Advanced System Operator Workshop For IBM I [PDF]

  • 0 0 0
  • Gefällt Ihnen dieses papier und der download? Sie können Ihre eigene PDF-Datei in wenigen Minuten kostenlos online veröffentlichen! Anmelden
Datei wird geladen, bitte warten...
Zitiervorschau

V11.0

cover

Front cover Course Guide

Advanced System Operator Workshop for IBM i Course code AS27G   ERC 10.0

November 2016 edition Notices This information was developed for products and services offered in the US. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive, MD-NC119 Armonk, NY 10504-1785 United States of America INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk. IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to actual people or business enterprises is entirely coincidental.

Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. © Copyright International Business Machines Corporation 2001, 2016. This document may not be reproduced in whole or in part without the prior written permission of IBM. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

V11.0 Contents

TOC

Contents Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Course description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Unit 1. LPAR concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 IBM Power Systems family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Virtualization technologies on Power Systems with IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 IBM PowerVM editions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 IBM PowerVM features by Power8 systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 What is a partition? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8 Logical partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 Partition characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11 Partition resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12 Logical partition resource example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14 The big picture: Dynamic partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15 Dynamic partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16 Virtual I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18 Smarter IOAs (IOP-less) direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20 LPAR summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21 Benefits of using partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22 LPAR education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27

Unit 2. Console options and HMC overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Power with IBM i console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 HMC introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5 IBM Systems hierarchy of management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6 HMC and managed system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8 Managed system without HMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Managed system without HMC different options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10 Power Systems management: Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 HMC features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12 HMC options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Available HMC model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14 HMC functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15 Capacity on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17 HMC education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22

Unit 3. Basic management using HMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2 Topic 1: Dynamic logical partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

iii

V11.0 Contents

TOC

Partition profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Processing and Memory settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 I/O adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 Dynamic partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 Dynamic partitioning: Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8 Dynamic partitioning: Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10 Dynamic partitioning: Physical Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12 Dynamic partitioning: Virtual Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13 Create Virtual Adapter: Ethernet Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14 Virtual Ethernet Adapter: General and Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15 Work with Communications Resources display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21 Topic 2: Additional useful functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22 Serviceability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 Operations: Power Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25 Operations: Power On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26 Managed system states (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27 Managed system states (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28 Topic 3: Managed server partition tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30 Partition task selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 Partition tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32 Operations: Activate (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33 Operations: Activate (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38

Unit 4. IBM i Access Family overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 Topic 1: Overview of IBM i Access Family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 IBM i Access Family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 IBM i Access for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 IBM i Access for Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 IBM i Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Topic 2: Overview of IBM Navigator for i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 IBM Navigator for i window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 IBM Navigator for i main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 Topic 3: Using IBM i Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12 Platform independent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 Download Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 Unzip the download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16 Run the startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 Define the target IBM i (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Define the target IBM i (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19 Use Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20 Topic 4: Reference documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21 IBM i Access Family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22 A smart way to modernize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26

Unit 5. IBM i Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 IBM i Access Client Solutions deployment (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 IBM i Access Client Solutions deployment (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 Main user interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

iv

V11.0 Contents

TOC

System Configurations (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7 System Configurations (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8 Console configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9 Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10 5250 Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11 Virtual Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12 Database Run SQL Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13 Database SQL Performance Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14 5250 Emulation (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15 5250 Emulation (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16 5250 Emulation (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-17 5250 Session Manager (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18 5250 Session Manager (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19 Printer Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Actions: Download, View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22 Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23 Printer Output View menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25 Data Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27 Preferences: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-29 Preferences: Local Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-31 Preferences: Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-33 Preferences: Printer Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-34 HMC Probe Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-35 Exercise: Print output using IBM i Access Client Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-36 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-37 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-39

Unit 6. Security concepts and overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2 The objectives of system security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Physical security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4 Monitoring physical security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5 System tools used to secure your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6 Security is always active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13

Unit 7. System values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2 Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Topic 1: Security level system value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4 QSECURITY system value: Security level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Security level 40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6 The comparison of the functions supported by the different levels of security . . . . . . . . . . . . . . . . . . 7-7 Locking system values using service tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Topic 2: Configure security using 5250 emulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9 Individual system values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10 System value categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 Allocation category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12 Topic 3: Configure security using IBM Navigator for i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13 Configuration and Service: System Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

v

V11.0 Contents

TOC

Security category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15 Date and Time category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16 Change Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-18 Password rules for changing password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22

Unit 8. User security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2 Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Topic 1: User profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4 Roles served by user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5 User profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6 Appendix B: Default values for user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7 New User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8 Create a new user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9 New User: Capabilities > Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10 System privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11 Privilege classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-13 Capabilities: Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15 Capabilities: Password and Unique Identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17 Capabilities: UID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19 New User: Jobs > General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20 Jobs > Session Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-21 Jobs > Display Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23 Display Session: Limit capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25 Jobs > Output and International . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26 New User: Groups > Group Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-27 New User: Personal > Name, Location, and Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29 Appendix B: IBM-supplied user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31 User functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32 Changing a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33 Deleting a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34 Exercise: Create a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35 Topic 2: Group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36 Roles served by group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37 More facts about group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-38 New Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-39 New Group > Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40 New Group > Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-41 Group functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-42 Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-43 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-45 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-46 Review questions (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-47 Review answers (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-48 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-49

Unit 9. Resource security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2 Security components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3 Topic 1: Resource security concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 User-owned objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5 Primary group authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 QDFTOWN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

vi

V11.0 Contents

TOC

Where object permissions come from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8 Where *PUBLIC authority comes from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9 Object management authority (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10 Object management authority (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-11 Object data authority (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12 Object data authority (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13 Object exclude authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14 Commonly used permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-15 Integrated file system authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-16 Building authority checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-17 Topic 2: Defining resource security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-18 Object permission: QSYS.LIB file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-19 Basic and Details permission displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-20 Permission: Add / Remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-21 Permission: Customize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-22 Permission: Authorization List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-23 Change owner: Change primary group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24 Topic 3: Column-level authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25 Column-level security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26 Granting column-level permission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-27 Column-level security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28 Security - Separation of duties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29 What is RCAC? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-31 IBM Advanced Data Security for i (Boss Option 47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-32 Row permissions - 5250 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-33 Row permissions - IBM Navigator for i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-34 Column Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-35 Column Mask - IBM Navigator for i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-36 Exercise: Resource security and group profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-37 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-38 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-39 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-40

Unit 10. Authorization lists and adopted authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2 Topic 1: Authorization lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3 What is an authorization list? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 Authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5 Create an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6 Authorization list permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7 Object secured by an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8 Securing an object with an authorization list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9 Authorization list considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10 Authorization list versus group profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-11 Groups and AUTLs compared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12 Building authority checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13 Exercise: Authorization lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-14 Topic 2: Adopted authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-15 Adopted authority (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-16 Adopted authority (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-17 Authority checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18 Exercise: Adopted authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-19 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-21 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-22

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

vii

V11.0 Contents

TOC

Unit 11. Work management: Concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2 IBM i advanced application architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3 IBM i functional components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5 Performance checklist: Work management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6 Overview of work management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7 Storage management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8 Input, process, and output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 IBM i view: Job initiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10 Performance tuning (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-11 Performance tuning (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12 Work management objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-13 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-16 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-17

Unit 12. Work management: Subsystem concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . 12-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2 Topic 1: Subsystem concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3 Subsystems (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4 Subsystems (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5 Subsystem description (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7 Subsystem description (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9 Work entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-11 Routing entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Class information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-14 Start subsystem (STRSBS QINTER) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-16 Default subsystem configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-18 Topic 2: Memory pool concepts and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20 An overview of memory pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-21 The shared pool subtypes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22 Why pools? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-23 Main storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-24 Storage pool characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-26 Specifying which pools are assigned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-27 Storage pool allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28 Topic 3: Working with subsystems and memory pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-29 Display Subsystem Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-30 QINTER subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31 Work with System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-33 WRKSYSSTS: Pool data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-34 WRKSHRPOOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-35 IBM Navigator for i: Active Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-36 IBM Navigator for i: Shared Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-37 Shared Pools: Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-38 General and Configuration tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-39 Performance and Tuning tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-40 IBM Navigator for i: WRKSYSSTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-42 General and Jobs tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-43 Processors and Memory tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-44 Disk Space and Addresses tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-46 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-49 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-50

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

viii

V11.0 Contents

TOC

Unit 13. Work management: Job processing concepts and interactive jobs . . . . . . . . . . . . . . . 13-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2 Topic 1: Job processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3 Where work is processed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4 Types of jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5 Start / End of a job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6 Interactive job: User view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7 Interactive job: Programmer view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-8 Identify the types of jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9 Topic 2: Interactive jobs and job tuning concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-10 Interactive job routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-11 Selecting initial program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-13 Work management: Interactive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-14 Pool sizes and paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15 Pool benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16 Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-17 How objects are stored on disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-18 How do faults affect performance? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-19 DB versus non-DB page faults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20 Active Pools: Page faults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-21 Paging (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-22 Paging (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-23 Paging of interactive jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-24 How does paging affect performance? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-25 How to ensure the system has enough memory? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-26 Pool activity level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-27 IBM i activity levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-28 Active Pools: Activity level/transition data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-29 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-31 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-32 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33

Unit 14. Work management: Job processing concepts of other job types. . . . . . . . . . . . . . . . . 14-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2 Topic 1: Batch jobs and job tuning concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3 Batch jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-4 Job selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-6 Batch job routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-7 Batch tuning: A pool for batch jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-8 Performance runtime attributes: Timeslice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-9 Performance runtime attributes: Run priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-10 Multiple types of batch jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-11 Topic 2: QSPL subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12 STRSBS QSPL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-13 Topic 3: Autostart jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-14 Autostart jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-15 Topic 4: Communication jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17 Communication jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-18 Topic 5: Prestart jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-20 Prestart jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-21 Work management objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-23 Performance tuning education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-25 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-27 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-28 Review questions (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-29 Review answers (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-30 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

ix

V11.0 Contents

TOC

Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-31

Unit 15. Work management: Submitting and tracking of batch jobs. . . . . . . . . . . . . . . . . . . . . . 15-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2 Putting a job on a job queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3 Submitting a batch job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4 Job message queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6 Scheduling a batch job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-7 Putting jobs on a job queue: Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-8 Tracking jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9 Spooling intercept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-10 Printer device file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-12 Printer and output queue defaults (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-13 Printer and output queue defaults (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-15 Spool writers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-16 Spooling summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-18 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-19 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-20 Exercise: Work management: Job and subsystem management . . . . . . . . . . . . . . . . . . . . . . . . . . 15-21 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-22

Unit 16. Programming concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2 The manual process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3 The automated process: CL program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4 What is a program? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5 Steps involved in creating a program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-6 What is needed to create a program? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7 Process for creating a CL program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-9 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-10 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-12

Unit 17. CL programming concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-2 CL programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-3 Commands allowed in CL programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-5 Some familiar CL programming commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-6 CL commands allowed only in CL programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-7 Command format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-8 Command format in a CL program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-9 Coding rules for CL commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-10 Additional coding rules for CL commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-11 Example of coding rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-12 The structure of a CL program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-13 Declare CL variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-14 DCL examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-15 What is the purpose of SNDUSRMSG? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-17 SNDUSRMSG parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-18 SNDUSRMSG example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-20 Using SNDUSRMSG in CL program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-21 GOTO and labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-22 If-Then ELSE (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-23 If-Then Else (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-24 Relational and logical expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-25 DO / ENDDO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-26 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

x

V11.0 Contents

TOC

Command prompting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-27 Selective command prompting (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-29 Selective command prompting (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-30 Whoops! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-31 MONMSG example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-32 MONMSG: Monitoring for range of messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-33 Example: Control work flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-34 Example: Communicating with user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-35 Create a CL program using PDM and SEU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-36 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-37 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-38 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-39

Unit 18. CL programming using PDM and SEU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-2 Programming Development Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-3 Specify source file and library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-5 Work with Members screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6 Specify member name and type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-7 Specify member entries and prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-8 Specify entries and exits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-9 Select compile options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-10 Reference materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-11 IBM Knowledge Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12 Programming education (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-13 Programming education (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-14 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-15 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-16 Review questions (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-17 Review answers (2of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-18 Exercise: CL programming using PDM and SEU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-19 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-20

Unit 19. Creating a menu using SDA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2 SDA features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3 Screen Design Aid menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-4 Design Menus display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-5 Specify Menu Functions display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-6 Define menu image work screen (1 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 Define menu image work screen (2 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-8 Define menu image work screen (3 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-9 Define menu image work screen (4 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-10 Define menu image work screen (5 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-11 Define menu image work screen (6 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-12 Define menu image work screen (7 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-14 Define menu image work screen (8 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-16 Define menu image work screen (9 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-17 Define menu image work screen (10 of 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-18 F10: Prompt for commands (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-20 F10: Prompt for commands (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-21 F13: Command area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-22 Exit SDA and create menu (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-23 Exit SDA and create menu (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-24 Notice message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-25 Sample menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-26 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xi

V11.0 Contents

TOC

Additional options when creating menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-27 Prompted parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-28 Command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-29 Delete menu and all associated objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-30 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-31 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-32 Review questions (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-33 Review answers (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-34 Exercise: Creating a menu using SDA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-35 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-36

Unit 20. Tips for improved operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-2 Topic 1: Proxy commands, using CHGCMD and CHGCMDDFT . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-3 Proxy commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-4 IBM commands and LPP commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-6 Change command: CHGCMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-8 CHGCMD: Where allowed to run parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-10 Which commands should be changed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-11 Change command defaults: CHGCMDDFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-12 Changing an IBM-supplied command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-14 Example of a CL program to change commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-15 Topic 2: System Reply List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-16 What is the System Reply List? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-17 How the System Reply List works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-18 When is the System Reply List used? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-19 System Reply List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-21 Reply column of System Reply List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-23 Inquiry messages that might not need a reply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-24 System Reply List with user entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-26 Topic 3: Attention program and DSCJOB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-27 Set attention program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-28 User profile: Attention program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-29 Disconnect Job - DSCJOB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-31 Topic 4: Managing writers and printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-33 Using multiple writers for an OUTQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-34 Manage printing by spool file size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-35 Topic 5: Virtual optical image catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-37 Virtual optical image catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-38 Steps to create an optical image catalog (1 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-40 Steps to create an optical image catalog (2 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-41 Steps to create an optical image catalog (3 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-42 Steps to create an optical image catalog (4 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-43 Steps to create an optical image catalog (5 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-45 Steps to create an optical image catalog (6 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-46 Steps to create an optical image catalog (7 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-48 Steps to create an optical image catalog (8 of 8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-49 Web address for virtual optical devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-50 Topic 6: FTP transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-51 Transfer data to and from IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-52 FTP PC-IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-53 FTP PC-IBM i name format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-54 FTP PC-IBM i transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-55 FTP IBM i - IBM i transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-56 FTP IBM i - IBM i IFS name format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-57 FTP - batch mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-58 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xii

V11.0 Contents

TOC

FTP - batch mode run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-60 Topic 7: Advanced spool file management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-61 Too many files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-62 Spool file expiration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-63 Spool files expiration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-64 BRMS spool files expiration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-65 Delete expired spooled files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-66 Topic 8: SST/DST Advance Operator functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-67 Problem determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-68 Product activity log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-69 Log Analysis Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-70 Work with service action log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-71 Service action log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-72 Service action log entry details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-73 Check disks status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-74 Disk path status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-75 Review questions (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-76 Review answers (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-77 Review questions (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-78 Review answer (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-79 Exercise: Tips for improved operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-80 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-81

Unit 21. Journaling overview and basic operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-2 Topic 1: Journal management concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-3 Think about your most important data file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-4 Single-level storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-5 Journal objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-7 Objects that can be journaled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-8 Display Journal Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-9 Display Journal Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-10 F10 = Display only entry details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-12 Topic 2: Steps to implement journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-13 Implementing journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-14 Step 1: CRTJRNRCV command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-16 Step 2: CRTJRN command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-18 Step 3a: Access path command (STRJRNAP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-19 Step 3b: Library command (STRJRNLIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-20 Step 3c: Object command (STRJRNOBJ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-21 Step 3d: Physical file command (STRJRNPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-22 Step 3e: IFS object command (STRJRN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-24 IBM Navigator for i: Journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-25 IBM Navigator for i start/end journaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-26 Save objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-27 Topic 3: Journal receiver considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-28 Managing the receiver chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-29 System change journal management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-31 Journal receiver chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-33 WRKJRNA command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-34 F15 = Work with Receiver Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-36 Exercise: Journal management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-38 Review questions (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-39 Review answers (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-40 Review questions (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-41 Review answers (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-42 © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xiii

V11.0 Contents

TOC

Review questions (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-43 Review answers (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-44 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-45

Unit 22. Virtual IP versus EtherChannel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-1 Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-2 Topic 1: EtherChannel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-3 EtherChannel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-4 EtherChannel required resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-5 EtherChannel creating line description (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-7 EtherChannel creating line description (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-8 EtherChannel creating line description (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-10 EtherChannel new resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-11 Topic 2: Virtual IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-12 Virtual IP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-13 Virtual IP wizard (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-14 Virtual IP wizard (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-15 Virtual IP wizard (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-16 Virtual IP wizard (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-17 Virtual IP created . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-18 Virtual IP associate physical interface (1 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-19 Virtual IP associate physical interface (2 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-20 Virtual IP associate physical interface (3 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-21 Virtual IP associate physical interface (4 of 4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-22 Virtual IP change preferred interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-23 Virtual IP 5250 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-24 Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-25 Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-26 Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-27

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xiv

V11.0 Trademarks

TMK

Trademarks The reader should recognize that the following terms, which appear in the content of this training document, are official trademarks of IBM or other companies: IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. The following are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide: Active Memory™ DB2® Integrated Language Environment® Lotus® Power Architecture® Power Systems Software™ POWER6® Rational® System z®

AIX® Domino® i5/OS™

DB™ Express® Language Environment®

Micro-Partitioning® POWER Hypervisor™ Power® POWER7® Redbooks®

Notes® Power Systems™ PowerVM® POWER8® System i®

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group in the United States and other countries. VMware and the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks (the “Marks”) of VMware, Inc. in the United States and/or other jurisdictions. Other product and service names might be trademarks of IBM or other companies.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xv

V11.0 Course description

pref

Course description Advanced System Operator Workshop for IBM i Duration: 3 days Purpose This course is designed to enhance the skills of a IBM i System Operator. In this class, we will explain the concept of how LPAR works and discuss the functions provided by the HMC. We will discuss the IBM i Access Family of products in general and Access Client Solutions, specifically. We will discuss the different types of security that you can implement in order to control who has access to your data and what they can do with that data if they are allowed access. We will discuss security control via system values, user and group profiles, authorization lists, and adopted authority. This course will help you to develop additional skills in the areas of work management and how to create a basic CL program. In the area of CL programming, we will discuss concepts of programming, then how to create a basic CL program using the traditional application development tools PDM and SEU. You will also learn the steps to create a menu using SDA. You will learn some tips that you can use to help improve your IBM i operations. We will also discuss about journaling overview and some tips which improved operator work. Finally will be discus about differences between virtual IP and EtherChannel. Important This course consists of several independent modules. The modules, including the lab exercises, stand on their own and do not depend on any other content.

Audience This advanced course is designed for those individuals who are responsible for operating and managing the operation of a single Power i server or a network of Power i servers.

Prerequisites Before taking this course, a student should be able to: • Perform basic system operations such as sending and receiving messages, working with user’s jobs and printed output, entering commands on the system, and executing CL commands • Describe the difference between an interactive job and a batch job • Use the help facilities available on the system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xvi

V11.0 Course description

pref

Objectives • Explain the concept of how LPAR works • Explain the functions served by the HMC • Explain the functions of IBM i Access Client Solutions • Explain how user versus resource security are implemented • Explain the difference between group profiles and authorization lists • Describe how adopted authority works • Describe how work is managed on the system and the concepts of the performance tuning process on the system • Explain how Management Central can be used to manage a single system or a network of Power i servers • Perform the steps to create a basic CL program using both the traditional (PDM and SEU) application development tools • Perform the steps to create a menu using SDA • Provide some tips on how you can improve your operations

Contents • LPAR concepts and overview • Console options and HMC overview • Basic management using HMC • IBM i Access Family overview • IBM i Access Client Solutions • Security concepts and overview • System values • User security • Resource security • Authorization lists and adopted authority • Work management: Concepts and overview • Work management: Subsystem concepts and overview • Work management: Job processing concepts and interactive jobs • Work management: Job processing concepts of other job types • Work management: Submitting and tracking of batch jobs • Programming concepts • CL programming concepts • CL programming using PDM and SEU © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xvii

V11.0 Course description

pref

• Creating a menu using SDA • Tips for improved operation • Journaling overview and basic operation • Virtual IP versus EtherChannel

Curriculum relationship • This course is part of the Power i curriculum. A system operations course, System Operator Workshop for System i (AS24G), precedes this course.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xviii

V11.0 Agenda

pref

Agenda Note The following unit and exercise durations are estimates, and might not reflect every class experience.

Day 1 (00:30) Welcome (00:20) Unit 1: LPAR concepts and overview (00:25) Unit 2: Console options and HMC overview (00:10) Break (01:15) Unit 3: Basic management using HMC (00:30) Unit 4: IBM i Access Family overview (00:10) Break (00:45) Unit 5: IBM i Access Client Solutions (00:30) Exercise 1: IBM Client Access Solutions (00:10) Break (00:10) Unit 6: Security concepts and overview (00:20) Unit 7: System values (01:00) Lunch (00:25) Unit 8: User security, Topic 1 User profiles (00:20) Exercise 2: Create a user profile (00:10) Break (00:15) Unit 8: User security, Topic 2 Group profiles (00:30) Unit 9: Resource security

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xix

V11.0 Agenda

pref

Day 2 (00:25) Exercise 3: Resource security and group profiles (00:15) Unit 10: Authorization lists and adopted authority, Topic 1 Authorization lists (00:20) Exercise 4: Authorization lists (00:10) Break (00:10) Unit 10: Authorization lists and adopted authority, Topic 2 Adopted authority (00:10) Exercise 5: Adopting authority (00:15) Unit 11: Work management: Concepts and overview (00:35) Unit 12: Work management: Subsystem concepts and overview (00:10) Break (00:35) Unit 13: Work management: Job processing concepts and interactive jobs (00:25) Unit 14: Work management: Job processing concepts of other job types (01:00) Lunch (00:20) Unit 15: Work management: Submitting and tracking of batch jobs (00:40) Exercise 6: Work management: Job and subsystem management (00:10) Break (00:10) Unit 16: Programming concepts (00:35) Unit 17: CL programming concepts (00:20) Unit 18: CL programming using PDM and SEU (00:45) Exercise 7: CL programming using PDM and SEU

Day 3 (00:45) Unit 19: Creating a menu using SDA (00:30) Exercise 8: Creating a menu using SDA (00:10) Break (00:45) Unit 20: Tips for improved operation (00:30) Exercise 9: Tips for improved operation (01:00) Lunch (00:50) Exercise 10: Transferring data using FTP (01:00) Unit 21: Journaling overview and basic operation (00:10) Break (00:20) Exercise 11: Journal management (00:45) Unit 22: Virtual IP versus EtherChannel

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

xx

V11.0 Unit 1. LPAR concepts and overview

Uempty

Unit 1. LPAR concepts and overview Estimated time 00:20

Overview This unit provides an overview of the concept of logical partitions.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-1

V11.0 Unit 1. LPAR concepts and overview

Uempty

Unit objectives

• • • • •

Describe the functions of PowerVM Describe the concept of partitions List resources that are allocated to partitions Describe dynamic partitioning List some benefits of using a partition

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-2

V11.0 Unit 1. LPAR concepts and overview

Uempty

IBM Power Systems family

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-2. IBM Power Systems family

The IBM Power Systems Hardware Information Center contains information about IBM i. Access the website at the following URL: http://www.ibm.com/support/knowledgecenter/ssw_ibm_i. Click the link for Hardware Information Center to see the web page (lower right corner on this visual). The URL to access this website directly is: http://www.ibm.com/support/knowledgecenter/POWER8/p8hdx/POWER8welcome.htm.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-3

V11.0 Unit 1. LPAR concepts and overview

Uempty

Virtualization technologies on Power Systems with IBM i • • • • • • • • • • • • • • • •

Multiple OSs Multiple LPARs Dynamic LPAR Micro-Partitioning

IBM i Partitions

Virtual CPUs Multiple processor shared pools Shared dedicated processor IVE SR-IOV SMT Virtual LANs Virtual I/O IVM CoD, Power Enterprise Pools Live Partition Mobility HMC

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-3. Virtualization technologies on Power Systems with IBM i

The IBM System and IBM Power System technologies The following technologies and services are the components of PowerVM, which are integrated into the IBM Power Systems: • POWER Hypervisor: Supports partitioning and dynamic resource movement across multiple operating system environments. • Multiple operating system supports: Logical partitioning allows a single server to run multiple operating system images concurrently. • Dynamic logical partitioning: Allows adding, moving, or deleting physical and virtual resources of an LPAR without shut down. • Micro-Partitioning: Enables a logical partition to be allocated a percentage of processor usage rather than a full physical processor. Multiple virtual shared processor pools are available with POWER6 POWER7 and POWER8 technology. • Dedicated shared processor: Function provides the ability for partitions that normally run as dedicated processor partitions to contribute unused processor capacity to the shared processor pool. This support allows unneeded capacity to be donated to uncapped Micro-Partitioning instead of being wasted as idle cycles in the dedicated partition.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-4

V11.0 Unit 1. LPAR concepts and overview

Uempty

• Integrated Virtual Ethernet (IVE): Also called Host Ethernet Adapter (HEA - not supported on Power8 servers), this is a feature that provides network connectivity to the partitions. It is available on certain types of POWER6 and POWER7 based systems and allows partition communication. It uses a physical Integrated Virtual Ethernet adapter and it must not be considered as a virtual feature. • For POWER8, you can use single root I/O virtualization (SR-IOV). This a Peripheral Component Interconnect Express (PCIe) standard architecture that defines extensions to PCIe specifications to enable multiple logical partitions running simultaneously within a system to share PCIe devices. The architecture defines virtual replicas of PCI functions known as virtual functions (VF). A Logical partition can connect directly to an SR-IOV adapter VF without going through a virtual intermediary (VI) such as a POWER Hypervisor or Virtual I/O Server. This ability provides for a low latency and lower CPU utilization alternative by avoiding a VI. • Simultaneous Multithreading (SMT): On-chip hardware threads to improve resource usage. • Virtual LAN: Provides network virtualization capabilities. It is purely firmware-based, by using the POWER Hypervisor, and does not require the purchase of the PowerVM edition. Multiple virtual switches can be defined with POWER6,POWER7, and POWER8 processor-based systems. • Virtual I/O: Allows the sharing of I/O adapters and devices between partitions. • Integrated Virtualization Manager (IVM) provides the virtualization capabilities for the management of a server and LPARs without using a Hardware Management Console (HMC). • Capacity on Demand (CoD): Allows system resources, such as processors and memory, to be activated as needed. • Power Enterprise Pools (PEP) provide the ability to move processor and memory resources from one server to another any time, with no physical movement of hardware, by using easy operator commands in HMC. • The PowerVM Enterprise edition includes the Partition Mobility virtualization feature that allows migrating a virtualized logical partition from a source system to a target. This feature supports Live Partition Migration without partition shutdown. • The PowerVM Enterprise edition also includes the Active Memory sharing feature that allows shared memory partitions to share a common shared memory pool (not supported in IBM i). • Shared Storage Pools allow share storage across systems with possibility of cloning or moving partitions (not supported in IBM i). • Suspend/Resume feature allows suspend/resume client partition for releasing server resources. • Thin Provisioning allows better utilization of disks space in Shared Storage Pools (not supported in IBM i). • Most of the hardware virtualization features listed above are managed by using the HMC. IVM allows management of some IBM Power Systems, and blades without using an HMC. IVM does not support all of the HMC functions and has limited capabilities.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-5

V11.0 Unit 1. LPAR concepts and overview

Uempty

IBM PowerVM editions Features

Express Edition

Standard Edition

Enterprise Edition

Maximum VMs

3 / Server

2000 / Server

2000 / Server

Management

VMControl, IVM,

VMControl, IVM*, HMC

VMControl, IVM*, HMC

Virtual I/O Server

(Dual)

(Dual)

Suspend/Resume

NPIV

Shared processor pools

Shared storage pools

SRIOV

Live Partition Mobility * IVM only supports a single Virtual I/O Server LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-4. IBM PowerVM editions

PowerVM Enterprise Edition PowerVM Enterprise Edition is offered exclusively on POWER6,POWER7/7+, and POWER8 processor-based servers and includes all the features of PowerVM Standard Edition plus two new industry-leading capabilities called Active Memory Sharing and Live Partition Mobility. PowerVM Standard Edition For users ready to get the full value out of their server, IBM offers PowerVM Standard Edition providing the most complete virtualization functionality for AIX, IBM i, and Linux operating systems in the industry. PowerVM Standard Edition is supported on Power Systems servers and includes features designed to allow businesses to increase system utilization, while helping to ensure that applications continue to get the resources they need. PowerVM Express Edition PowerVM Express Edition is designed for users looking for an introduction to more advanced virtualization features at a highly affordable price. With PowerVM Express Edition, users can create up to three partitions on the server, leverage virtualized disk and optical devices VIOS, and even try out the shared processor pool.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-6

V11.0 Unit 1. LPAR concepts and overview

Uempty

IBM PowerVM features by Power8 systems

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-5. IBM PowerVM features by Power8 systems

On this visual, you can see PowerVM features and editions availability depending on the Power8 systems models.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-7

V11.0 Unit 1. LPAR concepts and overview

Uempty

What is a partition?

• Partition: ƒ Allocation of one system’s resources (processors, memory, I/O, and virtual I/O) to create logically separate systems. ƒ Each partition is an independent operating environment.

From one to many

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-6. What is a partition?

Partition When a Power i server is subdivided into multiple, independent operating system images, those independent operating environments are called partitions. The resources on the system are divided up among the partitions. Applications running on a partitioned system do not have to be redesigned for the partitioned environment. Independent operating environment Each partition runs its own operating system that might or might not match operating systems in other partitions on the same system. Each partition can be started and stopped independently of other partitions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-8

V11.0 Unit 1. LPAR concepts and overview

Uempty

Logical partition

• A partition is the allocation of system resources to create logically separate systems within the same physical footprint. • A logical partition is when the isolation is implemented with firmware: ƒ Although a partition might be logical, it can also be physical (resources). ƒ It provides configuration flexibility.

SYS1

SYS2

SYS3

SYS4

1:00

10:00

11:00

12:00

Japan

US

Brazil

UK

LPARs operate independently

ORD

IBM i

LPAR concepts and overview

Linux

IBM i

AIX

© Copyright IBM Corporation 2001, 2016

Figure 1-7. Logical partition

Logical partition (LPAR) Logical partitioning is the ability to make a single system run as if it were two or more systems. Each partition represents a division of resources in your computer system. The partitions are logical because the division of resources is virtual and not along physical (tower) boundaries. However, there are, configuration rules that must be followed and these are covered later in this course. For the rest of the course, logical partitions are simply called LPARs or partitions for brevity. Implemented in firmware A logical partition uses firmware to logically partition the resources on a system. While there are configuration rules, the granularity of the units of resources that can be allocated to partitions is very flexible. You can add just a small amount memory if that is all that is needed without a dependency on the size of the memory controller or without having to add more processors or I/O slots that are not needed. Firmware refers to underlying software running on a system independently from any operating system. On Power Systems, this includes the software used by the Flexible Service Processor (FSP) and the POWER Hypervisor.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-9

V11.0 Unit 1. LPAR concepts and overview

Uempty

POWER4 and POWER5 based servers comparison There is no concept of a primary or secondary partition for POWER5 systems. You might have heard the phrase physical partitions from the UNIX server market that is partitions based on physical system units, such as a system board, which contains a certain amount of processing power and memory, and a number of I/O slots. IBM implemented logical partitions, not physical partitions for IBM i AIX an Linux.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-10

V11.0 Unit 1. LPAR concepts and overview

Uempty

Partition characteristics

• Each partition has its own (or have access to): ƒ Licensed Internal Code (LIC) for IBM i or open firmware from AIX VIOS and Linux ƒ Operating system ƒ Console ƒ Load source disk or boot resources ƒ ASPs and memory pools ƒ Others expected in a stand-alone operating system environment: í í í í í í

Problem logs Data (libraries, objects, and file system) Performance characteristics Language feature codes Network identity Date and time

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-8. Partition characteristics

Characteristics of a partition The visual above illustrates how each partition is independent. As stated before, each partition runs on its own operating system that might be IBM i (or Linux, VIOS, and AIX). The versions of the operating system might be any valid version that is supported. Other things you would expect on physically separate system are also separate for partitions and even independent virtual consoles. What is the same between partitions on the same system? Each partition shares a few physical system attributes such as the system serial number, system model, and processor feature code with other partitions. In addition, you can choose to share other hardware such as SAS, Fibre adapters, and serial devices among partitions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-11

V11.0 Unit 1. LPAR concepts and overview

Uempty

Partition resources

• The resources that are allocated to partitions are: ƒ Load source I/O adapters and disk unit ƒ I/O slots í

ƒ ƒ ƒ ƒ

Including virtual devices (volumes from external storage)

Processing units Memory 5250 emulation (‘interactive’) for IBM i Console

• Virtual resources that can be shared: ƒ ƒ ƒ ƒ

Ethernet SCSI Serial Fibre Channel

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-9. Partition resources

Resources Resources are the system components that are configured into partitions. The maximum number of partitions is related to the total amount of resources on a system. For example, if a system has enough resources, the upper limit of the number of partitions is 1000 on Power8 (E880) servers. Minimum amount of resources Each IBM i partition must be configured with at least 128 MB of memory, five hundredths of a physical processor, and enough I/O devices to provide a load source (boot resources), have access to a console and have the ability to load code. I/O slots I/O resources are allocated to partitions at the slot level. At a minimum, you must configure a partition with enough I/O resources to include the load source disk (boot resources) and at least access to a console. Processing units A dedicated processor = 1.00 processing units. Micro-Partitioning 0,05 processor unit (up to 20 micropartitions per processor).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-12

V11.0 Unit 1. LPAR concepts and overview

Uempty

Memory Memory is allocated in multiple MB segments (the smallest being 16 MB). The exact size depends on the model and the total amount of memory on the managed server. A partition can be as small as 254 MB or as large as all of the installed memory. 5250 CPW (IBM i partitions only) - also known as OLTP Your system has a certain amount of interactive performance based on the type of system and the number of processors. The 5250 emulation refers to how much the user must interact with (and respond to prompts from) the computer. You can contrast this with batch where no user intervention is required. Given the amount of interactive performance on your system, you need to determine what percentage is available for each partition. The combined total of all partitions’ settings cannot exceed 100% - of the available 5250 CPWs. This resource was known as Interactive Performance on the POWER4 based iSeries servers. Virtual devices Other devices can be configured to be shared between partitions. Each partition can configure virtual I/O slots, which can be configured with a virtual adapter instance. These virtual adapters can be an Ethernet interface, a SCSI, serial devices, or Fibre Channel.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-13

V11.0 Unit 1. LPAR concepts and overview

Uempty

Logical partition resource example

• Flexibility to allocate resources depending on need LPAR1

LPAR2

LPAR 3

LPAR 4

Processors

Memory

I/O slots

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-10. Logical partition resource example

This visual above shows how a system’s resources might be divided between four partitions. With logical partitions, resources can be allocated based on computing needs. You do not need to allocate all resources to partitions. Some resources can remain deallocated until they are needed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-14

V11.0 Unit 1. LPAR concepts and overview

Uempty

The big picture: Dynamic partitioning

*DLPAR

Managed system Processors

IBM i Partition 1

Linux Partition 2

Unassigned resources

Mem regions I/O slots

HMC

POWER Hypervisor Ethernet

Non-volatile RAM

Processors Mem regions I/O slots

LPAR allocation tables

LPAR concepts and overview

Service processor Ethernet

© Copyright IBM Corporation 2001, 2016

Figure 1-11. The big picture: Dynamic partitioning

The Hardware Management Console (HMC) uses its network connections to one or more servers or frames, referred to as managed systems to perform various management functions. More details of the HMC are covered in the next unit.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-15

V11.0 Unit 1. LPAR concepts and overview

Uempty

Dynamic partitioning

• DLPAR allows you to add, remove, or move resources between partitions without restarting the partitions.

