reference to the job (may be null if the
AttachReplica task completed).
IBMTSESS_Volume REF Source Parameter of The source storage object which may be
Element AttachReplica a StorageVolume or other storage object.
IBMTSESS_Volume REF Target Parameter of Reference to the target storage element.
Element AttachReplica
CopyType uint16 Parameter of CopyType describes the type of
AttachReplica synchronized relationship that will be
created. ValueMap {2, 3, 4, 5, ..,
0x8000..0xFFFF}, Values {Async, Sync,
UnSyncAssoc, UnSyncUnAssoc, DMTF
Reserved, Vendor Specific}
Return values — Return values of Description of return values:
AttachReplica
0 Success
5 Invalid Parameter
0x8011 Could not retrieve internal
VolumeID from CIM Volume
Object
Appendix C. CIM Agent class information for the ESS API 167
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
Return values — Return values of Description of return values:
AttachReplicas
0 Success
5 Invalid Parameter
0x8015 Current copyType does not
provide specified option under
given operation
0x8020 SourceVolume is already a
TargetElement in other
StorageSynchronized
relationship
0x8021 Failed to establish PPRC path
0x8024 Invalid option
0x8025 Invalid combinaton of options
0x8030 Invalid parameter
FreezeConsistencyGroup uint32 Method FreezeConsistencyGroup stops all I/O to
source and target volume pairs for the
given source and target VolumeSpaces.
Sources[] String Parameter of Array of strings containing
FreezeConsistency representations of references to
Group IBMTSESS_VolumeSpace instances,
Each element must have a 1-1
relationship with the target parameter.
Targets[] String Parameter of Array of strings containing
FreezeConsistency representations of references to
Group IBMTSESS_VolumeSpace instances.
Each element must have a 1-1
relationship with the source parameter.
| sourceESSIDs[] String Parameter of Array of strings containing EssIDs used
| FreezeConsistency to create the NILSSIDs for the remote
| Group source volumespaces, the number of
| sources and sourceSSIDs must be the
| same or null.
| sourceSSIDs[] String Parameter of Array of strings containing ssIDs used to
| FreezeConsistency create the NILSSIDs for the remote
| Group source volumespaces, the number of
| sources and sourceSSIDs must be the
| same.
| sourceLSSs[] String Parameter of Freeze Array of strings containing LSSes used to
| ConsistencyGroup create the NILSSIDs for the remote
| source volumespaces, the number of
| sources and sourceLSSs must be the
| same.
| targetESSIDs[] String Parameter of Array of strings containing ESSID used to
| FreezeConsistency create the NILSSIDs for the remote target
| Group volumespaces, the number of targets and
| sourceSSIDs must be the same.
| targetSSIDs[] String Parameter of Array of strings containing ssIDs used to
| FreezeConsistency create the NILSSIDs for the remote target
| Group volumespaces, the number of targets and
| targetSSIDs must be the same.
targetLSSs[] String Parameter of Array of strings containing LSSes used to
FreezeConsistency create the NILSSIDs for the remote target
Group volumespaces, the number of targets and
targetLSSs must be the same.
Appendix C. CIM Agent class information for the ESS API 169
Table 32. IBMTSESS_StorageConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
queryConsistencyGroupSetting uint32 Method queryConsistencyGroupSetting allows
application to query for the current
PPRC/FlashCopy Consistency Group
settings
LSSID String Parameter of Logical Subsystem for which attributes
queryConsistencyGroup should be queried
Setting
Timeout uint16 Parameter of Number of seconds for the PPRC
queryConsistencyGroup ConsistencyGroup timeout (Maximum of
Setting 600000 seconds)
| Return values — Return values of Description of return values:
| queryConsistencyGroup
| 0 Success
| 0x8030 setConsistencyGroup
| Setting() failed
| getCRStatus uint32 Method Allows an application to query the staatus
| of the copy relationship.
| Synchronizations String Parameter of Copy relationship of Synchronizations
| getCRStatus
| RemoteSynchronizations String Parameter of It is either
| getCRStatus IBMTSESS_RemoteSourceStorage
| Synchronized or
| IBMTSESS_TargetSourceStorage
| Synchronized. If synchronizations is not
| null, then remoteSynchronizations must
| be null.
Appendix C. CIM Agent class information for the ESS API 171
Table 33. IBMTSESS_LunMaskPrivilegeService class properties (continued)
Qualifier or
Property Type Parameter Description
CreationClassName String Key, MaxLen(256) Indicates the name of the class or the
subclass used in the creation of an
instance. When used with the other key
properties of this class, this property
allows all instances of this class and its
subclasses to be uniquely identified. The
value
for IBMTSESS_LunMaskPrivilegeService
is IBMTSESS_LunMaskPrivilegeService.
Name String Key, MaxLen(64) Describes an address or other identifying
information to uniquely name the
LogicalElement.
Appendix C. CIM Agent class information for the ESS API 173
Table 33. IBMTSESS_LunMaskPrivilegeService class properties (continued)
Qualifier or
Property Type Parameter Description
Return values — Return values of Description of return values:
RemoveAccess
0 Success
1 Not Supported
4 Failed (Result might be
intermittent. You may need to
look into it)
0x8001 Invalid parameter Subject
0x8003 Invalid parameter Target
0x8004 Access not assigned yet
0x8005 The specified Subject and Target
are not associated
0x8010 Support Single Target only
0x8011 Should DetachDevice first
0x8020 IBMTSESS cannot
RemoveAccess as specified
(ESS CLI cannot delete or set
hostconnection, as specified.)
0x8021 Controller processing fails
0x8022 HardwareAccount processing
fails
0x8030 Creating indication failure
Appendix C. CIM Agent class information for the ESS API 175
Table 34. IBMTSESS_StorageHardwareIDManagementService class properties (continued)
Qualifier or
Property Type Parameter Description
| Return values — Return values of Description of return values:
| CreateStorage
|| HardwareID
0 Success
| 1 Not Supported
| 5 Invalid Parameter
| 0x8010 UserIDType should be PortWWN
| 0x8020 CreateHardwareAccount processing fails
| 0x8030 Creating indication failure
| DeleteStorageHardwareID uint32 Method This method deletes a named
| IBMTSESS_HardwareAccount and all
| associations. ValueMap{0, 1, 2, 3, 4, 5, 6..0xFFF,
| 0x1000, 0x1001..0x7FFF, 0x8000.. } Values
| {Success, Not Supported, Unknown, Timeout,
| Failed, Invalid Parameter, DMFT Reserved,
| Specified instance not found, Method
| Reserved, Vendor Specific }
| IBMTSESS_StorageHardwareID REF Parameter of Refers to the StorageHardwareID instance to be
| Hardware DeleteStorage deleted.
| ID HardwareID
| Return values — Return values of Description of return values:
| DeleteStorage
|| HardwareID
0 Success
| 1 Not Supported
| 5 Invalid Parameter
| 0x8010 Should remove access first
| 0x8020 DeleteHardwareAccount processing fails
| 0x8030 Creating indication failure
Appendix C. CIM Agent class information for the ESS API 177
Table 39. IBMTSESS_StorageSystemToController class properties
Qualifier or
Property Type Parameter Description
CIM_Component
CIM_SystemComponent
CIM_SystemDevice
IBMTSESS_StorageSystemToController
GroupComponent IBMTSESS_StorageSystem Key Parent system in the Association
(override)
PartComponent IBMTSESS_Controller Key A component of a System
(override)
Appendix C. CIM Agent class information for the ESS API 179
Table 43. IBMTSESS_AuthorizedSubject class properties (continued)
Qualifier or
Property Type Parameter Description
Privilege (override) IBMTSESS_Privilege Key Describes the Privilege either
granted or denied to an
Identity or group of Identities
collected by a Role.
PrivilegedElement IBMTSESS_StorageHardwareID Key Describes the Subject for
(override) which Privileges are granted
or denied.
Appendix C. CIM Agent class information for the ESS API 181
Table 51. IBMTSESS_HostedStoragePool class properties (continued)
Qualifier or
Property Type Parameter Description
CIM_SystemComponent
CIM_HostedStoragePool
IBMTSESS_HostedStoragePool
GroupComponent IBMTSESS_StorageSystem Key Represents the parent system in the
(override) Association
PartComponent IBMTSESS_VolumeSpace Key Represents the component of a System
(override)
Appendix C. CIM Agent class information for the ESS API 183
Table 53. IBMTSESS_StorageSetting class properties
Qualifier or
Property Type Parameter Description
CIM_ManagedElement
ElementName String Enables each instance to define a user-friendly name in
addition to its key properties or identity data, and
description information.
Appendix C. CIM Agent class information for the ESS API 185
Table 54. IBMTSESS_Chassis class properties (continued)
Qualifier or
Property Type Parameter Description
HeatGeneration uint16 Describes the amount of heat generated by the Chassis
in BTU/hour.
Appendix C. CIM Agent class information for the ESS API 187
Table 59. IBMTSESS_RemoteServiceAccessPoint class properties (continued)
Qualifier or
Property Type Parameter Description
ElementName String Enables each instance to define a user-friendly name in
addition to its key properties or identity data, and
description information.
Appendix C. CIM Agent class information for the ESS API 189
Table 62. IBMTSESS_ComputerSystemPackageCard class properties (continued)
Qualifier or
Property Type Parameter Description
Antecedent IBMTSESS_StorageProcessorCard Key Describes the PhysicalPackage that
(override) realizes a Unitary ComputerSystem
Dependent IBMTSESS_StorageSystem Key Describe a ComputerSystem.