• Resources include: ƒ Processors, memory, and I/O slots that are not required ƒ Virtual I/O

• Security and isolation between LPARs is not compromised: ƒ A partition sees its own resources plus other available resources ƒ Resources are reset when moved

• Applications might or might not be DLPAR-aware.

DLPAR allows you to react to changing resource needs. LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-12. Dynamic partitioning

Dynamic partitioning Dynamic partitioning refers to the fact that you can “switch” resources between partitions without shutting down the partitions. The opposite of dynamic partitioning is static partitioning, where new configurations are only used when a partition is reactivated. DLPAR operations do not weaken the security or isolation between LPARs. Partitions only see resources in their own partition, as well as any potential “connectors” for additional virtual resources that might have been configured, and any resources not currently allocated. Resources are reset when moved from one partition to another. Processors are reinitialized, memory regions are cleared, and adapter slots are reset. DLPAR operations You can add, remove, and move resources between partitions. This can be accomplished from the HMC application or through HMC command line commands. With virtual devices, you can add or delete them, but you cannot move them from one partition to another. However, you can dynamically change the configuration that specifies what type of virtual adapter it is. Other partition options that can be reconfigured dynamically are covered later in this course.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-16

V11.0 Unit 1. LPAR concepts and overview

Uempty

DLPAR resources The resources include memory, processing units, and non-required I/O slots. A “required” slot or adapter is one that a partition has defines as essential to its operation and is thus unavailable for “movement” as long as the partition is operational. For virtual devices, you can add and remove, but not move resources between partitions. These operations will be covered in a future unit in this course. Applications might not be DLPAR-aware Most applications are unaware of the underlying resource specifics and that works just fine. But some applications and utilities, particularly monitoring tools, might inhibit some DLPAR operations if they bind to processors or pin memory. Many resource-aware applications have been rewritten in recent years to allow DLPAR. Check with your sales representative about your application.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-17

V11.0 Unit 1. LPAR concepts and overview

Uempty

Virtual I/O

• Each partition has virtual I/O ‘slots’. ƒ Configurable for each partition

• Slots can have a virtual adapter instance. ƒ Ethernet, serial, or SCSI, Fibre Channel

• Can be dynamically added or removed just like physical I/O slots: ƒ But they cannot be dynamically moved to another partition ƒ Configuration of what is in the slot can be redefined without a restart of the partition

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-13. Virtual I/O

Virtual I/O adapters Virtual I/O adapters give a partition the flexibility to use certain types of resources without requiring that the physical hardware be present. The following virtual I/O adapters can be created: • Virtual Ethernet • Virtual Serial • Virtual SCSI • Virtual Fibre Channel - on the virtual Fiber Channel the best performance can be achieved on NPIV - N_Port ID Virtualization is a Fibre Channel feature whereby multiple Fibre Channel node port (N_Port) IDs can share a single physical N_Port. All virtual I/O adapters reside on a single virtual system. The maximum number of virtual adapters is a field that a user can edit. This field specifies how many virtual I/O adapters can connect to the virtual system bus.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-18

V11.0 Unit 1. LPAR concepts and overview

Uempty

Virtual Ethernet Virtual Ethernet allows for high speed (1 gigabit) inter-partition communications. For two partitions to be able to talk they need to have a virtual Ethernet adapter that has the same port virtual LAN ID. Having the virtual Ethernet adapter occupy the same slot is not a requirement. Virtual Serial Virtual serial allows for the creation of an internal point-to-point connection. This connection is between the partition and either the HMC or another partition. An adapter is defined as either a client adapter or a server adapter. A client adapter is used on a partition that wants to use a resource that is provided by a server adapter. In creating a virtual serial client adapter, the remote partition needs to be specified along with the slot number containing the virtual serial server adapter on the remote partition. By default, the HMC gets the console for a hosted guest partition. A pair of virtual serial adapters can be used to allow another partition to provide console function for the hosted guest partition as well. Virtual SCSI Virtual SCSI allows for a partition to use storage resources that physically reside in another partition. Storage resources include disk, tape, or optical. As with virtual serial, the server adapter type is for use on a partition that is providing a resource while the Client adapter is used on a partition that is using that resource. A pair of virtual SCSI adapters can be created to provide disk access for a hosted guest partition. Virtual Fibre Channel A virtual Fibre Channel adapter is a virtual adapter that provides client logical partitions with a Fibre Channel connection to a storage area network N_Port ID virtualization (NPIV) is a technology that allows a single host bus adapter (HBA) called an “N_Port” to register multiple worldwide port names (WWPNs) and N_Port identification numbers. This allows each virtual server to present a different worldwide name to the storage area network (SAN), which in turn means that each virtual server sees its own storage.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-19

V11.0 Unit 1. LPAR concepts and overview

Uempty

Smarter IOAs (IOP-less) direction

Classic IOP/IOA

Processor

IOP-less

Processor

IOP

IOA

IOA

• IOA technology has evolved to the point where an IOA can take over the IOP as well as the IOA functionality. • Smarter IOA benefits include: ƒ Avoiding cost of IOP and PCI slot to hold IOP ƒ Configuration flexibility including simpler LPAR I/O

• IBM i 7.2 on POWER6 does not support IOPs or IOP-based adapters. • POWER7 or late does not support IOPs or IOP-based adapters. LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-14. Smarter IOAs (IOP-less) direction

On the visual you can compare classic IOP/IOA and modern IOP-less adapter. Note Power and Power8 supports only IOP-less adapters.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-20

V11.0 Unit 1. LPAR concepts and overview

Uempty

LPAR summary

• • • •

No requirement for primary partition All LPARed servers must have an IVM or HMC All IBM i partitions must be at 7.1 or greater Simple migration process

VIOS

Power Hypervisor

IBM i

AIX

LINUX

Virtual SCSI Adapter Virtual Serial Adapter Virtual Fibre Channel Virtual Ethernet

Power Systems LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-15. LPAR summary

Note Old IBM i version (6.1) can be used in LPARed environment (POWER6 and POWER7) but this version is not supported now.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-21

V11.0 Unit 1. LPAR concepts and overview

Uempty

Benefits of using partitions

• Capacity management ƒ Flexibility to allocate resources

• Consolidation: ƒ Consolidate hardware, floor space, software licenses, support contracts, and in-house support/operations ƒ Efficient use of resources

• Application isolation: ƒ Separate workloads ƒ Guaranteed resources ƒ Data integrity

• Merge production and test environments ƒ Share same hardware

• Ability to have virtual: ƒ Ethernet ƒ I/O devices

• Shared processors: Capped or uncapped LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-16. Benefits of using partitions

Introduction Sometimes large symmetric multiprocessing systems are used to run several different applications. This might be an efficient use of resources in some cases. In other cases, separate physical computers are used to run individual applications. This page describes reasons why it might be better to create separate partitions rather than run everything in the same operating system image or use separate physical computers for each application. Capacity management You might want to use partitions to reallocate resources when the system workload changes. For example, if at the end of each month, one partition runs CPU-intensive, batch jobs, you can reconfigure the system monthly to take processors from another lower priority application in another partition and “loan” them to the partition with the batch application. We see later that you can even name these configurations using keywords, such as end-of-month to make the reconfiguration operation easier.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-22

V11.0 Unit 1. LPAR concepts and overview

Uempty

Consolidation Using partitions gives you the ability to reallocate expensive resources and manage them all with one interface (the HMC). You can reallocate processors, memory, or any I/O adapter (and thus device) by reconfiguring the partitions or by using dynamic partition operations. All of the resources are located within one server, potentially reducing the amount of floor space needed. Application isolation Partitioning isolates an application from others in different partitions. For example, two applications on one SMP system could interfere with each other or compete for the same resources. One decision support database query could bring a second, interactive application to a frustrating snail’s pace. By separating the applications into their own partitions, they cannot interfere with each other. Also, if one application were to hang or crash the operating system, this would not have an effect on the other partitions. Additionally, with partitions, one server can support multiple applications that use different time zones or that run on different operating system release levels. Partitions can also be used to comply with application license requirements. For example, a 4-processor partition could be created to comply with an application license that only allows for a 4-processor server. Check the vendor’s application license requirements carefully. Merge production and test environments Many customers utilize smaller development systems to develop, test, and migrate applications. These smaller systems might not be the same hardware, have the same software, devices, or infrastructure as the “real”, production system. These issues can be largely avoided by utilizing a partition on the same system as the production application for development and testing. This also protects the production partition from the activities on the test partition. When the testing is complete, the resources used for the development partition can be reallocated to the production partition. Partitions have an exclusive set of resources The amount of resources allocated to a partition is generally fixed (although there are some exceptions that can be configured). This could be a benefit or a disadvantage. On a symmetric multiprocessor system running multiple applications within the same operating system image, there might be greater sharing (or swapping) of resources than on a partition system where the applications are isolated in their own partitions. Virtual Ethernet and virtual I/O devices On POWER servers, you can configure a virtual Ethernet connection, which acts like an Ethernet connection, but is really a memory-to-memory connection with another partition. Virtual I/O devices allow partitions to use physical devices (such as a console or tape drive or CD drive) that are owned by another partition. Shared Processors Partitioning gives you the ability to assign less than full processors to a server. These shared processor partitions can be either capped (capacity is limited to the number of shared processing units assigned) or uncapped (have the capability of using more processing resources than are assigned via processing units).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-23

V11.0 Unit 1. LPAR concepts and overview

Uempty

LPAR education AS5EG: PowerVM on IBM i - I: Implementing Virtualization and LPAR This course teaches how to implement virtualization and LPARs on a Power system with IBM i. AS5FG: PowerVM on IBM i - II : Advanced Topics and Performance It teaches advanced topics and performance implementing PowerVM on IBM i. OL52G: Hardware Management Console (HMC) for Power Systems with IBM i This course teaches the functions and capabilities provided by the HMC to manage a Power system with IBM i.

http://www.ibm.com/training

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-17. LPAR education

When you attend the LPAR course, you learn the installation, configuration, and operation of the Hardware Management Console (HMC) for Power System servers. The class begins with an overview of HMC functions, followed by detailed information on how to install a new HMC, configure network settings and HMC user profiles, create a connection to a managed system, and upgrade an existing HMC. Explore the HMC’s graphical user interface (GUI) to manage System i servers. Through online presentations and quizzes, develop the basic skills for backing up HMC and managed system configuration data, performing HMC and microcode software maintenance, and creating logical partitions (LPAR).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-24

V11.0 Unit 1. LPAR concepts and overview

Uempty

Review questions 1. True or False: A partition is an independent operating environment within a larger system. 2. A partition is a logical partition if which of the following options are true? a. b. c. d.

Resource assignments are flexible. Resources can be moved between partitions without a restart. Partition isolation is accomplished with software (firmware). All of the above.

3. True or False: PowerVM provides virtualization and the management of resources in a consolidated, logical view.

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-18. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-25

V11.0 Unit 1. LPAR concepts and overview

Uempty

Review answers 1. True or False: A partition is an independent operating environment within a larger system. The answer is true.

2. A partition is a logical partition if which of the following options are true? a. Resource assignments are flexible. b. Resources can be moved between partitions without a restart. c. Partition isolation is accomplished with software (firmware). d. All of the above. The answer is all of the above.

3. True or False: PowerVM provides virtualization and the management of resources in a consolidated, logical view. The answer is true.

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-19. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-26

V11.0 Unit 1. LPAR concepts and overview

Uempty

Unit summary

• • • • •

Describe the functions of PowerVM Describe the concepts of partitions List resources that are allocated to partitions Describe dynamic partitioning List some benefits of using a partition

LPAR concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 1-20. Unit summary

The objective of the remainder of the course is to expand your knowledge on these and other topics. A focus lies on the automation of some of your system operations activities.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

1-27

V11.0 Unit 2. Console options and HMC overview

Uempty

Unit 2. Console options and HMC overview Estimated time 00:25

Overview This unit provides a review of the different options available for setting a console for the system and overviews the concepts of the HMC.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-1

V11.0 Unit 2. Console options and HMC overview

Uempty

Unit objectives

• • • • • •

Discuss the different consoles that can be used with Power with IBM i Describe the concepts of HMC List the different HMC models that are available Describe virtual HMC appliance Describe the differences between IVM, HMC Describe the different capacity on-demand options available

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-2

V11.0 Unit 2. Console options and HMC overview

Uempty

Power with IBM i console

Existing available console option: • Operation LAN console (LAN adapter required) • 5250 interface using HMC (vHMC) Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-2. Power with IBM i console

Operations console With Operations console, you can use one or more PCs to access and control the server and control panel functions. This PC can be attached either locally or remotely. Operations console is available for connectivity to an IBM i server. This PC can be directly connected by using a cable, through a LAN with a dedicated adapter, or can be connected using the embedded Ethernet port, if it is available on the server. With this type of connection, a single PC can serve as the console for multiple servers. Considerations for choosing Operations console: You can set up Operations console to manage the IBM i operating system in a partitioned or a non-partitioned environment. You need a separate LAN adapter card for each partition with which you need to communicate using Operations console. This can result in less room for other I/O adapters that you need to install in the server. Unlike the HMC, you cannot change partition resources with Operations console. Although Operations console uses a standard Windows PC, the HMC is a dedicated system that cannot be changed except for service upgrades. This greatly increases the security and stability of the HMC versus Operations console. Operations console supports more than 40 languages. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-3

V11.0 Unit 2. Console options and HMC overview

Uempty

5250 interface using HMC or virtual HMC (VHMC): You can connect to system using session directly on the HMC or you can use IBM i Client Solution (or previous IBM Client Access) to set up the console session or virtual panel session. HMC allows you connect to many partitions. You can setup a shared or dedicated connection to the console.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-4

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC introduction

• Intel-based PC appliance ƒ Required for configuration and management of partitions í

IBM Power Systems with POWER5, POWER6, POWER7, POWER8 processors

• Main HMC applications are: ƒ Server and partition management ƒ Licensed Internal Code maintenance: HMC code maintenance Independent of managed system or operating systems í Licensed Internal Code update for Flexible Service Processor, or FSP í

ƒ HMC management: í í

HMC users Configuration

ƒ Service applications ƒ Power Systems HW Information Center

Console options and HMC overview

HMC

© Copyright IBM Corporation 2001, 2016

Figure 2-3. HMC introduction

The Hardware Maintenance Console (HMC) is a dedicated desktop or rack-mounted workstation that provides a graphical user interface (GUI) for configuration and operating logical partitions on LPAR-capable POWER5, POWER6, POWER7, and POWER8 servers. An HMC is required for many functions, including logical partition (LPAR) management, capacity on demand (CoD) management, and as a single point for service error reporting for the HMC the service processor and - if wanted - logical partitions. Virtual HMC appliance functionality is the same as standard HMC. VHMC required VMware or KVM.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-5

V11.0 Unit 2. Console options and HMC overview

Uempty

IBM Systems hierarchy of management

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-4. IBM Systems hierarchy of management

IBM Directory management was removed now IBM offering two management models: 1. PowerVM architecture based on Cloud Manager wit OpenStack and PowerVC and HMC/KVM to manage server. 2. PowerVM with NovaLink Architecture this is new architecture. With both models, you can use HMC to manage servers, partitions and their resources. IBM Cloud Manager with OpenStack for Power Systems is an entry level cloud solution to help organizations get up and running quickly and easily with cloud. It works with Power Systems infrastructure, leveraging Power's enterprise security, availability, and reliability to deliver cloud without risk. IBM Cloud Manager with OpenStack for Power Systems increases efficiency through heterogeneous cloud management across Power Systems, System z, and x86 environments, on-premises or off-premises, to manage private, public, or hybrid cloud infrastructure. And Cloud Manager with OpenStack can manage PowerKVM environments directly or PowerVM environments through PowerVC, giving customers the flexibility to leverage the choice of hypervisors provided with Power Systems.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-6

V11.0 Unit 2. Console options and HMC overview

Uempty

PowerVM NovaLink is a software interface that is used for virtualization management. You can install PowerVM NovaLink on a PowerVM server. PowerVM NovaLink enables highly scalable modern cloud management and deployment of critical enterprise workloads. You can use PowerVM NovaLink to provision large numbers of virtual machines on PowerVM servers quickly and at a reduced cost. PowerVM NovaLink runs in a Linux logical partition on a POWER8 processor-based server that is virtualized by PowerVM. You can manage the server through a representational state transfer application programming interface (REST API) or through a Command Line Interface (CLI). You can also manage the server by using PowerVC or other OpenStack solutions. PowerVM NovaLink is available at no additional charge for servers that are virtualized by PowerVM. PowerVM NovaLink can be installed only on POWER8 processor-based servers.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-7

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC and managed system

• Graphic representation of relationships between: ƒ HMC ƒ Service processor ƒ Hypervisor Virtual Server (Partitions): When active

Non-volatile RAM

Hypervisor: OS-independent

Service processor

Processors Mem regions I/O slots

Virtual Server (LPAR) allocation tables

Managed system

Virtual servers consist of different elements (look at colors): • Processors • Memory • I/O slots • Some part of Hypervisor

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-5. HMC and managed system

The HMC and service processor The HMC provides the administrator a GUI method of managing virtual servers (partitions or LPARs). The Service Processor (SP) in turn provides the interface to the Hypervisor, which is operating system and virtual server (partition) independent. The POWER Hypervisor is the interface through which the HMC is able to control the allocation of appropriate resources necessary for virtual servers (partitions) on a managed system. The virtual server (partition) configuration information is recorded in the NVRAM on the managed system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-8

V11.0 Unit 2. Console options and HMC overview

Uempty

Managed system without HMC

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-6. Managed system without HMC

Advanced System Management Interface (ASMI) If your system is not managed by a Hardware Management Console (HMC), you can connect a PC or notebook to the server to access the Advanced System Management Interface (ASMI). You need to configure the web browser address on the PC or notebook to match the manufacturing default address on the server. Depending on type of the server the default addresses could be different. Check it in the server specification. The web interface to the ASMI is available during all phases of system operation including the initial program load (IPL) and run time. The ASMI is used to perform general and administrator-level service tasks. These tasks include reading service processor error logs, reading vital product data, setting up the service processor, and controlling the system power.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-9

V11.0 Unit 2. Console options and HMC overview

Uempty

Managed system without HMC different options

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-7. Managed system without HMC different options

You can manage POWER servers without an HMC. The various management options and supported virtual machine types are: • IVM (AIX, Linux, IBM i) • KVM (Linux) • Full system partition (AIX, Linux, IBM i) KVM (Kernel-based Virtual Machine) is a popular open-source hypervisor that’s new to the Power Systems family of servers. Both KVM and IVM are installed and run directly on the server. Their management in scope applies only to the virtual machines running on the same server. The remainder of this article focuses on managing POWER8 scale-out servers with an HMC. Integrated Virtualization Manager The Integrated Virtualization Manager (IVM), a component of PowerVM Editions, can be used to manage your Virtual I/O Server (VIOS) and client virtual servers. The IVM provides a web-based system management interface. The interface allows to create a partition. Partitioning with the Integrated Virtualization Manager In the above figure, the VIOS is in its own partition, and the client logical partitions are managed by the VIOS logical partition. The browser on the PC connects to the IVM over a network and it (IVM) can be used to create and managed the logical partitions. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-10

V11.0 Unit 2. Console options and HMC overview

Uempty

Power Systems management: Summary Power Systems ASMI only

IVM only

ƒ No LPAR ƒ Entry-level LPAR controls from IVM, ƒ Limited CoD based on AIX VIO ƒ Basic service functions Server (VIOS) ƒ Limited CoD ƒ Limited service functions

ASMI / TTY to FSP directly

Rack-mount HMC ƒ “Stackable”, with shared flat panel/keyboard drawer, well suited for clusters ƒ Full function LPAR controls ƒ Full service functions ƒ Virtual OS consoles ƒ Redundant HMC optional

vHMC appliance ƒ Hardware+vHMC ƒ vHMC only –Virtual Machine image

Browser to VIOS

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-8. Power Systems management: Summary

This figure summarizes the Power Systems management techniques available to administrators. ASMI management allows limited server management and no partitions. IVM and HMC provide more functional server management and partitions. vHMC Prior to HMC V8R8.4, the POWER HMC was sold only as an integrated appliance that included the underlying hardware as well as the HMC firmware. Starting with V8R8.4, the HMC can now be purchased as either the traditional hardware appliance (for example, model 7042-CRx) or as a firmware only virtual machine image. The virtual HMC (vHMC) offering allows clients to use their own hardware and server virtualization to host the IBM supplied HMC virtual appliance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-11

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC features • Integrated, custom HMC software ƒ Graphical user interface ƒ Commands

• Remotely accessible • Support for multiple managed systems • Active partitions can continue to function without an HMC ƒ The ability to change resource configuration is lost

• • • •

Redundant capability Partition information backups Console for logical partitions HMC connection options: ƒ Private network ƒ Open network

• Performance management • Template management

Console options and HMC overview

Rack-mount 7042-CR9

Virtual HMC 5765-HMV

© Copyright IBM Corporation 2001, 2016

Figure 2-9. HMC features

Management interfaces: The HMC provides a GUI for managing the Power Systems. This GUI can be operated locally on the HMC or from a web browser connected to the HMC over a network. While the vast majority of work will be performed using the GUI, there are commands that can be entered directly on the HMC and/or run through SSH connections from PCs or LPARs in the managed Power System to automate functions such as LPAR configuration changes. The HMC virtual appliance can be installed in your existing x86 virtualized infrastructure. The HMC virtual appliance supports the following virtualization hypervisors: • Kernel-based virtual machine (KVM) • Xen • VMware

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-12

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC options

• Refreshed rack-mounted HMC ƒ For POWER6 and later servers ƒ 7042-CR9 - follow-on to CR8

• New HMC virtual appliance (vHMC) ƒ For POWER6, POWER7, POWER8 servers ƒ Same functionality as traditional HMC (version 8) ƒ Runs as virtual machine on x86 server

Options for attachment to a server

One or two HMCs Console options and HMC overview

One vHMC and one HMC

One or two vHMCs © Copyright IBM Corporation 2001, 2016

Figure 2-10. HMC options

Now you can mix hardware and virtual HMC in following combination: 1. Only hardware 2. Hardware and virtual 3. Only wirtual

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-13

V11.0 Unit 2. Console options and HMC overview

Uempty

Available HMC model • For POWER6 and later servers • 7042-CR9 - follow-on to 7042-CR8 • Normal technology refresh • Refreshed rack-mounted HMC ƒ 2.4 GHz Intel Xeon Processor

ƒ 16 GB to 192 GB memory (#EM20 16 GB feature code) í Most clients expected to use 16 GB or 32 GB for HMC ƒ One or optionally two 500 GB SATA disk drives í í

ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Second drive allows RAID1 mirroring protection (recommended/defaulted) Support any two of the eight physical hot-plug SFF bays (max 2 supported)

DVD-RAM Four integrated Ethernet ports Six USB ports One PCIe slot One or two power supplies (two recommended for hot-plug redundancy) 1U (1 EIA) Like CR8, does not offer an internal or external modem (or support one)

• HMC code level 8.4.0 or later Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-11. Available HMC model

HMC 7042-CR8 and 7042-CR7 are still supported but are no longer marketed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-14

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC functions

• • • • •

Configuration management Operations management Change management Problem management Service management

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-12. HMC functions

When you log on to the HMC you can choose which software interface to use. The HMC Classic interface provides access to all traditional functions of the HMC and the HMC Enhanced interface provides both redesigned and new virtualization tasks and functions. Bellow some traditional functions: • Configuration management • Server and partition configuration • Virtual I/O configuration • Capacity on-demand management • HMC setup and configuration • Operations management • GUI or command line, local, or remote • Virtual operating system consoles • Server partition controls • Dynamic LPAR resource movement

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-15

V11.0 Unit 2. Console options and HMC overview

Uempty

• Scheduled operations • Change management • Add/remove server hardware • Check and update Licensed Internal Code on servers and on HMC itself • Problem management • Hardware error event collection, analysis, and correlation • Gathering of extended debug data • Transmission of problems to IBM • Service management • Guided concurrent repair procedures • Hardware inventory collection • Service utilities

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-16

V11.0 Unit 2. Console options and HMC overview

Uempty

Capacity on demand

• Capacity on Demand (CoD) ƒ Activation of processors or memory

• Capacity Upgrade on Demand (CUoD) ƒ permanently activate one or more inactive processor cores or memory

• Trial CoD ƒ No charge 30-day activation of processors or memory resources

• Elastic CoD ƒ Ability to activate processor or memory resources temporarily

• Utility CoD ƒ Ability to cover unpredictable, short workload spikes

Add reserve resources

• Power Enterprise Pool ƒ Group of systems that can share Mobile Capacity on Demand (CoD) processor resources and memory resources

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-13. Capacity on demand

CoD is a list of features that can be purchased. The bullets in the visual list the purchasing options that are managed from the HMC and require a license key to activate: • Capacity CUoD Capacity on Demand (CoD) offerings you can dynamically activate one or more resources on your server as your business peaks dictate. You can activate inactive processor cores or memory units that are already installed on your server on a temporary and permanent basis. It requires a purchase agreement. Once processors or memory is added, there is no ability to turn off the capacity. • Trial CoD is available for 30 days at no additional cost to allow testing and emergency relief while the customer processes the purchase of permanent CUoD resources. • Elastic CoD (formerly referred to as On/Off CoD) allows you to temporarily activate and deactivate processor cores and memory units to help meet the demands of business peaks. After you request that a number of processor cores or memory units are to be made temporarily available for a specified number of days, those processor cores and memory units are available immediately. You can start and stop requests for Elastic CoD, and you are billed for usage at the end of each quarter. • Utility CoD is used when you have unpredictable, short workload spikes. Utility CoD automatically provides additional processor capacity on a temporary basis within the shared

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-17

V11.0 Unit 2. Console options and HMC overview

Uempty

processor pool. Use is measured in processor minute increments and is reported at the Utility CoD website. • Power Enterprise Pool is a group of systems that can share Mobile Capacity on Demand (CoD) processor resources and memory resources.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-18

V11.0 Unit 2. Console options and HMC overview

Uempty

HMC education Hardware Management Console (HMC) for Power with IBM i This course is designed to familiarize the student with functions of the HMC using lecture and lab. After completing this course, you should be able to: Install an HMC and go through the setup wizard, connect the HMC to a managed system, create, and manage partitions manually or with a .sysplan, manage the HMC including updating code for the HMC and firmware in the managed system

Hardware Management Console (HMC) for Power Systems with IBM i Course code: OL52G Skill level: Intermediate Duration: 2.0 days

http://www.ibm.com/training Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-14. HMC education

This course is designed to familiarize students with functions of the HMC using lecture and lab exercises.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-19

V11.0 Unit 2. Console options and HMC overview

Uempty

Review questions 1. What is the component needed to configure partitions, configure CoD, and provide access to virtual consoles? a. b. c. d.

FSP HMC POWER Hypervisor NVRAM

2. True or False: One HMC can control multiple managed systems. 3. True or False: The HMC can be used with two different software interface classic or enhanced.

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-15. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-20

V11.0 Unit 2. Console options and HMC overview

Uempty

Review answers 1.

What is the component needed to configure partitions, configure CoD, and provide access to virtual consoles? a. FSP b. HMC c. POWER Hypervisor d. NVRAM The answer is HMC.

2.

True or False: One HMC can control multiple managed systems. The answer is True.

3.

True or False: The HMC can be used with two different software interface classic or enhanced. The answer is True.

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-16. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-21

V11.0 Unit 2. Console options and HMC overview

Uempty

Unit summary

• • • • • •

Discuss the different consoles that can be used with Power with IBM i Describe the concepts of HMC List the different HMC models that are available Describe virtual HMC appliance Describe the differences between IVM, HMC Describe the different capacity on-demand options available

Console options and HMC overview

© Copyright IBM Corporation 2001, 2016

Figure 2-17. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

2-22

V11.0 Unit 3. Basic management using HMC

Uempty

Unit 3. Basic management using HMC Estimated time 01:15

Overview The intention of this unit is not to replace the HMC course, but to explain some HMC functions that allow the operator to use advanced work management. In addition, this unit explains some virtualization aspects, like virtual Ethernet.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-1

V11.0 Unit 3. Basic management using HMC

Uempty

Unit objectives

• Explain how to dynamically change partition parameters like CPU, Memory, Physical and Virtual Resources • Explain how to set up virtual Ethernet between partitions • Explain basic servers and partitions operations

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-2

V11.0 Unit 3. Basic management using HMC

Uempty

Topic 1: Dynamic logical partitioning

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-2. Topic 1: Dynamic logical partitioning

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-3

V11.0 Unit 3. Basic management using HMC

Uempty

Partition profile

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-3. Partition profile

A partition profile is a record on the Hardware Management Console that specifies a possible set of resource allocations and activation settings for a logical partition. To activate a logical partition, you must activate one of the partition profiles for that logical partition. The managed system uses the partition profile to configure the resources for the logical partition. The partition profile is a separate entity from the logical partition. Changing the partition profile properties does not automatically change the resource allocations for an active logical partition. Similarly, changing the resource allocations for an active logical partition does not automatically change the properties for any partition profile.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-4

V11.0 Unit 3. Basic management using HMC

Uempty

Processing and Memory settings

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-4. Processing and Memory settings

On the visual you see the typical processing unit and memory configuration. It is important to understand the minimum desired and maximum amount of processor / memory assigned to the partition. After the partition is IPL'ed the resources are assigned to the partition in the desired level if available. Using dynamical logical partitioning (DLPAR) you can increase or decreased to minimum defined in the partition profile.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-5

V11.0 Unit 3. Basic management using HMC

Uempty

I/O adapters

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-5. I/O adapters

I/O and virtual I/O adapters can be assigned to a partition as desired or required. If I/O is required, it cannot be moved until partition is stopped.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-6

V11.0 Unit 3. Basic management using HMC

Uempty

Dynamic partitioning

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-6. Dynamic partitioning

Dynamic partitioning (DLPAR) allows you to dynamically (without start stop partition) manage resources. Right-click the partition name and from tasks choose Dynamic Partitioning now choose: • • • • •

Processor Memory Physical / Virtual Adapters Host Ethernet Select action: ▪ Add or Remove ▪ Move

On the next slide we show all the operations on processor resources, but this same way you can dynamically manage other resources. If want to manage I/O resources, it must be desired for partition. Dynamic partitioning working with active partition. Note: If you are dynamically adding resources or are creating some adapters you must modify the partition profile, otherwise after the IPL is partitioned you will lose added or created dynamically resources. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-7

V11.0 Unit 3. Basic management using HMC

Uempty

Dynamic partitioning: Processor

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-7. Dynamic partitioning: Processor

Right-click the partition name and from tasks chose Dynamic Partitioning > Processor > Add or Remove. Add/Remove Processor Resources Use this window to add processor resources to or remove processor resources from the selected logical partition without restarting the logical partition. When you add processors or processing units to a logical partition dynamically, you must meet the following conditions: • The number of processors or processing units that you add must be less than or equal to the available number of processors or processing units. • The number of processors or processing units that the logical partition will have must be less than or equal to the maximum number of processors or processing units set for the logical partition. • If the logical partition uses shared processors, the number of virtual processors that the logical partition will have must be equal to or greater than the number of processing units that the logical partition will have, and less than or equal to the maximum number of virtual processors set for the logical partition.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-8

V11.0 Unit 3. Basic management using HMC

Uempty

When you remove processor resources from a logical partition dynamically, you must meet the following conditions: • The number of processors or processing units that the logical partition will have must be less than or equal to the maximum number of processors or processing units set for the logical partition. • If the logical partition uses shared processors, the number of virtual processors that the logical partition will have must be equal to or greater than the number of processing units that the logical partition will have, and less than or equal to the maximum number of virtual processors set for the logical partition. Right-click the partition name and from tasks chose Dynamic Partitioning > Processor > Move. Move Processor Resources Use this window to move processor resources from the selected logical partition to another logical partition without restarting either logical partition. • You can move processors or processing units dynamically between logical partitions if the following conditions are met: • The number of processors or processing units that you move must be less than or equal to the movable number of processors or processing units on the source logical partition. • The number of processors or processing units that the destination logical partition will have must be less than or equal to the maximum number of processors or processing units set for the destination logical partition. • If the source logical partition uses shared processors, the number of virtual processors that you move must be less than or equal to the movable number of virtual processors on the source logical partition. • If the destination logical partition uses shared processors, the number of virtual processors that the destination logical partition will have must be greater than or equal to the number of processing units that the destination logical partition will have, and less than or equal to the maximum number of virtual processors set for the logical partition.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-9

V11.0 Unit 3. Basic management using HMC

Uempty

Dynamic partitioning: Memory

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-8. Dynamic partitioning: Memory

Right-click the partition name and from tasks chose Dynamic Partitioning > Memory > Add or Remove. Add/Remove Memory Resources Use this window to add memory resources to or remove memory resources from the selected logical partition without restarting the logical partition. When you add memory or processing units to a logical partition dynamically, you must meet the following conditions: • The amount of the memory that you add must be less than or equal to the available memory. • The amount of the memory that the logical partition will have must be less than or equal to the maximum amount of the memory set for the logical partition. Right-click the partition name and from tasks chose Dynamic Partitioning > Memory > Move. Move Memory Resources Use this window to move memory resources from the selected logical partition to another logical partition without restarting either logical partition. You can move memory dynamically between logical partitions if the following conditions are met:

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-10

V11.0 Unit 3. Basic management using HMC

Uempty

• The amount of the memory that you move must be less than or equal to the movable amount of the memory on the source logical partition. • The amount of the memory that the destination logical partition will have must be less than or equal to the maximum amount of the memory set for the destination logical partition. Note Depending on how busy the system is, removing or moving memory might not run at once. And it might need to be repeated.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-11