(override)
Appendix C. CIM Agent class information for the ESS API 191
Table 65. IBMTSESS_PhysicalPackage class properties
Qualifier or
Property Type Parameter Description
CIM_ManagedElement
ElementName String Enables each instance to define a user-friendly
name in addition to its key properties or identity
data and description information. The value for
IBMTSESS_PhysicalPackage is Disk Group on
ESS + ESS serial number.
CIM_ManagedSystemElement
Name String Defines the label by which the object is known.
When subclassed, the Name property can be
overridden to be a Key property. The value for
IBMTSESS_PhysicalPackage will be ESS serial
number.
CIM_PhysicalElement
Tag String Key Uniquely identifies the Physical Element and
serves as the key for the Element. The value for
IBMTSESS_PhysicalPackage is diskGroupId-ESS
serial number.
CreationClassName String Key Indicates the name of the class or the subclass
used in the creation of an instance. The value for
IBMTSESS_PhysicalPackage is
IBMTSESS_PhysicalPackage.
Manufacturer String Describes the name of the organization
responsible for producing the PhysicalElement.
The value for IBMTSESS_PhysicalPackage is IBM.
Model String Describes the name by which the PhysicalElement
is generally known. The value for
IBMTSESS_PhysicalPackage is 2105.
PoweredOn Boolean Indicates that the PhysicalElement is powered on.
The value for IBMTSESS_PhysicalPackage is
TRUE.
CanBeFRUed Boolean Indicates whether this PhysicalElement uses field
replaceable units (FRUs). The value for
IBMTSESS_PhysicalPackage is TRUE.
OtherIdentifyingInfo String Captures additional data, beyond that of the Tag
information, that is used to identify a
PhysicalElement.
Appendix C. CIM Agent class information for the ESS API 193
Table 68. IBMTSESS_ControllerConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
ElementName String Allows each instance to define a
user-friendly name in addition to its
key properties/identity data and
description information.
Appendix C. CIM Agent class information for the ESS API 195
Table 68. IBMTSESS_ControllerConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
IBMTSESS_SCSIProtocol REF Parameter of AttachDevice The ProtocolController instance
Controller Protocol
Controller
IBMTSESS_Volume REF Parameter of AttachDevice The LogicalDevice instance to attach
Device
DeviceNumber String Parameter of AttachDevice The number assigned to
ProtocolControllerForUnit.
DeviceNumber if supported by the
hardware (indicated by Masking
Capabilities. MapUnits set to true) or
if MapUnits is false, but the
DeviceNumber has not been
established in an existing
ProtocolControllerForDevice subclass.
Return values — Return values of AttachDevice Description of return values:
0 Success
1 Not Supported
4 Failed (Result might be
intermittent.You may need to
look into it.)
5 Invalid SCSIProtocol
Controller
0x1000 Invalid Parameter Device
0x8000 Authorization failure
0x8010 You should AssignAccess
first.
0x8011 Device instance is already
attached to a Host.
0x8020 IBMTSESS cannot attach
device as specified. (ESS
CLI cannot create
volumeaccess as specified.)
0x8030
Creating an indication failure
Appendix C. CIM Agent class information for the ESS API 197
Table 68. IBMTSESS_ControllerConfigurationService class properties (continued)
Property Type Qualifier or Parameter Description
DetachDevice uint32 Method Removes the
ProtocolControllerForDevice
association subclass between the
ProtocolController and device.
IBMTSESS_SCSIProtocol REF Parameter of DetachDevice The ProtocolController instance
Controller Protocol
Controller
IBMTSESS_Volume REF Parameter of DetachDevice The LogicalDevice instance to detach
Device
Return values — Return values of Description of return values:
DetachDevice
0 Success
1 Not Supported
4 Failed (Result might be
intermittent. You may need to
look into it.)
5 Invalid Controller
0x1000 Invalid parameter Device
0x8001 Cannot remove device since
it is not attached.
0x8020 IBMTSESS cannot remove
device as specified. (ESS
CLI cannot ″delete
volumeacess″ as specified.)
0x8030 Creating an indication failure
DetachDeviceS uint32 Method This method removes the
ProtocolControllerForDevice
association subclass between the
ProtocolController and a set of
LogicalDevice, such as a set of
StorageVolumes. When the
ProtocolController is actively masking
a device (for example, is part of an
AuthorizedTarget association, the
management instrumentation provider
should update the hardware access
configuration when DetachDevice is
called. ValueMap {0, 1, 2, 3, 4, 5,
6..4095, 4096, 4097, 4098..32767,
32768..65535} Values {Success, Not
Supported, Unspecified Error,
Timeout, Failed, Invalid Parameter,
DMTF Reserved, LogicalDevice
Instance not Associated with
Controller, Busy, Method Reserved,
Vendor Specific}
IBMTSESS_SCSIProtocol REF Parameter of DettachDeviceS The ProtocolController instance.
Controller Protocol
Controller
Devices[] String Parameter of DettachDeviceS The LogicalDevice instance to detach.
Appendix C. CIM Agent class information for the ESS API 199
Table 70. IBMTSESS_DeviceMaskingCapabilities class properties (continued)
Qualifier or
Property Type Parameter Description
InstanceID String Key Identifies a unique instance of
Capabilities.
Appendix C. CIM Agent class information for the ESS API 201
Table 70. IBMTSESS_DeviceMaskingCapabilities class properties (continued)
Qualifier or
Property Type Parameter Description
OnePortPerView Boolean Indicates whether this storage system
limits configurations to a single port per
view. Values are:
TRUE This storage system limits
configurations to a single port
per view.
FALSE This storage system does not
limit configurations to a single
port per view.
Appendix C. CIM Agent class information for the ESS API 203
Table 73. IBMTSESS_RegisteredProfile class properties (continued)
Qualifier or
Property Type Parameter Description
RegisteredName String Identifies this standard (profile or
subprofile). It is the responsibility of
the organization to ensure that the
standard’s name is unique within the
scope of the organization .
Appendix C. CIM Agent class information for the ESS API 205
Table 77. IBMTSESS_PhysicalElementLocation class properties (continued)
Qualifier or
Property Type Parameter Description
PhysicalLocation IBMTSESS_Location Key Represents the
(override) PhysicalElement’s Location.
Appendix C. CIM Agent class information for the ESS API 207
Table 80. IBMTSESS_StorageExtent class properties (continued)
Qualifier or
Property Type Parameter Description
CreationClassName String Key, MaxLen(256) Indicates the name of the class or the
subclass used in the creation of an
instance. When used with the other
key properties of this class, this
property allows all instances of this
class and its subclasses to be
uniquely identified.
Appendix C. CIM Agent class information for the ESS API 209
Table 82. IBMTSESS_Component class properties (continued)
Qualifier or
Property Type Parameter Description
PartComponent (override) IBMTSESS_VolumeSpace Key Describes the
PartComponent.
Appendix C. CIM Agent class information for the ESS API 211
Table 86. IBMTSESS_EltCapabilitiesStgPool class properties (continued)
Qualifier or
Property Type Parameter Description
IBMTSESS_EltCapabilitiesStgPool
ManagedElement IBMTSESS_ Key Describes the
(override) PrimordialStoragePool ManagedElement.
Capabilities (override) IBMTSESS_StorageCapabilities Key Describes the Capabilities
object associated with the
element.
Appendix C. CIM Agent class information for the ESS API 213
Table 88. IBMTSESS_VolumeStatistics class properties (continued)
Qualifier or
Property Type Parameter Description
DirectBytesRead uint64 Taken from the ESS statistics file
(Volume Statistics): Disk ->
Cache ops.
NumberOfCacheHitsforReads uint64 NumberOfCacheIOsforReadSeq
+
NumberOfCacheIOsforReadDirect
NumberOfCacheHitsforWrites uint64 NumberOfCacheIOsforWriteSeq
+
NumberOfCacheIOsforWriteDirect
NumberOfCacheIOsforReadSeq uint64 Taken from the ESS statistics file
(Volume Statistics): Sequential
I/O - Cache hits - Read Count.
NumberOfCacheIOsforWriteSeq uint64 Taken from the ESS statistics file
(Volume Statistics): Sequential
I/O - Cache hits - Write Count.
NumberOfCacheIOsforReadDirect uint64 Taken from the ESS statistics file
(Volume Statistics): Normal I/O -
Cache hits - Read Count.
NumberOfCacheIOsforWriteDirect uint64 Taken from the ESS statistics file
(Volume Statistics): Normal I/O -
Cache hits - Write Count.
IOOperations uint64 ReadIOOperations +
WriteIOOperations
NumberOfIOsServicedFromCache uint64 NumberOfCacheHitsforReads +
NumberOfCacheHitsforWrites.
DasdFastWriteIOs uint64 Taken from the ESS statistics file
(Volume Statistics):
DasdFastWrite ops.
DasdFastWriteSeq uint64 Taken from the ESS statistics file
(Volume Statistics):
DasdFastWrite seq.
VolumeNumber uint64 Taken from the ESS statistics file
(Volume Statistics): Volume
number.
RankName String Taken from the ESS statistics file
(Volume Statistics): Rank name.
RankID uint64 Taken from the ESS statistics file
(Volume Statistics): Rank ID.
CacheAvailable Boolean Taken from the ESS statistics file
(Volume Statistics): Cache
Available.
DasdFastWriteDel uint64 Taken from the ESS statistics file
(Volume Statistics):
DasdFastWrite del.
RecCacheReadMisses uint64 Taken from the ESS statistics file
(Volume Statistics):
RecCacheRead Misses.
Appendix C. CIM Agent class information for the ESS API 215
Table 89. IBMTSESS_VolumeSpaceStatistics class properties (continued)
Qualifier or
Property Type Parameter Description
StartStatisticTime Datetime Retrieves the time when the statistics
collection started.
StatisticTime Datetime Retrieves the timestamp for this statistics
instance.
SampleInterval Datetime Describes the frequency of the statistics
collection.
IBMTSESS_VolumeSpaceStatistics
ReadIOOperations uint64 Taken from the ESS statistics file (Disk
Group Statistics): I/O requests - Read
Count.
WriteIOOperations uint64 Taken from the ESS statistics file (Disk
Group Statistics): I/O requests - Write
Count.
BytesRead uint64 Taken from the ESS statistics file (Disk
Group Statistics): FixedBlockSec ops -
Read Count.
BytesWritten uint64 Taken from the ESS statistics file (Disk
Group Statistics): FixedBlockSec ops -
Write Count.
ReadTime uint64 Taken from the ESS statistics file (Disk
Group Statistics): Response Time - Read
Count.
WriteTime uint64 Taken from the ESS statistics file (Disk
Group Statistics): Response Time - Write
Count.
IOOperations uint64 ReadIOOperations + WriteIOOperations
BytesTransferred uint64 BytesRead + BytesWritten
RankName String Taken from the ESS statistics file (Disk
Group Statistics): Rank.
RankID String Taken from the ESS statistics file (Disk
Group Statistics): Rank ID.
NumberOfDDMs uint64 Taken from the ESS statistics file (Disk
Group Statistics): Number of DDMs.
SectorSize uint64 Taken from the ESS statistics file (Disk
Group Statistics): Sector Size.
RankType uint64 Taken from the ESS statistics file (Disk
Group Statistics): Rank Type.
VS String The DeviceID of the corresponding
IBMTSESS_VolumeSpace.
Appendix C. CIM Agent class information for the ESS API 217
Table 92. IBMTSESS_PerformanceStatisticsService class properties (continued)
Qualifier or
Property Type Parameter Description
Name String Key, MaxLen(64) Describes an address or other identifying
information to uniquely name the
LogicalElement.
IBMTSESS_PerformanceStatisticsService
StatisticsCollection String It is ’enabled’ if the performance statistics
collection is turned on. It is ’disabled’ if
the performance statistics collection is
turned off.
Frequency uint64 Describes the collection frequency.
Port uint16 Describes the port on the host that
receives the performance data.
GetStatisticsFiles uint32 Method Retrieves the performance statistics files.
The statistics files can only be retrieved
when the performance statistics collection
is turned on.
FileClusterOne[] String Parameter of The statistics file for cluster one. Each line
GetStatisticsFiles of the file is one string in the array
FileClusterTwo[] String Parameter of The statistics file for cluster two. Each line
GetStatisticsFiles of the file is one string in the array
Return values — Return values of Description of return values:
GetStatisticsFiles
0 Success
1 Failed
StartStatisticsCollection uint32 Method Starts the statistics collection.
Port uint16 Parameter of The port on the host that receives the
StartStatistics performance data. This parameter is
Collection optional
Frequency uint16 Parameter of The collection frequency in minutes. This
StartStatistics parameter is optional
Collection
Duration uint16 Parameter of The duration of collecting statistics in
StartStatistics hours. This parameter is optional
Collection
Return values — Return values of Description of return values:
StartStatistics
0 Success
Collection
This return code indicates that the
performance statistics collection has been
started successfully.
1 Failed
This return code indicates that the
performance statistics collection could not
be started. A possible reason is that the
ESS is not able to serve client requests at
this time.
2 The performance statistics
collection has already been
started.
StopStatisticsCollection uint32 Method Stops the statistics collection.
Appendix C. CIM Agent class information for the ESS API 219
Table 95. IBMTSESS_RemoteSourceStorageSynchronized class properties (continued)
Qualifier or
Property Type Parameter Description
SystemElement IBMTSESS_ Key Represents the Storage that is the source of
(override) RemoteVolume the replication.
SyncedElement IBMTSESS_Volume Key Represents the Storage that is the target of
(override) the replication.
CopyType uint16 Describes the Replication Policy. ValueMap 2,
3, 4, 5, .., 0x8000 ...}, Values Async, Sync,
UnSyncAssoc, UnSyncUnAssoc, DMTF Reserved,
Vendor Specific}
SyncMaintained Boolean Indicates whether the synchronization is being
maintained on an ongoing basis.
Appendix C. CIM Agent class information for the ESS API 221
Table 97. IBMTSESS_PPRCPath (continued)
Property Type Qualifier or Parameter Description
SystemName String Key, MaxLen(256) Describes the scoping System’s
Name.
Appendix C. CIM Agent class information for the ESS API 223
| Table 99. IBMTSESS_AsyncPPRCService (continued)
| Property Type Qualifier or Parameter Description
| Name String Key, MaxLen(64) Describes an address or other
| identifying information to uniquely
| name the LogicalElement.
| StorageConfigurationService
| IBMTSESS_AsyncPPRCService
| ManageSession uint32 Method Creates or destroys a session that
| constitutes a group of volumes that
| belong to a specified LSS and that
| have some consistency correlation.
| SessionNumber uint16 Parameter of Session number in decimal (1-255)
| ManageSession
| SessionType string Parameter of Session type in hexadecimal, for
| ManageSession example, 0x40 for XDC session, 0x30
| for Flash Copy session, 0x20 for
| PPRC session, 0x10 for XRC session
| LSS string Parameter of LSS for the session, in format
| ManageSession ESSID:LSSID:SSID where ESSID is of
| format like 2105.FA120 and LSSID is a
| 1 or 2 byte hexadecimal LSS number
| SSID is a 1 or 2 byte hexadecimal SS
| ID (empty string if undefined)
| Operation uint16 Parameter of Type of operation - open or close
| ManageSession session. ValueMap{0, 1}, Values {Open,
| Close }
| Return values — Return valuesof Description of return values:
| ManageSession
| 0 Success
| 1 Not Supported
| 5 Invalid input parameter
| 0x8010 Cannot retrieve internal
| Service
| 0x8012 Cannot connect to internal
| Services
| 0x8013 Cannot retrieve internal
| SessionService
| 0x8014 Cannot create NILLSID
| 0x8015 Cannot create SessionID
| 0x8030 Exception in executing
| ManageSession
| 0x8031 Session already opened
| 0x8080 Internal returned NULL in
| ManageSession
| 0x9000 and above are internal return
| values
| ManageSessionVolume uint32 Method Adds or removes the specified
| volumes to or from a session.
Appendix C. CIM Agent class information for the ESS API 225
| Table 99. IBMTSESS_AsyncPPRCService (continued)
| Property Type Qualifier or Parameter Description
| MasterLSS string Parameter of Master LSS for the copy relationship in
| ManageAsyncPPRC the format ESSID:LSSID:SSID, where
| ESSID is of format like 2105.FA120
| and LSSID is a 1 or 2 byte
| hexadecimal LSS number, and SSID is
| a 1 or 2 byte hexadecimal SS ID
| (empty string if undefined)
| ControlPath string[] Parameter of Array of Path pairs between the
| ManageAsyncPPRC Leader LSS and the Follower LSS in
| the format ESSID:LSSID:SSID –
| ESSID:LSSID:SSID, where the first is
| for the Leader and the second is for
| the Follower. ESSID is of format like
| 2105.FA120 and LSSID is a 1 or 2
| byte hexadecimal LSS number, and
| SSID is a 1 or 2 byte hexadecimal SS
| ID (empty string if undefined)
| Operation uint16 Parameter of Operation type. ValueMap {0, 1, 2, 3},
| ManageAsyncPPRC Values { Start, Pause, Resume,
| Terminate}
| ConsistencyGroupInterval uint16 Parameter of Interval (in seconds) between
| ManageAsyncPPRC ConsistencyGroup formation. The
| following use requirements apply:
| v Start — Required
| v Resume — Optional
| v Pause — Ignored
| v Terminate — Ignored
| MaxXDCCoordinationTime uint16 Parameter of Maximum time (in milliseconds)
| ManageAsyncPPRC allowed for Leader to coordinate
| Followers to form Consistency Group.
| Default 50 millisec. The following use
| requirements apply:
| v Start — Required
| v Resume — Optional
| v Pause — Ignored
| v Terminate — Ignored
| MaxConsistencyGroupDrain uint16 Parameter of Maximum time (in minutes) allowed to
| ManageAsyncPPRC drain Out-Of-Sync data to B volumes.
| Default 4 minutes. The following use
| requirements apply:
| v Start — Required
| v Resume — Optional
| v Pause — Ignored
| v Terminate — Ignored
Appendix C. CIM Agent class information for the ESS API 227
| Table 99. IBMTSESS_AsyncPPRCService (continued)
| Property Type Qualifier or Parameter Description
| Result uint32 Output Parameter of Result of format specified in ESS
| QueryXDCIncrement Attachment Specification, DSO
| Status command, suborder x4A, each Uint32
| represents 4 bytes of data
| Return values — Return values of Description of return values:
| QueryXDCIncrement
|| Status
0 Success
| 1 Not Supported
| 5 Invalid input parameter
| 0x8010 Cannot retrieve NI Service
| 0x8011 Cannot connect to NI
| 0x8013 Cannot get NI
| AsyncPPRCService
| 0x8015 Cannot create SessionID
| 0x8016 Cannot create
| NIESSID/NILSSID for Scope
| parameter
| 0x8024 Invalid option
| 0x8025 Invalid combination of options
| 0x8030 Exception in executing
| queryXDCIncrementStatus
| 0x8080 Internal returned NULL in
| ManageSessionVolume
| 0x9000 and above are internal return
| values
| QueryXDCOutOfSyncStatus uint32 Method Retrieves information about Extended
| Distance Consistency’s Out-of-Sync
| Tracks. The scope can be either one
| ESS or one LSS.