V11.0 Unit 3. Basic management using HMC

Uempty

Dynamic partitioning: Physical Adapters

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-9. Dynamic partitioning: Physical Adapters

When you add an I/O slot to a logical partition, the I/O adapter in that I/O slot and the devices that are controlled by the I/O adapter can be used by the logical partition. This function is typically used to share infrequently used devices among logical partitions by moving these devices from one logical partition to another. Right-click the partition name and from tasks chose Dynamic Partitioning > Physical Adapters > Add or Remove. Right-click another partition and from tasks chose Dynamic Partitioning > Memory > Move.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-12

V11.0 Unit 3. Basic management using HMC

Uempty

Dynamic partitioning: Virtual Adapters

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-10. Dynamic partitioning: Virtual Adapters

Dynamic partitioning for virtual adapters, you can only add, create, or delete it. You can add the following virtual adapters: • Ethernet • Fibre Channel • SCSI • Serial Note Before you start creating new virtual adapters check the current number of virtual adapters and available maximum. If both values are equal, you have to change the partition profile definition. Right-click the partition name and from tasks chose Dynamic Partitioning > Virtual Adapters > Action > Create Virtual Adapter. To delete the virtual adapter, select it and then chose Action > Delete.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-13

V11.0 Unit 3. Basic management using HMC

Uempty

Create Virtual Adapter: Ethernet Adapter

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-11. Create Virtual Adapter: Ethernet Adapter

This course does not cover all HMC tasks, but from an Advanced Operator perspective it could be useful to know how two partitions communicate without a physical Ethernet adapter. To do this you can add it by dynamical creation of the Ethernet virtual adapter (if necessary you have to create it on both partitions). To create virtual Ethernet adapter right-click the partition name and from tasks chose Dynamic Partitioning > Virtual Adapters > Action > Create Virtual Adapter > Ethernet Adapter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-14

V11.0 Unit 3. Basic management using HMC

Uempty

Virtual Ethernet Adapter: General and Advanced

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-12. Virtual Ethernet Adapter: General and Advanced

Create/Edit Virtual Ethernet Adapter Use this window to enter, view, or change the properties for a virtual Ethernet adapter on this logical partition or partition profile. Virtual Ethernet adapters can form Virtual Local Area Networks (LANs) automatically if you specify the same virtual LAN ID for each virtual Ethernet adapter. You can create up to 4094 virtual LANs using virtual Ethernet adapters. Each virtual LAN is identified by a virtual LAN ID number. Virtual Ethernet adapters can communicate with each other only if they are assigned the same virtual LAN ID number. A Virtual Switch (VSwitch) is used to allow the virtual Ethernet adapter to route through a physical adapter to an external network. When you create a virtual Ethernet adapter, the managed system automatically assigns a Media Access Control (MAC) address to the virtual Ethernet adapter. MAC addresses are used to identify Ethernet adapters on a network. The MAC address that the managed system assigns to the virtual Ethernet adapter is unique within the managed system. However, this MAC address is not universally unique, and might not be unique within a network containing multiple managed systems. Having multiple virtual Ethernet adapters with the same MAC address can cause network problems. To resolve these problems, you can change the MAC address prefix assigned to the POWER6 or POWER7 processor-based server using the Hardware Management Console (HMC) © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-15

V11.0 Unit 3. Basic management using HMC

Uempty

chhwres command. The managed system prefix is used to build the partition virtual Ethernet MAC addresses during partition activation. Additionally, in specific POWER7 processor-based servers, you have the option of specifying a complete custom MAC address instead of using one that is automatically generated by the HMC. Note To determine whether a POWER7 processor-based server provides the capability to customize the whole MAC address instead of only the MAC address prefix, run the lssyscfg command using the '-F capabilities' option. If the custom_mac_addr_capable capability is listed for the POWER7 processor-based server, then the whole MAC address can be customized for any virtual Ethernet adapter. Otherwise, only the MAC address prefix can be changed for the virtual Ethernet adapter. Beginning with POWER7 processor-based servers, you can use the Edit option to modify the IEEE 802.1Q Compatible adapter, Additional VLANs, and QoS priorities of the Virtual Ethernet Adapter during dynamic logical partitioning operation. Current settings for the Virtual Ethernet adapter are listed at the bottom of the panel. Information on these settings can be found in the detailed help below. The Create Virtual Ethernet Adapter panel has the following two tabs: General • Use this tab to enter the virtual ID, vSwitch, VLAN ID, and select the optional settings. • You can find more detailed help on the following elements of this window: ▪ Adapter ID - Specify the slot number to use for this virtual Ethernet adapter. The slot number is used to identify the virtual adapter within the logical partition. (The combinations of the slot number and the logical partition ID uniquely identify this slot within the managed system.) - This slot number does not refer to any physical hardware location on your system. Therefore, you can assign slot numbers to virtual adapters in any way that makes sense to you, provided that you follow the following guidelines: ○ You can use any slot number from 2 up to (but not including) the maximum number of virtual adapters. (Slots 0 and 1 are reserved for system-created virtual adapters. If the logical partition is a Virtual I/O Server logical partition, other slot numbers might also be reserved.) For example, if the maximum number of virtual adapters is 10, and the logical partition is not a Virtual I/O Server logical partition, you can use any slot number from 2 to 9. By default, the system displays the lowest unused slot number for this logical partition. ○ You cannot use a slot number that was used for any other virtual adapter on the same logical partition.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-16

V11.0 Unit 3. Basic management using HMC

Uempty

▪ VSwitch - Select a VSwitch from the list to which you want to connect the virtual Ethernet adapter. You can create multiple VLAN adapters in a partition by using the virtual switches (VSwitches). These adapters can route through different physical adapters to the external network by using VSwitches. The VSwitch (VSwitch0) is defined by default. ▪ Port Virtual Ethernet (VLAN ID) - Specify the ID number for the Virtual Local Area Network (LAN) to which you want to connect this virtual Ethernet adapter. This virtual LAN ID number can be any whole number from 1 to 4094. ▪ View Virtual Network - Select View Virtual Network to view Virtual Switch (VSwitch) and Virtual LAN (VLAN) configurations. From this task, you can: ○ View existing VSwitches and their associated VLANs ○ Create a new VSwitch - VSwitches are created using this task. VLANs are created when a partition with a VLAN defined is activated. For more information on managing virtual networks, select Help from the Virtual Network Management panel. ▪ Optional Settings - Select IEEE 802.1q compatible adapter or Access external network to set these optional settings for the virtual Ethernet adapter. You can find more detailed help on the following elements of this page: ○ IEEE 802.1 compatible adapter - Select this option to add this virtual Ethernet adapter to additional Virtual Local Area Networks (LANs) as specified in the IEEE 802.1Q network standard. Selecting this option allows you to specify additional virtual LAN IDs for the adapter. - Not all versions of all operating systems support the IEEE 802.1Q network standard. If the operating system does not support the IEEE 802.1Q network standard, the virtual Ethernet adapter can connect to only one virtual LAN (as identified by VLAN ID). - You can find this option only if Hardware Management Console (HMC) supports the power hypervisor capability. ▪ New VLAN ID - Specify the ID number for any additional Virtual Local Area Networks (LANs) to which you want to connect this virtual Ethernet adapter and click Add. This virtual LAN ID number can be any whole number from 2 to 4094. Beginning with POWER7 processor-based servers, you can specify a range of VLANs or a comma separated list of VLANs and can modify the VLAN ID dynamically while the logical partition is active. ▪ Additional VLANs - This option is visible when you select IEEE 802.1 compatible adapter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-17

V11.0 Unit 3. Basic management using HMC

Uempty

- Lists the ID numbers of any additional Virtual Local Area Networks (LANs) to which the virtual Ethernet adapter belongs. To remove the virtual Ethernet adapter from a virtual LAN, select the virtual LAN here and click Remove. ▪ Access external network - Indicate whether this virtual Ethernet adapter is the trunk adapter on this Virtual Local Area Network (LAN). - A trunk adapter is an Ethernet adapter that links its LAN to an external network. If a data transmission on the virtual LAN is addressed to an Ethernet adapter that does not exist on the virtual LAN, the data transmission is sent to the trunk adapter. The trunk adapter can then forward the data transmission to an external network. - Selecting this option will not automatically connect the virtual LAN to an external network. You must also configure the operating system of the logical partition to forward information to the external network. - Not all versions of all operating systems support trunk adapters. Your operating system might support other methods for connecting logical partitions to external networks. To determine which method is appropriate for your situation, consult the documentation for your operating system. - A virtual LAN can have only one active trunk adapter at a time. You can create only one trunk adapter for each virtual LAN on your managed system unless you are creating redundant trunk adapters for virtual trunk adapter failover capability. If you create redundant trunk adapters for virtual trunk adapter failover capability, you must follow these rules when creating these adapters: ○ The virtual LAN ID in Virtual LAN ID must match for all redundant trunk adapters. ○ The trunk priority in Trunk priority must be unique for each redundant trunk adapter. ○ All of the virtual LAN IDs in Additional VLANs must match for all redundant trunk adapters. Advanced Beginning with POWER7 processor-based servers, you can use this tab to configure advanced options for your virtual Ethernet adapter. When adding a virtual Ethernet adapter to a logical partition, you can configure a custom MAC address for the adapter and specify restrictions for operating system-defined MAC addresses. If the managed system provides support for quality of service, you also can specify a priority for network communications for the adapter. You can edit the QoS priorities using the dynamic logical partitioning operation when the partition is running. Advanced properties ▪ Default MAC Address - The MAC address is automatically generated by the Hardware Management Console (HMC). Beginning with POWER7 processor-based servers, you have the option of specifying a custom MAC address. This field displays a value of auto-assigned unless you choose to specify a custom MAC address by selecting the Override option.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-18

V11.0 Unit 3. Basic management using HMC

Uempty

▪ Override - Select this option if you want to specify a custom MAC address for the virtual Ethernet adapter. ▪ Custom MAC address - If you select Override, you can specify a custom MAC address. - The MAC address is a 12-character hexadecimal string. The valid characters are from 0 to 9 and A to F. The characters are not case-sensitive. There are two rules for MAC addresses: Bit 1 of byte zero of the MAC addresses, for example: mask 0x010000000000, is reserved for Ethernet multicasting and must always be '0'. Bit 2 of byte zero of the MAC addresses must always be '1', as it indicates that the MAC is a locally administered address. For example, these virtual Ethernet MAC addresses follow the rules: FE:00:00:00:00:00, F2:00:00:00:00. ▪ Maximum quality of service - The QoS setting on the virtual adapter is a maximum value. It will limit the outgoing packets to that priority by lowering any packet priority that is greater than the max, but any lower priority packet will remain at its current priority. - You can select one of the following values for the priority level: 1. 1 - background 2. 2 - spare 3. 0 (default) - best effort 4. 3 - excellent effort 5. 4 - controlled load 6. 5 - video (less than 100 ms latency and jitter) 7. 6 - voice (less than 10 ms latency and jitter) 8. 7 - network control ▪ MAC Address Restrictions - You can choose the following values for any operating system-defined MAC addresses. ▪ Allow all O/S Defined MAC Addresses - Select this option to allow any operating system-defined MAC addresses. This is the default value. ▪ Deny all O/S Defined MAC Addresses - This option does not allow any operating system-defined MAC address(es). ▪ Specify Allowable O/S Defined MAC Addresses - Select this option to specify a maximum of four operating system-defined MAC addresses that are allowed. ▪ Allowed MAC Address - Specify a MAC address in the Allowed MAC Address field and click Add.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-19

V11.0 Unit 3. Basic management using HMC

Uempty

- This adds the address to the Allowed MAC Address(es) list. You can specify a maximum of four MAC addresses. - Click Remove to delete a MAC Address from the list. ▪ Virtual Station Interface - VSI Type ID ○ Specify the type ID of the VSI profile. ▪ VSI Type Version - Specify the version number of the VSI profile. ▪ VSI Manager ID - Specify the ID of the VSI manager.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-20

V11.0 Unit 3. Basic management using HMC

Uempty

Work with Communications Resources display

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-13. Work with Communications Resources display

Note all virtual devices have a letter in type like 268C. When you create new device check it using WRKHDWRSC *CMN for communication devices.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-21

V11.0 Unit 3. Basic management using HMC

Uempty

Topic 2: Additional useful functions

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-14. Topic 2: Additional useful functions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-22

V11.0 Unit 3. Basic management using HMC

Uempty

Serviceability

Start Control Panel Functions like 21 Dedicated Service Tools (all available only for IBM i) Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-15. Serviceability

For each partition you can view / manage serviceable events and see Reference Codes. Additionally when you need to run DST (dedicated service tools) you can activate it using Control Panel function 21 (active console 5250 session is required to use this function). From Tasks (bottom of screen) expand Serviceability > Manage Serviceable Events > Manage Serviceable Events. Use this window to select the criteria for the set of serviceable events you want to view. When you finish selecting the criteria, you can view the serviceable events that match your specified criteria. Select ALL if you do not want the results filtered. Event criteria Serviceable event status: Select one event status to filter the problems you want to view. You can view Open or Closed events. Problem Number: Select one problem number to filter the problems you want to view.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-23

V11.0 Unit 3. Basic management using HMC

Uempty

Error criteria Reporting system MTMS: Select ALL to view all events for all reporting systems or select the machine type-model/serial number (MTMS) of the system that reported the serviceable events that you want to view. The list of MTMS is in the following format: TTTT-MMM/NNNNNNN, where TTTT is the machine type, MMM is the model number, and NNNNNNN is the serial number. Failing enclosure MTMS: Select ALL to view all units that failed or select the machine type-model/serial number (MTMS) of a specific unit that failed and generated the serviceable events that you want to view. This field lists only those units for which serviceable events are available. Reference code: Select one reference code to filter the problems you want to view. This lists only reference codes for which serviceable events are available. Number of days: Specify the number of days of past events to view, starting with today to filter the problems you want to view. The range is 1, 7, 14, or 30. Field-Replaceable Unit (FRU) criteria Part number: Select one part number to filter the problems you want to view. Location code: Select one location code to filter the problems you want to view. From the Tasks (bottom of screen) expand Serviceability > Reference Code History. Reference Code History (Partition): Use this window to view reference codes that have been generated for the selected logical partition. Reference codes are diagnostic aids that help you determine the source of a hardware or operating system problem. By default, only the most recent reference codes that the logical partition has generated display on this window. To view more reference codes, enter the number of reference codes that you want to view into View history and click Go. The window displays that number of the latest reference codes, with the date and time at which each reference code was generated. The window can display up to the maximum number of reference codes stored for the logical partition. The details displayed in the Reference Codes table are as follows: Time stamp: This column displays the date and time at which each reference code was generated in Coordinated Universal Time (UTC). Code: This column displays each reference code that was generated for the logical partition. You can click the reference code to see whether there is any additional descriptive text for the reference code. FRU callout: This column displays the Field Replaceable Unit (FRU) numbers for the FRUs whose absence or failure caused each reference code to be generated. You can select any of the reference codes in the table to more detailed information about the reference code in the Details table. The Details table displays hexadecimal words that can provide additional information about the problem that caused this reference code to be generated. From Tasks (bottom of screen) expand Serviceability > Control Panel Function. Now you can run some Control Panel functions for example function 21 DST.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-24

V11.0 Unit 3. Basic management using HMC

Uempty

Operations: Power Off

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-16. Operations: Power Off

Power Off: This task shuts down the managed system. Turning off the managed system makes all partitions unavailable until the system is turned on again. Normal power off: The system ends all active jobs in a controlled manner. During that time, programs running in those jobs are allowed to perform cleanup (end-of-job processing). Fast power off: The system ends all active jobs immediately. The programs running in those jobs are not allowed to perform any cleanup. Note Powering down a server with running partitions is not recommended, shutdown all partitions first. If you Power Off with running partitions a warning window will appear.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-25

V11.0 Unit 3. Basic management using HMC

Uempty

Operations: Power On

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-17. Operations: Power On

Power On: Use the Power On task to start a managed system. You can choose from two different options to start your managed system: • Normal: Turns on the managed system to partition standby mode and then activates all partitions that are marked as auto start or those partitions that were running when the system shutdown. • Hardware Discovery: Selecting this Power On option specifies that the HMC run the hardware discovery process when the managed system powers on. The hardware discovery process captures information about all I/O devices: In particular those devices not currently assigned to partitions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-26

V11.0 Unit 3. Basic management using HMC

Uempty

Managed system states (1 of 2)

• Only service processor powered on: ƒ No Connection í

HMC cannot locate required managed system

ƒ Pending Authentication í

Service processor password must be updated

ƒ Failed Authentication í

Service processor password is incorrect

ƒ Error í

Problem with hardware or operating system

ƒ Error - Dump in Progress í

The managed system encountered an error and is performing a system dump

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-18. Managed system states (1 of 2)

This visual lists some of the states that will be displayed on the HMC. At this point, only the four states listed under Service Processor Powered on apply. • No Connection: This is a cause for concern because the HMC cannot connect to the managed system specified. • Pending Authentication: This requires the service processor password to be updated. • Failed Authentication: The service processor password is incorrect. • Error: The operating system or the hardware of the managed system is experiencing errors. •

Error - Dump in Progress: The managed system encountered an error and is performing a system dump.

After you activate the managed system and create or activate partitions, you will see the other states (and more), which are applicable to the powered on managed system and partitions. These will be discussed later.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-27

V11.0 Unit 3. Basic management using HMC

Uempty

Managed system states (2 of 2)

• Managed system powered on: ƒ ƒ ƒ ƒ ƒ ƒ

Initializing Standby Operating Power Off Error – Terminated On-Demand Recovery

ƒ ƒ ƒ ƒ

Incomplete Recovery Service Processor Failover in Progress Version Mismatch

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-19. Managed system states (2 of 2)

Initializing: The managed system is powered on and is initializing. The initialization time might vary depending on the hardware and the partition configuration of the managed system. Standby: The managed system is powered on using the Power on standby option. It will stay in this state until a logical partition is activated. You can create and modify logical partitions while the managed system is in this state. Operating: The managed system initialized and is operational. Error - Terminated: The managed system encountered an error and has performed a system dump. On Demand Recovery: The anchor card (also known as the system VPD card) on this managed system was replaced. You must enter replacement activation codes for Capacity on Demand or Virtualization Engine system technologies. On/Off CoD requests must be restarted Powering Off: The managed system is powering off normally.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-28

V11.0 Unit 3. Basic management using HMC

Uempty

Incomplete: The HMC failed to get all of the necessary information from the managed system. Refresh the internal representation of the managed system on the HMC using the Rebuild task. The Rebuild operation does not disrupt the operation of the running server. If the rebuild is unsuccessful, refer to the Correcting an Incomplete State for a Managed System topic in the Managing the HMC v7 Guide publication. You can access this HMC publication and other useful HMC documentation either in the PDF or HTML format from the Additional Resources section in the HMC Welcome page. Recovery: The save area in service processor is not synchronized with the HMC database. Service Processor Failover In Progress: The primary service processor in the managed system is performing an administrative failover and transferring system management to the secondary service processor. This transfer is in progress. Version Mismatch: This version of HMC is unable to manage the system. Update the HMC Licensed Internal Code.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-29

V11.0 Unit 3. Basic management using HMC

Uempty

Topic 3: Managed server partition tasks

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-20. Topic 3: Managed server partition tasks

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-30

V11.0 Unit 3. Basic management using HMC

Uempty

Partition task selection

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-21. Partition task selection

To work with partitions on a server: Click the name of the managed system under the Server tab. On the main pane you will see a partition or partitions. You must select the partition and then perform the task. Systems Management > Servers > click chosen server name.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-31

V11.0 Unit 3. Basic management using HMC

Uempty

Partition tasks

• Multiple ways to view tasks • Tasks are different on remote sessions versus native HMC Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-22. Partition tasks

When the partition has been selected, there are three ways to view the tasks that can be performed. They are: • Using the Tasks list at the top of the screen. • Using the Tasks menu located in the bottom of the screen. • Clicking the arrow next to the name on the selected partition.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-32

V11.0 Unit 3. Basic management using HMC

Uempty

Operations: Activate (1 of 2)

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-23. Operations: Activate (1 of 2)

Right-click the partition name click Activate > Profile. Use the Activate partition profile task to start a single logical partition. Select a profile to use when activating the partition from the list of profiles displayed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-33

V11.0 Unit 3. Basic management using HMC

Uempty

Operations: Activate (2 of 2)

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-24. Operations: Activate (2 of 2)

You can choose to work with a terminal window or console session when the partition is activated by selecting Open a terminal window or console session. Note On the remote web browser connection to the HMC, the Open a terminal window or console session is not available for IBM i type partitions. You can use you Open console session only locally on HMC. To run Console 5250 remotely you have to use IBM i Access Client Solutions. Click Advanced for more options on activating the partition. Alternatively, you can use the Activate - Current Configuration task to quickly start multiple logical partitions by using the current configuration information for the partitions that is available on the hypervisor. Advance: Use the Advanced window to set options for the logical partition that you are activating. No VSI Profile: Select this check box to ignore the failure in configuring the VSI profile and to continue to activate the partition. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-34

V11.0 Unit 3. Basic management using HMC

Uempty

Keylock position: Select a keylock position. The keylock position establishes the power-on and power-off modes allowed for the system. Possible values are: • Do not Override: Uses the current partition setting. • Manual: After the partition is powered on, operating the managed system in manual (attended) mode means that an operator uses the control panel to direct the managed system for special needs. For security reasons, it is not preferred that you set the keylock position to Manual. • Normal: After the partition is powered on, operating the managed system in Normal (unattended) mode during the restart operation does not require the support of an operator. For IBM i logical partitions IPL type: Displays the IPL type of the partition. Possible values are: • Do not Override: Uses the current partition setting. • IPL type A: Use IPL type A when directed for special work, such as diagnostic work. • IPL type B: Use IPL type B for routine work. • IPL type C: This type of IPL is reserved for hardware service representatives. • IPL type D: Use IPL type D when directed for special work, such as installing and reloading programs. IPL type D loads the system programs from an alternate IPL load source, such as a tape drive or CD-ROM. For AIX or Linux logical partitions: Boot mode: Displays the boot mode of this partition. This field is available only for the AIX or Linux partitions. This field is disabled, when you are installing a VIOS image on a VIOS partition. For AIX or Linux boot mode, the possible values are: • Do Not Override: Uses the setting in the profile user selected here. • Normal: The logical partition starts up as normal. (This is the mode that you use to perform most everyday tasks.) • SMS: The logical partition boots to the System Management Services (SMS) menu. • Diagnostic with default boot list: The logical partition boots using the default boot list that is stored in the system firmware. This mode is normally used to boot customer diagnostics from the CD-ROM drive. Use this boot mode to run standalone diagnostics. • Diagnostic with stored boot list: The logical partition performs a service mode boot using the service mode boot list saved in NVRAM. Use this boot mode to run online diagnostics. • Open Firmware OK prompt: The logical partition boots to the open firmware prompt. This option is used by service personnel to obtain additional debug information. • Install Virtual I/O Server: This option is available only when the partition is a Virtual I/O Server. When a VIOS image is being installed, this option is selected by default and the field is grayed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-35

V11.0 Unit 3. Basic management using HMC

Uempty

Review questions 1. When defining a partition’s processors, why is the minimum number of processors important? a. You cannot go below this number of processors while the partition is active. b. If the wanted number of processors is not available (but if this minimum necessary number is), the partition will still activate. c. Both a and b.

2. True or False: You can activate DST using HMC. 3. True or False: You cannot dynamical add Virtual Ethernet Adapter.

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-25. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-36

V11.0 Unit 3. Basic management using HMC

Uempty

Review questions 1. When defining a partition’s processors, why is the minimum number of processors important? a. You cannot go below this number of processors while the partition is active. b. If the wanted number of processors is not available (but if this minimum necessary number is), the partition will still activate. c. Both a and b.

The answer is both a and b. You cannot go below this number of processors while the partition is active and if the wanted number of processors is not available (but if this minimum necessary number is), the partition will still activate.

2. True or False: You can activate DST using HMC. The answer is true.

3. True or False: You cannot dynamical add Virtual Ethernet Adapter. The answer is False. Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-26. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-37

V11.0 Unit 3. Basic management using HMC

Uempty

Unit summary

• Explain how to dynamically change partition parameters like CPU, Memory, Physical and Virtual Resources • Explain how to set up virtual Ethernet between partitions • Explain basic servers and partitions operations

Basic management using HMC

© Copyright IBM Corporation 2001, 2016

Figure 3-27. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

3-38

V11.0 Unit 4. IBM i Access Family overview

Uempty

Unit 4. IBM i Access Family overview Estimated time 00:30

Overview This unit describes the concepts and capabilities of the IBM i Access Family of software. It also specifically explores one of those products - IBM i Access Client Solutions.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-1

V11.0 Unit 4. IBM i Access Family overview

Uempty

Unit objectives

• Describe the features and capabilities of the IBM i Access Family of products • Describe the installation and use of IBM i Access Client Solutions • List reference documentation

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-2

V11.0 Unit 4. IBM i Access Family overview

Uempty

Topic 1: Overview of IBM i Access Family

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-2. Topic 1: Overview of IBM i Access Family

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-3

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access Family

• IBM Access Family of Products ƒ IBM i Access for Windows (5770XE1) í í

Client Access

ƒ IBM i Access for Web (5770XH2) í

IBM i system hosted HTML based web product

ƒ IBM i Access Client Solutions (5733XJ1) í

Java based, platform-independent interface that runs on most operating systems that support Java

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-3. IBM i Access Family

The IBM i Access Family of products provide easy to use, out of the box solutions for accessing IBM i resources. These four products include alternatives for you to use to work with your business applications and resources on IBM i. For example: • The Windows-based solution provides more functional capabilities for the IBM i environment than any other Windows-based product in the marketplace. Not only does it provide a very high-function 5250 native Windows emulator, but it also provides key database access through an easy-to-use GUI. It also provides drivers (such as ODBC, OLDB, and .NET) so that Windows applications can access IBM i/OS resources. It also contains the System i Navigator functions of Management Central, which is the GUI system management for IBM i. •

The web-based solution enables desktop users to connect to IBM i through their browsers. This option requires no special software to be installed or configured on the desktop. The desktop users can start up any browser (for example, Internet Explorer, Netscape, Firefox, Mozilla, or Opera, and have the same look-and-feel when connecting to IBM i. Additionally, the actual desktop operating system is completely transparent; thus allowing users with many dissimilar desktop operating systems to connect to IBM i and see the same presentation.

• IBM i Access Client Solutions provides a Java based, platform-independent interface that runs on most operating systems that support Java, Mac, and Windows™. This option requires a simple “deployment” of the executable code to the workstation of choice. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-4

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access for Windows

• Access for Windows Base (5770-XW1) • Access for Windows (5770-XE1) IBM does not plan to support IBM i Access for Windows on operating systems beyond Windows 8.1. The replacement product is IBM i Access Client Solutions, which includes 5250 emulation, data transfer, printer output, console support, and more.

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-4. IBM i Access for Windows

IBM i Access for Windows delivers TCP/IP connectivity to users running a variety of Microsoft Windows operating systems. IBM i Access for Windows offers an all-inclusive client solution for accessing and using resources from your Windows desktop. It includes 5250 emulation, access to DB2 for IBM i through its Data Transfer, and utilizes IBM i NetServer for working with the IBM i integrated file system and printers. It also has a variety of middleware for using and developing client applications to access IBM i resources; and System i Navigator (Management Central), the IBM i GUI, for administering your IBM i. The use of PC5250 and Data Transfer in IBM i Access for Windows requires an IBM i Access Family (5770-XW1) license.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-5

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access for Web

• Access for Windows Base (5770-XW1) • Access for Windows (5770-XH2): ƒ ƒ ƒ ƒ ƒ ƒ

Database Access 5250 Display IFS Access Commands Print Access Job Access

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-5. IBM i Access for Web

IBM i Access for Web offers browser-based access to IBM i. IBM i Access for Web enables end users to leverage business information, applications, and resources across an enterprise by extending the IBM i resources to the client desktop through a web browser. With it users can run batch commands, access the database as well as the integrated file system, work with printers, printer output, and messages. A 5250 interface is also available. Even though there is no code running on the workstation, IBM i Access for Web requires an IBM i Access Family (5770-XW1) license on the target IBM i server.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-6

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access Client Solutions

• Access for Windows Base (5770-XW1) • Access for Windows (5733-XJ1): ƒ Data transfer/DB access ƒ 5250 Display emulator ƒ Navigator for i í í í

Command execution Print Access Job Access

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-6. IBM i Access Client Solutions

IBM i Access Client Solutions is new to the IBM i Access Family. It offers browser-based access to IBM i. It runs on any platform that supports Java 6.0 or later including Windows, Mac, Linux, AIX, or IBM i systems. With it users can create and manage 5250 emulation sessions, access and transfer data, work with printer output and manage their jobs. Executable code is deployed to the Java supported workstation and this code provides the function. Nothing is installed on the client. Just download, unpack, and execute the code. The target IBM i server requires an IBM i Access Family (5770-XW1) license.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-7

V11.0 Unit 4. IBM i Access Family overview

Uempty

Topic 2: Overview of IBM Navigator for i

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-7. Topic 2: Overview of IBM Navigator for i

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-8

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM Navigator for i window

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-8. IBM Navigator for i window

Navigator for i is a web-based graphical interface for accessing and managing resources and jobs using a web browser. The system management tasks in Navigator for i include System Tasks, Basic operations, Work Management, Configuration and Service, Network, Integrated Services Administration, Security, Users and Groups, Databases, Journal Management, Performance, File Systems, Internet Configurations, and more. This GUI display provides an advantage to operators, administrators, and users who do not have an extensive knowledge of control language (CL) commands. In this example, the Basic Operations folder has been opened and a tab with those commonly used basic operations, is displayed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-9

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM Navigator for i main window

• • • • • • • • • • •

System Tasks Basic Operations Work Management Configuration and Service Network Internet Configuration Security Users and Groups Database File Systems Backup

• Application Administration • Journal Management • Integrated Server Administration

ƒ BRMS plug-in

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-9. IBM Navigator for i main window

System Tasks include viewing system status, messages, disk status, system passwords, application administration, and 5250 emulation. Basic Operations allow you to easily manage lists of messages, printer output, and printers. Work Management functions control the work done on the system. When the IBM i licensed program is installed, it includes a work management environment that supports all interactive and batch work. In addition, work management contains the functions you need to distribute resources for your applications so that your system can handle your applications. Configuration and Service provides functions to help you manage both hardware and software on your system. Network allows you to work with TCP/IP configuration, remote access services, networking servers, IP policies, and integrated servers. Internet Configuration allows you to work with the IBM i Internet configuration tasks such as HTTP servers, Digital Certificates and more. Security functions allow you to plan and implement security on your system. Users and Groups displays a complete list of the users and groups on a system. You can use this functional area to manage users and groups.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-10

V11.0 Unit 4. IBM i Access Family overview

Uempty

Database is a graphical interface that you can use to perform many of your common administrative database operations. Most of the IBM Navigator for i operations are based on Structured Query Language (SQL), but you do not need to fully understand SQL to perform them. File Systems are a part of IBM i that supports stream input/output and storage management similar to personal computer and UNIX operating systems. They also provide a similar hierarchical directory structure. Click File Systems to display a list of all IBM i file systems to which you are authorized. You can access IBM i objects by specifying the path through the directories to the object. BRMS Backup, Recovery and Media Services helps you to easily manage complex saves, restores and their media. Application Administration allows the setting of access to functions or applications by your users. Journal Management allows you to manage journal and journal receiver objects. A journal is an object that records changes to files by sending information about the change to a journal receiver. Integrated Server Administration combines the ease-of-use of a Windows, Linux, or VMware server with the dependability and power of IBM i, giving you the flexibility to enroll and manage users and groups, greater accessibility and protection for your data, and simplified administration.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-11

V11.0 Unit 4. IBM i Access Family overview

Uempty

Topic 3: Using IBM i Access Client Solutions

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-10. Topic 3: Using IBM i Access Client Solutions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-12

V11.0 Unit 4. IBM i Access Family overview

Uempty

Platform independent

• Runs anywhere that has Java. ƒ Java 6.0 or later

• This includes: ƒ ƒ ƒ ƒ ƒ

Windows Mac Linux AIX IBM i

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-11. Platform independent

IBM i Access Client Solutions (ACS) need only be “deployed” to any Java supported platform. To “deploy” the product, it must first be downloaded. The download consists of zipped configuration and executable files. Next, the downloaded code must be unpacked to the media from which it will be run, such as a local hard drive, network shares, or a thumb drive. You are then ready to use the product to connect to the IBM i server. The simple steps are outlined below: a. Download the product from IBM. b. Unzip the download to the run media. c. Run the startup program to initiate the product. d. Define one or more target IBM i servers.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-13

V11.0 Unit 4. IBM i Access Family overview

Uempty

Download Access Client Solutions

http://www-03.ibm.com/systems/power/software/i/access/solutions.html IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-12. Download Access Client Solutions

On the IBM i Access Client Solutions web page, there are two different downloads of the product available. One is called the evaluation version (70 days) to preview. It is the current product and can be downloaded by anyone with an IBM ID and password. This is by far the easiest way to get your hands on ACS. Just click the “Download IBM i Access Client Solutions base package” link, key in your IBM ID and password when prompted and the download will be initiated. If you want to extend usage you have to have license. You can also download IBM i Access Client Solutions and the two optional platform-specific packages which include middleware for using and developing client applications. These two packages are: IBM i Access Client Solutions - Windows Application Package for Windows operating systems. Features include: • Connectivity to DB2 for i using ODBC, .Net, and OLE DB • Programming Toolkit for accessing IBM i system objects • Support for TLS/SSL connections • AFP printer driver

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-14

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access Client Solutions - Linux Application Package for Linux operating systems. Features include: • Connectivity to DB2 for i using ODBC • Full support for 64-bit ODBC data types • TCP/IP connectivity Base ACS product and both packages can only be download from the Entitled Software Support (ESS) website This requires an IBM ID and password as well as an IBM customer number for the software support.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-15

V11.0 Unit 4. IBM i Access Family overview

Uempty

Unzip the download

Examine the Documentation and Start_Programs folders.