| SessionNumber uint16 Parameter of Session number in decimal (1-255)
| QueryXDCOutOfSync
| Status
| SessionType string Parameter of Session type in hexadecimal, for
| QueryXDCOutOfSync example, 0x40 for XDC session, 0x30
| Status for FlashCopy session, 0x20 for PPRC
| session, 0x10 for XRC session
| Scope string Parameter of LSSID of format ESSID:LSSID:SSID
| QueryXDCOutOfSync where ESSID is of format like
| Status 2105.FA120 and LSSID is a 1 or 2
| byte hexadecial LSS number and
| SSID is a 1 or 2 byte hexadecimal
| SSID (empty string if undefined)
| Option uint16 Parameter of 0 for whole ESS (the Scope parameter
| QueryXDCOutOfSync can use any existing LSS for the ESS)
| Status
Appendix C. CIM Agent class information for the ESS API 229
| Table 99. IBMTSESS_AsyncPPRCService (continued)
| Property Type Qualifier or Parameter Description
| Return values — Return values of Description of return values:
| QueryXDCSessionsAnd
|| Devices
0 Success
| 1 Not Supported
| 5 Invalid input parameter
| 0x8010 Cannot retrieve NI Service
| 0x8011 Cannot connect to NI
| Services
| 0x8013 Cannot get NI
| AsyncPPRCService
| 0x8016 Cannot create
| NIESSID/NILSSID for Scope
| parameter
| 0x8030 Exception in executing
| QueryXDCSessionsAnd
| Devices
| 0x8080 Internal returned NULL in
| QueryXDCSessionsAnd
| Devices
| 0x9000 and above are internal return
| values
| QueryAsyncPPRCStatus uint32 Method Retrieves information about
| Asynchronous PPRC. The scope is for
| one whole ESS.
| SessionNumber uint16 Parameter of Session number in decimal (1-255)
| QueryAsyncPPRCStatus
| SessionType string Parameter of Session type in hexadecimal, for
| QueryAsyncPPRCStatus example, 0x40 for XDC session, 0x30
| for FlashCopy session, 0x20 for PPRC
| session, 0x10 for XRC session
| Scope string Parameter of LSSID of format ESSID:LSSID:SSID
| QueryAsyncPPRCStatus where ESSID is of format like
| 2105.FA120 and LSSID is a 1 or 2
| byte hexadecial LSS number and
| SSID is a 1 or 2 byte hexadecimal
| SSID (empty string if undefined). Any
| existing LSS of the ESS can be used.
| Result uint32 Parameter Output of Result of the format specified in ESS
| QueryAsyncPPRCStatus Attachment Specification, DSO
| command, suborder x51, each uint32
| represents 4 bytes of data
Appendix C. CIM Agent class information for the ESS API 231
Physical Package Instance Diagram
IBMTSESS_Product
+Name(Key): String
+IdentifyingNumber(Key): String
+Vendor: String
+Version: String
IBMTSESS_ProductPhysicalComponent
IBMTSESS_Chassis
+Tag(Key): String
+CreationClassName(Key): String
IBMTSESS_StorageSystem
+CreationClassName(Key): String
+Name(Key): String
+OtherIdentifyingInfo: Vector
IBMTSESS_ComputerSystemPackage +IdentifyingDescription: Vector
+model: String
+codeLevel: String
+cache: String
+nvs: String
+Dedicated: Vector
Figure 7 on page 233 shows the classes and their related associations that
represent the storage classes to the ESS.
IBMTSESS_FcPort
IBMTSESS_SystemDevice
IBMTSESS_StorageSystem IBMTSESS_ProtocolController
IBMTSESS_SystemDevice
IBMTSESS_SystemDevice IBMTSESS_Volume
IBMTSESS_HostedStoragePool IBMTSESS_ElementSettingData
IBMTSESS_AllocatedFromStoragePool
IBMTSESS_StorageSetting
IBMTSESS_VolumeSpace
IBMTSESS_ElementCapabilities
IBMTSESS_StorageCapabilities
Figure 8 on page 234 shows the classes and their related associations that
represent the access, addressing information, or both, for a remote connection to
the ESS.
Appendix C. CIM Agent class information for the ESS API 233
Access Point Subprofile Instance Diagram
IBMTSESS_RemoteServiceAccessPoint
+SystemCreationClassName(Key): String
+SystemName(Key): String
+CreationClassName(Key): String
+Name(Key): String
IBMTSESS_HostedAccessPoint
IBMTSESS_StorageSystem
+CreationClassName(Key): String
+Name(Key): String
+OtherIdentifyingInfo: Vector
+IdentifyingDescription: Vector
+model: String
+codeLevel: String
+cache: String
+nvs: String
+Dedicated: Vector
Figure 9 shows the classes and their related associations that represent the
aggregate elements to the ESS.
IBMTSESS_ExtraCapacitySet
+InstanceID(Key): String
IBMTSESS_StorageSystem IBMTSESS_ConcreteIdentityCapSet
+CreationClassName(Key): String
+Name(Key): String
+OtherIdentifyingInfo: Vector
+IdentifyingDescription: Vector
IBMTSESS_MemberOfCollection
+model: String
+codeLevel: String
+cache: String
+nvs: String
+Dedicated: Vector
Figure 10 on page 235 shows the classes and their related associations that
represent the location of the disk group to the ESS.
IBMTSESS_PhysicalPackage
IBMTSESS_PhysicalElementLocation
IBMTSESS_Location
Figure 11 shows the classes and their related associations that represent the
service control on the copy relationships to the ESS.
IBMTSESS_StorageSystem
IBMTSESS_HostedService IBMTSESS_StorageConfigurationService
+AttachReplica( )
+ModifySynchronization( )
IBMTSESS_StorageVolume IBMTSESS_StorageVolume
IBMTSESS_StorageSynchronized
Figure 12 on page 236 shows the classes and their related associations that
represent the pool manipulation to the ESS.
Appendix C. CIM Agent class information for the ESS API 235
Pool Manipulation, Capacity and Settings Subprofile Instance Diagram
IBMTSESS_StorageCapabilities IBMTSESS_StorageSetting
IBMTSESS_ElementCapabilities IBMTSESS_ElementSetting
IBMTSESS_HostedStoragePool IBMTSESS_AllocatedFromStoragePool
IBMTSESS_StorageSystemToVolume
IBMTSESS_StorageConfigurationService
IBMTSESS_HostedService +CreateorModifyStoragePool( )
+DeleteStoragePool( )
Figure 12. Pool manipulation, capacity, and settings subprofile instance diagram
Figure 13 on page 237 shows the classes and their related associations that
represent the LUN Creation to the ESS.
IBMTSESS_StorageCapabilities IBMTSESS_StorageSetting
IBMTSESS_ElementCapabilities IBMTSESS_ElementSetting
IBMTSESS_HostedStoragePool IBMTSESS_AllocatedFromStoragePool
IBMTSESS_StorageSystemToVolume
IBMTSESS_StorageConfigurationService
IBMTSESS_HostedService +CreateorModifyElementFrom
+StoragePool( )
Figure 14 on page 238 shows the classes and their related associations that
represent the LUN Connectivity to the ESS.
Appendix C. CIM Agent class information for the ESS API 237
LUN Mapping and Masking Subprofile Instance Diagram
IBMTSESS_HostedService
IBMTSESS_ConcreteDependency
IBMTSESS_PrivledgeManagementService
IBMTSESS_AuthorizedSubject
IBMTSESS_Privledge
IBMTSESS_AuthorizedTarget
IBMTSESS_StorageClientSetting
IBMTSESS_ElementSettingData
IBMTSESS_Controller
IBMTSESS_StorageSystem ConfigurationService
IBMTSESS_HostedService
IBMTSESS_ElementCapabilities
IBMTSESS_ProtocolContollerMaskingCapabilities
IBMTSESS_HostedService
Figure 15 on page 239 shows the classes and their related associations that
represent the VolumeSpace specific statistics to the ESS.
IBMTSESS_PerformanceServices
IBMTSESS_StorageSystem
IBMTSESS_HostedService +StartStatisticsCollection( )
+StopStatisticsCollection( )
Figure 16 shows the classes and their related associations that represent the
physical disk drive to the ESS.
IBMTSESS_Volume IBMTSESS_StorageSystem
+SystemCreationClassName(Key): String +CreationClassName(Key): String
+SystemName(Key): String +Name(Key): String
+CreationClassName(Key): String
+DeviceID(Key): String
IBMTSESS_MediaPresent IBMTSESS_SystemDevice
IBMTSESS_DiskDrive
+SystemCreationClassName(Key): String
+SystemName(Key): String
+CreationClassName(Key): String
+DeviceID(Key): String
IBMTSESS_Realizes
IBMTSESS_PhysicalPackage
+Tag(Key): String
+CreationClassName(Key): String
Related topics:
v “ESS API class definitions” on page 147
v “CIM Agent communication concepts” on page 125
v Appendix A, “ESS API component definitions,” on page 123
v “CIM Agent Communication methods” on page 126
v “Error codes returned by the CIMOM” on page 137
Appendix C. CIM Agent class information for the ESS API 239
240 ESS API Reference
Appendix D. ESS API support for Microsoft Volume Shadow
Copy Service for Windows
This chapter includes an overview of ESS API support for Microsoft Volume
Shadow Copy Service along with an overview of the installation process, and
instructions for installing and reconfiguring Microsoft Volume Shadow Copy Service
on a Windows Server 2003 operating system. Instructions for uninstalling Microsoft
Volume Shadow Copy Service are also provided.
http://www.ibm.com/storage/hardsoft/products/ess/supserver.htm
The ESS API support for Microsoft Volume Shadow Copy Service enables users to
quickly back up and restore large amounts of data on Windows Server 2003.
Microsoft Volume Shadow Copy Service coordinates with a provider and the
Enterprise Storage Server (ESS) to create a consistent shadow copy of a volume or
group of volumes at a point-in-time. Point-in-time shadow copies ensure
consistency for Microsoft Volume Shadow Copy Service-aware writers, and also
works with applications that do not support Microsoft Volume Shadow Copy Service
technology. The shadow copy can be created while the volume is mounted and files
are in use.
The volumes are then mounted hidden and read-only, to be used when rapid
restore is necessary. Alternatively, the volumes can be mounted on a different host
and used for application testing or backup to tape.
You must install the IBM TotalStorage Common Information Model Agent (CIM
Agent), a middleware application that provides a CIM-compliant interface, before
installing Microsoft Volume Shadow Copy Service. The Microsoft Volume Shadow
Copy Service uses the CIM technology to manage proprietary devices as open
system devices through storage management applications.
Microsoft Volume Shadow Copy Service is supported on ESS Fxx and 800 models,
version 2.3.x.x, or later.
The following installation tasks are presented in the order in which they should be
performed:
1. Before you install Microsoft Volume Shadow Copy Service for Windows, check
the hardware and software requirements listed in “ESS API support for Microsoft
Volume Shadow Copy Service installation requirements.”
2. Install the prerequisite ESS CIM Agent software, as instructed in Chapter 4,
“ESS CIM Agent for Windows,” on page 59.
3. Run the InstallShield Wizard for Microsoft Volume Shadow Copy Service by
performing the instructions in “Installing ESS API support for Microsoft Volume
Shadow Copy Service on Windows” on page 243.
4. Verify the installation by performing the instructions in “Verifying ESS API
support for Microsoft Volume Shadow Copy Service Windows installation” on
page 252.
5. Create Free and Reserved Volume Pools in “Creating the VSS_FREE and
VSS_RESERVED pools” on page 252.
6. Reconfigure Microsoft Volume Shadow Copy Service by using the commands in
“ESS API support for Microsoft Volume Shadow Copy Service reconfiguration
commands” on page 253. Perform this optional task if you would like to change
the configuration that you established during installation.
You must install the ESS CIM Agent before you install Microsoft Volume Shadow
Copy Service. You can locate the CIM Agent on the same machine as Microsoft
Volume Shadow Copy Service or on a different machine.
Attention:Before you start the installation of the ESS CIM Agent, all prerequisite
software must be installed. The ESS CIM Agent installation program will check for
the existence of the ESS CLI. If the program does not detect the ESS CLI, the
installation of the ESS CIM Agent will not complete successfully.
Hardware
The following hardware is required:
v ESS Models 800 and Fxx, version 2.3.x.x or higher with FlashCopy Version 1 or
FlashCopy Version 2
Note: You must define all host machine HBAs on the ESS Specialist. If you do
not, ESS API support for Microsoft Volume Shadow Copy Service might
fail upon shadow volume location or import.
Software
The following software is required:
v Windows Server 2003 operating system. The following editions of Windows
Server 2003 are supported:
– Standard Edition
– Enterprise Edition, 32-bit version
– Datacenter Edition, 32-bit version
v Common Information Model (CIM) Agent. The CIM Agent can be located on the
same machine as Microsoft Volume Shadow Copy Service or a different
machine. You can find this software on the IBM TotalStorage Enterprise Storage
Server (ESS) Application Programming Interface CD1- IBM TotalStorage CIM
Agent for ESS CD.
v Microsoft Volume Shadow Copy Service compliant backup software
Installing ESS API support for Microsoft Volume Shadow Copy Service
on Windows
This section includes the steps to install ESS API support for Microsoft Volume
Shadow Copy Service in your Windows system. You must satisfy all prerequisites
that are listed in “Installing the ESS CIM Agent on Windows in unattended (silent)
mode” on page 69 before you start the installation.
Steps:
Perform the following steps to install Microsoft Volume Shadow Copy Service:
1. Log on to your system as the local administrator.
2. Run the InstallShield Wizard by inserting the IBM TotalStorage Enterprise
Storage Server (ESS) Application Programming Interface - Microsoft Volume
Shadow Copy Service CD into the CD-ROM drive
3. Click Next to continue with the InstallShield Wizard.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 243
4. The License Agreement window opens. Select whether you accept the terms
of the license agreement and click Next. If you do not accept, you cannot
continue with the installation.
5. The Choose Destination Location Window opens. If you do not want to choose
the default destination location where setup will install the files, click Change.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 245
6. The Ready to Install the Program window opens. Click Install to begin the
installation. To cancel the install setup, click Cancel.
The Setup Status window opens. Click Cancel if you want to stop the setup.
8. The Password window opens. Enter your ICAT 1.2 password and click Next.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 247
9. The Setup Type window opens. Select whether you want to use Secure
Sockets Layer (SSL) to connect to ICAT 1.2 and click Next.
Notes:
a. You can set the SSL using the ibmvssconfig.exe configuration tool.
b. If you are not sure whether to use SSL to connect to ICAT 1.2, contact
your ICAT administrator.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 249
11. The Edit Data window opens. Type the ESS serial number and click Next.
12. The Setup Type window opens. Select the version of FlashCopy that is
installed on your machine and click Next.
13. The InstallShield Wizard Complete window opens. Click Finish. The
InstallShield Wizard is complete.
14. The installation program might prompt you to reboot your system.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 251
Result:
If you are able to perform all of the installation tasks successfully, Microsoft Volume
Shadow Copy Service has been successfully installed on your Windows system.
Verifying ESS API support for Microsoft Volume Shadow Copy Service
Windows installation
This task verifies that Microsoft Volume Shadow Copy Service is installed correctly
on your Windows system.
Steps:
Perform the following steps to verify your Microsoft Volume Shadow Copy Service
installation:
1. Select Start -> All Programs -> Administrative Tools -> Services
2. Ensure that there is a service named IBM TotalStorage ESS Hardware Provider
for VSS (Short name: IBMVSS) and that the Status is Started and the Startup
Type is Automatic.
3. Open a command prompt window and type the following command to verify that
Microsoft Volume Shadow Copy Service is installed:
Result:
If you are able to perform all of the verification tasks successfully, Microsoft Volume
Shadow Copy Service has been successfully installed on your Windows system.
Steps:
Perform the following steps using the IBM TotalStorage ESS Specialist to create the
VSS_FREE and VSS_RESERVED pools:
1. Create a virtual host on the ESS named ″VSS_FREE″, of type Microsoft
Windows, attached by Fibre Channel with a WWPN of 5000000000000000.
2. Create a virtual host on the ESS named ″VSS_RESERVED″, of type Microsoft
Windows, attached by Fibre Channel with a WWPN of 5000000000000001.
3. Create and assign free volumes to VSS_FREE.
Note: If you already have volumes created for VSS_FREE, you must assign
those volumes to VSS FREE.
Verifying ESS API support for Microsoft Volume Shadow Copy Service
Windows configuration
This task verifies that Microsoft Volume Shadow Copy Service is configured
correctly on your Windows system.
Steps:
After you have installed Microsoft Volume Shadow Copy Service and created the
VSS_FREE and VSS_RESERVED pools, perform the following steps to verify your
configuration:
1. Issue the following command:
ibmvssconfig listvols
All of the volumes on your ESS should be listed with the WWPNs they are
assigned to.
2. If the volumes are not listed, check the connectivity of your ESS CIM Agent.
Then, check your ESS API support for Microsoft Volume Shadow Copy Service
configuration. You can reconfigure using the commands that are listed in the
next section. The ESSService.log provides more detailed information on which
setting is incorrect. ESS API support for Microsoft Volume Shadow Copy
Service will not work if this command does not succeed.
Result:
If you are able to perform all of the verification tasks successfully, Microsoft Volume
Shadow Copy Service has been successfully configured on your Windows system.
Commands:
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 253
After installation, you can use several commands on the ibmvssconfig.exe tool to
change or correct parameters that you used to install the Microsoft Volume Shadow
Copy Service. To do this, you must use the utility ibmvssconfig.exe. You do not
have to set many of the settings because there are defaults provided for them in
Microsoft Volume Shadow Copy Service. Table 100 shows the commands you can
use for reconfiguration.
Note: If you do not know which settings to provide (for example, passwords or user
names) for the following commands, contact your system administrator.
Table 100. Microsoft Volume Shadow Copy Service reconfiguration commands
Command Description Example
ibmvssconfig Provides the current
showcfg settings.
ibmvssconfig listvols Lists the volumes ibmvssconfig listvols
that are currently in
ibmvssconfig listvols free
the freepool,
unassigned, or all ibmvssconfig listvols unassigned
volumes. By default, ibmvssconfig listvols all
without any
additional
parameters, this
command will list all
of the volumes.
ibmvssconfig listvols Lists the volumes ibmvssconfig listvols free
free that are currently in
the freepool,
volumes that are
unassigned, or both.
ibmvssconfig listvols Lists the volumes ibmvssconfig listvols unassigned
unassigned that are currently in
the freepool,
volumes that are
unassigned, or both.
ibmvssconfig add Adds a volume or ibmvssconfig add 12312345 32112345
volumes to the
freepool.
ibmvssconfig rem Removes a volume ibmvssconfig rem 512
or volumes from the
ibmvssconfig rem 51212345
freepool.
ibmvssconfig set Changes the ESS ibmvssconfig set targetESS 12345
targetESS <5-digit identification number,
ESS Id> usually seen in the
form of 2105.xxxxx.