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-13. Unzip the download

Here are the folders and files that are unzipped to your location of choice. The Documentation folder has GettingStarted.txt files in multiple languages. Read this document. It has detailed information about the contents of the folders that you have unzipped as well as instructions on how to start ACS. The Start_Programs folder contains various platform-specific start programs for ACS. By clicking the appropriate start program for your platform, you will initiate ACS.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-16

V11.0 Unit 4. IBM i Access Family overview

Uempty

Run the startup program GettingStarted.txt Startup program

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-14. Run the startup program

The visual illustrates the section of the GettingStarted.txt file that describes the platform-specific start programs that are available for ACS. Each start program is found in its own folder. A double-click of this startup program initiates ACS. You might want to send a shortcut of your startup program to your desktop to facilitate later starts.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-17

V11.0 Unit 4. IBM i Access Family overview

Uempty

Define the target IBM i (1 of 2)

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-15. Define the target IBM i (1 of 2)

Once IBM i Access Client Solutions has been started, target systems can be defined and connected by using 5250 emulation, Navigator for i, or data transfer. Click System Configuration under Management tasks. The System Configuration window is displayed. Any previously defined systems are displayed in this window. Click New to define an additional system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-18

V11.0 Unit 4. IBM i Access Family overview

Uempty

Define the target IBM i (2 of 2)

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-16. Define the target IBM i (2 of 2)

The Add New System window is displayed. Key the system name or IP address and a description into the prompts on the General tab. Click the Connection tab in order to designate how password rules are to be handled. Select use a default user name to prompt for each system or prompt for the user name and password every time. Click the General tab in order to return. From the General tab, click the Verify button in order to verify the server connection.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-19

V11.0 Unit 4. IBM i Access Family overview

Uempty

Use Access Client Solutions

• • • • • • •

Use the pull-down to select a system Start Navigator for i Start 5250 Emulation Manage printer output Start data transfer Run SQL Start Virtual Control Panel

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-17. Use Access Client Solutions

Return to the IBM i Access Client Solutions display and select a system using the pull-down. Now ACS is ready to connect to the IBM i using the facility of choice by clicking the appropriate option.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-20

V11.0 Unit 4. IBM i Access Family overview

Uempty

Topic 4: Reference documentation

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-18. Topic 4: Reference documentation

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-21

V11.0 Unit 4. IBM i Access Family overview

Uempty

IBM i Access Family

http://www-03.ibm.com/systems/power/software/i/access/index.html IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-19. IBM i Access Family

To access this website, go to: http://www-03.ibm.com/systems/power/software/i/access/index.html

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-22

V11.0 Unit 4. IBM i Access Family overview

Uempty

A smart way to modernize

• MODERN-I-ZATION Blog Entries ƒ ƒ ƒ ƒ ƒ

http://iprodeveloper.com/blog/iaccess-unleashed http://iprodeveloper.com/blog/access-client-solutions-deployment-options http://iprodeveloper.com/blog/move-your-data-access-client-solutions http://iprodeveloper.com/blog/access-client-solutions-migration-made-easy http://iprodeveloper.com/blog/how-do-you-actually-get-access-client-solutions

• IBM i Technical Library ƒ http://www.ibm.com/developerworks/ibmi/library/i-access_client_solutions/

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-20. A smart way to modernize

The URLs to access these publications are: • http://iprodeveloper.com/blog/iaccess-unleashed • http://iprodeveloper.com/blog/access-client-solutions-deployment-options • http://iprodeveloper.com/blog/move-your-data-access-client-solutions • http://iprodeveloper.com/blog/access-client-solutions-migration-made-easy • http://iprodeveloper.com/blog/how-do-you-actually-get-access-client-solutions • http://www.ibm.com/developerworks/ibmi/library/i-access_client_solutions/

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-23

V11.0 Unit 4. IBM i Access Family overview

Uempty

Review questions 1. True or False: IBM Navigator for i can display the system history log. 2. True or False: IBM Navigator for i launches in a web browser. 3. True or False: Application Administration is used to control access to functions or applications. 4. True or False: IBM i Access Client Solutions replaced IBM i Navigator

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-21. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-24

V11.0 Unit 4. IBM i Access Family overview

Uempty

Review answers 1. True or False: IBM Navigator for i can display the system history log. The answer is true.

2. True or False: IBM Navigator for i launches in a web browser. The answer is true.

3. True or False: Application Administration is used to control access to functions or applications. The answer is true.

4. True or False: IBM i Access Client Solutions replaced IBM i Navigator. The answer is true.

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-22. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-25

V11.0 Unit 4. IBM i Access Family overview

Uempty

Unit summary

• Describe the features and capabilities of the IBM i Access Family of products • Describe the installation and use of IBM i Access Client Solutions • List reference documentation

IBM i Access Family overview

© Copyright IBM Corporation 2001, 2016

Figure 4-23. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

4-26

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Unit 5. IBM i Access Client Solutions Estimated time 00:45

Overview This unit describes the new functionality available in IBM i Access Client Solutions.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-1

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Unit objectives

• Describe purpose IBM i Access Client Solutions • Describe available tasks IBM i Access Client Solutions

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-2

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

IBM i Access Client Solutions deployment (1 of 2)

• IBM i Access Client Solutions is not installed to the client operating system, on which it is deployed. ƒ There is no installation program for the core of the product.

• Access Client Solutions Deployment ƒ The deployment involves the client bundle being placed wherever it is to be executed from, and determining where the product settings are going to be stored.

• Client bundle ƒ Contains the Java executable .jar properties file, platform-specific start executables and JavaScript start samples, product documentation, and licensing notices. ƒ All that is required to be deployed is the Java executable .jar. ƒ The rest is optional.

• No JRE distributed ƒ IBM i Access Client Solutions does not deploy a specific JRE. ƒ Relies on a Java 1.6 or higher JRE to be accessible on the client OS. IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-2. IBM i Access Client Solutions deployment (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-3

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

IBM i Access Client Solutions deployment (2 of 2)

• There are two main things that can be controlled with the IBM i Access Client Solutions deployment ƒ Where the product is launched from ƒ Where the user’s configuration is stored

• Both of these locations can basically be anywhere ƒ Local PC Operating System ƒ Network Share File System ƒ Portable media or USB flash drive

• They can be located in different places ƒ Product can be launched from local PC OS, while configuration is stored on a Network file system

• Or in the same location ƒ Product can be launched with configuration files that are all stored on a USB flash drive IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-3. IBM i Access Client Solutions deployment (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-4

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Main user interface

• Provide an easy to use launchpoint for features • Build an infrastructure that is extensible for the future

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-4. Main user interface

On the visual you can see IBM i Access Client Solutions (ACS) main screen. ACS offers many features previously in IBM Client Access. Features include: • 5250 display and printer emulation based on IBM's Host-on-Demand • 5250 Session Manager support modeled after IBM Personal Communications Session Manager • Multiple language support for concurrent 5250 emulation sessions on the same client • Data Transfer similar to IBM i Access for Windows Data Transfer plus support for OpenDocument spreadsheet (*.ods), Excel Workbook (*.xlsx), and other file formats • Data Transfer integration with Excel and OpenOffice • Simplified SSL Configuration • Download and viewing of spool files • IBM i Virtual Control Panel for LAN and HMC consoles • 5250 emulation for LAN and HMC consoles

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-5

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

• Consolidation of hardware management interface configurations, including ASMI, IVM, and HMC IBM i Access Client Solutions - Windows Application Package for Windows operating systems. Features include: • Connectivity to DB2 for i using ODBC, .Net, and OLE DB • Programming Toolkit for accessing IBM i system objects • Support for TLS/SSL connections • AFP printer driver

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-6

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

System Configurations (1 of 2)

• Use the System Configurations panel to store connection information on the IBM i Systems that are used.

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-5. System Configurations (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-7

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

System Configurations (2 of 2) Create, edit, or delete connection information for IBM i Systems that are used.

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-6. System Configurations (2 of 2)

To add a new system click the New button. If you want to modify a system click the Edit button. If you want to use LAN Console use Locate Console button. In the General and Connection tabs enter: • System name or IP Address • User name to connect

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-8

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Console configuration

• Console information is configured in the System Configuration panel ƒ LAN Console/Virtual Control Panel í

Service host name

ƒ HMC 5250 Console Host name or IP address to the HMC 5250 Proxy interface í Supports SSL í Virtual Control Panel í

ƒ Hardware Management Interfaces Host name or IP address Can append a port to the name or address x.x.x.x:port í Description í Examples of management interfaces Advanced System Management Interface (ASMI) Integrated Virtualization Manager (IVM) Hardware Management Console (HMC) í

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-7. Console configuration

On the Console configuration tab you can also configure Virtual Control Panel by pressing Advanced button.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-9

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Console

• 5250 Console: Opens an interactive console to the current system • Virtual Control Panel: Opens a Virtual Control Panel if LAN Console is used for the current system • Hardware Management Interface 1: Opens a web browser to the management console specified for the current system

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-8. Console

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-10

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Console

• 5250 HMC Console

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-9. 5250 Console

Note on the 5250 Console screen you see the ‘HMC 5250 Console’ watermark.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-11

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Virtual Control Panel

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-10. Virtual Control Panel

The Virtual Control Panel allows you manage control panel functionality.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-12

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Database Run SQL Script

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-11. Database Run SQL Script

Run SQL Scripts is a useful tool for running SQL statements and CL commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-13

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Database SQL Performance Center

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-12. Database SQL Performance Center

SQL Performance Center provides a set of tools to help you optimize the SQL in your database applications. • Analyze - Provides a summarized view of collected performance data that serves as a launch point into deeper analysis using drill-down navigation. • Show Statements - Links to IBM Navigator for i. • Compare - Links to IBM Navigator for i. • SQL Plan Cache - Links to IBM Navigator for i.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-14

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Emulation (1 of 3)

• Opens an IBM 5250 Telnet session to the current system

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-13. 5250 Emulation (1 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-15

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Emulation (2 of 3)

• Provides nearly identical interaction, look, and feel to the Access for Windows PC5250 emulator

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-14. 5250 Emulation (2 of 3)

5250 Emulator starts a 5250 display session for the selected system. If a 5250 display session profile exists for the selected system, the profile is used when starting the display session; otherwise, a default display session profile is used. When the 5250 display session is ended, if a profile does not exist for the system, you are prompted to save the current settings of the display session to a 5250 display session profile. The saved display session profile will be used the next time a 5250 display session is started for the system. The saved 5250 display session profile can be managed using 5250 Session Manager from the Management tasks.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-16

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Emulation (3 of 3)

• IBM i Access Client Solutions 5250 Emulation sessions are saved as .hod files. ƒ Access for Windows PC5250 .ws files can be imported into .hod files. ƒ .hod files can also be saved outside of the Session Manager. í

Need to set up a file association in the PC operating system to run the file and have it open the emulator.

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-15. 5250 Emulation (3 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-17

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Session Manager (1 of 2)

• 5250 Session Manager

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-16. 5250 Session Manager (1 of 2)

5250 Session Manager provides an interface to create and manage IBM i display and printer emulator sessions. 5250 Session Manager supports: • Creating new 5250 display session profiles • Creating new 5250 printer session profiles • Creating or editing multiple session batch files • Starting a display or printer emulation session using existing session profiles • Viewing all active 5250 display and printer emulator sessions • Importing session profiles from IBM Personal Communications (*.ws)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-18

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

5250 Session Manager (2 of 2)

• Similar to Access for Windows PC5250 Session Manager ƒ Start a saved session ƒ Create new display or printer session ƒ Create a multiple session start batch file from existing saved sessions

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-17. 5250 Session Manager (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-19

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Printer Output

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-18. Printer Output

On the left pane IBM i Access Client Solutions click Printer Output. Printer Output - provides an interface that allows you to view files in the IBM i output queues and also provides the capability to download these files to your client system. By default, the current user's output files are displayed for all output queues.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-20

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Actions

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-19. Actions

You can select file or files by clicking it and then right-clicking to see possible operations or use Actions menu: • Download Only: Download the selected files. • Download and View: Download the selected files and then open them. The program used to open the files is platform-dependent based on the file extension. • View Only: Download the selected files to a temporary location and then open them. The program used to open the files is platform-dependent based on the file extension.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-21

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Actions: Download, View

View

Download

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-20. Actions: Download, View

Depending on the chosen action you can see your spool file in .pdf format or download it. You can choose both download and open i one operation. If you have a PDF reader installed on your workstation you can see in .pdf format if not you will see a .TXT format.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-22

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Preferences

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-21. Preferences

On the Printer Output window click the Edit menu and then Preferences. Use the Download Location option to set the location where the printer output files are downloaded. Download to desktop: Printer output will be downloaded to the user's desktop and placed in a folder named after the target system. Download to a temporary location: Printer output will be downloaded into a temporary subdirectory for the user. Download to the product's configuration root: A subdirectory named Splf will be created below the product's configuration root, and printer output will be downloaded there. The text area displays the path name of this directory. Specify a location: Printer output will be downloaded to the specified location. Regardless of the Download Location setting, printer output is stored in a subdirectory unique to the target system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-23

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

The “Use PDF format if available” option is used to determine whether printer output with a *SCS or *AFPDS device type should be converted to PDF format. If this option is enabled and the host supports PDF transformations, then the client file is stored in PDF format with the .pdf file extension. Otherwise, it is stored in plain text and stored with a .txt file extension. The host supports PDF transformations if the Transform Services product (option 1) is installed and functional.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-24

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Printer Output View menu

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-22. Printer Output View menu

On the Printer Output click the View menu you can see following items: Active Tasks Pane From the View menu, you can enable or disable the Active Tasks Pane. This pane will display the progress for printer output that is currently being downloaded. When the task is complete, the task is removed from this pane. Download Pane: From the View menu, you can enable or disable “Download Pane”. This will display an area labeled “Downloaded Files” that shows downloaded printer output. From this pane, you can drag and drop files to your local file system. On the download pane you can select downloaded files and use the Open or Delete button to manage files. Download Directory: From the View menu, choose Download Directory. This will launch your platform's file browser to the location of the downloaded files. For instance, on Windows operating systems, Windows Explorer will be launched. Set Filter You can customize the printer output based on user and output queue.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-25

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Options for filtering by User are: • Current user (*CURRENT): Printer output is displayed for the current user. • All users (*ALL): Printer output is displayed for all users. • Select user: Printer output is displayed for the selected user. Options for filtering by output queue are: • All output queues (*ALL): Printer output from all output queues are shown. • Select a specific output queue: Printer output is displayed for a specific output queue. The output queue must be specified in “LIBRARY/FILE” format.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-26

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Data Transfer

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-23. Data Transfer

Data Transfer provides an interface to help you transfer data between your client system and your IBM i. Data Transfer supports many common file formats, such as: • • • •

OpenDocument Spreadsheet (*.ods) Excel Workbook (*.xlsx) Excel 97-2003 Workbook (*.xls) CSV (Comma delimited) (*.csv)

Data Transfer from IBM i allows you to transfer data from a file on your IBM i to a file or active spreadsheet on your client workstation. To create a transfer request from the system, you must specify the following options: • System: The name of the IBM i from which you want to transfer your data. You can either select a configured system or type the name of the system in the text box. • File name (IBM i): Provides a space for you to enter the library, file, and optional member name of the file from which you are transferring your data. You can either browse to find the file on your IBM i, or type the name of the file. An example of a file name is mylib/myfile(mymember). To browse the contents of a library, either leave the File name field blank, or specify a library name followed by a slash character, for example: QIWS/. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-27

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

• Data Options: Clicking the Data Options button allows you to specify ways to select, group, and order the data you transfer from the IBM i. • Output Device: Allows you to specify what type of device your data is transferred to. You can select to transfer data to a file or directly to a window on your display. You can also transfer data to an active spreadsheet. When transferring data to a file or active spreadsheet, you can click the Details button to select more options for transferring the data. • Name: The name of the file on your workstation that will contain the data you want to retrieve from your IBM i. You can either browse to find the file on your workstation, or type the path and name of the file in the text box. This option is not available when using an active spreadsheet. • Format Options: Clicking the Format Options button allows you to specify how you want your data formatted. • Details: Clicking the Details button allows you to specify more detailed information about the transfer request. • Properties: Clicking the Properties button allows you to specify more information about how you want your data transferred. It includes options for conversions, connection information, and how to display IBM i object names. It also allows you to set the Library List to enable browsing for files in a set of libraries. When you are ready to transfer your data, click the Start Transfer button.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-28

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Preferences: General

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-24. Preferences: General

Use the Locale field to select the locale you want to use. The choices include all locales supported by the installed Java virtual machine (JVM). The language will be determined by the locale value. If the language is not available for that locale, English will be used. Locales that have an asterisk (that is, *) after them will use English as the language. Use the Logging level to control the types of events that are logged. Logging is used to store information about the state of your IBM i Access Client Solutions application. This logging information can be used by IBM Service to aid in problem determination. Log files are stored on your system in a location, which is shown in the Local Settings tab. When more detailed logging is enabled, more space is used in your file system. Therefore, detailed logging should only be used when directed by IBM Service. The logging levels are: FINEST FINE CONFIG INFO WARNING SEVERE OFF

Detailed tracing messages and the FINE level Basic tracing messages and the CONFIG level Messages about configuration and the INFO level Informational messages and the WARNING level Warning messages and the SEVERE level Serious failures Nothing will be logged

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-29

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

The License refresh interval field allows you to specify the number of minutes to hold an IBM i Access Family license after the license is no longer being used. Data Transfer and 5250 Emulator require this license. The license is available when the IBM i Access Family Licensed Product (57xx-XW1) is installed and configured on the IBM i. Obtaining a license requires logon credentials. Increasing the license refresh interval might decrease how often you are prompted for logon credentials, but will hold the license for a longer period of time. When using System Configurations to configure a new system, the Use SSL for connection option will be enabled by default when the Default communication to SSL box is checked. The Default communication to SSL box also determines whether or not to use SSL when connecting to a system that is not currently configured. Checking Default communication to SSl has no effect on System Configurations which already exist. Tool tip messages are available for some fields and are displayed when the cursor is over the field. You can disable this function by unchecking the Enable tool tip messages box. Information about each task on the main panel is available by either moving the cursor over the task or by using the tab and arrow keys to navigate between groups and tasks. You can disable this function by unchecking the Enable description panel box. Additional tab locations and other accessibility features are enabled when the Enable accessibility mode box is checked.

M

Mac OS

To enable accessibility features like screen readers, it is necessary to download and install the Java Access Bridge package from Oracle. By default, the product does not attempt to force or verify that secure connections are established in a FIPS-compliant manner. If the Client SSL must be FIPS-compliant box is checked, however, the product will attempt to verify that the current Java Runtime Environment (JRE) is configured to be FIPS-compliant for secure connections. FIPS compliance must be supported in the currently-running JRE in order for the application to run in a FIPS-compliant mode. When the Read netrc file for login information box is checked, the product will use the current user's netrc file for determining login information. This file is located in the user's home directory, and is named _netrc on Windows or .netrc on non-Windows operating systems. Reading of encrypted passwords from this file is not supported. The file format is assumed to follow the standard .netrc file format widely utilized by Linux users. Note that the use of a netrc file has potential security implications, and it is the responsibility of the user to ensure that the file's permissions do not allow other users to access the file.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-30

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Preferences: Local Settings

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-25. Preferences: Local Settings

The settings on this tab show the location where the configuration and service log information is kept. The Open button allows you to display the contents of that location. The Clear button will remove the files at that location. The Configuration Root is the root location of the configuration. There are several sub-directories below this directory where the configuration is stored. The Logs Directory is relative to the Configuration Root and is the location where the logs are stored when you enable logging. The Dumps Directory is relative to the Configuration Root and is the location where the service logs are stored when you use Tools > Generate Service Logs from the main menu. The Service Directory is relative to the Configuration Root and is the location where service information is stored when you use Tools > Package Service Logs from the main menu. The location of the Configuration Root defaults to a platform-specific path. To change the Configuration Root location, set the com.ibm.iaccess.AcsBaseDirectory property in the AcsConfig.properties file and restart IBM i Access Client Solutions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-31

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

If the path to the Configuration Root does not exist, IBM i Access Client Solutions will fail to start. If the configuration directories below the Configuration Root do not exist, they will automatically be created.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-32

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Preferences: Passwords

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-26. Preferences: Passwords

Change IBM i passwords provides an interface for changing your password on one or more IBM i systems. In order to change the password on multiple systems at once, the current system password must be the same. To change your password, select the system (or systems) and click the Change Password button. You will be prompted for the old (current) password and the new password, followed by information on whether or not the password change attempt was successful for each system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-33

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Preferences: Printer Output

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-27. Preferences: Printer Output

Use the Download Location option to set the location where the printer output files are downloaded. • Download to desktop: Printer output will be downloaded to the user's desktop and placed in a folder named after the target system. • Download to a temporary location: Printer output will be downloaded into a temporary subdirectory for the user. • Download to the product's configuration root: A subdirectory named Splf will be created below the product's configuration root, and printer output will be downloaded there. The text area displays the path name of this directory. • Specify a location: Printer output will be downloaded to the specified location. Regardless of the Download Location setting, printer output is stored in a subdirectory unique to the target system. The “Use PDF format if available” option is used to determine whether printer output with a *SCS or *AFPDS device type should be converted to PDF format. If this option is enabled and the host supports PDF transformations, then the client file is stored in PDF format with the .pdf file extension. Otherwise, it is stored in plain text and stored with a .txt file extension. The host supports PDF transformations if the Transform Services product (option 1) is installed and functional. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-34

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

HMC Probe Utility

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-28. HMC Probe Utility

The HMC Probe Utility allows you retrieve information about systems and partitions managed by the HMC console.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-35

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Exercise: Print output using IBM i Access Client Solutions

• At the end of the exercise, you should be able to:

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-29. Exercise: Print output using IBM i Access Client Solutions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-36

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Review questions 1. True or False: IBM i Access Client Solutions provides an option that allows you to see the output that is generated by another user. 2. Under which of the following is the Printer Output branch found? a. b. c. d.

General Database Users and Groups Management

3. Which of the following actions can be performed for a spoolfile from the printer output? a. b. c. d.

Download View Download and View All above

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-30. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-37

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Review answers 1. True or False: IBM i Access Client Solutions provides an option that allows you to see the output that is generated by another user. The answer is true.

2. Under which of the following is the Printer Output branch found? a. General b. Database c. Users and Groups d. Management The answer is General.

3. Which of the following actions can be performed for a spoolfile from the printer output? a. Download b. View c. Download and View d. All above The answer is All above.

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-31. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-38

V11.0 Unit 5. IBM i Access Client Solutions

Uempty

Unit summary

• Describe purpose IBM i Access Client Solutions • Describe available tasks IBM i Access Client Solutions

IBM i Access Client Solutions

© Copyright IBM Corporation 2001, 2016

Figure 5-32. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

5-39

V11.0 Unit 6. Security concepts and overview

Uempty

Unit 6. Security concepts and overview Estimated time 00:10

Overview Security on the IBM i platform is flexible enough to meet the requirements of a wide range of users and situations. You need to understand the features and options available to have a better understanding of what has been set up by your system administrator on your system. In this unit, we will cover the tools at your disposal to secure your system, control what users are allowed to do, and secure who can access the data and limit what they can do to that data. This unit will discuss the concepts, while the following units will cover the specific details.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-1

V11.0 Unit 6. Security concepts and overview

Uempty

Unit objectives

• • • •

List and discuss the objectives of system security Describe what physical security entails Discuss what keylock security means List and describe the capabilities of the system tools available to secure your system

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-2

V11.0 Unit 6. Security concepts and overview

Uempty

The objectives of system security

• Confidentiality: ƒ Protecting against disclosing information to unauthorized people ƒ Restricting access to confidential information ƒ Protecting against curious system users and outsiders

• Integrity: ƒ Protecting against unauthorized changes to data ƒ Restricting manipulation of data to authorized programs ƒ Providing assurance that data is trustworthy

• Availability: ƒ Preventing accidental changes or destruction of data ƒ Protecting against attempts by outsiders to abuse or destroy system resources

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-2. The objectives of system security

System security is often associated with external threats, such as hackers or business rivals. However, protection against system accidents by authorized system users is often the greatest benefit of a well-designed security system. In a system without good security features, pressing the wrong key might result in deleting important information. System security can prevent this type of accident. The best security system functions cannot produce good results without good planning. Security that is set up in small pieces, without planning, can be confusing. It is difficult to maintain and to audit. Planning does not imply designing the security for every file, program, and device in advance. It does imply establishing an overall approach to security on the system and communicating that approach to application designers, programmers, and system users.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-3

V11.0 Unit 6. Security concepts and overview

Uempty

Physical security Computer Room

System

Ke ep Ou t

Display Stations Backup Tapes

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-3. Physical security

Physical security includes protecting the system unit, system devices, and backup media from accidental or deliberate damage. Most measures you take to ensure the physical security of your system are external to the system. All new Power Systems models do not have keylock however you can order keylock rack tower to prevent server access. In all current available Power System, you can use keylock position using Virtual Control Panel, Key position for server/partition on the HMC session, or physical on the Power System Control Panel to setup work running mode (Normal/Manual). You cannot secure server or partition changed key position.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-4

V11.0 Unit 6. Security concepts and overview

Uempty

Monitoring physical security

• If the computer is behind a door locked that uses an entry code, ensure • • • •

that the code is changed regularly. Restrict physical access to save and restore devices, such as tape units and optical units. Ensure backup media is protected from damage and theft. Restrict access to publicly located workstations and the console. Restrict remote access to the 5250 console or HMC/IVM/ASMI.

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-4. Monitoring physical security

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-5

V11.0 Unit 6. Security concepts and overview

Uempty

System tools used to secure your system

• • • • • • •

Security level System values User profiles Groups profiles Object (Resource) security Authorization lists Adopted authority

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-5. System tools used to secure your system

Security level There are five levels of security that can be set with the QSECURITY system value. System values Allow you to define system wide security settings and allow you to provide customization for many characteristics of your System i. Signing Signing your software object is particularly important if the object has been transmitted across the Internet or stored on media which you feel might have been modified. The digital signature can be used to detect if the object has been altered. Digital signatures, and their use for verification of software integrity, can be managed according to your security policies using the Verify Object Restore (QVFYOBJRST) system value, the Check Object Integrity (CHKOBJITG) command, and the Digital Certificate Manager tool. Additionally, you can choose to sign your own programs (all licensed programs shipped with the system are signed).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-6

V11.0 Unit 6. Security concepts and overview

Uempty

Single sign-on enablement Single sign-on is an authentication process in which a user can access more than one system by entering a single user ID and password. To enable a single sign-on environment, IBM® provides two technologies that work together to enable users to sign in with their workstation user name and password and be authenticated to System i platforms in the network. Network Authentication Service (NAS) and Enterprise Identity Mapping (EIM) are the two technologies that an administrator must configure to enable a single sign-on environment. To authenticate users to the network the Kerberos protocol is used. A secure, centralized system, called a key distribution center, authenticates principals (Kerberos users) to the network. User profiles The user profile is powerful and flexible tool used to control what the user can do and customize the way the system appears to that user. Groups profiles A group profile is a special type of user profile. Rather than giving authority to each user individually, you can use a group profile to define authority for a group of users. Resource security The ability to access an object is called authority. Resource security on the IBM i operating system enables you to control object authorities by defining who can use which objects and how those objects can be used. You can specify detailed authorities, such as adding records or changing records. Or you can use the system-defined subsets of authorities: *ALL, *CHANGE, *USE, and *EXCLUDE. Files, programs, and libraries are the most common objects requiring security protection, but you can specify authority for any object on the system. Security audit journal You can use security audit journals to audit the effectiveness of security on your system. The IBM i operating system provides the ability to log selected security-related events in a security audit journal. Several system values, user profile values, and object values control which events are logged.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-7

V11.0 Unit 6. Security concepts and overview

Uempty

Security is always active Signon: Mary

Menu

Payroll

Authority

Authority

menu

PAYEDIT Authority program

Payroll data

Security concepts and overview

Operational Read Execute

© Copyright IBM Corporation 2001, 2016

Figure 6-6. Security is always active

On the System i security has been architected from the ground up. Security is always available and active. Based on what level of security you choose to configure and implement will determine how secure your system will be.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-8

V11.0 Unit 6. Security concepts and overview

Uempty

Review questions (1 of 2) 1. True or False: The objectives of security are confidentiality, integrity, and availability. 2. Physical security includes which of the following? a. b. c. d.

Controlling access to the CPU Securing the tapes used for backup Securing the printers connected to your system All of the above

3. Which of the following is not one of the modes you can select for your system? a. b. c. d. e.

Manual Normal Automatic Secure Lockdown

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-7. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-9

V11.0 Unit 6. Security concepts and overview

Uempty

Review answers (1 of 2) 1. True or False: The objectives of security are confidentiality, integrity, and availability. The answer is true.

2. Physical security includes which of the following? a. Controlling access to the CPU b. Securing the tapes used for backup c. Securing the printers connected to your system d. All of the above The answer is all of the above.

3. Which of the following is not one of the modes you can select for your system? a. Manual b. Normal c. Automatic d. Secure e. Lockdown The answers are manual and normal. Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-8. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-10

V11.0 Unit 6. Security concepts and overview

Uempty

Review questions (1 of 2) 4. True or False: It is not possible to disable the power button on your system. 5. True or False: Security is always active on the System i.

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-9. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-11

V11.0 Unit 6. Security concepts and overview

Uempty

Review answers (1 of 2) 4. True or False: It is not possible to disable the Power button on your system. The answer is true.

5. True or False: Security is always active on the System i. The answer is true.

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-10. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-12

V11.0 Unit 6. Security concepts and overview

Uempty

Unit summary

• • • •

List and discuss the objectives of system security Describe what physical security entails Discuss what keylock security means List and describe the capabilities of the system tools available to secure your system

Security concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 6-11. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

6-13

V11.0 Unit 7. System values

Uempty

Unit 7. System values Estimated time 00:20

Overview There are three components used to implement security on this system. The operating system continually checks system values, user profiles, and an object's resource security as it receives requests from users to determine whether that user will be allowed to access the object in question. In this unit, we will discuss system values and how you use these to customize many characteristics of your system. Security is an integral part of the operating system. It is not an add-on or extra purchase feature of an application.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-1

V11.0 Unit 7. System values

Uempty

Unit objectives

• List and explain the levels of security available • Describe the capability in service tools to lock out users from changing • • • •

system values Define the different categories of system values available Explain how to use security policies to set system values List the commands used to set system values when using a 5250 emulation session List the steps used in System i Navigator to manipulate system values

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-2

V11.0 Unit 7. System values

Uempty

Security components

People (Users)

Objects (Resources)

User Profiles

Individual Objects

Job Descriptions

Library/Directory

Group Profiles

Authorization Lists

System

System values

Values

© Copyright IBM Corporation 2001, 2016

Figure 7-2. Security components

There are three components used to implement security on this system. The operating system continually checks system values, user profiles, and objects as it receives requests from users to determine whether that user will be allowed to access the object in question. In this unit, we will discuss System values and how you use these to customize many characteristics of your system. Security is an integral part of the operating system. It is not an add-on or extra purchase feature of an application.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-3

V11.0 Unit 7. System values

Uempty

Topic 1: Security level system value

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-3. Topic 1: Security level system value

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-4

V11.0 Unit 7. System values

Uempty

QSECURITY system value: Security level

Level 50

Enhanced integrity

Level 40

System integrity

Level 30

Resource

Level 20

Password

Recommended value = Level 40

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-4. QSECURITY system value: Security level

You can choose how much security you want the system to enforce by setting the security level (QSECURITY) system value. If you want to change the security level, use the Work with System Values (WRKSYSVAL) command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-5

V11.0 Unit 7. System values

Uempty

Security level 40 Level 50

Enhanced Integrity

Level 40

System Integrity

Level 30

Resource

Level 20

Password

• Prevents use of unsupported interfaces • Prevents use of restricted instructions • Controls use of job descriptions on SBMJOB • Prevents signon without a user ID and password • Enhanced hardware storage protection • Default for QSECURITY system value System values

© Copyright IBM Corporation 2001, 2016

Figure 7-5. Security level 40

Level 40 is referred to as system integrity security. At this level, the system itself is protected against users. User-written programs cannot directly access the internal control blocks through pointer manipulation. Select System Security Level by using IBM Navigator for i panels. • Accessing objects through unsupported interfaces. Example: Calling the command processing program for the SIGNOFF command • Accessing internal system structures with C/400, Pascal or Assembler • Controls use of job descriptions on SBMJOB • Does not allow *SBSD to allow sign on without entering User and Password • Enables enhanced hardware storage protection, defining system information on disk as read/write, read only, or no access Level 20-30: Usually action allowed but logged to QAUDJRN journal. Level 40-50: Usually action fails, and is logged to QAUDJRN journal.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-6

V11.0 Unit 7. System values

Uempty

The comparison of the functions supported by the different levels of security

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-6. The comparison of the functions supported by the different levels of security

On the visual you can compare functions supported depending on chose security level.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-7

V11.0 Unit 7. System values

Uempty

Locking system values using service tools

• Steps to lock/unlock using STRSST: 1. 2. 3. 4. 5.

Sign on to an emulation session. Enter the STRSST command. Type your service tools user ID and password. Select option 7 = Work with system security. Select option 1 to lock or option 2 to unlock.

• Steps to lock/unlock using DST: 1. 2. 3. 4. 5.

IPL system in attended mode. Select option 3 = Use Dedicated Service Tools from the IPL or Install system display. Sign on to DST with your service tools user ID and password. Select option 13 = Work with system security. Select option 2 to lock or option 1 to unlock.

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-7. Locking system values using service tools

You can use system service tools (SST) or dedicated service tools (DST) to lock and unlock the security-related system values. However, you must use DST if you are in recovery mode because SST is not available during this mode. Otherwise, use SST to lock or unlock the security-related system values. You can restrict the following system values by using the lock option: QALWJOBITP QRETSVRSEC QPWDLVL QMAXSGNACN QCRTOBJAUD QAUDENACN QSCANFSCTL QPWDRQDDGT QPWDEXPWRN QFRCCVNRST QAUTOCFG QVFYOBJRST

QAUTORMT QALWOBJRST QRMTSIGN QPWDMAXLEN QMAXSIGN QDEVRCYACN QAUDFRCLVL QSECURITY QPWDRQDDIF QPWDLMTAJC QINACTMSGQ

QLMTDEVSSN QAUTOVRT QALWUSRDMN QRMTSRVATR QPWDMINLEN QPWDCHGBLK QDSPSGNINF QAUDLVL QSHRMEMCTL QPWDRULES QPWDLMTCHR

QPWDLMTREP QLMTSECOFR QCRTAUT QAUDCTL QSCANFS QPWDPOSDIF QPWDEXPITV QDSCJOBITV QAUDLVL2 QUSEADPAUT QPWDVLDPGM

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-8

V11.0 Unit 7. System values

Uempty

Topic 2: Configure security using 5250 emulation

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-8. Topic 2: Configure security using 5250 emulation

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-9

V11.0 Unit 7. System values

Uempty

Individual system values

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-9. Individual system values

You can change system values working with individual system value name.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-10

V11.0 Unit 7. System values

Uempty

System value categories

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-10. System value categories

To work with system value you can also use the system value category like *SEC for security system value.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-11

V11.0 Unit 7. System values

Uempty

Allocation category

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-11. Allocation category

On this visual is example to work with allocation category system value. Note you can also type name of the system value in the Position to field to allocate specified value.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-12

V11.0 Unit 7. System values

Uempty

Topic 3: Configure security using IBM Navigator for i

© Copyright IBM Corporation 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

Figure 7-12. Topic 3: Configure security using IBM Navigator for i

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-13

V11.0 Unit 7. System values

Uempty

Configuration and Service: System Values

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-13. Configuration and Service: System Values

Changes to the majority of the system values will take effect immediately. An IPL is required only when changing the security level (QSECURITY) system value or the password level (QPWDLVL) system value. To work with system value using IBM Navigator for i you have to: 1. Log on to the system using http://:2001. 2. On the left pane, expand IBM i Management (default is expanded). 3. Expand Configuration and Service. 4. Click System Value.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-14

V11.0 Unit 7. System values

Uempty

Security category

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-14. Security category

The steps to follow when using IBM Navigator for i are: 1. Expand the Configuration and Service branch on the function tree. 2. Click the System Values sub branch to see the categories displayed on the right pane. 3. Right-click Security category in the right pane and chose Properties to see the panel displayed in the lower right corner on the visual. 4. Select the level of security that is to be implemented then click OK. 5. IPL the system for this change to take effect.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-15

V11.0 Unit 7. System values

Uempty

Date and Time category

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-15. Date and Time category

1. Expand the Configuration and Service branch on the function tree. 2. Click the System Values sub branch to see the categories displayed on the right pane. 3. Right-click Date and Time category in the right pane and chose Properties. Use the Date tab to specify the current date for your system. The Date tab also specifies a leap year adjustment that ensures that the system date is correct when a leap year occurs. System date - The system supports dates that range from August 24, 1928 to July 6, 2053. To change only the year, highlight the year and click the up or down arrow. To change only the month, highlight the month and click the up or down arrow. System value - QDAYOFWEEK, QDATE, QDAY, QMONTH, and QYEAR. Special considerations: The system date is automatically updated when the time reaches midnight, 12:00:00 AM.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-16

V11.0 Unit 7. System values

Uempty

Leap year adjustment - Adjusts the system calendar for the leap year in different calendar systems. If your calendar year agrees with the Gregorian calendar system, select Use Gregorian leap year adjustment. If your calendar year differs from the Gregorian, adjust the system calendar to account for the leap year of the calendar year you are using. To make the adjustment, divide the leap year in your calendar system by 4; then set Leap year adjustment to the value of the remainder. For example, the Gregorian calendar year of 1984 was the year 73 in the Republic of China. Because 73 was a leap year, you divide 73 by 4; this leaves a remainder of 1. Therefore, to adjust the system calendar for the Republic of China, specify 1 for Leap year adjustment. System value: QLEAPADJ. Special considerations: Changing the leap year system value does not change the system clock and job dates of active jobs, but it might change the date system value. The QTIMADJ system value identifies the software used to adjust the system clock in order to keep it synchronized with an external time source. This value should be maintained by the time adjustment software and is intended as an aid to prevent multiple time adjustment applications from conflicting with one another. Time adjustment specifies whether a time maintenance application is specified to maintain the system time and whether or not there is a time adjustment in progress. The time adjustment might initiate from the time maintenance application or you can manually start a time adjustment. Adjusting does not cause large jumps in time that can be experienced with setting the clock with the Time of Day system value. Adjusting takes time to complete because it is not a single, instantaneous change to the clock. For example, adjusting the clock by 1 second could take 10 seconds of real time to complete. Two hours forward or backward is the maximum amount of adjustment that can be made. System value: QTIMZON A time zone specifies how to set your system time. You can specify a time zone for each system in your business environment. The time zone setting specifies the offset from UTC and whether to observe Daylight Saving Time (DST) or not. If you specify to observe Daylight Saving Time, the system automatically updates the system time when Daylight Saving Time begins and ends. You do not need to manually set the system time when Daylight Saving Time begins and ends.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-17

V11.0 Unit 7. System values

Uempty

Change Password

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-16. Change Password

The password-composition system values are enforced only when the password is changed using the CHGPWD command, the change password in IBM Navigator for i, the ASSIST menu option to change a password, or the QSYCHGPW application programming interface (API). They are not enforced when the password is set using the CRTUSRPRF or CHGUSRPRF command. To change password from IBM Navigator for i interface use: 1. On the left pane, click the System on the function tree. 2. On the main pane, click Change Password you can here change your password or password of another user if you have rights to do that.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-18

V11.0 Unit 7. System values

Uempty

Password rules for changing password Password validation program N

Pass rules

Message

Y

QPWDVLDPGM

N

Y Validation program

Message

PGM detects error?

N Password changed

Y System values

© Copyright IBM Corporation 2001, 2016

Figure 7-17. Password rules for changing password

If *REGFAC or a program name is specified in the QPWDVLDPGM system value, the system runs one, or more programs after the new password has passed any validation tests you specify in the password-control system values. You can use the programs to do additional checking of user-assigned passwords before they are accepted by the system. The topic “Using a Password Approval Program” in the book System i Security Reference discusses the requirements of the password approval program and shows an example.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-19

V11.0 Unit 7. System values

Uempty

Review questions 1. True or False: In order to implement security on your system, you must install additional security software on your system. 2. True or False: It is possible to lock out users from changing system values. 3. True or False: One of the components available to implement security on your system is System Values. 4. True or False: Only a security officer can change system values. 5. True or False: The default security level shipped on the system is Level 50. System values

© Copyright IBM Corporation 2001, 2016

Figure 7-18. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-20

V11.0 Unit 7. System values

Uempty

Review answers 1. True or False: In order to implement security on your system, you must install additional security software on your system. The answer is False. 2. True or False: It is possible to lock out users from changing system values. The answer is True. 3. True or False: One of the components available to implement security on your system is System Values. The answer is True. 4. True or False: Only a security officer can change system values. The answer is False. 5. True or False: The default security level shipped on the system is Level 50. The answer is False. System values

© Copyright IBM Corporation 2001, 2016

Figure 7-19. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-21

V11.0 Unit 7. System values

Uempty

Unit summary

• List and explain the levels of security available • Describe the capability in service tools to lock out users from changing • • • •

system values Define the different categories of system values available Explain how to use security policies to set system values List the commands used to set system values when using a 5250 emulation session List the steps used in System i Navigator to manipulate system values

System values

© Copyright IBM Corporation 2001, 2016

Figure 7-20. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

7-22

V11.0 Unit 8. User security

Uempty

Unit 8. User security Estimated time 00:40

Overview There are three components used to implement security on the system. The operating system continually checks system values, user profiles, and an object's resource security as it receives requests from users to determine whether that user will be allowed to access the object in question. In this unit, we will discuss user security. We will look at how to use user profiles to customize the capabilities that a user will have once they are signed on to the system.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-1

V11.0 Unit 8. User security

Uempty

Unit objectives

• • • •

Explain the purpose served by user profiles List the steps to create a user profile Explain the purpose served by group profiles List the steps to create a group profile

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-2

V11.0 Unit 8. User security

Uempty

Security components

People (Users)

Objects (Resources)

User Profiles

Individual Objects

Job Descriptions

Library/Directory

Group Profiles

Authorization Lists

System

User security

Values

© Copyright IBM Corporation 2001, 2016

Figure 8-2. Security components

There are three components used to implement security on this system. The operating system continually checks system values, user profiles, and objects as it receives requests from users to determine whether that user will be allowed to access the object in question. In this unit we will discuss User and Group Profiles and how you use these to customize the capabilities and what authority users will have once they are signed on to the system. We will also look at the capabilities provided by management central in relation to working with users on the system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-3

V11.0 Unit 8. User security

Uempty

Topic 1: User profiles

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-3. Topic 1: User profiles

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-4

V11.0 Unit 8. User security

Uempty

Roles served by user profiles

• A user profile has several roles on the system: ƒ ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Controls how the user signs on the system Controls what the user is allowed to do after signing on Establishes how the user’s actions are audited Is designed to customize the system and adapt it to the user Is used to identify the user’s jobs and printer output Contains information about the objects owned by the user Contains information about private authorities to objects Is a management and recovery tool

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-4. Roles served by user profiles

A user profile has several roles on the system: • It contains security-related information that controls how the user signs on the system, what the user is allowed to do after signing on, and how the user’s actions are audited. • It contains information that is designed to customize the system and adapt it to the user. • It is a management and recovery tool for the operating system. The user profile contains information about the objects owned by the user and all the private authorities to objects. • The user profile name identifies the user’s jobs and printer output.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-5

V11.0 Unit 8. User security

Uempty

User profile

User profile Tells the system who you are

User information Password Password expiration level Initial menu/program User class Special authority

List of objects owned

Object authorizations

Static

User information

Dynamic

List of owned objects List of object authorizations

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-5. User profile

The user profile contains a list of objects owned by the user profile, a list of objects which the user profile does not own but is otherwise authorized to access, and information about the user: current library, initial program, initial menu, special authorities, user class, group profile, maximum storage, and much more. Every object on the system must have an owner. If an object does not have an owner, it might not be used, and the RCLSTG command is typically executed in order to assign it to QDFTOWN. Do not assign all (or nearly all) objects to only one owner profile. Profiles that own many objects with many private authorities can become very large. To prevent impacts to either performance or system operations, distribute ownership of objects to multiple profiles. Avoid applications owned by IBM-supplied user profiles, such as QSECOFR or QPGMR. These profiles can become difficult to manage because they own a large number of IBM-supplied objects.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-6

V11.0 Unit 8. User security

Uempty

Appendix B: Default values for user profiles

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-6. Appendix B: Default values for user profiles

Refer to the table listed in Appendix B of the System I Security Reference manual, SC41-5302-10. This table shows the default values that are used for all IBM-supplied user profiles and on the Create User Profile (CRTUSRPRF) command. The parameters are sequenced in the order they appear on the Create User Profile display.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-7

V11.0 Unit 8. User security

Uempty

New User 5250 interface

GUI interface

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-7. New User

Creating a new user profile is a function that can be done from an emulation screen or using IBM Navigator for i. When using an emulation session, you can directly key in the command CRTUSRPRF or you can use option 1=Create of off the WRKUSRPRF screen. With IBM Navigator for i 1. On the left pane click Users and Groups. 2. On the main pane click Create User.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-8

V11.0 Unit 8. User security

Uempty

Create a new user 5250 interface

GUI interface

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-8. Create a new user

Specify required parameters Password - Specifies the password for the user. The rules that determine whether a password is valid are specified on the Password System Values dialog (expand Configuration and Service to see System Values). No password - No password (sign-on not allowed). If you specify no password for this user, the user cannot sign on. The user is still functioning and programs or other users can access its resources. For example, some IBM-supplied profiles and group profiles. Enable user for processing - Specifies whether the user is enabled or disabled. A user that is disabled cannot sign on to the system. For IBM Navigator for I you have to use Capabilities link to enter additional parameters.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-9

V11.0 Unit 8. User security

Uempty

New User: Capabilities > Privileges

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-9. New User: Capabilities > Privileges

Based on their privilege class, users can be given privileges that allow certain actions on system resources. The Capabilities Privileges dialog specifies the privileges for a user or for a group (and the members of the group). System privileges Specifies the system privileges for this user or group. Privileges are required to perform certain functions on the system. When you are working with a group, the privileges specified apply to all users who are members of the group.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-10

V11.0 Unit 8. User security

Uempty

System privileges

• • • • • • • •

All object access (*ALLOBJ) Auditing control (*AUDIT) Job control (*JOBCTL) Save/restore (*SAVSYS) Security administration (*SECADM) Spool control (*SPLCTL) System configuration (*IOSYSCFG) System service access (*SERVICE)

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-10. System privileges

All object access - (*ALLOBJ) The user can access any system resource whether or not the user has private authority. Auditing Control - (*AUDIT) The user has authority to perform auditing functions. This authority is granted to users who turn auditing on or off for the system and control the level of auditing on an object or user. Job control - (*JOBCTL) The user has authority to change, display, hold, release, cancel, and clear all jobs running on the system or on a job queue or output queue that is operator controlled. The user also has the authority to start writers, and to stop active subsystems. This authority is usually granted to users who operate the system. Save/restore - (*SAVSYS) The user has authority to save, restore, and free storage for all objects on the system, whether or not the user has authority to the object. This authority is usually granted to users who operate the system. Security administration - (*SECADM) The user can create, change, or delete user profiles, if authorized to those commands and the user profiles. Spool control - (*SPLCTL) The user can perform all spool functions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-11

V11.0 Unit 8. User security

Uempty

System configuration - (*IOSYSCFG) The user has authority to change system I/O configurations. System service access - (*SERVICE) The user can perform service functions. The system security level determines what the default special privileges are for each user.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-12

V11.0 Unit 8. User security

Uempty

Privilege classes System Privileges

Privilege Classes Security officer

Security administrator

System operator

Programmer

User

All object access

X

20

20

20

20

Auditing control

X

Job control

X

20

X

20

Save/restore

X

20

X

20

Security administration

X

X

Spool control

X

System configuration

X

System service access

X

User security

20

© Copyright IBM Corporation 2001, 2016

Figure 8-11. Privilege classes

The table shows the privilege classes available on the system. Each class has a default set of system privileges. The authorities specified under System privileges override the default privileges for this user or group. When you are working with a group, the privileges specified apply to all users who are members of the group. Choices are: • User - The user's default privileges are save/restore and all object access for security levels 10 and 20. The user does not get any privileges at other security levels. • Programmer - The user's default privileges are save/restore, job control, and all object access for security levels 10 and 20. The user does not get any privileges at other security levels. • System operator - The user's default privileges are save/restore, job control, and all object access for security levels 10 and 20. The user's default privileges are save/restore and job control at other security levels. • Security administrator - The user's default privileges are save/restore, job control, security administration, and all object access for security levels 10 and 20. The user's special authority is security administration at other security levels.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-13

V11.0 Unit 8. User security

Uempty

• Security officer - The user's default privileges are all object access, save/restore, auditing control, security administration, system configuration, system service access, job control, and spool control.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-14

V11.0 Unit 8. User security

Uempty

Capabilities: Applications

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-12. Capabilities: Applications

Using the Applications page you can identify which functions a user or group can access. Where the access is derived from is also displayed. Access for allows you to select one of the following categories of applications: • IBM Navigator for i - Includes IBM Navigator for i and any plug-in extensions. • Client Applications - Includes all client applications that provide functions on clients that can be administered through Application Administration. • Host Applications - Includes all applications that reside entirely on the System i and provide functions that can be administered through Application Administration. You can customize access for a user or group to a specific function. Where the access is derived from is also displayed. Access to the functions is restricted as follows: • Default Access: Determines whether the user has Default Access to the functions when the user or group is not explicitly allowed or denied access. • All Object Access: Defines whether a user or group with All Object System privilege is allowed access to the function.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-15

V11.0 Unit 8. User security

Uempty

• Customized Access: Users with security administration privilege can explicitly allow or deny access of users or groups to specific functions. There is a set of commands that can be called from a 5250 emulation session. The Work with Function Usage (WRKFCNUSG) command shows a list of function identifiers and allows you to change or display specified functions. There is also a CHGFCHUSG and DSPFCNUSG command available.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-16

V11.0 Unit 8. User security

Uempty

Capabilities: Password and Unique Identifier

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-13. Capabilities: Password and Unique Identifier

Requiring users to change their passwords after a specified length of time reduces the risk of an unauthorized person accessing the system. The Capabilities – Password dialog specifies the change interval used for the user’s password. The number of days the user’s password is valid can be specified in the system value. Also, the number of days can be specified explicitly or the user’s password can never expire. Password Specifies that the password uses the specified system value. The QPWDEXPITV (password expiration) system value controls the number of days a password is valid. How to manage the password: Manage this password locally When you select this option, the password can be managed on the local system. This is the recommended setting. This field corresponds to the local password management (LCLPWDMGT) parameter of the CRTUSRPRF and CHGUSRPRF commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-17

V11.0 Unit 8. User security

Uempty

Manage this password remotely When you select this option the password will not be managed on the local system. Specifying this value will cause the local i5/OS password to be set to *NONE. The password value specified in the password parameter will be sent to other IBM products and options that do password synchronization (for example, Integrated Server support). The user will not be able to change their own password using the Change Password (CHGPWD) command. They will not be able to sign on to the system directly. Time limit for password changes: Specifies the value for blocking password changes once the password has been successfully changed. As specified by system value The system value is used to determine this field QPWDCHGBLK specifies that the password uses the specified system value. The QPWDCHGBLK (Block password changes) system value controls the password blocking. None Specifies that no password blocking exists for this user. Hours after last change (1-99) The number of hours until a password is allowed to be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-18

V11.0 Unit 8. User security

Uempty

Capabilities: UID

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-14. Capabilities: UID

Unique Identifier The system uses the user identification (UID) number to identify a user and to verify the user's authority. For most installations, the best approach is to let the system choose a unique number for the new user's UID. However, if your system is part of a network, you might need to assign UID numbers to match those assigned on other systems in the network. When moving files across systems, or managing users across systems, it is very important that the UID is preserved across systems for a specific user. • Set the UID to a specific number - If your system is part of a network, you might need to assign a specific UID number to match those assigned on other systems in the network. If you specify a UID number, use a number from 1 to 4,294,967,294. • Let each System i choose a unique number - For best results, let each system generate these numbers. This option is available only when you are creating a new user. • Find a unique number across all selected systems - If you are adding a new user to an endpoint system or to multiple systems

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-19

V11.0 Unit 8. User security

Uempty

New User: Jobs > General

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-15. New User: Jobs > General

Each piece of work in a system is called a job, and each job has a unique name. Jobs can have values that determine how they are run on the system. These values can be specified for a user on the Jobs - General dialog. Current Library - The current library is searched before the libraries in the user portion of the library list for any objects specified as *LIBL. If the user creates objects and specifies *CURLIB, the objects are put in the current library. Job Description - When a user signs on, the system looks at the workstation entry in the subsystem description to determine what job description to use for the interactive job. If the workstation entry specifies *USRPRF for the job description, the job description in the user profile is used. Home directory - Lists the path name of the home directory for this user. The home directory is the user's initial working directory. If the home directory doesn't exist when the user signs on, the root directory is used. If you specify a directory path name, use up to 2048 characters.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-20

V11.0 Unit 8. User security

Uempty

Jobs > Session Startup

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-16. Jobs > Session Startup

Initial program Lists the qualified name of the program called when a user signs on the system. If you are changing this field, you can specify a program name or you can specify that no program runs initially. If you specify a program name, use up to 10 characters. You can also specify library where the program is. Initial menu Lists the qualified name of the menu displayed when the user signs on the system. If you are changing this field, you can specify the main menu, or you can type the name of another menu to be shown when the user signs on. You can also specify Sign off to sign the user off the system after the initial program has run. If you specify a menu name, use up to 10 characters. You can also specify library where the menu exists. Display sign-on information Indicates whether the sign-on information shows when the user signs on the system. If you are changing this field, you can specify the system value, to display sign-on information, or to not display it. Sign-on information includes date of last sign-on, sign-on attempts that were not valid, and number of days before the user’s password expires if the password is due to be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-21

V11.0 Unit 8. User security

Uempty

Number of device sessions a user can have Indicates the number of device sessions a user can have. As specified by system value Specifies that the password uses the specified system value. The QLMTDEVSSN (Limit Device Sessions) system value controls the number of device sessions. No limit There is no limit specified for the number of device sessions. Device sessions (1-9) The number of device sessions that a user can have.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-22

V11.0 Unit 8. User security

Uempty

Jobs > Display Session

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-17. Jobs > Display Session

Attention Program - The Attention-key-handling program (ATNPGM) is the program that is called when the user presses the Attention (ATTN) key during an interactive job. Limit initial program/menu capability - Lists the limits the user has over the initial program, initial menu, current library, and the ATTN key handling program values while signed on to an I Series session. This value is ignored when the security level is 10. If you are changing this field, you can specify no limit, partial limit, or full limiting of the user's capabilities where the user cannot change the program, menu, or current library. If specific commands are limited, users cannot run them from the command line. In PC-Based applications, setting a user profile to LMTCPB(*YES) does not prevent the user from running an System i command via IBM Navigator for i or Rational Development Studio for i. Assistance level - The QASTLVL system value is used to determine the assistance level. Keyboard buffering - The QKBDBUF system value is used. User options - Lists the level of detail the user sees and the default function of the Page Up and Page Down keys when the user is signed on the system. The possible values are: • Show parameter keywords - Parameter keywords are shown instead of the possible parameter values when a command is displayed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-23

V11.0 Unit 8. User security

Uempty

• Show all details - Detailed information is shown when the user is doing display and edit options. • Change direction of rollkey - The actions of the Page Up and Page Down keys are reversed. • Do not show status messages - The user sees no status messages. • Show status messages - The user sees status messages. • Display help on full screen - Help information is shown on full screen. • Send message to spool file owner - A message is sent to this user's message queue when a spooled file for this user is printed or held by the printer writer. The owner of the spool file receives a message.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-24

V11.0 Unit 8. User security

Uempty

Display Session: Limit capabilities The Display Session tab allows you to limit user's capability to change their initial program, menu, current library, and attention program and prohibit them from running most System i commands. Limit initial program/menu capabilities

Initial Program

Initial Menu

Current Library

Attention Program

Execute Commands

Do not limit

Yes

Yes

Yes

Yes

Yes

Limit some capabilities

No

Yes

No

No

Yes

Limit capabilities

No

No

No

No

No

Users can still run commands created or changed with parameter ALWLMTCPB(*YES).

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-18. Display Session: Limit capabilities

The ALWLMTUSR parameter on commands and Limit Capabilities and Limit some capabilities do not restrict a user from doing the following: • Running commands in CL programs that are running a command as a result of taking an option from a menu • Running remote commands through applications, such as FTP The commands allowed by default are: DSPMSG, DSPJOB, DSPJOBLOG, and STRPCO, SIGNOFF, and SNDMSG.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-25

V11.0 Unit 8. User security

Uempty

Jobs > Output and International

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-19. Jobs > Output and International

You can specify the printer used to print the output for this user. Spooled files are placed in an output queue with the same name as the printer when the output queue (OUTQ) is specified as the print device (*DEV). The print device and output queue information from the user profile are used only if the printer file specifies *JOB and the job description specifies *USRPRF. You can specify the name of a message queue for a user. A message queue is an object on which messages are placed when they are sent to a person or a program. A message queue is used when a user sends or receives messages. If the message queue does not exist, it is created when the profile is created or changed. The message queue is owned by the profile being created or changed. You can specify the language identifier, country, or region identifier to be used by the system for the user.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-26

V11.0 Unit 8. User security

Uempty

New User: Groups > Group Information

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-20. New User: Groups > Group Information

Specifying a group profile name makes the user a member of the group profile. The group profile can provide the user with authority to use objects for which the user does not have specific authority. You can specify up to 16 additional groups for the user. If the user is a member of a group, you use the owner parameter in the user profile to specify who owns any new objects created by the user. Objects can be owned either by the user or by the user’s first group (the value of the GRPPRF parameter). You can specify the OWNER field only if you have specified the Group profile field. If the user profile is a member of a group and OWNER(*USRPRF) is specified, the Group authority field controls what authority is given to the group profile for any objects created by this user. Possible values for GRPAUT: • *ALL - The group profile is given all management and data authorities to any new objects the user creates • *CHANGE - The group profile is given the authority to change any objects the user creates • *USE - The group profile is given authority to view any objects the user creates

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-27

V11.0 Unit 8. User security

Uempty

• *EXCLUDE - The group profile is specifically denied access to any new objects created by the user When a user creates a new object, the Group authority type parameter in the user’s profile determines what type of authority the user’s group receives to the new GRPAUT parameters to determine the group’s authority to a new object. Possible values for GRPAUTTYP: • *Private - The authority defined in the GRPAUT parameter is assigned to the group profile as a private authority • *PGP - The group profile defined in the GRPPRF parameter is the primary group for the newly created object. The primary group authority for the object is the authority specified in the GRPAUT parameter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-28

V11.0 Unit 8. User security

Uempty

New User: Personal > Name, Location, and Mail

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-21. New User: Personal > Name, Location, and Mail

Name - More detail about user personality information Location - phone numbers, department address, building and so on. MAIL Mail Service Level - Specifies the type of mailbox for the System i to use to store the user's mail. The Mail service level value matches the type of email application that the user has. The possible values are: • User index • System mailbox • Lotus Domino The System i places all mail for the user in the mailbox type that you specify, regardless of the source of the mail or the type of address that the sender Specifies on the incoming mail. Preferred address type - Specifies how System i should format the address on incoming mail for this user. The possible choices are: • User ID and Address - uses this addressing scheme for distributing mail. • SMTP name - Used in an email or Internet network. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-29

V11.0 Unit 8. User security

Uempty

Addresses - The Personal Mail dialog shows one or more addresses the System i uses to locate the user when email arrives. The appearance of the following fields is dependent on the Preferred address type and the System i configurations. The possible values are: • User ID - For mail users with a System i user profile, the user ID is the user profile name. • Address - Identifies the user. The address usually matches the name of the System i where the user receives mail. • System name - Identifies the System i where the user receives mail • SMTP name - Specifies the user name for email in an SMTP network, including the Internet. The system inserts the user profile name if the user is not in the System i distribution directory. The SMTP name can be a value other than the user profile name. The SMTP name can be up to 64 characters with no blank spaces between characters. • Domain - Identifies the user's location within an SMTP network.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-30

V11.0 Unit 8. User security

Uempty

Appendix B: IBM-supplied user profiles

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-22. Appendix B: IBM-supplied user profiles

The tables listed in Appendix B of the System I Security reference manual (SC41-5302-10) list each IBM-supplied profile, its purpose, and any values for the profile that are different from the defaults for IBM-supplied user profiles. This is the first of multiple tables that are listed in appendix B. Note: IBM-supplied user profiles now include additional user profiles that are shipped with the licensed program products. The table includes only some, but not all user profiles for licensed program products; therefore, the list is not inclusive. Attention: • Password for the QSECOFR profile You must change the password for the QSECOFR profile after you install your system. This password is the same for every System i product and poses a security exposure until it is changed. However, Do not change any other values for IBM-supplied user profiles. Changing these profiles can cause system functions to fail. • Authorities for IBM-supplied profiles Use caution when removing authorities that IBM-supplied profiles have for objects that are shipped with the operating system. Some IBM-supplied profiles are granted private authorities to objects that are shipped with the operating system. Removing any of these authorities can cause system functions to fail.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-31

V11.0 Unit 8. User security

Uempty

User functions

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-23. User functions

In the user list you can select the user and right-click to see available function for your user. On the left pane click Users and Groups. On the main pane click Users. Select user and right-click to see pop-up menu and available functions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-32

V11.0 Unit 8. User security

Uempty

Changing a user profile

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-24. Changing a user profile

You can change a user profile using option 2 (Change) from either the Work with User Profiles display or the Work with User Enrollment display. You can also use the Change User Profile (CHGUSRPRF) command. On the left pane click Users and Groups. On the main pane click Users. Select user and right-click to see pop-up menu and from menu select Properties.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-33

V11.0 Unit 8. User security

Uempty

Deleting a user profile

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-25. Deleting a user profile

You cannot delete a user profile that owns objects. You must first delete any objects owned by the profile or transfer ownership of those objects to another profile. You cannot delete a user profile if it is the primary group for any objects. When you delete a user profile, the user is removed from all distribution lists and from the system directory. Scan for owned objects: List the objects in the system owned by this user. The output from this is quite interesting as it includes objects you know about as well as internal work objects the system uses for this user while the user is active.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-34

V11.0 Unit 8. User security

Uempty

Exercise: Create a user profile

• At the end of the exercise, you should be able to: ƒ Use IBM Navigator for i to create a user profile

Systems to be used for class: Name

Teach system

TCP/IP Address

__________ __________

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-26. Exercise: Create a user profile

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-35

V11.0 Unit 8. User security

Uempty

Topic 2: Group profiles

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-27. Topic 2: Group profiles

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-36

V11.0 Unit 8. User security

Uempty

Roles served by group profiles

• Security tool: ƒ Provides a method for organizing authorities and sharing them among users ƒ Used to define object or special authorities for group profiles rather than for each individual user profile ƒ A user can be a member of up to 16 group profiles

• Customizing tool: ƒ ƒ ƒ ƒ

A group profile can be used as a pattern for creating individual user profiles You create group profiles in the same way that you create individual profiles The system recognizes a group profile when you add the first member to it The system also generates a group identification number (GID) for the profile

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-28. Roles served by group profiles

A group profile is a special type of user profile that provides the same authority to a group of users. A group profile serves two purposes on the system: • Security tool - A group profile provides a method for organizing authorities on your system and sharing them among users. You can define object authorities or special authorities for group profiles rather than for each individual user profile. A user can be a member of up to 16 group profiles. • Customizing tool - A group profile can be used as a pattern for creating individual user profiles. Most people who are part of the same group have the same customizing needs, such as the initial menu and the default printer. You can define these things in the group profile and then copy the group profile to create individual user profiles. You create group profiles in the same way that you create individual profiles. The system recognizes a group profile when you add the first member to it. At that point, the system sets information in the profile indicating that it is a group profile. The system also generates a group identification number (GID) for the profile. You can also designate a profile as a group profile at the time when you create it by specifying a value in the GID parameter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-37

V11.0 Unit 8. User security

Uempty

More facts about group profiles

• Allows users with similar jobs to share permissions without having to share the same password

• Should choose a naming convention which makes groups easily recognizable

• Create with No password (signon not allowed) • Should assign groups in order of use • Permissions are additive at the group level

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-29. More facts about group profiles

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-38

V11.0 Unit 8. User security

Uempty

New Group

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-30. New Group

To create new group: 1. On the left pane click Users and Group. 2. On the main pane click Create Group. You can create new user group based on the existing group, or create new one not base on any.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-39

V11.0 Unit 8. User security

Uempty

New Group > Capabilities

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-31. New Group > Capabilities

You can add existing users to the list. Additionally you can define privileges.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-40

V11.0 Unit 8. User security

Uempty

New Group > Networks

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-32. New Group > Networks

The user identification (UID) and group identification (GID) numbers identify the group to the system. For best results, let each system choose a unique number for the UID and GID of the new group. However, if your system is part of a network, you might need to assign specific UID and GID numbers to match those assigned on other systems in the network. When moving files across systems or managing users across systems, it is very important that the unique identifiers are preserved across systems for a specific group.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-41

V11.0 Unit 8. User security

Uempty

Group functions

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-33. Group functions

To work with available group functions: 1. On the left pane click Users and Groups. 2. On the main pane click Groups. 3. Right-click the group name and on the pop-up menu you can see available functions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-42

V11.0 Unit 8. User security

Uempty

Deleting a group

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-34. Deleting a group

When deleting a group, you have to determine what to do if the group is the primary group of objects. Primary group authority gives a group profile permission to an object. This permission is stored with the object. Groups that have system names (typically ones that start with Q like QSECOFR) cannot be deleted. Groups that have user members cannot be deleted. Groups can be deleted if all owned objects and primary group objects are successfully transferred to the specified group. Groups can be changed if a new group name is specified to identify where to transfer ownership of the owned objects. Action to take if group is primary group of objects Some objects have a form of authority known as primary group authority stored with the object. You can select one of the following actions to take if the group you are deleting is the primary group of any i5/OS objects: • Do not delete group You choose not to delete this group if it is the primary group of objects.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-43

V11.0 Unit 8. User security

Uempty

• Remove primary group from objects The group will be removed as the primary group for objects and deleted from the system. • Change primary group The group will be deleted from the system and you will select a different group as the primary group for objects that had this group as the primary group. Action to take if group owns objects Specifies the action to take if the group you are deleting owns objects. Possible choices are: • Do not delete Select this to cancel the group delete action if the group owns objects. • Delete objects that group owns Select this to delete the objects that the group owns when the group is deleted. • Transfer objects to another user Select this to transfer ownership of objects to a different user. The objects are transferred to the new user regardless of that user's current authority to the objects. Scan for Owned Objects... Click Scan for Owned Objects to scan the selected system for objects that the selected users or groups own.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-44

V11.0 Unit 8. User security

Uempty

Review questions (1 of 2) 1. True or False: User profiles are one of the security components available to implement security on the system. 2. Which of the following is not specified in a user profile? a. b. c. d.

Password User classification Security level defined on the system List of owned object

3. The (blank) special authority allows a user access to all system resources. a. b. c. d.

*ALLOBJ *JOBCTL *SPLCTL *SECADM

4. True or False: A user profile can be used to specify an initial program to be called when the user signs on to the system. User security

© Copyright IBM Corporation 2001, 2016

Figure 8-35. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-45

V11.0 Unit 8. User security

Uempty

Review answers (1 of 2) 1.

True or False: User profiles are one of the security components available to implement security on the system. The answer is true.

2.

Which of the following is not specified in a user profile? a. Password b. User classification c. Security level defined on the system d. List of owned object The answer is security level defined on the system.

3.

The *ALLOBJ special authority allows a user access to all system resources. a. *ALLOBJ b. *JOBCTL c. *SPLCTL d. *SECADM The answer is *ALLOBJ.

4.

True or False: A user profile can be used to specify an initial program to be called when the user signs on to the system. The answer is true.

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-36. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-46

V11.0 Unit 8. User security

Uempty

Review questions (2 of 2) 5. By specifying (blank), you can keep a user from changing which menu and which library they will sign on to from the sign-on screen. a. Do not limit capabilities b. Limit some capabilities c. Limit capabilities

6. True or False: Ideally, group profiles should be created with a password of *NONE because you should not sign on to the system using this group ID. 7. The maximum number of group profiles that a user can belong to is? a. b. c. d.

16 32 64 *NOLIMIT

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-37. Review questions (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-47

V11.0 Unit 8. User security

Uempty

Review answers (2 of 2) 5. By specifying limit some capabilities, you can keep a user from changing which menu and which library they will sign on to from the sign-on screen. a. Do not limit capabilities b. Limit some capabilities c. Limit capabilities The answer is limit some capabilities.

6. True or False: Ideally, group profiles should be created with a password of *NONE because you should not sign on to the system using this group ID. The answer is true.

7. The maximum number of group profiles that a user can belong to is? a. 16 b. 32 c. 64 d. *NOLIMIT The answer is 16.

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-38. Review answers (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-48

V11.0 Unit 8. User security

Uempty

Unit summary

• • • •

Explain the purpose served by user profiles List the steps to create a user profile Explain the purpose served by group profiles List the steps to create a group profile

User security

© Copyright IBM Corporation 2001, 2016

Figure 8-39. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

8-49

V11.0 Unit 9. Resource security

Uempty

Unit 9. Resource security Estimated time 00:30

Overview There are three components used to implement security on this system. The operation system continually checks system values, user profiles, and an object's resource security as it receives requests from users to determine whether that user will be allowed to access the object in question. In this unit, we will discuss resource security and how you can customize what actions a user can perform against the data once an object is accessed.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-1

V11.0 Unit 9. Resource security

Uempty

Unit objectives

• • • • •

Describe what resource security is and how it is implemented Explain how ownership of an object is established Explain the purpose served by the QDFTOWN user profile Explain how public authority is assigned to an object Explain the difference between object management authority and data authority that can be assigned to an object • Describe the search order used by the system to determine whether a user is allowed to access an object • Explain what means RCAC means and how to implement it

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-2

V11.0 Unit 9. Resource security

Uempty

Security components

People (Users)

Objects (Resources)

User Profiles

Individual Objects

Job Descriptions

Library/Directory

Group Profiles

Authorization Lists

System

Values

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-2. Security components

In this unit you can learn more about resource security.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-3

V11.0 Unit 9. Resource security

Uempty

Topic 1: Resource security concepts

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-3. Topic 1: Resource security concepts

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-4

V11.0 Unit 9. Resource security

Uempty

User-owned objects

• • • •

Each object has one owner. The user who creates an object is assigned as the owner. The owner initially has all object and data permission. The authority can be removed, but the owner can grant any authority back to themself at any time. • The ownership of an object can be transferred to another user. • It is not possible to delete a user who owns objects. Two solutions are offered: ƒ Transfer ownership ƒ Delete owned objects

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-4. User-owned objects

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-5

V11.0 Unit 9. Resource security

Uempty

Primary group authority

• Stored in the object header: Good for performance • Only one primary group authority per object, unlike real private authorities where there can be many per object

• Object owner cannot be primary group for object • When assigning a primary group: ƒ Object created by profile with GRPAUTTYP(*PGP) ƒ Use WRKOBJPGP or CHGOBJPGP to specify primary group object ƒ Use CHGPGP for objects in the integrated file system

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-5. Primary group authority

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-6

V11.0 Unit 9. Resource security

Uempty

QDFTOWN

• QDFTOWN is an IBM-supplied user profile used when: ƒ An object has no owner. ƒ The object ownership might pose security exposure.