Obtain this number
by telnetting to your
ESS.
ibmvssconfig set Sets the CIMOM ibmvssconfig set username johnny
username <CIMOM user name.
username>
ibmvssconfig set Sets the CIMOM ibmvssconfig set password mypassword
password <CIMOM user password.
password>
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 255
Error codes returned by Microsoft Volume Shadow Copy Service
This section identifies the possible error codes that are returned by Microsoft
Volume Shadow Copy Service.
Note: These errors are logged in the Windows Event Monitor and in the Microsoft
Volume Shadow Copy Service log file located in the installation directory.
Table 101. Return error codes for Microsoft Volume Shadow Copy Service
Symbolic Name Code Definition
ERR_JVM 1000 JVM Creation failed.
ERR_CLASS_NOT_FOUND 1001 Class not found: %1.
ERR_MISSING_PARAMS 1002 Some required
parameters are missing.
ERR_METHOD_NOT_FOUND 1003 Method not found: %1.
ERR_REQUIRED_PARAM 1004 A missing parameter is
required. Use the
configuration utility to set
this parameter: %1.
ERR_RECOVERY_FILE_CREATION_FAILED 1600 The recovery file could
not be created.
ERR_ARELUNSSUPPORTED_IBMGETLUNINFO 1700 ibmGetLunInfo failed in
AreLunsSupported.
ERR_FILLLUNINFO_IBMGETLUNINFO 1800 ibmGetLunInfo failed in
FillLunInfo.
ERR_GET_TGT_CLEANUP 1900 Failed to delete the
following temp files: %1
ERR_LOG_SETUP 2500 Error initializing log.
ERR_CLEANUP_LOCATE 2501 Unable to search for
incomplete Shadow
Copies. Windows Error:
%1.
ERR_CLEANUP_READ 2502 Unable to read
incomplete Shadow
Copy Set information
from file: %1.
ERR_CLEANUP_SNAPSHOT 2503 Unable to cleanup
snapshot stored in file:
%1.
ERR_CLEANUP_FAILED 2504 Cleanup call failed with
error: %1.
ERR_CLEANUP_OPEN 2505 Unable to open file: %1.
ERR_CLEANUP_CREATE 2506 Unable to create file:
%1.
ERR_HBAAPI_LOAD 2507 HBA: Error loading hba
library: %1.
Steps:
Perform the following steps to uninstall Microsoft Volume Shadow Copy Service:
1. Log on to your system as the local administrator.
2. Click Start -> Control Panel.
Appendix D. ESS API support for Microsoft Volume Shadow Copy Service for Windows 257
3. The Control Panel window opens. Double-click on Add or Remove Programs
and then select IBM TotalStorage ESS API - Microsoft Volume Shadow Copy
Service. Click Remove to remove the program.
4. Select Yes when asked if you want to completely remove the selected
application and all of it components or click No to go back to the Add or
Remove Programs window.
5. The progress window quickly opens and closes.
6. The Finish window opens. Click Finish. The removal is now complete.
Result:
If you are able to perform all of the uninstallation tasks successfully, Microsoft
Volume Shadow Copy Service has been successfully uninstalled on your Windows
system.
Features
These are the major accessibility features in the IBM TotalStorage Enterprise
Storage Server information:
1. You can use screen-reader software and a digital speech synthesizer to hear
what is displayed on the screen. IBM Home Page Reader version 3.0 has been
tested.
2. You can operate features using the keyboard instead of the mouse.
Navigating by keyboard
You can use keys or key combinations to perform operations and initiate menu
actions that can also be done through mouse actions. You can navigate the IBM
TotalStorage Enterprise Storage Server information from the keyboard by using the
shortcut keys for your browser or Home Page Reader. See your browser Help for a
list of shortcut keys that it supports. See the following Web site for a list of shortcut
keys supported by Home Page Reader:
http://www-306.ibm.com/able/solution_offerings/keyshort.html
You can access the information using IBM Home Page Reader 3.0.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the user’s responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications to cover subject matter that is
described in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION ″AS IS″ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions; therefore, this statement may not apply to
you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those
Web sites. The materials at those Web sites are not part of the materials for this
IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
Such information may be available, subject to appropriate terms and conditions that
include in some cases, payment of a fee.
The licensed program described in this document and all licensed material available
for it are provided by IBM under terms of the IBM Customer Agreement, IBM
International Program License Agreement, or any equivalent agreement between
us.
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM
has not tested those products and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those
products.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
Trademarks
The following terms are trademarks of the International Business Machines
Corporation in the United States, or other countries, or both:
AIX
Enterprise Storage Server
IBM
TotalStorage
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States and other countries.
Notices 263
264 ESS API Reference
Glossary
The terms in this glossary are defined as they A
pertain to the Common Information Model for the
IBM TotalStorage Enterprise Storage Server. If you access.
do not find a term you are looking for, you can 1. To obtain the use of a computer resource.
refer to the IBM Dictionary of Computing Terms. A
2. In computer security, a specific type of interaction
link to the Web site for this reference is listed in
between a subject and an object that results in flow
the following paragraph. of information from one to the other.
This glossary might include terms and definitions access control list.
from: 1. In computer security, a collection of all access rights
v The American National Standard Dictionary for for one object.
Information Systems, ANSI X3.172–1990, 2. In computer security, a list associated with an object
copyright 1990 by the American National that identifies all the subjects that can access the
Standards Institute (ANSI), 11 West 42nd object and their access rights; for example, a list
Street, New York, New York 10036. associated with a file that identifies users who can
access the file and identifies their access rights to
v The IBM Glossary of Computing Terms, which that file.
is available online at the following Web site:
http://www.ibm.com/ibm/terminology/. active window. The window a user is currently
v The Information Technology Vocabulary interacting with.
developed by Subcommittee 1, Joint Technical address.
Committee 1, of the International Organization
1. A character or group of characters that identify a
for Standardization and the International
register, a particular part of storage, or some other
Electrotechnical Commission (ISO/IEC data source or destination.
JTC1/SC1).
2. To refer to a device or an item of data by its
address.
This glossary uses the following cross-reference
3. The location, identified by an address code, of a
forms:
specific section of the recording medium or storage.
See Refers the reader to one of two kinds of 4. A name, label, or number identifying a location in
related information: storage, a device in a system or network, or any
v A term that is the expanded form of an other data source.
abbreviation or acronym. This 5. In data communication, the unique code assigned to
expanded form of the term contains the each device or workstation connected to a network.
full definition.
advanced. Usually refers to the performance of
v A synonym or more preferred term functions not understood by the basic user.
See also advanced interactive executive (AIX). An operating
Refers the reader to one or more related system used in the RS/6000 computers. See also AIX
terms. Operating System.
Contrast with AIX. See advanced interactive executive.
Refers the reader to a term that has an
opposite or substantively different AIX Operating System. IBM’s implementation of the
meaning. UNIX operating system. The RISC 6000 computer,
among others, runs on the AIX operating system.
Numerics alert. A message or log that a storage facility
generates as the result of error event collection and
2105. The machine number for the IBM TotalStorage analysis. An alert indicates that you need to perform
Enterprise Storage Server (ESS). some service action.
command-line interface (CLI). An interface provided Desktop Management Task Force (DMTF. An
by an operating system that defines a set of commands alliance of computer vendors that was convened to
and enables a user (or a script-like language) to issue define streamlined management of the diverse operating
these commands by typing text in response to the systems commonly found in an enterprise.
command prompt (for example, DOS commands or
UNIX shell commands). device.
Glossary 267
1. A mechanical, electrical, or electronic contrivance
with a specific purpose.
E
2. A storage server, such as the ESS, that is the final enable. To make functional.
destination of a client application request, and the
processor of the request. encryption. In secure communications, a means of
3. In the AIX operating system, a valuator, button, or scrambling data to prevent the data from being read by
the keyboard. Buttons have values of 0 or 1 (up or anyone other than the intended recipient. The sender
down); valuators return values in a range, and the uses a key to encrypt the message. The recipient uses
keyboard returns ASCII values. the decryption key.
device adapter (DA). A physical subunit of a storage Enterprise Storage Server. A disk storage system
controller that provides the ability to attach to one or that provides storage sharing for all major types of
more interfaces used to communicate with the servers.
associated storage devices.
error message. An indication that an error has been
device provider. A device-specific handler that detected.
receives client application requests that are destined for
ESS. See Enterprise Storage Server.
its device or storage server.
event.
digital certificate. A file used to identify the
authenticity of a person or organization. A certificate is 1. A representation of a change that occurs to a part.
made up of the following: The change enables other interested parts to
receive notification when something about the part
v The public key of the person who is being certified
changes. For example, a push button generates an
v The name and address of the person who is being event by signalling that it has been clicked, which
certified may cause another part to display a window.
v The digital signature of the certification authority 2. Any significant change in the state of a system
v The issue date resource, network resource, or network application.
v The expiration date An event can be generated for a problem, for the
resolution of a problem, or for the successful
digital signature. A unique mathematically computed completion of a task. Examples of events are: the
signature that ensures accountability. normal starting and stopping of a process, the
abnormal termination of a process, and the
disable. To make nonfunctional. malfunctioning of a server.