• The object ownership is assigned to QDFTOWN in the following cases: ƒ The owning profile becomes damaged and is deleted. The RCLSTG command assigns ownership of objects to QDFTOWN. ƒ An object is restored and the owner profile does not exist. ƒ A program that needs to be created again is restored, but program creation is not successful. ƒ The maximum storage limit is exceeded for the user profile that owns an authority holder that has same name as file being moved, renamed, or whose library is being renamed.

• Consider the following recommendations: ƒ QDFTOWN should not normally own objects. ƒ Ownership can be transferred with the WRKOBJOWN command or by IBM Navigator for i. Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-6. QDFTOWN

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-7

V11.0 Unit 9. Resource security

Uempty

Where object permissions come from To access or use an object, you must have the appropriate authority. • This authority can come from: ƒ ƒ ƒ ƒ ƒ ƒ

All object access (*ALLOBJ) special authority A private or explicit authority to the object Authorization list Primary group authority Public authority (*PUBLIC) Adopted authority

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-7. Where object permissions come from

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-8

V11.0 Unit 9. Resource security

Uempty

Where *PUBLIC authority comes from Defined by the AUT parameter on the CRTxxx command. It defaults to *LIBCRTAUT.

System values QCRTAUT: *CHANGE Library

PAYLIB

CRTAUT: *SYSVAL

Output queue

MYQUEUE

AUT(*LIBCRTAUT)

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-8. Where *PUBLIC authority comes from

Every library has a parameter called CRTAUT (create authority). This parameter determines the default public authority for any new object that is created in that library. When you create an object, the AUT parameter on the create command determines the public authority for the object. If the AUT value on the create command is *LIBCRTAUT, which is the default, the public authority for the object is set to the CRTAUT value for the library. The QCRTAUT system value is used to determine the public authority for a newly created object if the following conditions are met: • The create authority (CRTAUT) for the library of the new object is set to *SYSVAL. • The new object is created with public authority (AUT) of *LIBCRTAUT. The default value for the QCRTAUT system value is *CHANGE. This can introduce a higher authority level to new objects than actually needed. However, prior to V5R3, when changing this system value to *USE or *EXCLUDE caused problems for some objects, such as automatically created device descriptions. The default value for the AUT parameter has changed from *LIBCRTAUT to *CHANGE on several CRT commands for line, controller and device description.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-9

V11.0 Unit 9. Resource security

Uempty

Object management authority (1 of 2) Private and public permissions consist of one or more of the following: Specific object authorities

Object management

Operational Management Existence Alter Reference

Look at the next visual

Authorization list

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-9. Object management authority (1 of 2)

On the visual you can see object management permissions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-10

V11.0 Unit 9. Resource security

Uempty

Object management authority (2 of 2) Definition

Permission Operational (*OBJOPR)

Look at the description of an object and use the object as determined by the data authorities the user has. To open a file, the user must have *OBJOPR.

Management (*OBJMGT)

Authorize users to the object, move, or rename the object, and add members to database files. All functions defined for *OBJALTER and *OBJREF.

Existence (*OBJEXIST)

Change ownership and delete the object, free storage for the object, and perform save and restore operations for the object.

Alter (*OBJALTER)

Add, clear, initialize, and reorganize members of database files, alter, and add attributes of database files, add and remove triggers, and change attributes of SQL packages.

Reference (*OBJREF)

Specify database file as the parent in a referential constraint.

Authorization List (*AUTLMGT)

Add and remove users and their authorities from an authorization list.

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-10. Object management authority (2 of 2)

On the table you can learn what means each permission.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-11

V11.0 Unit 9. Resource security

Uempty

Object data authority (1 of 2) Private and public permissions consist of one or more of the following: Specific object authorities

Object management

Data authority

Operational

Read

Management

Add

Existence

Update

Alter

Delete

Reference

Execute

Look at the next visual

Authorization list

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-11. Object data authority (1 of 2)

On the visual you can see data authority.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-12

V11.0 Unit 9. Resource security

Uempty

Object data authority (2 of 2) Definition

Permission Read (*READ)

Display the contents of an object, such as viewing the records in a file.

Add (*ADD)

Add entries to an object, such as adding messages to a message queue or records to a file.

Update (*UPD)

Change entries in an object, such as changing records in a file.

Delete (*DLT)

Remove entries from an object, such as removing messages from a message queue or deleting records from a file.

Execute (*EXECUTE)

Run a program or search a library or directory.

Exclude (*EXCLUDE)

Object access prevented.

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-12. Object data authority (2 of 2)

On the table you can learn what means each data authority.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-13

V11.0 Unit 9. Resource security

Uempty

Object exclude authority Private and public permissions consist of one or more of the following: Specific object authorities

Exclude Object management

Data authority

Operational

Read

Management

Add

Existence

Update

Alter

Delete

Reference

Execute

Authorization list

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-13. Object exclude authority

Exclude: The user cannot access the object.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-14

V11.0 Unit 9. Resource security

Uempty

Commonly used permissions

Object control Operation

All

X

Change Use

Management

Existence

X

X

Data authority Alter

X

Reference

Read

Add

Update

Delete

X

X

X

X

X

X

X

X

X

X

X

X

X

Execute

X

X

Exclude

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-14. Commonly used permissions

On the table you can compare Object control and Data authority depending on permission.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-15

V11.0 Unit 9. Resource security

Uempty

Integrated file system authority

• • • • • • • •

*RWX: Object operational authority and all the data authorities *RX: Object operational authority, read, and execute *RW: Object operational authority, read, add, update, and delete *WX: Object operational authority, add, update, delete, and execute *R: Object operational authority and read *W: Object operational authority, add, update, and delete *X: Object operational authority and execute *EXCLUDE: Prevents access to object

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-15. Integrated file system authority

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-16

V11.0 Unit 9. Resource security

Uempty

Building authority checking

User profile

*ALLOBJ special authority?

Yes

No

User specific Yes authority? No

Allow access to object Yes

Adequate authority?

*PUBLIC

No

Reject access to object

Public authority

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-16. Building authority checking

On the diagram you can follow of the authority checking.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-17

V11.0 Unit 9. Resource security

Uempty

Topic 2: Defining resource security

© Copyright IBM Corporation 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

Figure 9-17. Topic 2: Defining resource security

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-18

V11.0 Unit 9. Resource security

Uempty

Object permission: QSYS.LIB file system

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-18. Object permission: QSYS.LIB file system

To work with object permission using GUI you have to: 1. On the left pane, expand Integrated File Systems. 2. Expand QSYS.LIB. 3. Click the library name where the objects are. 4. On the main pane, right-click the object name and from pop-up menu chose Permissions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-19

V11.0 Unit 9. Resource security

Uempty

Basic and Details permission displays Basic = Commonly used permissions

Details = Object and data permission

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-19. Basic and Details permission displays

You can see objects permission in Basic view or Details view. To change view, you have to click the arrow and chose view type and click Go.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-20

V11.0 Unit 9. Resource security

Uempty

Permission: Add / Remove

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-20. Permission: Add / Remove

If you want to add another user or group permission to the object you have to click Add button and then specify or select from the list. Confirm with OK.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-21

V11.0 Unit 9. Resource security

Uempty

Permission: Customize

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-21. Permission: Customize

Use the Customize button to customize the permissions for the selected user or group.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-22

V11.0 Unit 9. Resource security

Uempty

Permission: Authorization List

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-22. Permission: Authorization List

On the Authorization List dialog, you can select the authorization list that is used to secure the object. This window is shown when the Authorization List button is selected from the Permissions window. Object: Specifies the path name of the object secured by the authorization list. Type: Specifies the type of the object secured by the authorization list. Authorization list: Select an authorization list from the menu. Click Browse to open the Authorization list dialog and view details about the authorization list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-23

V11.0 Unit 9. Resource security

Uempty

Change owner: Change primary group

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-23. Change owner: Change primary group

Use the Primary Group dialog to select a new primary group for the object. Only one group can be selected. The groups can be expanded so you can see which users are in the group, but a user might not be selected. This window is shown when the Primary Group button is selected from the Permissions window or the Edit window. Note Using a primary group gives you better performance. A new primary group is assigned the authority of the old primary group.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-24

V11.0 Unit 9. Resource security

Uempty

Topic 3: Column-level authority

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-24. Topic 3: Column-level authority

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-25

V11.0 Unit 9. Resource security

Uempty

Column-level security GRANT UPDATE (CDTLMT) ON QCUSTCDT TO AS27

CUSNUM

LSTNAM

CDTLMT

938472

HENNING

5000

397267

TYRON

1000

693829

THOMAS

9999

AS27 group: Needs Update access

Resource security

AS2701: No Update access

© Copyright IBM Corporation 2001, 2016

Figure 9-25. Column-level security

Column-level security allows you better protect your data by more granular level.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-26

V11.0 Unit 9. Resource security

Uempty

Granting column-level permission MANAGER: Suppose AS27 group already has specific *USE authority to QCUSTCDT Grant AS27 group update authority to CDTLMT:

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-26. Granting column-level permission

To grant authority to column you have to on Permissions window click arrow next to the Authority view field and select Columns and press Go. After this you will see rights to the table columns.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-27

V11.0 Unit 9. Resource security

Uempty

Column-level security considerations

• Column-level security enforcement primarily occurs during the update operation on the file

• No new enforcement during open of the file • Column-level authorities are stored in the database file object and managed by DB2 for i

• Object authorities are stored in the user profile and managed by the system security manager

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-27. Column-level security considerations

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-28

V11.0 Unit 9. Resource security

Uempty

Security - Separation of duties Before 7.2

• Problem: Anyone who has the authority to grant privileges also has the authority to perform operations that require those privileges. Should the security administrator be able to access the data within tables? IBM i 7.2 with RCAC

• Enable the management of security, without exposing the data to be read or modified. • A user with security administration function usage (QIBM_DB_SECADM) will be able to grant or revoke privileges on any object to anyone, even if they do not have the SELECT privilege.

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-28. Security - Separation of duties

RCAC limits data access to those users who have a business “need to know”. RCAC makes it easy to set up a rich and robust security policy that is based on roles and responsibilities. RCAC functionality is made available through the optional, no charge feature called “IBM Advanced Data Security for i”, also known as option 47 of IBM i 7.2. In DB2 for i, RCAC is implemented using two different approaches that address the shortcomings of traditional control methods and mechanisms: • Row permissions • Column masks Another benefit of RCAC is that no database user is automatically exempt from the control. Users with *ALLOBJ authority can no longer freely access all of the data in the database unless they have the appropriate permission to do so. The ability to manage row permissions and column masks rests with the database security administrator. The RCAC definitions, enablement, and activation are controlled by SQL statements. Row permissions and column masks require virtually no application changes. RCAC is based on specific rules that are transparent to existing applications and SQL interfaces. Enforcement of your security policy does not depend on how applications or tools access the data. RCAC also facilitates multi-tenancy, which means that several independent customers or business units can share a single database table without being aware of one another. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-29

V11.0 Unit 9. Resource security

Uempty

The RCAC row permission ensures that each user sees only the rows they are entitled to view because the enforcement is handled by DB2 and not the application logic.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-30

V11.0 Unit 9. Resource security

Uempty

What is RCAC?

• Additional layer of data security available with DB2

IBM Advanced Data Security for i (Boss option 47) No Charge

• Complementary to table level security

• Subsetting access to only the required data for a task

• Controls access to a table at the row, column, or both

• Two sets of rules ƒ Permissions for rows ƒ Masks for columns

• IBM Advanced Data Security for i ƒ No-charge feature - Option 47 Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-29. What is RCAC?

RCAC is an additional layer of security and is complimentary to table level authorizations already in DB2 LUW. RCAC will work in conjunction with authorizations already in place. RCAC does have the ability to protect at the table row level, table column level, or both, providing a masking of result sets to the users based on the protection in place. This is done by using rules which are created and we will discuss this further in this presentation. The image on the slide simply shows at a high, non-specific level, that the SSN column is masked out (it is in green) and that a number of rows are not returned (in red) based on a row permission defined.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-31

V11.0 Unit 9. Resource security

Uempty

IBM Advanced Data Security for i (Boss Option 47)

• Option must be installed to use: ƒ CREATE PERMISSION and CREATE MASK (RCAC) ƒ Open a file that has RCAC activated

• RCAC constructs exist within the table (*FILE) and get applied by SQE • RCAC does not replace object authorization requirements ƒ If you pass the object authorization check: í í

Row permissions reduce the set of rows returned Column Masks limit full or partial access to sensitive column data

• RCAC is comprehensive and applies to any interface (Native DB, SQL, RPG, APIs, and so on) • Row Permissions are a replacement technology for Views / Logical Files • Only users with QIBM_DB_SECADM authority can manage RCAC

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-30. IBM Advanced Data Security for i (Boss Option 47)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-32

V11.0 Unit 9. Resource security

Uempty

Row permissions - 5250 interface

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-31. Row permissions - 5250 interface

A row permission is a database object that manifests a row access control rule for a specific table. It is essentially a search condition that describes which rows you can access. For example, a manager can see only the rows that represent their employees. To create row permission, you have to use SQL statement. Bellow is example how to create permissions. CREATE PERMISSION HR_SCHEMA.PERMISSION1_ON_EMPLOYEES ON HR_SCHEMA.EMPLOYEES AS EMPLOYEES FOR ROWS WHERE ( VERIFY_GROUP_FOR_USER ( SESSION_USER , 'HR' ) = 1 ) OR ( VERIFY_GROUP_FOR_USER ( SESSION_USER , 'MGR' ) = 1 AND ( EMPLOYEES . MANAGER_OF_EMPLOYEE = SESSION_USER OR EMPLOYEES . USER_ID = SESSION_USER ) ) OR ( VERIFY_GROUP_FOR_USER ( SESSION_USER , 'EMP' ) = 1 AND EMPLOYEES . USER_ID = SESSION_USER ) ENFORCED FOR ALL ACCESS ENABLE ;

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-33

V11.0 Unit 9. Resource security

Uempty

Row permissions - IBM Navigator for i

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-32. Row permissions - IBM Navigator for i

You can also create Row permissions using IBM Navigator for i to that you have to: 1. On the left pane expand Database. 2. Expand Databases (normally system name is the database name but can be different especially if you have IASP. 3. Expand Schemas. 4. Click your schema (library). 5. On the main pane right-click the Row Permissions link and from pop-up menu select New > New Permissions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-34

V11.0 Unit 9. Resource security

Uempty

Column Mask

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-33. Column Mask

A column mask is a database object that manifests a column value access control rule for a specific column in a specific table. It uses a CASE expression that describes what you see when you access the column. For example, a teller can see only the last 4 digits of a tax identification number. On the visual is an example of the mask creation.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-35

V11.0 Unit 9. Resource security

Uempty

Column Mask - IBM Navigator for i

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-34. Column Mask - IBM Navigator for i

You can also create column masking using IBM Navigator for i to that you have to: 1. On the left pane expand Database. 2. Expand Databases (normally system name is the database name but can be different especially if you have IASP. 3. Expand Schemas. 4. Click your schema (library). 5. On the main pane right-click the Column Masks link and from pop-up menu select New > Column Mask.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-36

V11.0 Unit 9. Resource security

Uempty

Exercise: Resource security and group profiles

• At the end of the exercise, you should be able to: ƒ Grant a user profile permission to an object ƒ Add a user as a member of a group profile

Systems to be used for class: Name

Teach system

TCP/IP Address

__________ __________

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-35. Exercise: Resource security and group profiles

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-37

V11.0 Unit 9. Resource security

Uempty

Review questions 1. True or False: An object can be owned by multiple users on the system. 2. True or False: The name of the primary group and its authority to the object are stored in the object header. 3. When an object does not have an owner specified, it gets assigned to the (blank) user profile. a. *USER b. *SECOFR c. *SYSOPR d. QDFTOWN

4. True or False: The QCRTAUT system value is used to determine the public authority for a newly created object. 5. True or False: Read, Add, and Update are authorities that can be specified to the object management authority for a specific object. Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-36. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-38

V11.0 Unit 9. Resource security

Uempty

Review answers 1.

True or False: An object can be owned by multiple users on the system. The answer is false.

2.

True or False: The name of the primary group and its authority to the object are stored in the object header. The answer is true.

3.

When an object does not have an owner specified, it gets assigned to the QDFTOWN user profile. a. *USER b. *SECOFR c. *SYSOPR d. QDFTOWN The answer is QDFTOWN.

4.

True or False: The QCRTAUT system value is used to determine the public authority for a newly created object. The answer is true.

5.

True or False: Read, Add, and Update are authorities that can be specified to the object management authority for a specific object. The answer is false.

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-37. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-39

V11.0 Unit 9. Resource security

Uempty

Unit summary

• • • • •

Describe what resource security is and how it is implemented Explain how ownership of an object is established Explain the purpose served by the QDFTOWN user profile Explain how public authority is assigned to an object Explain the difference between object management authority and data authority that can be assigned to an object • Describe the search order used by the system to determine whether a user is allowed to access an object • Explain what means RCAC means and how to implement it

Resource security

© Copyright IBM Corporation 2001, 2016

Figure 9-38. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

9-40

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Unit 10. Authorization lists and adopted authority Estimated time 00:25

Overview Authorization lists provide another way to secure an object. In this unit, we will discuss authorization list concepts. We will look at how these are created and how to specify which list is used to secure an object. We will also compare and contrast the function provided by user groups versus authorization lists. Then we will take a look at how you can temporarily assign security for an object. We will discuss how adopted authority works and the steps to implement it.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-1

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Unit objectives

• Explain the purpose served by an authorization list • List the steps to secure an object with an authorization list • Describe the search order used by the system to determine whether a user is allowed to access an object

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-2

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Topic 1: Authorization lists

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-2. Topic 1: Authorization lists

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-3

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

What is an authorization list?

That's easy! Use an authorization list!

Authorization lists and adopted authority

I need to give the same set of authorities for multiple objects.

© Copyright IBM Corporation 2001, 2016

Figure 10-3. What is an authorization list?

Purpose of the authorization list is give same set of authorities for multiple objects.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-4

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Authorization list

Name: Owner:

AUTL1 USER3

LIBA

LFILEB

User Authority: *PUBLIC

Exclude

USER1

Use

USER2

Change

USER4

All

USER5

Change

PFILEC

PROGD

*PUBLIC is on all authorization lists Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-4. Authorization list

On the visual you can see example of the authorization list. Note that each user can have different rights. *PUBLIC is always in each list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-5

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Create an authorization list

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-5. Create an authorization list

You can create authorization list using 5250 by CRTAUTL or you can use IBM Navigator for i with following steps: 1. On the left pane, expand Security. 2. Click Authorization Lists. 3. On the main pane click Actions and from the pop-up menu select New > Authorization List.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-6

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Authorization list permissions

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-6. Authorization list permissions

You can change permission to authorization list in 5250 interface using WRKAUTL and use option 2 Change or you can use IBM Navigator for i: 1. On the left pane expand Security. 2. Click Authorization Lists. 3. On the main pane right-click the authorization list name and from pop-up list click Permissions. 4. On the list you can use Add button to add new use or group to the list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-7

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Object secured by an authorization list

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-7. Object secured by an authorization list

You can see object secured by the list by clicking the Secured Objects link.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-8

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Securing an object with an authorization list

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-8. Securing an object with an authorization list

Perform the following to work with object secured by authorization list using IBM Navigator for i: 1. On the left pane expand Integrated File Systems. 2. Expand QSYS.LIB. 3. On the left pane click your library name. 4. On the main pane find the object and right-click the name. From pop-up menu select Permissions. 5. Then click the Authorization List link to see object secured by the list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-9

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Authorization list considerations

• • • • •

Cannot use to specify authority to a user profile Cannot use to specify authority to an authorization list An object can be secured by only one authorization list Deleting an object does not affect the list that secured it User's list authority applies to all objects secured by that list

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-9. Authorization list considerations

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-10

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Authorization list versus group profile BILL

Use

WAYNE

All

FINDEPT/FILE3 LIB23 DSP05

GUNNARUse FRANK

Change Objects

Authorization List

BILL

GROUP

WAYNE GUNNAR FRANK

Use All Change

FINDEPT/FILE3 LIB23 DSP05 Objects

Group Profile Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-10. Authorization list versus group profile

Compare the differences between authorization lists and group profiles.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-11

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Groups and AUTLs compared Authorization lists

Groups

Can secure multiple objects

Can secure multiple objects

A user can be on multiple lists

A user can be a member of up to 16 groups as a maximum

Users can have different authority

All users in a group have the same authority

Same authority for different objects using same list

Different authority for different objects

An object can be secured by only one An object can be authorized to many authorization list groups

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-11. Groups and AUTLs compared

Now you can compare authorization list and group profile attributes.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-12

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Building authority checking *ALLOBJ special authority?

Yes

No

User profile

User specific authorities?

Yes

No Authorization list? See note.

Yes

No *ALLOBJ special authority?

Yes

Allow access to object

No

Group profile

Group specific authority?

Adequate authority?

No Authorization list? See note.

*PUBLIC

*AUTL

No

Reject access to object

Yes

No Public specific authorities?

Yes

Yes

Yes

Note: Is the object secured by an authorization list and is the user or group on the list?

Public authority on authorization list Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-12. Building authority checking

The diagram shows the authority checking process.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-13

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Exercise: Authorization lists

• At the end of the exercise, you should be able to: ƒ Secure an object with an authorization list ƒ Display the list of users on an authorization list

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-13. Exercise: Authorization lists

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-14

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Topic 2: Adopted authority

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-14. Topic 2: Adopted authority

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-15

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Adopted authority (1 of 2) Everything you have shown me deals with PERMANENT grants of authority. I would like to give a user TEMPORARY access to several objects, without a lot of grants and revokes. What can I do?

Authorization lists and adopted authority

You need to use ADOPTED AUTHORITY.

© Copyright IBM Corporation 2001, 2016

Figure 10-15. Adopted authority (1 of 2)

Adopting authority is a way to temporary access to the objects.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-16

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Adopted authority (2 of 2)

• • • •

Provides a way to temporarily grant a user authority Adopted authority is added to the user's authority Both object authorities and special authorities are adopted Authority is in effect as long as the program that originally adopts is still in the stack • Propagating authority down the call stack is dangerous, especially when adopting a powerful profile, such as QSECOFR • Provides the ability to restrict direct object access but allow access using applications

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-16. Adopted authority (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-17

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Authority checking *ALLOBJ special authority?

Yes

No

User profile

User specific authorities?

Yes

No Authorization list? See note.

Yes

No *ALLOBJ special authority?

Yes

Allow access to object

No

Group profile

Group specific authority?

Yes

No Authorization list? See note.

*PUBLIC

*AUTL Public authority on authorization list

Authorization lists and adopted authority

Yes adopt No Reject access No Program No and adequate authority?

to object

Yes

No Public specific authorities?

Adequate authority?

Yes

Yes

Note: Is the object secured by an authorization list and is the user or group on the list? © Copyright IBM Corporation 2001, 2016

Figure 10-17. Authority checking

As you can see in this completed diagram, program adopted authority is the final step in authority checking. Adopted authority can allow a user temporary access to objects that otherwise the user is not authorized to access. This visual displays the completed diagram for authority checking with IBM i. Follow the logic cycle through for the class.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-18

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Exercise: Adopted authority

• At the end of the exercise, you should be able to: ƒ Change a program to use adopted authority

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-18. Exercise: Adopted authority

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-19

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Review questions 1. The very first thing that a system checks when determining whether a user is allowed to access an object is: a. b. c. d.

Group authority Authorization list Private authorities All object access

2. The maximum number of authorization lists that a user can be specified in is: a. b. c. d.

16 32 64 No maximum

3. (Blank) authority is an authority that can be assigned to an object temporarily. a. b. c. d.

User Object Resource Adopted

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-19. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-20

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Review answers 1. The very first thing that a system checks when determining whether a user is allowed to access an object is: a. Group authority b. Authorization list c. Private authorities d. All object access The answer is All object access.

2. The maximum number of authorization lists that a user can be specified in is: a. 16 b. 32 c. 64 d. No maximum The answer is No maximum.

3. Adopted authority is an authority that can be assigned to an object temporarily. a. User b. Object c. Resource d. Adopted The answer is Adopted. Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-20. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-21

V11.0 Unit 10. Authorization lists and adopted authority

Uempty

Unit summary

• Explain the purpose served by an authorization list • List the steps to secure an object with an authorization list • Describe the search order used by the system to determine whether a user is allowed to access an object

Authorization lists and adopted authority

© Copyright IBM Corporation 2001, 2016

Figure 10-21. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

10-22

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Unit 11. Work management: Concepts and overview Estimated time 00:15

Overview Work management is the basis for all work handled in IBM i. To control and tune the performance of a system, you must understand how jobs are processed. This unit covers the concepts of work management on IBM i.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-1

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Unit objectives

• List the checklist of things to consider that relate to performance • List the IBM i functional components • Discuss the view of an interactive job from the perspective of a user versus a programmer • List the IBM i objects that affect performance and job processing • List the objects needed for processing work on IBM i

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-2

V11.0 Unit 11. Work management: Concepts and overview

Uempty

IBM i advanced application architecture

User program area IBM i Mach interface

System Licensed Internal Code POWER Hypervisor Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-2. IBM i advanced application architecture

There are two components to the operating system software on IBM i. This important distinction is unique in the industry in its completeness of implementation. The two components are: System Licensed Internal Code (SLIC) and Operating System (IBM i). SLIC provides the TIMI, process control, resource management, integrated SQL database, security enforcement, network communications, file systems, storage management, JVM, and other primitives. SLIC is a hardened, high-performance layer of software at the lowest level, much like a Unix kernel, only far more functional. IBM i provides higher-level functions based on these services to users and to applications. IBM i also provides a vast range of high-level languages (such as C/C++, COBOL, RPG) runtime functions. Object-based system IBM i keeps all information as objects. There are hundreds of object types. Object-based design enables a powerful, yet manageable level of system integrity, reliability, and authorization constraints.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-3

V11.0 Unit 11. Work management: Concepts and overview

Uempty

All programs and operating system information, such as user profiles, database files, programs, printer queues have their associated object types stored with the information. In the IBM i architecture, the object type determines how the object's contained information can be used (which methods). Single-Level Storage IBM i applications and the objects with which they interact all reside in a very large virtualized, single-level storage. That is, the entire system, including the objects most other systems distinguish as “on disk” or “in memory” are all in the single-level storage. Objects are designated as either permanent or temporary. Permanent objects exist across system IPLs (reboots). Temporary objects do not require such persistence. Essentially, the physical RAM on the server is a cache for this very large, single-level storage space. Storage management, a component of SLIC, ensures that objects which need to persist when the system is off are maintained in persistent storage. This is either magnetic hard disk or flash memory as of this writing. The benefit of providing a single, very large address space, in which all objects on the system reside, is that applications need not tailor their memory usage to a specific machine configuration. In fact, IBM i, due to the single-level storage, does not need to tailor such things as the sizes of disk cache versus paging space. This greatly facilitates the on-demand allocation of memory among logical partitions. The operating system and most applications for IBM i are built on a Technology Independent Machine Interface (TIMI) that isolates programs from differences in processor architectures, and allows the system to automatically capitalize on many new Power Architecture features without changes to existing programs. For example, TIMI allows a program to use decimal floating point (DFP) on POWER5 processors (without special hardware support), and that same program automatically uses hardware support for DFP on POWER6, POWER7, and POWER8 processors.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-4

V11.0 Unit 11. Work management: Concepts and overview

Uempty

IBM i functional components LIB

Object management Work management

PGM

Storage management JOB

Database management System resource management

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-3. IBM i functional components

The IBM i provides few functional components which make system stable and very easy to manage.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-5

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Performance checklist: Work management

• • • • • • • •

Work management Creating a work environment Special work management functions Shipped system objects System values Job structure Storage management System tuning

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-4. Performance checklist: Work management

Work management supports the commands and internal functions necessary to control system operation and the daily workload on the system. In addition, work management contains the functions that you need to distribute resources for your applications so that your system can handle your applications. The purpose of your system is to perform work. Work enters, work is processed, and work leaves the system. If you think of work management in these three terms, work management will be easier to understand. Work management describes where work enters the system, where and with what resources work is processed, and where output from work goes. Are you new to work management? The topic collection under the subject Introduction to work management is designed to provide you with several different overall perspectives of work management. In this way, you should be able to get a solid foundation in the underlying principles of work management, regardless of your systems background

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-6

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Overview of work management

• Work management is responsible for initiating IBM i jobs: ƒ ƒ ƒ ƒ

Batch Interactive Communications Autostart

• The performance characteristics of jobs are established by work management when the job is initiated: ƒ Runtime attributes ƒ Storage pool assignments

• Job performance is a function of the relationship of runtime parameters for each of the jobs.

• Altering job initiation from the defaults often results in better overall system performance. Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-5. Overview of work management

Work management, manages active jobs, server jobs, job queues, subsystems, and memory.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-7

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Storage management

Whatever a job needs for processing must be in memory before the job can use it.

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-6. Storage management

This statement is true for all computers. Because everything a job needs must be in memory in order for the job to use it, storage management is a critical part of the system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-8

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Input, process, and output

Main storage processor

Input

Output

Work is performed here. Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-7. Input, process, and output

Work is performed by the central processor on data in main storage.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-9

V11.0 Unit 11. Work management: Concepts and overview

Uempty

IBM i view: Job initiation

Main storage 7

CLASS Priority

Initial program

PROG1

6 4

PROFILE

Job description

QCMD

1

5 SBSD

3

Routing

Work management: Concepts and overview

SBS monitor

IBM i

2

JOBD Job description Routing

© Copyright IBM Corporation 2001, 2016

Figure 11-8. IBM i view: Job initiation

This visual shows job initiation steps. The life of a simple batch job begins when you submit it to the system. The job is then sent to a job queue where it waits to enter a subsystem where it can run. After the job moves to the subsystem it is allocated memory in which to run. The printer output file (also called spooled files) is then sent to the output queue to await further instruction on what to do (for example, printing). While not every job follows this exact path, you can better understand how other work is completed on the system by learning more about this typical job lifecycle.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-10

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Performance tuning (1 of 2) What everyone would like to have

i performance

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-9. Performance tuning (1 of 2)

In performance work, when you are tuning and optimizing an application for a system you must run and measure performance levels on that system. Although there are some characteristics that are shared among systems. There is not only one parameter which can flow on performance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-11

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Performance tuning (2 of 2) But what we do have

i performance

Subsystem descriptions

Activity levels

System values

Pool sizes

Network attributes

Job queues

Job descriptions

System displays

Job state transitions Fault rates Work management: Concepts and overview

Classes © Copyright IBM Corporation 2001, 2016

Figure 11-10. Performance tuning (2 of 2)

Many of operating system elements can flow for performance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-12

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Work management objects IBM i Subsystem

Job thread

System values

SBSD

Work entries

Routing entries

Pools

Work management: Concepts and overview

Network attributes

JOBD

Class

Program

© Copyright IBM Corporation 2001, 2016

Figure 11-11. Work management objects

Whether you are new to work management or have been using work management tools for years, these work management concepts might be useful for you. The structure of your system After receiving your IBM i product, you might want to know what subsystems are included with the system, whether you need to change any start-up programs, and what kind of user interface you will work with. Subsystems The subsystem is where work is processed on the system. A subsystem is a single, predefined operating environment through which the system coordinates the work flow and resource use. The system can contain several subsystems, all operating independently of each other. Subsystems manage resources. Memory pools A memory pool is a logical division of main memory or storage that is reserved for processing a job or group of jobs. On your system, all main storage can be divided into logical allocations called memory pools. By default, the system manages the transfer of data and programs into memory pools.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-13

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Jobs All work done on a system is performed through jobs. Each job has a unique name within the system. All jobs, with the exception of system jobs, run within subsystems. A job can enter the subsystem from any of the work entries, such as a job queue entry, workstation entry, communications entry, autostart job entry, or prestart job entry. Job scheduling options The job schedule function allows for time-dependent scheduling of IBM i batch jobs. You can schedule jobs to be released from the job queue at a particular time, or you can use a job schedule entry to submit your job to the job queue automatically at the time you specify. Job scheduling allows you to control the date and time a batch job is submitted to or becomes eligible to start from a job queue. This flexibility can help you as you balance the work load on your system. Job queues A job queue contains an ordered list of jobs waiting to be processed by a subsystem. The job queue is the first place that a submitted batch job goes before becoming active in a subsystem. The job is held here until a number of factors are met. Output queues Output queues are areas where printer output files (also called spooled files) wait to be processed and sent to the printer. Printer output is created either by the system or by the user using a print file. Job logs A job log contains information related to requests entered for a job. A job log has two forms, a pending form and a spooled form. Job accounting The job accounting function gathers data so that you can determine who is using your system and what system resources they are using. It also assists you in evaluating the overall use of your system. Job accounting is optional. You must take specific steps to set up job accounting. You can request the system to gather job resource accounting data, printer file accounting data, or both. You can also assign accounting codes to user profiles or specific jobs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-14

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Review questions 1. True or False: Work management supports the commands and internal functions necessary to control system operation and the daily workload. 2. True or False: Work management is not one of the functional components of IBM i. 3. True or False: There is one system value used to adjust and tune the system.

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-12. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-15

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Review answers 1. True or False: Work management supports the commands and internal functions necessary to control system operation and the daily workload. The answer is true.

2. True or False: Work management is not one of the functional components of IBM i. The answer is false.

3. True or False: There is one system value used to adjust and tune the system. The answer is false.

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-13. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-16

V11.0 Unit 11. Work management: Concepts and overview

Uempty

Unit summary

• List the checklist of things to consider that relate to performance • List the IBM i functional components • Discuss the view of an interactive job from the perspective of a user versus a programmer • List the IBM i objects that affect performance and job processing • List the objects needed for processing work on IBM i

Work management: Concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 11-14. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

11-17

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Unit 12. Work management: Subsystem concepts and overview Estimated time 00:35

Overview Work management is the basis for all work that is handled in the IBM i system. To control and tune the performance of a system, you must understand how jobs are processed. This unit covers interactive job processing and the relationships among the work management objects. We will also discuss how to track jobs through the system and what the controls are for limiting the number of jobs executing concurrently.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-1

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Unit objectives

• • • •

Describe what a subsystem is Describe what memory pools are List and describe the type of memory pools on the system Describe the types of work that can be run in the different memory pools • Explain why different types of memory pools exist • List the commands used to display memory pool information • Explain the information displayed on the work with system status command display

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-2

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Topic 1: Subsystem concepts and overview

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-2. Topic 1: Subsystem concepts and overview

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-3

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Subsystems (1 of 2)

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-3. Subsystems (1 of 2)

The subsystem is where work is processed on the system. A subsystem is a single, predefined operating environment through which the system coordinates the work flow and resource use. The system can contain several subsystems, all operating independently of each other. Subsystems manage resources. All jobs, with the exception of system jobs, run within subsystems. Each subsystem can run unique operations. For instance, one subsystem can be set up to handle only interactive jobs, while another subsystem handles only batch jobs. Subsystems can also be designed to handle many types of work. The system allows you to decide the number of subsystems and what types of work each subsystem handles. The subsystem is where work is processed on the system. A subsystem is a single, predefined operating environment through which the system coordinates the work flow and resource use. The system can contain several subsystems, all operating independently of each other. Subsystems manage resources.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-4

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Subsystems (2 of 2) A specialized environment for handling a certain type of work or function, such as:

Interactive

Spooling

Batch

Communications

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-4. Subsystems (2 of 2)

All jobs, with the exception of system jobs, run within subsystems. Each subsystem can run unique operations. For instance, one subsystem can be set up to handle only interactive jobs, while another subsystem handles only batch jobs. Subsystems can also be designed to handle many types of work. The system allows you to decide the number of subsystems and what types of work each subsystem handles. The run-time characteristics of a subsystem are defined in an object called a subsystem description. For example, if you want to permanently change the amount of work (number of jobs) coming from a job queue into a subsystem you only need to change the job queue entry in the subsystem description. On the visual you can see some subsystems example like: • Batch • Interactive • Spooling • Communications In the system there are many more.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-5

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

As the number of users on the system increases, a single subsystem for a set of work is often insufficient. By dividing your users into multiple subsystems, you gain several advantages. Improved manageability of work You get better control over what work is running in each subsystem. For example, for server jobs, you might want to isolate all of the database server jobs to one subsystem, the remote command server jobs to a different subsystem, the DDM server jobs to yet a different subsystem. Additionally, by using multiple subsystems you can isolate groups of jobs with their own memory pools. In this way, one group does not adversely impact other jobs. Reduced downtime impact for users For example, if every Friday afternoon you must bring the system to the restricted state for backup purposes, you can gradually take users offline by ending one subsystem at a time. Improved scalability and availability By having a single subsystem do work for fewer users. The subsystem is less busy and can be more responsive to the work requests it handles. Improved error tolerance in interactive subsystems by spreading the work across multiple subsystems, should a network failure occur, multiple subsystems can manage the device recovery processing. Improved interactive subsystem startup time You can keep the subsystem startup times shorter by subdividing the work across multiple subsystems. Additional options for performance tuning By using multiple subsystems you can set up the subsystems with a small number of routing entries.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-6

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Subsystem description (1 of 2)

• • • •

A subsystem description determines: How much work can be initiated, including the number of storage jobs Where that work will be performed, including main storage pools The sources of work for a subsystem: ƒ ƒ ƒ ƒ

Autostart jobs Workstations Job queues Communication jobs

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-5. Subsystem description (1 of 2)

A subsystem description is an object that defines the environment for the jobs that run in the subsystem. The purpose is to have the jobs run most efficiently. The subsystem description identifier is *SBSD. All work within a subsystem is controlled by an i program known as a subsystem monitor. All subsystem monitors are identical, regardless of the subsystem they control or the type of jobs that run in it. Each subsystem monitor uses a different subsystem description in performing its control functions. A subsystem description is an object that contains information defining the characteristics of an operating environment which can handle a specific type of processing, such as interactive, batch, spooling, or communication. It defines: • How many jobs the subsystem runs in parallel • Where and how those jobs are run • Where the subsystem looks for jobs to run • Which resources the subsystem uses to perform the work

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-7

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

A subsystem description can contain work entries (sources of work) for one or more of the following: • Autostart jobs • Workstations (individual or by type) • Job queues • Communication jobs A subsystem description also defines the amount of main storage that is available for jobs that are run in the subsystem. The subsystem description is used by the subsystem monitor to establish the environment for its jobs. When a subsystem is started, it takes the name of the subsystem description it uses.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-8

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Subsystem description (2 of 2) Subsystem description POOLS(

Work entries

) MAXJOBS (

)

CRTSBSD

Job queue entries

ADDJOBQE

Workstation entries

ADDWSE

AUTOSTART entries

ADDAJE

Communication entries

ADDCMNE

PRESTART entries ADDPJE Routing entries ADDRTGE Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-6. Subsystem description (2 of 2)

Work entries identify the sources where jobs can enter a subsystem. Specific types of work entries are used for different types of jobs. Work entries are part of the subsystem description. The following information describes the different types of work entries and how to manage them. There are five types of work entries; autostart job entries, communication entries, job queue entries, prestart job entries, and workstation entries. Autostart job entries Autostart job entries identify the autostart jobs to start as soon as the subsystem starts. When a subsystem starts, the system allocates several items and starts autostart and prestart jobs before it is ready for work. Communications entries The communications work entry identifies to the subsystem the sources for the communications job it processes. The job processing begins when the subsystem receives a communications program start request from a remote system and an appropriate routing entry is found for the request.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-9

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Job queue entries Job queue entries in a subsystem description specify from which job queues a subsystem is to receive jobs. When the subsystem is started, the subsystem tries to allocate each job queue defined in the subsystem job queue entries. Prestart job entries You define the prestart job by using a prestart job entry. A prestart job entry does not affect the device allocation or program start request assignment. Prestart jobs for servers In the prestart job model there is one primary listening job, generally called the daemon job or listener job, and multiple server jobs that process the client requests. The daemon job listens on the port for connection requests. When a new connection is received, the daemon does some general work, then gives the socket descriptor to a waiting prestart server job. Workstation entries An interactive job is a job that starts when a user signs on to a display station and ends when the user signs off. For the job to run, the subsystem searches for the job description, which can be specified in the workstation entry or the user profile.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-10

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Work entries Workstation entries Type

Jobd

Name

Jobd

*ALL

*USRPRF

DSP03

*USRPRF

Job queue entries

PRESTART job entries

Jobq

Prog

Jobd

QBATCH

PROG01

JOBDAPPC

AUTOSTART job entries

Communication entries

Job

Jobd

Dev

Jobd

START

STARTJD

*ALL

*USRPRF

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-7. Work entries

An interactive job is a job that starts when a user signs on to a display station and ends when the user signs off. For the job to run, the subsystem searches for the job description, which might be specified in the workstation entry or the user profile. The workstation entry guides the subsystem to prospective workstations. If a workstation is available, the subsystem sends a sign-on screen to the display. Note: The subsystem description for the controlling subsystem must contain a workstation entry for the console, and that entry must be of type *SIGNON. (*SIGNON is a value for the AT parameter, specified on the Add Work Station Entry (ADDWSE) command.) The *SIGNON value indicates that the sign-on display is shown at the workstation when the subsystem is started. This requirement ensures that the subsystem has an interactive device for the entry of the system and subsystem level commands. The End System (ENDSYS) command ends the IBM i licensed program to a single session (or sign-on display) at the console in the controlling subsystem. A subsystem description that does not contain a workstation entry for the console cannot be started as a controlling subsystem.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-11

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Routing entries

SEQNBR

CMPVAL

CLASS

PGM

10

QCMDB

QBATCH

QCMD

1

50

QCMDI

QINTER

QCMD

2

9999

*ANY

QBATCH

QCMD

1

Work management: Subsystem concepts and overview

POOL ID

© Copyright IBM Corporation 2001, 2016

Figure 12-8. Routing entries

The routing entry identifies the main storage subsystem pool to use, the controlling program to run (typically the system-supplied program QCMD), and additional run-time information (stored in the class object). Routing entries are stored in the subsystem description. A routing entry can be likened to a single entry in a shopping mall directory. Customers that cannot find the store they need can use a directory to help send them in the right direction. The same is true on your system. Routing entries guide the job to the correct place. Routing entries in a subsystem description specify the program to be called to control a routing step for a job running in the subsystem, which memory pool the job uses, and from which class to get the run-time attributes. Routing data identifies a routing entry for the job to use. Together, routing entries and routing data provide information about starting a job in a subsystem. Routing entries consist of these parts; the subsystem description, class, comparison data, maximum active routing steps, memory pool ID, program to call, thread resources affinity, resources affinity group, and the sequence number.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-12

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Class Job run-time attributes are contained in the class object that is specified in the (CLS) parameter in the routing entry. If a job consists of multiple routing steps, the class used by each subsequent routing step is specified in the routing entry used to start the routing step. If the class does not exist when the routing entry is added, a library qualifier must be specified because the qualified class name is kept in the subsystem description. Comparison data The comparison value (CMPVAL) parameter of the routing entry specifies data that is compared with routing data to determine which routing entry to use. (The routing entry also specifies the starting position for the comparison.) The routing data is compared with the comparison value of each routing entry in sequence number order until a match is found. The sequence number contained in a routing entry defines the order in which the routing entries are scanned and can be used as the identifier of the routing entry. Maximum active routing steps The maximum active routing steps (MAXACT) parameter of the routing entry specifies the maximum number of routing steps (jobs) that can be active at the same time through this routing entry. Memory pool ID The memory pool ID (POOLID) parameter of the routing entry specifies the pool identifier of the storage pool in which the program runs. The pool identifier specified here relates to the storage pools in the subsystem description.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-13

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Class information

QBATCH

QINTER

Run priority

50

20

Time slice

5000 ms

2000 ms

Purge

*NO

*YES

Wait time

120 sec

30 sec

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-9. Class information

Job run-time attributes are contained in the class object that is specified in the (CLS) parameter in the routing entry. If a job consists of multiple routing steps, the class used by each subsequent routing step is specified in the routing entry used to start the routing step. If the class does not exist when the routing entry is added, a library qualifier must be specified because the qualified class name is kept in the subsystem description. Run-time attributes that are included in a routing entry class are: • Run priority (RUNPTY) The run priority is a value ranging from 1 (highest priority) through 99 (lowest priority) that represents the priority at which the job competes for the processing unit relative to other jobs that are active at the same time. For multi-threaded jobs, the run priority is also the highest run priority allowed for any thread within the job. Individual threads within the job might have a lower priority. • Time slice (TIMESLICE) This is the time slice establishes the amount of time needed by a thread in a job to accomplish a meaningful amount of processing. At the end of the time slice, the thread might be put in an inactive state so that other threads can become active in the storage pool.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-14

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

• Default wait time (DFTWAIT) This specifies the default maximum time (in seconds) that a thread in the job waits for a system instruction, such as the LOCK machine interface (MI) instruction to acquire a resource. This default wait time is used when a wait time is not otherwise specified for a given situation. Normally, this is the amount of time the system user might be willing to wait for the system before the request is ended. If the wait time for any one instruction is exceeded, an error message can be displayed or it can be automatically handled by a Monitor Message (MONMSG) command. • Maximum CPU time (CPUTIME) This specifies the maximum processing unit time (in milliseconds) that the job can use. If the job consists of multiple routing steps, each routing step is allowed to use this amount of processing unit time. If the maximum time is exceeded, the job is held. • Maximum temporary storage (MAXTMPSTG) This specifies the maximum amount of temporary (auxiliary) storage that the job can use. If the job consists of multiple routing steps, this is the maximum temporary storage that the routing step can use. This temporary storage is used for storage required by the program itself and by implicitly created internal system objects used to support the job. It does not include storage in the QTEMP library. If the maximum temporary storage is exceeded, the job is held. This parameter does not apply to the use of permanent storage, which is controlled through the user profile. • Maximum threads (MAXTHD) This specifies the maximum number of threads that a job using this class can run with at any time. If multiple threads are initiated simultaneously, this value can be exceeded. If this maximum value is exceeded, the excess threads will be allowed to run to their normal completion. Initiation of additional threads will be inhibited until the maximum number of threads in the job drops below this maximum value. • Text description (TEXT) This specifies the text that briefly describes the object. This is an attribute of the class object when it is created, but it is not a run-time attribute for a job. • Authority (AUT) This specifies the authority you are giving to users who do not have specific authority for the object, who is not on an authorization list, and whose group profile or supplemental group profiles do not have specific authority for the object. This is an attribute of the class object when it is created, but it is not a run-time attribute for a job.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-15

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Start subsystem (STRSBS QINTER) Subsystem monitor program

QSYS/QINTER subsystem description Attributes Sign-On Display File (QSYS/QDISGNON) MAXJOBS(*NOMAX) Storage Pools ID Storage 1 *BASE 2 *INTERACT

LWS1 User Password

Main storage

*INTERACT

*BASE

*MACHINE 3180 User Password 3197 User Password

Work Station Entry Work Station Names LWS1 Work Station Types *ALL

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-10. Start subsystem (STRSBS QINTER)

When a subsystem starts, the system allocates several items and starts autostart and prestart jobs before the subsystem is ready for work. The subsystem description is used to determine how items are allocated. The following list represents the sequence of events that occur when the subsystem starts: • Request to start subsystem is issued. The Start Subsystem (STRSBS) command is issued. Key startup information is located in the subsystem description. • Memory pools are allocated. Memory is allocated to the pools defined in the subsystem description. The memory that is allocated to each defined pool is taken from the Base memory pool. The system does not allocate memory to a pool if the amount of memory available to the Base storage pool is less than the minimum size specified by the Base memory pool minimum size system value QBASPOOL. If the system cannot allocate all of the requested memory, it allocates as much memory as is available and allocates all the other as memory becomes available. • Prestart jobs are started. This information comes from the prestart job entries. • Autostart jobs are started. This information comes from the autostart jobs entries.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-16

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

• Display stations are allocated (sign-on displays are up). If there are workstation entries and the device is varied on and has not been allocated by any other subsystem, the subsystem can allocate it and display the sign-on display. If the device is varied on and has been allocated by another subsystem and is at the sign-on display (the sign-on display was displayed before the second subsystem was started), a second subsystem can allocate the device from the first subsystem and display the sign-on display. If the device is not varied on, the subsystem cannot allocate it. The system arbiter (QSYSARB) and the QCMNARB jobs hold locks on all varied-off devices. Workstation entries provide the information about what devices to check for allocation. Note: For virtual display devices, the sign-on display is shown when the device becomes fully varied on. This happens when a user connects to the IBM i using that device description (assuming the connection request does not carry the data that is used to bypass the sign-on display processing). A device can be taken from a pool of previously created device descriptions and varied on as part of that connection processing, or a device can be created and varied on. At a subsystem start, the subsystem pends a lock for any of the previously created device descriptions that the subsystem wants. • Job queues are allocated. The subsystem will not be able to allocate a job queue if it is already allocated to another active subsystem. This information comes from the job queue entries. • Communications devices are allocated. Requests are sent to the QLUS (LU services) system job, which handles device allocation for all communications devices. This information comes from the communication entries. The environment is ready for work.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-17

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Default subsystem configurations

• IPL starts only the subsystem named in QCTLSBSD system value. • Environment as shipped (Default) - QCTLSBSD = QBASE QBASE

Autostart job

QSPL

Spooling

Console, Interactive, Batch, Communications

QSYSWRK

System initiated functions

QSERVER QUSRWRK

File server

User initiated functions

• Complex environment - QCTLSBSD = QCTL QCTL

Autostart job

Console

QSYSWRK

QINTER

Interactive

QBATCH

Batch

QSPL

Spooling

QCMN

Communication

QSERVER

File server

System functions

QUSRWRK System functions Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-11. Default subsystem configurations

IBM ships predefined subsystem descriptions that can be used to provide the environments needed on most systems. The default subsystem configuration consists of a controlling subsystem called QBASE, a system function subsystem called QSYSWRK, and a spooling subsystem called QSPL. In this environment, all jobs on the system except for some system jobs and spooling jobs that are run under the control of the QBASE subsystem. Certain system jobs run under the control of QSYSWRK. Spooling jobs run under the control of the QSPL subsystem. A more complex subsystem configuration is also provided and can be used instead of the default QBASE/QSPL configuration. It consists of: • QCTL The controlling subsystem • QSYSWRK Which runs certain System jobs initiated by the OS • QUSRWRK Was instituted in V5.1 and it is used by the system for system jobs that are user-oriented • QINTER The subsystem for interactive jobs • QBATCH The subsystem for batch jobs • QSPL The subsystem for spooling © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-18

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

• CMN The subsystem used for communicating jobs • QSERVER The subsystem used for file serving jobs • QHTTPSVR The subsystem used for Web server jobs and programs IBM ships several predefined subsystem descriptions. A system can be implemented through the use of these shipped subsystems. It is also possible for a system implementer to implement a system by creating brand new subsystem descriptions. When it is shipped, every system has QBASE as its controlling subsystem; the controlling subsystem is the only one started by i during IPL. QBASE is set up to handle all types of work on the system (which includes the console, interactive jobs, batch jobs, and communication jobs), except some system functions and spooling. In this environment, the QSYSWRK subsystem is responsible for some system functions and the QSPL subsystem is responsible for all spooling jobs (output to printers). A more complex environment is also shipped and can be used instead of the default QBASE/QSPL environment described above. This environment is used if there are a lot of different types of jobs running on a System i. The system value, QCTLSBSD (controlling subsystem) controls which subsystem configuration is used. IBM provides other subsystems, such as QSNADS, which supports jobs controlling the functions of the SNADS network and IBM-supplied transaction programs, such as document interchange and object distribution. These subsystems are started and ended when the functions they support are started and ended.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-19

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Topic 2: Memory pool concepts and overview

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-12. Topic 2: Memory pool concepts and overview

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-20

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

An overview of memory pools

• Main storage is divided into memory pools: • Shared pool: ƒ A pool in which multiple subsystems can run jobs ƒ Maximum of 64 shared pools on the system

• Private pool: ƒ A pool in which a single subsystem can run jobs ƒ Is assigned a size and activity level when the subsystem is created

• The activity level of a pool is the number of jobs that can have main storage at the same time.

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-13. An overview of memory pools

A memory pool is a logical division of main memory or storage that is reserved for processing a job or group of jobs. On your system, all main storage can be divided into logical allocations called memory pools. By default, the system manages the transfer of data and programs into memory pools. The memory pool from which user jobs get their memory is always the same pool that limits their activity level. (The activity level of a memory pool is the number of threads that can be active at same time in a memory pool.) Exceptions to this are system jobs (such as Scpf, Qsysarb, and Qlus) that get their memory from the Base pool but use the machine pool activity level. Additionally, subsystem monitors get their memory from the first subsystem description pool, but it uses the machine pool activity level. This allows a subsystem monitor to always be able to run regardless of the activity level setting.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-21

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

The shared pool subtypes

• Main storage is divided into memory pools: • Specialized shared pools: ƒ *MACHINE (machine pool) ƒ *BASE (base pool)

• General shared pools: ƒ *INTERACT ƒ *SPOOL ƒ *SHRPOOL1 - *SHRPOOL60

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-14. The shared pool subtypes

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-22

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Why pools? Main storage (memory) Only interactive jobs

Interactive program

Interactive program

Interactive program

Interactive program

Interactive program

Pool

Share Pool

Only batch jobs

Pool

Work management: Subsystem concepts and overview

Batch program

Batch program

© Copyright IBM Corporation 2001, 2016

Figure 12-15. Why pools?

You can control how much work can be done in a subsystem by controlling the number and size of the pools. The greater the size of the pools in a subsystem, the more work can be done in that subsystem. Using shared memory pools allows the system to distribute jobs for interactive users across multiple subsystems while still allowing their jobs to run in the same memory pool. Multiple pools in a subsystem help you to control the jobs' competition for system resources. The advantages of having multiple pools in a subsystem are that you can separate the amount of work done and the response time for these jobs. For example, during the day you might want interactive jobs to run with good response time. For better efficiency, you can make the interactive pool larger. At night, you might be running many batch jobs, so you make the batch pool larger. Note: Although tuning and managing your system can help the efficiency of the flow of work through your system, it cannot account for inadequate hardware resources. Consider a hardware upgrade if the demands of your workload are significant.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-23

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Main storage pools

*SPOOL POOL

(4)

*INTERACT POOL (3)

*BASE POOL

(2)

*MACHINE POOL (1) Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-16. Main storage pools

On the system, all main storage can be divided into logical allocations called memory pools. All memory pools in a system are either private or shared. There are private memory pools, shared memory pools, and special shared memory pools. As many as 64 memory pools, in any combination of private and shared pools, can be active at the same time. Private memory pools Private memory pools (also known as user-defined memory pools) contain a specific amount of main storage that can be used by a single subsystem to run jobs. These pools cannot be shared by multiple subsystems. They are identified in IBM® Navigator for i by the subsystem name. You can have as many as 62 private memory pools allocated for use in active subsystems. Shared memory pools Shared pools are either special or general; the Machine pool and Base pool are considered special shared pools, and all other shared pools are considered general shared pools. You can specify 63 of the 64 shared memory pools that are defined on the system for use when creating subsystem descriptions (the machine pool is reserved for system use).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-24

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Special shared pools (*MACHINE and *BASE) *MACHINE The Machine memory pool is used for highly shared Machine and operating system programs. It is identified as Machine in IBM Navigator for i. The Machine memory pool provides storage for tasks the system must run that do not require your attention. The size for this memory pool is specified in the Machine memory pool size system value (QMCHPOOL). No user jobs run in this memory pool. (On the Work with System Status display (WRKSYSSTS), the Machine memory pool appears as system pool identifier 1.) *BASE The Base memory pool, identified as Base in IBM Navigator for i, contains all unassigned main storage on the system, (all main storage that is not required by another memory pool). The Base pool contains storage that can be shared by many subsystems. The Base memory pool is used for batch work and miscellaneous system functions. The Base memory pool minimum size (QBASPOOL) system value specifies the minimum size of the Base memory pool. The activity level for this memory pool is specified in the Base memory pool maximum eligible threads (QBASACTLVL) system value. (On the Work with System Status display (WRKSYSSTS), the Base memory pool appears as system pool identifier 2.) General shared pools General shared pools are pools of main storage that multiple subsystems can use at the same time. On the character-based interface, they are identified as follows: • *INTERACT is the interactive storage pool used for interactive jobs. • *SPOOL is the storage pool used for spool writers. • *SHRPOOL1 through *SHRPOOL60 are storage pools that you can use for your own use. In IBM Navigator for i, the general shared pools are identified as Interactive, Spool, and Shared 1 Shared 60.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-25

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Storage pool characteristics

• • • • • • • • •

Logical areas of main storage for jobs: There are two types of pools: private and shared. The system can have up to 64 active storage pools. A subsystem can have up to 10 defined storage pools. Pool size determines the amount of storage. Memory is allocated in noncontiguous pages. Memory is reallocated when the *NOSTG parameter is used. Paging is restricted to each pool. Activity levels determine the number of job threads in a memory pool.

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-17. Storage pool characteristics

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-26

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Specifying which pools are assigned

• Private CRTSBSD ABC POOLS((1 1600 3) (2 2000 5))

• Shared Specialized: *MACHINE General: *INTERACT

*BASE *SPOOL *SHRPOOL1...*SHRPOOL60

CRTSBSD DEF POOLS((1 *BASE) (2 *INTERACT) (*SHRPOOL1)) CRTSBSD GHI POOLS((1 *BASE) (2 *INTERACT) (3 *SHRPOOL1) (4 2000 5))

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-18. Specifying which pools are assigned

You can assign pools when you are creating or changing subsystems description.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-27

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Storage pool allocation When creating a subsystem, storage pools must be specified: CRTSBSD QINTER POOLS((1 *BASE) (2 *INTERACT)) MAXJOBS(*NOMAX) Pool sizes can be changed while the subsystem is active: CHGSHRPOOL POOL(*INTERACT) SIZE(2100) ACTLVL(6) Before

After

*SPOOL

*SPOOL

*INTERACT (1800)

QINTER POOL 2

*INTERACT (2100)

*BASE

QINTER POOL 1

*BASE

*MACHINE POOL

*MACHINE POOL

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-19. Storage pool allocation

When creating a subsystem, storage pools must be specified: CRTSBSD QINTER POOLS((1 *BASE) (2 *INTERACT)) MAXJOBS(*NOMAX) Pool sizes can be changed while the subsystem is active: CHGSHRPOOL POOL(*INTERACT) SIZE(2100) ACTLVL(6)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-28

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Topic 3: Working with subsystems and memory pools

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-20. Topic 3: Working with subsystems and memory pools

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-29

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Display Subsystem Description

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-21. Display Subsystem Description

To display subsystem description you can use the DSPSBSD command. Look at the option 1 Operational attributes.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-30

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

QINTER subsystem Operational attributes Maximum jobs in subsystem

*NOMAX

Sign-on display file

QSYS/QDSIGNON

Pool definitions Pool ID

Storage size (KB)

1

*BASE

2

*INTERACT

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-22. QINTER subsystem

Subsystem description attributes are common overall system attributes. When you create a subsystem, the first step is to define the subsystem attributes. Subsystem attributes include: • The name of the subsystem description and the library where it is stored. • All of the memory pool definitions that this subsystem uses A subsystem definition can have a maximum of 10 memory pool definitions specified. Included in the subsystem definition are: ▪ Pool definition identifier: This is the identifier inside the subsystem description, of the storage pool definition. ▪ Size: This is the size of the storage pool expressed in KB (1K=1024 bytes) multiples and is the amount of main storage that the pool can use. ▪ Activity level: This is the maximum number of threads that can run at the same time in the pool. The maximum number of jobs that can be active in the subsystem at the same time. A text description of the subsystem description. The name and library of the sign-on display file that is used to show sign-on displays at work stations that are allocated to the subsystem. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-31

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

A subsystem library name that you can use if you want to specify a library that should be entered ahead of other libraries in the system portion of the library list. (This parameter allows you to use a secondary language library.) Also included in the subsystem description is information about authority levels to the subsystem. This information is kept by Security and is not stored with the other attributes of the subsystem description. You can view the subsystem description authority by using the Display Object Authority (DSPOBJAUT) command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-32

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Work with System Status

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-23. Work with System Status

The pool sizes and usage you can see using WRKSYSSTS command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-33

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

WRKSYSSTS: Pool data

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-24. WRKSYSSTS: Pool data

By pressing F11 function key you can change the view and see memory pool names. Pagination option The paging option associated with the pool. The paging option determines whether the system should dynamically adjust the paging characteristics of the storage pool for optimum performance. The following are the possible paging option values: *FIXED The system does not dynamically adjust the paging characteristics of the storage pool; it uses system-default values. *CALC The system dynamically adjusts the paging characteristics of the storage pool for optimum performance. USRDFN The system does not dynamically adjust the paging characteristics of the storage pool. It uses values that have been defined through an application programming interface (API).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-34

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

WRKSHRPOOL

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-25. WRKSHRPOOL

To work with all memory pool you can use command WRKSHRPOOL.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-35

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

IBM Navigator for i: Active Pools

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-26. IBM Navigator for i: Active Pools

To work with Active Pools using IBM Navigator for i you have to: 1. Open web browser http://:2001. 2. Log on to the IBM Navigator for i. 3. On the left pane, expand Work Management. 4. Click Active Memory Pools link. As you see that the shows information is similar like when you use WRKSYSSTS command. IBM Navigator for i offering system status details you will see later on this unit.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-36

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

IBM Navigator for i: Shared Pools

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-27. IBM Navigator for i: Shared Pools

To work with Shared Memory Pools using IBM Navigator for i you have to: 1. Open web browser http://:2001. 2. Log on to the IBM Navigator for i. 3. On the left pane, expand Work Management. 4. Under Active Memory Pools link expand All Tasks. 5. Expand Memory Pools. 6. Click Shared Memory Pools. On the screen, you will be see all shared pools active and inactive it is similar to WRKSHRPOOL command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-37

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Shared Pools: Properties

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-28. Shared Pools: Properties

To see shared memory pool properties select pool name and right-click on. From the pop-up menu, select Properties.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-38

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

General and Configuration tab

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-29. General and Configuration tab

Use the General tab to view and change attributes of a memory pool. Use the Configuration tab to view and change configuration values for a memory pool. You can find information about: • Size • Activity level • Paging option

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-39

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Performance and Tuning tab

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-30. Performance and Tuning tab

Use the Performance tab to view performance statistics for an active memory pool. You can see information about following parameters: • State transitions per minute • Database faults per second • Database pages per second • Non-database faults per second • Non-database pages per second Performance tuning is a way to adjust the performance of the system. There are many options for tuning your system. Each system environment is unique, requiring you to observe performance and make adjustments that are best for your environment. You can make performance adjustments to your system in the following ways: • Automatic performance adjustments: You can choose to set up the system to make performance adjustment automatically. When new systems are shipped, they are configured to adjust automatically. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-40

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

• Manual performance adjustments: Some users have much more experience and knowledge about IBM i work management functions and applications. You might want to perform additional tuning by manually setting specific values such as pool size, and activity level. • Customized performance adjustments: You can set values that control how the performance tuner operates and then let the system make the performance adjustments automatically.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-41

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

IBM Navigator for i: WRKSYSSTS

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-31. IBM Navigator for i: WRKSYSSTS

To work with System status using IBM Navigator for i you have to: 1. Open web browser http://:2001. 2. Log on to the IBM Navigator for i. 3. On the left pane, expand System. 4. Click System Status link. When the System Status dialog opens, it displays statistical information about your system for that instant in time. The exception is the CPU usage field, which displays a cumulative average during the time displayed in the Elapsed time field.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-42

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

General and Jobs tab

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-32. General and Jobs tab

Use the General tab to view high level system status values that show the current status of the system, such as elapsed CPU usage, total and active jobs in the system, permanent and temporary addresses used, total disk space, and system disk pool capacity and usage. You can find information about the following elements on this window: • • • • • •

CPU usage (elapsed) Jobs Addresses used Total disk space System disk pool System Resources Health Indicators

Use the Jobs tab to view the number of total, maximum, and active jobs and threads running on the system. You can find information about the following elements on this window: • • • •

Jobs Threads Active Jobs Jobs System Values

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-43

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Processors and Memory tab

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-33. Processors and Memory tab

Use the Processors tab to view the elapsed CPU usage and the number of processors in the system. You can find information about: • CPU usage (elapsed) • Type of processors • Processing power • Virtual processors • Interactive performance • Shared processor pool usage (elapsed) • Uncapped CPU capacity pool usage (elapsed) • CPU Health Indicators

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-44

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty Note Fields that do not apply to your system are not shown. Use the Memory tab to view the amount of memory on the system. You can also access the Active Memory Pools window. You can find information about: • Total memory • Active Memory Pools • Active Memory Pools

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-45

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Disk Space and Addresses tab

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-34. Disk Space and Addresses tab

Use the Disk Space tab to view the amount of disk space on the system. You can also access the Temporary Storage Details window, the Disk Pools window and the Storage System Values window from this tab. You can find information about: • Total disk space • System disk pool • Temporary storage used • Temporary Storage Details • Disk Status • Disk Pools • Storage System Values • Disk Health Indicators Use the Addresses tab to view information about address use on the system. When a permanent or temporary address is created on the system, it is assigned an address by disk storage management. The system uses this address to correlate references to the object with disk storage. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-46

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

It is important to regularly monitor the percentage of addresses used on your system. If the rate at which addresses are being used will cause you to reach 100% during the planned lifetime of the system or if address usage reaches 90% (critical limit), you should call your IBM software service representative. You can find information about: • Addresses used • Large addresses used (256 MB) • Very large addresses used (4 GB)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-47

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Review questions 1. True or False: A private memory pool is a pool in which multiple subsystems can run jobs. 2. In which pool does the LIC and operating system functions run? a. b. c. d.

*MACHINE *BASE *INTERACT *SPOOL

3. True or False: The recommendation is to allow interactive and batch programs to run in the same pool.

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-35. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-48

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Review answers 1. True or False: A private memory pool is a pool in which multiple subsystems can run jobs. The answer is False.

2. In which pool does the LIC and operating system functions run? a. *MACHINE b. *BASE c. *INTERACT d. *SPOOL The answer is *MACHINE.

3. True or False: The recommendation is to allow interactive and batch programs to run in the same pool. The answer is False.

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-36. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-49

V11.0 Unit 12. Work management: Subsystem concepts and overview

Uempty

Unit summary

• • • •

Describe what a subsystem is Describe what memory pools are List and describe the type of memory pools on the system Describe the types of work that can be run in the different memory pools • Explain why different types of memory pools exist • List the commands used to display memory pool information • Explain the information displayed on the work with system status command display

Work management: Subsystem concepts and overview

© Copyright IBM Corporation 2001, 2016

Figure 12-37. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

12-50

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Unit 13. Work management: Job processing concepts and interactive jobs Estimated time 00:35

Overview Work management is the basis for all work that is handled in the IBM i system. To control and tune the performance of a system, you must understand how jobs are processed. This unit covers interactive, batch and spool job processing, and the relationships among the work management objects. We will also discuss how to track jobs through the system and what the controls are for limiting the number of jobs executing concurrently.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-1

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Unit objectives

• • • • • • •

Explain where work is processed on the system Explain the difference between a job and a thread List the types of system and users jobs that can be run on the system Explain when the different types of jobs start and end Explain the interactive job routing process Explain how paging works on the system Explain the different types of faults that can happen

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-2

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Topic 1: Job processing

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-2. Topic 1: Job processing

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-3

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Where work is processed IBM i

SBS ABC Job

Job

SBS DEF Routing Step Thread 1

Job

Routing Step Thread 1

SBS XYZ

Routing Step Thread 1 Thread 2 Thread 3

Job

Job

Routing Step Thread 1

Job

Routing Step Thread 1

Work management: Job processing concepts and interactive jobs

Routing Step Thread 1

© Copyright IBM Corporation 2001, 2016

Figure 13-3. Where work is processed

Depending on the job parameters each job can run in different subsystems using one or more threads.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-4

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Types of jobs System jobs

User jobs

Spooling

Subsystem monitor

Interactive

Batch

System functions

Autostart

Communication

Prestart

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-4. Types of jobs

Generally all jobs can be divided into System Jobs and User Jobs. • System jobs: • Spooling • Subsystem monitoring • System functions • User jobs: • Batch • Interactive • Autostart • Communication • Prestart

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-5

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Start / End of a job Starts

Job

Ends *

Interactive Batch Autostart

Sign-on Released from jobq Start of subsystem

SIGNOFF End of requested command End of program in routing entry or cmd in request data

Communication

Request from remote system

End program in start request

Prestart

Start of subsystem or Start Prestart

ENDPJ End of subsystem Job command

Spooling

Start Reader or Writer command

End Reader or Writer command

* Unprinted spooled files for jobs that have ended are still managed by the system. This is reflected in the "Jobs in system" values from WRKSYSSTS.