3. An occurrence of significance to a task or system,
disk drive. A diskette drive or a hard disk drive as
such as the completion or failure of an operation.
opposed to a CD-ROM or optical drive.
4. A data link control command and response passed
distinguished name. In secure communications, the between adjacent nodes that allows the two nodes
name and address of the person and organization to to exchange identification and other information
whom a certificate has been issued. necessary for operation over the data link.
distributed system. A system that is spread out event log. A file which lists all actions that have
across a network. occurred.
DMTF. See Desktop Management Task Force. extended binary-coded decimal interchange code
(EBCDIC). A coding scheme that was developed by
DNS. See Domain Name System. IBM, which you use to represent various alphabetic,
numeric, and special symbols with an 8 bit code.
domain.
1. That part of a computer network in which the data Extensible Markup Language (XML. A standard
processing resources are under common control. metalanguage for defining markup languages that was
2. In TCP/IP, the naming system used in hierarchical derived from and is a subset of SGML. XML omits the
networks. more complex and less-used parts of SGML and makes
it much easier to (a) write applications to handle
Domain Name System (DNS). In the Internet suite of document types, (b) author and manage structured
protocols, the distributed database system used to map information, and (c) transmit and share structured
domain names to IP addresses. information across diverse computing systems. The use
of XML does not require the robust applications and
processing that is necessary for SGML. XML is being
developed under the auspices of the World Wide Web
Consortium (W3C).
firewall. A protection against unauthorized connection homogeneous. Of the same or similar type. A
to a computer or a data storage system. The protection computer network in which all computers have the same
is usually in the form of software on a gateway server or similar architecture.
that grants access to users that meet authorization
host. The controlling or highest level in a data
criteria.
communication configuration. In TCP/IP, any system
firmware. that has at least one Internet address associated with it.
A host with multiple network interfaces may have
1. An ordered set of instructions and data stored in a
multiple Internet addresses associated with it.
way that is functionally independent of main storage.
Firmware is more efficient than software and is more host application software. Software application
adaptable to change than pure hardware circuitry. programs executed in the host computer.
2. Deprecated term for microcode.
host initiated. A program executed as a subtask at
FTP. See File Transfer Protocol. the request of the host system.
FTP site. An electronic repository of information using host name. In the Internet suite of protocols, the name
File Transfer Protocol (FTP) to transfer data to and from given to a computer. Sometimes, ″host name″ is used
servers. to mean fully qualified domain name; other times, it is
used to mean the most specific subname of a fully
function. qualified domain name. For example, if
1. A specific purpose of an entity, or its characteristic mycomputer.city.company.com is the fully qualified
action. domain name, either of the following may be considered
2. A system component or licensed program that can the host name:
be optionally installed in a user’s system. v mycomputer.city.company.com
v mycomputer
G host processor. A processor that controls all or part of
a user application network. In a network, the processing
GB. See gigabyte.
unit in which the data communication access method
gigabyte (GB). A gigabyte of storage is 109 bytes. A resides. See also “host system.”
gigabyte of memory is 230 bytes.
host system.
graphical user interface (GUI). A type of computer 1. A computer system that is connected to the ESS.
interface consisting of a visual metaphor of a real world The ESS supports both mainframe (S/390 or
scene, frequently a desktop. The GUI contains icons, zSeries) hosts as well as open-systems hosts.
representing actual objects, that the user can access System/390 or zSeries hosts are connected to the
and manipulate. Contrast with a command-line interface ESS through ESCON or FICON interfaces.
(CLI).
Glossary 269
Open-system hosts are connected to the ESS by insert. To put a tape cartridge in the I/O station or to
SCSI or fibre-channel interfaces. automatically have the library move a cartridge from the
2. The data processing system to which a network is I/O station to a storage slot or drive.
connected and with which the system can
install. Set up for use or service. Adding a product,
communicate.
feature, or function system or device through a simple
3. The controlling or highest level system in a data change or through the addition of multiple components
communication configuration. or devices.
HTML. See hypertext markup language. instance.
HTTP. See Hypertext Transfer Protocol. 1. In Java programming, when you create a specific
variable of a particular class type, it is referred to as
hypertext markup language (HTML). An interpreted instantiating or creating an instance of that class
markup language used to create hypertext documents. 2. In Java programming, when you create a specific
Hypertext documents can include links to other related variable of a particular class type, it is referred to as
documents. HTML controls the format of text and instantiating or creating an instance of that class
position of form input areas, for example, as well as the
navigable links. interactive.
1. Pertaining to a program or system that alternately
Hypertext Transfer Protocol (HTTP). The primary
accepts input and then responds. An interactive
protocol in use on the Web.
system is conversational, that is, a continuous dialog
exists between user and system.
I 2. Pertaining to the exchange of information between a
user and a computer.
IBM product engineering (PE). IBM third-level service
support IBM engineers who have experience in interchange. The sending and receiving of data in
supporting a product, or who are knowledgeable about such a manner that the content of the data is not
the product. altered during transmission.
icon. interface.
1. A graphic symbol, displayed on a screen, that a user 1. A shared boundary between two functional units,
can point to with a device such as a mouse in order defined by functional characteristics, signal
to select a particular function or software application. characteristics, or other characteristics, as
2. A graphical representation of an object, consisting of appropriate. The concept includes the specification
an image, image background, and a label. of the connection of two devices having different
functions.
ID. See “identifier (ID).” 2. Hardware, software, or both, that links systems,
programs or devices.
identifier (ID). A unique name or address that
identifies things such as programs, devices, or systems. Internet. A wide area network that connects thousands
of disparate networks in industry, education,
initial program load (IPL). government, and research. The Internet network uses
1. The initialization procedure that causes an operating TCP/IP as the standard for transmitting information.
system to commence operation. Synonymous with
system restart, and system startup. Internet Explorer. The Web browser provided by
2. The process of loading system programs and Microsoft Corporation.
preparing a system to run jobs.
Internet Protocol (IP). A protocol used to route data
indication. A unique name or address that identifies from its source to its destination in the Internet
things such as programs, devices, or systems. computing network environment.
initialize. The formatting of a magnetic tape, except intranet. A collection of interconnected networks using
for the system files containing information on structure. Internet protocols, but with restricted access and not
All former contents of the tape are deleted. available to the public.
initiate. A network services request sent from a logical intrinsic method. A method that is supported by the
unit to a system services control point requesting that a CIM Agent itself.
session be established.
IP. See Internet Protocol.
initiator. A SCSI term for the part of a host computer
IP address. A group of four decimal numbers that
that communicates with its attached targets.
provides a unique address for the computer.
Glossary 271
next. A button or link that allows the user to move operator. A person or program responsible for
forward to the screen which follows the one they are managing functions controlled by a given piece of
currently viewing. software. The person who operates a device or keeps a
system running.
nonvolatile storage. Memory that stores active write
data to avoid data loss in the event of a power loss. operator intervention. A state requiring the operator
of the system or device to take action, either by
not installed. A status reading which indicates the acknowledging messages and initiating functions or
device is not present or cannot be initiated at this performing problem resolution.
location.
organizationally unique identifier (OUI). An identifier
NVS. See nonvolatile storage. that identifies an organization according to IEEE
standards.
O OUI. See organizationally unique identifier.
object. An object contains both data and code. The
principle feature of an object is that the data is kept P
privately inside the object structure. Any calculations on
that data are also private so it does not matter how that panel. The formatted display of information that
data is stored or how the computations are carried out. appears on a display screen.
It only matters that the object’s data and routines are
internally consistent and any access to the data in an parallel access volume (PAV). Created by
object always provides consistent results. associating multiple devices of a single control-unit
image with a single logical device. Up to 8 device
object name. An object name consists of a addresses can be assigned to a parallel access volume.
namespace path and a model path. The namespace
path provides access to the CIM implementation password. A unique string of characters known to a
managed by the CIM Agent. The model path provides computer system and to a user, who must specify the
navigation within the implementation. character string to gain access to a system and to the
information stored within it.
offline. The operating condition when the 3584 library
cannot interact with host systems. path. A statement that indicates where a file is stored
on a particular drive. The path consists of all the
online. The operating condition when host applications directories that must be opened to get to a particular
can interact with the 3584 library. file. The directory names are separated by the slash (/).
open system. A system whose characteristics comply platform. An ambiguous term that may refer to the
with standards made available throughout the industry, hardware, operating system, or a combination of the
and therefore can be connected to other systems that hardware and the operating system on which software
comply with the same standards. programs run.
Glossary 273
status. The condition or state of hardware or software, 1. To end a process.
usually represented by a status code. 2. The process of ending a process, usually without
making any changes.
storage. A functional unit into which data or data
media can be placed, in which it can be retained and Transmission Control Protocol/Internet Protocol
from which it can be retrieved. (TCP/IP). A set of communication protocols that
support peer-to-peer connectivity functions for both local
storage administrator. A person in the data
and wide area networks.
processing center who is responsible for defining,
carrying out, and maintaining storage management tutorial. Teaches a user how to use the product.
policies. Tutorials generally allow the user to move through the
functions at their own pace than reference manuals and
storage area network (SAN). A high speed
usually contain less detail.
subnetwork of shared storage devices. A SAN’s
architecture makes all storage devices available to all
servers on a LAN or WAN. As more storage devices are U
added, they too will be accessible from any server in
the larger network. Since stored data does not reside UA. See user assistance.
directly on a network’s servers, server power is used for
applications, and network capacity is released to the user assistance (UA). This refers to the help files,
end user. where users go to find information to assist them in
operations or problem resolution.
storage device. A physical unit which provides a
mechanism to store data on a given medium such that it user ID. The unique string of characters that identifies
can be subsequently retrieved. any person or device (the User) that may issue or
receive commands and messages to or from the
storage management. The task of using storage, information processing system.
such as DASD, tape, or optical devices, to keep and
deliver data to applications.