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-5. Start / End of a job

You can compare different start end actions for different jobs types.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-6

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Interactive job: User view

IBM i Database

Application program

Reports

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-6. Interactive job: User view

An interactive job starts when you sign on to the system or transfer to a secondary or group job. The interactive job ends when you sign off. Working from a display station, you interact with the system by issuing commands, by using function keys, and running programs and applications. In interactive jobs users communicate with operating system or applications (input data read results or messages) using workstation. The result of interactive job can be send to the display or to the output (outq and print or outq and change to PDF, email, or stay in outq as a spool file). The user see only input filed can put some value or run command/program and received result.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-7

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Interactive job: Programmer view

Main storage

Database Description

PROG 1 CALL

Data

Output queue

PRTF DSPF

Display file

Work management: Job processing concepts and interactive jobs

PROG 2

Printer file DEVD

Printer device description

© Copyright IBM Corporation 2001, 2016

Figure 13-7. Interactive job: Programmer view

Programmer view is different than simple user. Programmer can manage what and how will be displayed creating/changing display file. Programmer can manage data flow and manage application logic. Programmer can have impact on the database (files structure, views indexes, and so on). Similar to the display file, programmer can modeling printer file and produce different printout for different functions or programs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-8

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Identify the types of jobs 1

2

Enter User ID Password

3

:: STRSBS SPECIAL

:: SBMJOB PAY01

Program

Subsystem description

Program

PAY01

Startup

QSYSOPR JOBQ 4

5

System A

System B ? JOB

Work management: Job processing concepts and interactive jobs

Others?

© Copyright IBM Corporation 2001, 2016

Figure 13-8. Identify the types of jobs

On the visual you see different jobs and for each of these jobs a different requirement. Each job types have different characteristic and might have an impact on performance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-9

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Topic 2: Interactive jobs and job tuning concepts

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-9. Topic 2: Interactive jobs and job tuning concepts

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-10

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Interactive job routing QINTER subsystem description

Attributes MAXJOBS(*NOMAX) Storage Pools ID Storage 1 *BASESign-on Display File 2 *INTERACT (QSYS/QDSIGNON)

User Password

Job description USERLIB/USERJOBD User Name Job Queue Job Priority Output Priority Routing Data (QCMDI) Request Data Initial Library List More . . . .

Work Station Entry Work Station JobDescription LWS1 *USRPRF Routing Entry SEQNBR CMPVAL PGM Class Pool 50 QCMDI QCMD QINTER

User profile = XYZ PASSWORD = XXXXXX INLPGM = USERLIB/USERPGM JOBD = USERLIB/USERJOBD

2 CLASS QGPL/QINTER

QSYS/QCMD USERPGM

Run Priority *INTERACT

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-10. Interactive job routing

To determine the best approach for a particular job, you must first determine which program should control the routing step. Using QSYS/CMD for interactive jobs - benefits The IBM-supplied command processor QSYS/QCMD gives the greatest flexibility in terms of making functions available to workstation users. Using QCMD to control the routing step gives you the following benefits: The attention program is activated if it is specified in the user profile. The initial program that is specified in the user profile is called. The initial menu that is specified in the user profile is called. The user is placed in System/36 environment as it is specified in the user profile. In addition, the default using QCMD brings you to the Main menu where you can enter commands directly, including the CALL command, which is used to call user-written functions. Menu options with online help are provided to give easy access to system functions. Also provided are command selection menus, quick access to index search, and the command entry function (called by CALL QCMD). The command entry functions are intended primarily for programmers and operators who require the full range of functions available through the direct use of commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-11

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Calling a user program directly for interactive jobs - benefits Your programs can be directly called to control the routing steps for interactive jobs. These programs can be designed to give a more specialized access to functions needed by your workstation users than the IBM-supplied programs give. In addition, because your programs are tailored for specific functions, they should typically require even less system resource to support their running than the IBM-supplied programs. You might also want to provide functions such as an initial program and initial menu. After you have determined which program controls the routing step, you must determine whether routing is to be based on the workstation from which the job was started, or on the user (user profile) who signed on. Routing based on the workstation is accomplished using the routing data that is specified in the job description that is associated with the workstation entry or profile for the device. Routing based on a user can be done using the initial program that is specified in the user profile or the job description in the user profile mapping to a routing entry other than QCMD.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-12

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Selecting initial program *USRPRF

1) Sign-on

*SBSD Workstation Entry

2b) JOBD

*USRPRF

JOBD ?

2a) JOBD Name

JOB DESCRIPTION

3) RTGDTA

INLPGM INLMNU

5b) QSYS/QCMD

4) CMPVAL PGM 5) PGM ?

5c) INLPGM or INLMNU Work management: Job processing concepts and interactive jobs

Routing Entry

Other

5a) Appl. Pgm

© Copyright IBM Corporation 2001, 2016

Figure 13-11. Selecting initial program

Initial program uses Initial programs can interact with workstations to get input values from a workstation user. When an initial program is called, it cannot receive parameter values. An initial program can be used in one of two ways. To establish an initial environment for the user entering commands. For example, the library list can be changed or print files and message files can be overridden. When an initial program completes its function and returns to QSYS/QCMD, the initial menu is displayed. As the controlling program for the job. If the initial program does not return to QSYS/QCMD, it becomes the controlling program for the routing step. The initial menu is not displayed. The user can only request those functions available through the initial program. For example, a menu can be displayed with specific application options. The user can only perform the functions on the menu. One example of such an option is sign off. If the SIGNOFF command is run, the job ends and the system Main menu is never displayed. If you use this approach, consider using the user profile option INLMNU to ensure that no menu is displayed. An initial program can be written so that when a return is issued, it either does or does not return to QSYS/QCMD. If the initial program returns to QSYS/QCMD, the initial menu is displayed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-13

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Work management: Interactive

• Interactive users might not all use the same applications. • Some users might require page protection for faster service: ƒ Telephone sales ƒ Customer representatives ƒ Face-to-face customer interactions

• Separate pools will protect pages and provide better performance for the more important users’ jobs: ƒ By default, all interactive users run in the same pool ƒ Work management and standard security functions can be used to provide different pools to different users

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-12. Work management: Interactive

A interactive job is started when a person signs on to a workstation.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-14

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Pool sizes and paging

• Each storage pool holds information needed by the jobs that are • • • •

running in the pool. Information needed by one or more jobs that are not in main storage must be read into main storage. If the job that requested the page waits for the operation to complete before continuing, the operation is called a synchronous I/O. Most synchronous I/O operations are called page faults or faults. By using the Work with System Status (WRKSYSSTS) display or the IBM Navigator for i screens, you can observe the performance characteristics of the system.

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-13. Pool sizes and paging

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-15

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Pool benefits

• You can control work done in a subsystem by controlling the number and size of pools. The greater the pool size, the more work can be done in a subsystem.

• Shared storage pools allow the system to distribute storage requirements of interactive jobs across multiple subsystems, still allowing them to run in the same storage pool.

• Multiple pools can separate the amount of work done and influence the response time for jobs.

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-14. Pool benefits

You can control how much work can be done in a subsystem by controlling the number and the size of the pools. The greater the size of the pools in a subsystem, the more work can be done in it. Using shared storage pools allows the system to distribute the storage requirements of interactive users across multiple subsystems, still allowing their jobs to run in the same storage pool. Multiple pools in a subsystem help you control the competition between jobs for system resources. The advantage of having multiple pools in a subsystem is that you can separate the amount of work that is done, and influence the response time for these jobs. For example, during the day you might want interactive jobs running with a good response time. For better efficiency, you can make the interactive pool larger. At night, you might be running many batch jobs, so you could make the batch pool larger. Do not divide the work too much because that makes it more difficult to tune and manage the environment.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-16

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Pages The system moves what it needs or thinks it will need into memory. Memory (Main storage) *INTERACT

P3 P4

Disk (Auxiliary storage)

G1 G2 G3 G4

F6

P1

P2

P3

P4

P5

P6

F1 F2

F3

F4

F5

F6

F7 F8

G1

G2

G3

G4

G5

F7

P5

G5 F8

Work management: Job processing concepts and interactive jobs

Program *PGM File *FILE Process access group (PAG)

© Copyright IBM Corporation 2001, 2016

Figure 13-15. Pages

The system moves objects that it needs from auxiliary storage to main storage in storage pool pages. This is normal system activity that occurs all the time. The entire object that a job needs does not have to be in memory for the job to use it. Only those pages of the object that the job currently needs for processing must be in memory. A page fault occurs when a page that is referred to by an active program is not in main storage. On a RISC machine, one page is 4096 bytes. Too many page faults impact performance. There is a lot of information that a job needs in memory in order for it to function. We are familiar with some of the objects it needs, and unfamiliar with others such as the Process Access Group (PAG). A PAG is a group of job-related objects that can be paged out of storage in a single operation when a job (process) enters or leaves a long wait.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-17

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

How objects are stored on disk Objects are not stored contiguously on disk.

A

A A

A

When the system needs an object, or part of an object, it might have to read it from more than one disk. Internal pointers logically link together the whole object. Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-16. How objects are stored on disk

Objects stored on auxiliary storage are not stored contiguously. This is sometimes called scatter loading. Bringing an object into memory might take reads from several disks.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-18

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

How do faults affect performance?

The more faults, ...the more disk I/Os ...the higher the CPU use ...the longer the response time

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-17. How do faults affect performance?

The more page faults occur, the more times a job has to go to the disk to retrieve data. This can have a negative effect, not just on this job, but on others that are waiting for data from the disk.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-19

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

DB versus non-DB page faults

• Database page faults occur when the following are needed but are not in memory: ƒ Database data ƒ Access paths (the logical organization of data in a database file)

• Non-database page faults occur when the following are needed but are not in memory: ƒ Program code ƒ Job information ƒ Data queue information

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-18. DB versus non-DB page faults

There are two types of page faults: Database and non-database (NDB). • Database page faults occur when a file or part of a file, or an access path, is needed but is not in memory. • NDB page faults occur when objects such as programs (*PGM) or data queues (*DTAQ) are needed in memory.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-20

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Active Pools: Page faults

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-19. Active Pools: Page faults

The system keeps track of database and non-database page faults. Both figures are the number of faults per second. The database category includes pages containing database data or access paths. The non-database category includes pages other than database pages. At the top of the window, the elapsed time is shown. Use F5 or select Options > Refresh to update the statistics. Non-database Faults: This value indicates the number of times per second that a page (other than data) was requested but was not in main storage. Non-database Pages: The rate per second that pages (other than data) are read into main storage. Current size: The amount of main storage available for pages that are needed. When requests are made for pages, the pool that is to contain the page will be specified. To work with Active Pools using IBM Navigator for i, you have to: 1. Open web browser http://:2001. 2. Log on to the IBM Navigator for i. 3. On the left pane, expand Work Management. 4. Click Active Memory Pools link. In 5250 use WRSSYSSTS command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-21

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Paging (1 of 2) JOB1

JOB2

JOB3

Needs 9 pages

Needs 11 pages

Needs 10 pages

Memory = fixed size J1

J1

J1

J1

J2

J2

J2

J1

J2

J1

J1

J1

J2

J2

J2

J1

J2

J2

J2

J2

There are not enough pages for JOB3 to be contained in memory. Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-20. Paging (1 of 2)

When a page is brought into memory, it might not stay in memory for as long as it is needed. This occurs when more jobs try to run than those that can fit in memory. • Jobs J1 and J2 are in memory. • Job J3 needs memory but there are not enough pages for it to fit in memory with the other two jobs. • Job J3 needs to steal pages that are in use by the other jobs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-22

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Paging (2 of 2) Memory J1

J1

J1

J3

J2

J2

J3

J3

J2

J3

J2

J3

J1

J3

J2

J2

J3

J1

J2

J2

J3

J3

J2

J3

Work management: Job processing concepts and interactive jobs

Disk

J1

J1

J2

J2

J1

J1

© Copyright IBM Corporation 2001, 2016

Figure 13-21. Paging (2 of 2)

What happens to a page depends on how it has been handled: • If it has not been changed or recently used, the page can be stolen. • If it has been changed but has not been used recently, it is written to disk before it is stolen. • If it has been stolen, it must be returned to memory before it can be re-used. In order for the job J3 to be loaded into memory, several pages of job J1 and job J2 are moved to disk. In order for job J3 to fit into memory, it must take pages from job J1 or job J2, or both. Stolen pages are written to disk. When J1 or J2 needs those pages again, the system must redo work that it has already done to bring them back into memory. The system must repage. When J1 or J2 needs additional pages in memory, it too will probably have to steal pages from other jobs that are running. Because there is not enough room for all jobs to fit into memory at the same time, jobs will continue to steal pages from each other, and the system will have to do a lot of repaging to keep up with the requirements of a job.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-23

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Paging of interactive jobs CUST NO.___________ NAME______________ ADDRESS___________ CITY/ST_____________

ENTER

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-22. Paging of interactive jobs

Not all interactive jobs require pages of memory at the same time. A job that is waiting for a user to press Enter does not need its pages in memory. Only when the user presses Enter does the job need its pages in memory again. A job really needs its pages in memory only when it requires processing. While a user is typing in data, there is no need for a job to keep its pages in memory. By writing the pages of memory to disk for jobs that do not currently need their pages in memory, the operating system makes it easier for other jobs to read their needed pages into memory.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-24

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

How does paging affect performance?

The more paging, ...the more disk I/Os ...the higher the CPU use ...the longer the response time

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-23. How does paging affect performance?

Page swapping is a normal activity, but you want to minimize it. Avoid having too many jobs compete for the same pool of memory. Keeping page swapping to a minimum improves performance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-25

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

How to ensure the system has enough memory?

Goal The goal is to have enough memory so that once a job brings the pages it needs into memory, it is able to use them before they are stolen by another job.

Methodology Either increase the amount of memory, or reduce the number of jobs competing for it.

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-24. How to ensure the system has enough memory?

One of the methods to be sure that the system has enough memory is increase the amount of the memory or reduce the number of jobs competing for it.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-26

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Pool activity level The pool activity level is the maximum number of threads that can be active in a fixed amount of memory at any one time.

Memory (Activity level = 9) T1

T3

T4

T6

T5

T2

T1

T3

T4

T6

T7

T8

Ineligible queue

T7

T5

T9

T2

Thread 10

T8

T7

T9

T1

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-25. Pool activity level

The activity level of a storage pool is the number of threads that can be active at the same time in a storage pool. A thread is an independent unit of dispatchable work. Each job has at least one thread, the initial thread. What happens if the activity level is nine and a tenth thread needs pages in memory? It goes to an ineligible queue, where the system keeps track of those threads waiting for an activity level. If a job needs memory but all the jobs that can compete for memory are active, the maximum number being determined by the activity level, the thread must wait until another thread leaves its activity level. This technique avoids a lot of repaging (thrashing) and reduces the total time that is required by all threads. An activity level does not affect the number of jobs that can be active in a system at one time.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-27

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

IBM i activity levels



Job 3

Job 2

Activity levels full

Job 30

Job 29

Yes Ineligible queue

No Main storage Job 1

Job 8

Work management: Job processing concepts and interactive jobs

Job 27

Job16 © Copyright IBM Corporation 2001, 2016

Figure 13-26. IBM i activity levels

Storage pool uses something called activity levels to control the maximum number of threads that can be active in a fixed amount of memory at any given time.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-28

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Active Pools: Activity level/transition data

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-27. Active Pools: Activity level/transition data

Memory Pool Activity Level Maximum eligible threads: The maximum number of threads that can run in the memory pool at the same time. For the base pool, the system value for the base memory pool activity level (QBASACTLVL) is set. When more threads are started than can run (current ineligible threads) at the same time because of the activity level controls, the excess threads have to wait to use the processing unit (normally this wait is short). The memory pool activity level lets you limit the amount of main memory contention in the various memory pools in your subsystems. The number of threads running (current threads) refers to the number of threads that are eligible to compete for the processor and that count against the activity level for a memory pool. In this sense, active threads do not include threads that are waiting for input, for a message, for a device to be allocated, or for a file to be opened. Active threads do not include threads that are ineligible (threads that are ready to run but where the memory pool activity level is at its maximum).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-29

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

State Transitions per Minute Active -> Wait: The rate, in transitions per minute, at which threads move from an active to a waiting condition. The thread no longer needs an activity level. Usually, this transition represents the system beginning its wait for the user to press Enter or a function key. Wait -> Ineligible: The rate, in transitions per minute, at which threads move from a waiting to an ineligible condition. This usually means that a user pressed Enter or a function key and that there was no available activity level. Active -> Ineligible: The rate, in transitions per minute, at which threads move from an active to an ineligible condition. The thread exceeded its time slice in an activity level. Paging option Determines whether the system should dynamically adjust the paging characteristics of the memory pool for optimum performance. Possible values are: ▪ Fixed: The system does not dynamically adjust the paging characteristics of the memory pool. It uses system-default values. ▪ Calculated: The system dynamically adjusts the paging characteristics of the memory pool for optimum performance. ▪ User-defined value set via API: The system does not dynamically adjust the paging characteristics of the memory pool. Rather, it uses values that have been defined through an application programming interface (API). It is possible that a system operator would be asked by a performance person to adjust the paging value. To provide an understanding of the function, you might explain that not all jobs use memory or disk in the same way. For instance, some BATCH jobs do very little I/O, while others are always reading and writing to disk. The formula that the system regularly uses to determine where to store new data can give one of these jobs better performance than the other. When the value for the Paging Option is *FIXED, the system uses a standard formula; when the value is set to *CALC, the system varies how it manages the space for a job which might give a job improved throughput; when the value is set to *USRDFN, the system uses values identified in an application programming interface (API) to adjust the paging characteristics. The value should not be altered until someone with a solid performance background has analyzed the system and determined that a change should be made to this value.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-30

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Review questions 1. A (blank) is an independent unit of dispatchable work. a. b. c. d.

Job Routing step Thread Work station entry

2. Which of the following is not considered a user job? a. b. c. d.

Autostart Batch Interactive Spool

3. An (blank) job is associated with a subsystem and that starts when the subsystem is started. a. b. c. d.

Interactive Autostart Prestart Spooling

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-28. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-31

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Review answers 1. A thread is an independent unit of dispatchable work. a. Job b. Routing step c. Thread d. Work station entry The answer is thread.

2. Which of the following is not considered a user job? a. Autostart b. Batch c. Interactive d. Spool The answer is spool.

3. An autostart job is associated that starts when the subsystem is started. a. Interactive b. Autostart c. Prestart d. Spooling The answer is autostart. Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-29. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-32

V11.0 Unit 13. Work management: Job processing concepts and interactive jobs

Uempty

Unit summary

• • • • • • •

Explain where work is processed on the system Explain the difference between a job and a thread List the types of system and users jobs that can be run on the system Explain when the different types of jobs start and end Explain the interactive job routing process Explain how paging works on the system Explain the different types of faults that can happen

Work management: Job processing concepts and interactive jobs

© Copyright IBM Corporation 2001, 2016

Figure 13-30. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

13-33

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Unit 14. Work management: Job processing concepts of other job types Estimated time 00:25

Overview Work management is the basis for all work that is handled in the IBM i system. To control and tune the performance of a system, you must understand how jobs are processed. This unit covers the other types of job processing (batch and spool job, autostart, communication, and prestart) and the relationships among the work management objects. We will also discuss how to track jobs through the system.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-1

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Unit objectives

• • • • • •

Explain where work is processed on the system Explain the function provided by the MAXACT attribute in a job queue Explain the function provided by the MAXPTYn attribute in a job queue Explain the batch job routing process Explain the function served by the timeslice attribute Explain the function served by the runpriority attribute

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-2

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Topic 1: Batch jobs and job tuning concepts

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-2. Topic 1: Batch jobs and job tuning concepts

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-3

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Batch jobs Subsystem Monitor Program

QSYS/QBATCH Subsystem Description

Main Storage

Attributes Maxjobs(*NOMAX) Storage Pools ID 1

*INTERACT

Storage *BASE

QBATCH

*BASE Job Queue Entry

JOBQ

Job Queue QGPL/QBATCH

Max Act 1

Work management: Job processing concepts of other job types

*MACHINE

© Copyright IBM Corporation 2001, 2016

Figure 14-3. Batch jobs

A batch job is a predefined group of processing actions submitted to the system to be performed with little or no interaction between the user and the system. Jobs that do not require user interaction to run can be processed as batch jobs. A batch job typically is a low priority job and can require a special system environment in which to run. Batch jobs run in the system background, freeing the user who submitted the job to do other work. Several batch jobs can be active at the same time. Batch jobs can be started when a user: • Causes a job to be placed in a job queue • Issues a communication program start request • Starts a subsystem with a prestart job • Uses the spawn() API When a user submits a batch job, the job gathers information from several system objects before it is placed on a job queue. 1. A user submits a job.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-4

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

2. The job searches for job attributes. If the job attributes are not found on the Submit Job (SBMJOB) command, the job looks in the job description (specified on the SBMJOB command), the current user's user profile, and the currently active job (the job issuing the SBMJOB command). Note: Similar to interactive job initiation, you can specify in the job description to use the user profile. The user profile can specify to use a system value to find certain job attributes. 3. Once the job has all of its attributes, it resides on the job queue. 4. When the subsystem is ready to handle a job, it looks for jobs in the job queues (those that the subsystem has allocated). 5. Then, like interactive job processing, the subsystem checks the job description for the routing data. 6. The subsystem uses the routing data to find a routing entry. The routing entry provides information about which pool the job uses, which routing program is used, and from which class the job gets its run-time attributes. 7. After this information is obtained, the routing program is run. If you use QCMD, QCMD carries out the SBMJOB command. It runs the command specified on the CMD or RQSDTA parameter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-5

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Job selection Job queue entries in subsystem description JOBQ SEQNBR MAXACT MAXPTY1 . MAXPTY9

`

:

JOBQA 1O

JOBQB 20

JOBQC 30

*NOMAX *NOMAX :

1 *NOMAX

1 *NOMAX

:

:

: JOB 2

JOB 4

JOB 1

JOB 3

JOB 5

Jobs 1 to 5 have equal priority. Which jobs run concurrently if the subsystem description has: MAXJOBS = 2 MAXJOBS = 3 MAXJOBS = 4 MAXJOBS = *NOMAX

?

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-4. Job selection

For a batch jobs the most important parameter is maximum concurent jobs running at the same time in a job queue. The parameter is set for job queue (MAXACT).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-6

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Batch job routing SBMJOB CMD(CALL PRPROC) RTGDTA(QCMDB) JOB(PAY) JOBQ(QBATCH) Subsystem Monitor Program

1) QBATCH Subsystem Description

PAY

Max Jobs - *NOMAX Job Queue Entry Job Queue QBATCH

2)

Max Act 1

JOBQ QBATCH

Max Pty(n) *NOMAX

Routing Entry SEQNBR CMPVAL PGM CLASS POOL 9999 *ANY QCMD QBATCH 1 3)

4) CLASS QGPL/QBATCH Run Priority

6) CALL PRPROC

5) QSYS/QCMD *BASE

JOB MSGQ PAY

7) PRPROC Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-5. Batch job routing

The subsystem uses the routing data to find a routing entry. The routing entry provides information about which pool the job uses, which routing program is used, and from which class the job gets its run-time attributes. After this information is obtained, the routing program is run. If you use QCMD, QCMD carries out the SBMJOB command. It runs the command specified on the CMD or RQSDTA parameter

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-7

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Batch tuning: A pool for batch jobs

• • • •

By default, batch jobs are submitted to the QBATCH JOBQ. QBATCH will initiate the jobs from the QBATCH JOBQ. Batch jobs will run in *BASE. Some potential problems: ƒ *BASE contains a lot of different jobs: í í í í

Monitors Servers Routers And so on

ƒ Batch jobs are the lowest priority jobs in *BASE. ƒ TSE (Time Slice End) jobs might make the situation worse.

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-6. Batch tuning: A pool for batch jobs

QBatch is the Batch Subsystem job queue. The QBATCH jobq exist in QGPL library.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-8

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Performance runtime attributes: Timeslice

• Timeslice indicates the amount of uninterrupted CPU time a job can use during a single turn in an activity level: ƒ Jobs are interrupted only by long waits (record locks or display waits) ƒ TIMESLICE resets at each interrupt

• If timeslice is exceeded and a job with the same priority is waiting, the system will: ƒ Interrupt the job ƒ Remove the job from main storage

• In addition, more frequent interrupts called Internal Timeslice will interrupt the job but will not remove it from main storage • Batch jobs usually exceed timeslice many times while interactive jobs do not exceed timeslice very often • Default timeslice is five seconds for batch jobs, two seconds for interactive jobs

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-7. Performance runtime attributes: Timeslice

Time slice (TIMESLICE) Specifies the maximum amount of processor time (in milliseconds) given to each thread in a job using this class before other threads in a job or other jobs are given the opportunity to fun. The time slice establishes the amount of time needed by a thread in a job to accomplish a meaningful amount of processing. At the end of the time slice, the thread might be put in an inactive state so that other threads can become active in the storage pool. 2000 A maximum run time of 2000 milliseconds is allocated to each thread each time it is allowed to process. 0-9999999 Specify the maximum amount of time (in milliseconds) that each thread in a job using this class can have to run when it is given processing time. Note: Although you can specify a value of less than 8, the system takes a minimum of 8 milliseconds to run a process. If you display a job’s run attributes, the time slice value is never less than 8.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-9

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Performance runtime attributes: Run priority

• Run priority (RUNPTY) is used to determine the order in which jobs are chosen to use a processor. • RUNPTY for batch jobs defaults to 50. • RUNPTY for interactive jobs defaults to 20. • The system determines which jobs use a processor by either of two methods: ƒ Fixed priority ƒ Dynamic priority (the system default)

• When available, the system will try to assign a job to use the processor. This is a function called task dispatching.

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-8. Performance runtime attributes: Run priority

Run priority (RUNPTY) Specifies the run priority of jobs that use the class. Run priority is a value ranging from 1 (highest priority) through 99 (lowest priority) that represents the priority at which the job competes for the processing unit relative to other jobs that are active at the same time. For multi-threaded jobs, the run priority is also the highest run priority allowed for any thread within the job. Individual threads within the job might have a lower priority. This value represents the relative, not absolute, importance of the job. For example, a job with a run priority of 25 is not twice as important as one with a run priority of 50. 50 Jobs that use this class have a run priority of 50. 1-99 Specify the run priority of jobs this class.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-10

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Multiple types of batch jobs

• There are three general types of batch jobs: ƒ Production batch job submitted by the system operator: í í

Process a lot of data Run for a long time

ƒ Programming job submitted by a batch programmer: í í í

Process very little data Run for a long time For example, a program compile

ƒ User batch job submitted by production users: í í

Processing characteristics are unpredictable Run time is unpredictable

• Running these different styles of jobs in the same storage pool might not work well. • Running different batch job types in different storage pools: í í í

Protects pages Reduces I/O Improve run time

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-9. Multiple types of batch jobs

Batch jobs can be submitted by the system operator, programmers, and other users.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-11

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Topic 2: QSPL subsystem

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-10. Topic 2: QSPL subsystem

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-12

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

STRSBS QSPL 1) Subsystem monitor program

QSYS/QSPL subsystem description

Main storage

Attributes

*SPOOL

Maxjobs *NOMAX 2) Storage Pools

ID 1 2

Storage *BASE *SPOOL

*INTERACT (3)

QSPL

*BASE Job Queue Entry Job Queue QGPL/QSPL

JOBQ

Max Act *NOMAX

*MACHINE

Note: Spool job routing is identical to batch Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-11. STRSBS QSPL

The job routing for QSPL is identical to that of batch. When the QSPL subsystem start two memory pools will be use *SPOOL and *BASE. A reader job is a spooled input job, and a writer job is a spooled output job. Reader A reader job reads batch job streams from database files, and places the jobs on a job queue. The reader job is part of input spooling and is an IBM-supplied program. Writer A writer job writes records from printer output files (also called spooled files) to a printer. The writer job is an IBM-supplied program, started in the spooling subsystem where it selects files from the output queue to be printed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-13

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Topic 3: Autostart jobs

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-12. Topic 3: Autostart jobs

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-14

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Autostart jobs QBATCH Subsystem description

1) Subsystem monitor program Job description startup

Main storage

Attributes Maxjobs *NOMAX Storage Pools ID 1

User name Job queue Job priority Output priority Routing data QCMDI Request data 4) CALL START Initial library list More . . .

Storage *BASE

*SPOOL

*INTERACT

*BASE 2) Autostart job entry 3)

*MACHINE Job description STARTUP Program START

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-13. Autostart jobs

Autostart jobs An autostart job is a batch job doing repetitive work, one-time initialization work that is associated with a particular subsystem, initializes functions for an application, or provides centralized service functions for other jobs in the same subsystem. An autostart job in the controlling subsystem can be used to start other subsystems (as does the IBM-supplied controlling subsystem). The autostart jobs associated with a subsystem are automatically started each time the subsystem is started. To add an autostart job entry to the subsystem description, use the Add Autostart Job Entry (ADDAJE) command. When the subsystem starts the autostart job, it uses the job description specified in the autostart job entry to determine the routing data (RTGDTA) and tries to match that to the compare value in the routing entries defined in the subsystem description. When a match is found, other information in the routing entry is used to establish the work environment for the job such as the class that will be used and the program that will be run. When the program name in the routing entry is QCMD, the command processing program will look for the request data or command (RQSDTA) on the job message queue. The request data is found in the job description for the autostart job entry.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-15

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

If more than one autostart job is specified for a subsystem, all autostart jobs are started immediately rather than one followed by another. If the value specified for the maximum jobs in subsystem (MAXJOBS) is exceeded, no other jobs can be started in the subsystem until enough autostart jobs have completed so that the number of jobs running is below the maximum jobs. The job description that is used for an autostart job is specified using the Add Autostart Job Entry (ADDAJE) command. When the subsystem is started, the job operates under the user profile name in the specified job description. You can not specify the job description which contains USER(*RQD). Because the autostart job operates under the user profile that is specified by the job description, you need to control who is allowed to change the job description.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-16

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Topic 4: Communication jobs

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-14. Topic 4: Communication jobs

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-17

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Communication jobs QCMN subsystem description

Subsystem monitor program

Main storage

Attributes

*SPOOL Maxjobs *NOMAX Storage Pools Communications network

ID 1

Storage *BASE

*INTERACT

Line

*BASE Control Unit

Communications entry

Device

Dev *ALL

Jobd *USRPRF

*MACHINE

Mode

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-15. Communication jobs

A communications job is a batch job that is started by a program start request from a remote system. Job processing involves a communication request and appropriate specifications. For a communications batch job to run on an IBM® i system, a subsystem description containing a work entry for communications jobs must exist on the system. The communications work entry identifies to the subsystem the sources for the communications job it processes. The job processing begins when the subsystem receives a communications program start request from a remote system and an appropriate routing entry is found for the request. Routing data for communication jobs Job routing of communications jobs is determined by the program start request that is received from the remote system. When a program start request is processed on the target system, a fixed-length data stream that is used as routing data is created. Position 25 of the routing data always contains PGMEVOKE for communications requests. Subsystem routing entries that specify a compare value of PGMEVOKE in position 29 typically have *RTGDTA as the program name. This means that the program name specified in the routing data (from the remote system's program start request) is the program to run. If a special processing environment is required for certain communications jobs, you can add an additional routing entry to the subsystem description, specifying a compare value whose starting position is 37. This compare value should contain the program name for the program start request. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-18

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

The routing entry must have a sequence number lower than the routing entry that uses PGMEVOKE as the compare value. This method allows certain communications jobs to run with a different class or pool specification. Security The security on the system controls who can use communications devices as well as who can access the commands used with the associated device descriptions. You should consider additional security measures when writing and running application programs on both remote and target systems. Job description for communication jobs The job description used for communications jobs is specified on the Add Communications Entry (ADDCMNE) command. The user specified on this job description is ignored. The system gets the user name for communications jobs from the program start request. If the program start request does not specify a user name, the system uses the default user value from the communications entry. To ensure a greater degree of system security, include user information about the program start request rather than specifying a default user in the communications work entry.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-19

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Topic 5: Prestart jobs

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-16. Topic 5: Prestart jobs

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-20

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Prestart jobs QBATCH subsystem description

Subsystem monitor program Prestart job entry

Main storage

Attributes Maxjobs *NOMAX Storage Pools

attributes Subsystem description Program name User profile Job name Job description Start jobs Initial # jobs Max # prog. requests Pool ID Class

ID 1

Storage *BASE

*SPOOL

*INTERACT

*BASE Prestart job entry

*MACHINE

Job Program Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-17. Prestart jobs

A prestart job is a batch job that starts running before a work request is received. The prestart jobs are started before any other types of jobs in a subsystem. Prestart jobs are different from other jobs because they use prestart job entries (part of the subsystem description) to determine which program, class, and storage pool to use when they are started. Within a prestart job entry, you must specify attributes that the subsystem uses to create and manage a pool of prestart jobs. Use prestart jobs to reduce the amount of time required to handle a work request. Two types of prestart jobs exist. Each type handles different types of requests. Before a job waits for its first request, it will be shown as Prestart only because the system does not know yet what type of requests the job will handle. Prestart communications The job is a communications batch job that starts running before a remote system sends a program start request. Prestart batch The job is a batch job that starts before a work request is received. A prestart job starts before a work request is received, either when the subsystem starts or as a result of the Start Prestart Jobs (STRPJ) command. Prestart jobs start from a prestart job entry (PJE) in the subsystem description. The prestart job entry specifies attributes such as what program to run in the prestart job, the user profile under which the prestart job starts running, the job description, the class used to specify the run-time attributes of the job, and the memory pool in which the prestart job runs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-21

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Prestart jobs can start and initialize themselves before a work request is received. This reduces the amount of time required to handle the requests. Prestart jobs provide the ability to initialize once and handle many requests so that a new job is not needed for every request. Many client/server applications use prestart jobs to handle the requests for the client user. Having a job ready to go makes the performance better in this situation because the prestart job can start processing the request for the user immediately. Note The value specified for the maximum number of jobs in the subsystem can prevent prestart jobs from starting. If the maximum number of jobs in the subsystem is exceeded, no prestart jobs can be started. When enough jobs have completed so that the number of jobs running is below the maximum number of jobs in the subsystem, prestart jobs in the subsystem can start.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-22

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Work management objects IBM i

Subsystem

Job thread

SBSD Work entries

JOBD

Routing entries

Class

Pools

Work management: Job processing concepts of other job types

Program

© Copyright IBM Corporation 2001, 2016

Figure 14-18. Work management objects

Whether you are new to work management or have been using work management tools for years, these work management concepts might be useful for you. The structure of your system After receiving your IBM i product, you might want to know what subsystems are included with the system, whether you need to change any start-up programs, and what kind of user interface you will work with. Subsystems The subsystem is where work is processed on the system. A subsystem is a single, predefined operating environment through which the system coordinates the work flow and resource use. The system can contain several subsystems, all operating independently of each other. Subsystems manage resources. Memory pools A memory pool is a logical division of main memory or storage that is reserved for processing a job or group of jobs. On your system, all main storage can be divided into logical allocations called memory pools. By default, the system manages the transfer of data and programs into memory pools.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-23

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Jobs All work done on a system is performed through jobs. Each job has a unique name within the system. All jobs, with the exception of system jobs, run within subsystems. A job can enter the subsystem from any of the work entries, such as a job queue entry, workstation entry, communications entry, autostart job entry, or prestart job entry. Job scheduling options The job schedule function allows for time-dependent scheduling of IBM i batch jobs. You can schedule jobs to be released from the job queue at a particular time, or you can use a job schedule entry to submit your job to the job queue automatically at the time you specify. Job scheduling allows you to control the date and time a batch job is submitted to or becomes eligible to start from a job queue. This flexibility can help you as you balance the work load on your system. Job queues A job queue contains an ordered list of jobs waiting to be processed by a subsystem. The job queue is the first place that a submitted batch job goes before becoming active in a subsystem. The job is held here until a number of factors are