V
storage management application. A software tool
used to manage storage resources. value.
1. A specific occurrence of an attribute.
storage resources. Data that needs to be managed.
2. A quantity assigned to a constant, a variable,
storage subsystem. A storage control and its parameter or a symbol.
attached storage devices.
verification. Authentication, certification, or proof. For
storage server. A unit that manages attached storage example, verification of sensitive data is frequently
devices and provides access to the storage or storage enforced by dual entry of all the data and a comparison
related functions for one or more attached hosts. of the results.
terminate, termination.
X, Y, Z
XML. See Extensible Markup Language.
Special Characters
* (an asterisk). This character is used to indicate all
valid values in a field. For example, an IP address of
204.146.18.* specifies all valid addresses attached to
204.146.18.
Glossary 275
276 ESS API Reference
Index
A CIM Agent (continued)
configuration on AIX 22
about this guide
configuration on Linux 47
notational conventions 88
configuration on Windows 72
accessibility 259
configuration programs 91
addess subcommand 101, 103
configuring for unsecure mode on AIX 25
adduser subcommand 94
configuring for unsecure mode on Linux 50
AIX
configuring for unsecure mode on Windows 75
CLI installation 7
functional groups 136
configuring CIM Agent 22
installation overview for AIX 7
configuring for unsecure mode 25
installation overview for Linux 33
installation
installation overview for Windows 59
graphical mode 10
installation requirements 5
unattended mode 19
installing CLI on AIX 7
installation overview 7
installing CLI on Linux 33
installing the CIM Agent in graphical mode 10
installing CLI on Windows 60
installing the CIM Agent in unattended mode 19
installing on AIX in graphical mode 10
mounting the CD 9
installing on AIX in unattended mode 19
removing the CIM Agent 27
installing on Linux in graphical mode 35
running the CIM Agent 25
installing on Linux in unattended mode 43
verifying installation 21
installing on Windows in graphical mode 61
AllocatedFromStoragePool class 177
installing on Windows in silent mode 69
anatomy of a command line 90
installing on Windows in unattended mode 69
association, ESS API 123
intrinsic and extrinsic communication methods 125
AssociatorNames method parameters 132
invoking 88
Associators method parameters 131
mounting the CD on AIX 9
AsyncPPRCService class 223, 224, 225, 226, 227,
overview 2, 6
228, 229, 230, 231
product overview 1
AuthorizedSubject class 179
quick reference for class definitions 141
AuthorizedTarget class 179
removing from AIX 27
removing from Linux 52
removing from Windows 80
C running on AIX 25
Chassis class 185 running on Linux 51
chess subcommand 105 security 6
chessserver subcommand 107 verifying connection to the ESS 76
chuser subcommand 95 verifying installation on AIX 21
CIM Agent verifying installation on Linux 47
class information 141 verifying installation on Windows 71
command descriptions 87 CIM API communication methods
communication concepts 125 AssociatorNames 132
communication methods 126 Associators 131
component CreateInstance 127
Access point subprofile instance diagram 233 DeleteInstance 127
Array profile instance diagram 232 EnumerateClasses 128
Copy services subprofile instance diagram 235 EnumerateClassNames 129
Disk drive subprofile instance diagram 239 EnumerateInstanceNames 130
Extra capacity set subprofile instance EnumerateInstances 129
diagram 234 EnumerateQualifiers 135
Location subprofile instance diagram 234 error codes 137
LUN creation subprofile instance diagram 236 ExecQuery 130
LUN mapping and masking subprofile instance GetClass 126
diagram 237 GetInstance 126
Performance extension 238 GetProperty 133
Physical package instance diagram 231 GetQualifier 134
Pool manipulation, capacity, and settings ModifyInstance 128
subprofile instance diagram 235 ReferenceNames 133
components 3 References 132
D
DeleteInstance method parameters 127 I
DeleteQualifier, CIM API communication methods 135 IBMTSESS_ class definitions
DeviceMaskingCapabilities class 199 AllocatedFromStoragePool 177
disability 259 AsyncPPRCService 223, 224, 225, 226, 227, 228,
DiskDrive class 190 229, 230, 231
AuthorizedSubject 179
AuthorizedTarget 179
E Chassis 185
ElementCapabilitesMasking class 202 Component 209
ElementCapabilities class 181 ComputerSystemPackage 186
ElementConformsToProfile class 205 ComputerSystemPackageCard 189
elements, ESS API 123 ConcreteDependencyController 202
ElementSettingData class 181 ConcreteDependencyPrivilege 180
EltCapabilitiesStgPool class 211 ConcreteDependencyStorageHardwareID 180
emphasis 90 ConcreteIdentityCapSet 187
EnumerateClasses method parameters 128 ControllerConfigurationService 193
EnumerateClassNames method parameters 129 DeviceMaskingCapabilities 199
EnumerateInstanceNames method parameters 130 DiskDrive 190
EnumerateInstances method parameters 129 ElementCapabilitesMasking 202
EnumerateQualifiers, CIM API communication ElementCapabilities 181
methods 135 ElementConformsToProfile 205
error codes returned by the CIMOM 137 ElementSettingData 181
error codes returned by the ESS VSS Provider 256 EltCapabilitiesStgPool 211
ESS API ExtraCapacitySet 186
overview 1 FCPort 153
ESS API component definitions HostedAccessPoint 189
elements 123 HostedPrimordialStoragePool 211
ESS class definitions HostedService 180
individual functional schemas 231 HostedService2 181
quick reference 141 HostedService3 181
ESS VSS Provider HostedService4 199
error codes 256 HostedService6 219
installation requirements 242 HostedStoragePool 181
ExecQuery method parameters 130 InitiatorElementSettingData 206
ExtraCapacitySet class 186 Location 205
LunMaskPrivilegeService 171
MediaPresentExtent 209
MemberOfCollection 190
Index 279
IBMTSESS_ class definitions (continued) installation (continued)
PerformanceStatisticsService 217 unattended mode on Windows 69
PhysicalElementLocation 205 verifying on AIX 21
PhysicalPackage 192 verifying on Linux 47
Pool2PrimordialPool 223 verifying on Windows 71
PrimordialStoragePool 210 VSS Provider
Privilege 155 prerequisites 242
Product 176 Windows
ProductPhysicalComponent 187 prerequisites 5
ProtocolControllerForPort 178 invoking the CIM Agent 88
ProtocolControllerForUnit 178
Provider 212
Realizes 193 L
RegisteredProfile 203 Linux
RemoteServiceAccessPoint 187 CLI installation 33
RemoteSourceStorageSynchronized 219 configuring CIM Agent 47
RemoteTargetStorageSynchronized 220 configuring for unsecure mode 50
RemoteVolume 219 installation
SCSIProtocolController 154 graphical mode 36
StorageCapabilities 182 installation overview 33
StorageClientSettingData 206 installing the CIM Agent in graphical mode 35
StorageConfigurationService 157 installing the CIM Agent in unattended mode 43
StorageExtent 207 removing the CIM Agent 52
StorageHardwareID 156 running the CIM Agent 51
StorageHardwareIDManagementService 174 verifying installation 47
StorageProcessorCard 189 Location class 205
StorageSetting 184 lsess subcommand 109
StorageSynchronized 211 lsessserver subcommand 110
StorageSystem 147 lsuser subcommand 96
StorageSystemToController 178 LunMaskPrivilegeService class 171
StorageSystemToPort 177
StorageSystemToVolume 177
SubProfileExtendsProfile 204 M
SystemDevice 193 MediaPresentExtent class 209
Volume 150 MemberOfCollection class 190
VolumeSpace 148 method, ESS API 123
VolumeSpaceStatisticalData 217 mkcertificate command 119
VolumeSpaceStatistics 215 modifyconfig subcommand 122
VolumeStatisticalData 216 mounting the CD on AIX 9
VolumeStatistics 213
indication, ESS API 123
InitiatorElementSettingData class 206
installation
N
namespace, CIM 123
AIX
notational conventions
graphical mode 10
emphasis 90
unattended mode 19
special characters 90
CLI on AIX 7
CLI on Linux 33
CLI on Windows 60
graphical mode on AIX 10 O
graphical mode on Linux 35 object name, CIM 123
graphical mode on Windows 61 operational commands 91, 115
Linux
graphical mode 36
mounting the CD on AIX 9 P
overview for AIX 7 PerformanceStatisticsService class 217
overview for Linux 33 PhysicalElementLocation class 205
overview for Windows 59 PhysicalPackage class 192
silent mode on Windows 69 Pool2PrimordialPool class 223
unattended mode on AIX 19 prerequisites
unattended mode on Linux 43 VSS Provider 242
Index 281
Windows (continued)
prerequisites 5
removing the ESS CIM Agent 80
verifying connection to the ESS 76
verifying installation 71
Overall, how satisfied are you with the information in this book?
How satisfied are you that the information in this book is:
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you.
Name Address
Company or Organization
Phone No.
___________________________________________________________________________________________________
Readers’ Comments — We’d Like to Hear from You Cut or Fold
GC35-0489-01 Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
_________________________________________________________________________________________
Fold and Tape Please do not staple Fold and Tape
Cut or Fold
GC35-0489-01 Along Line
Printed in USA
GC35-0489-01
Spine information: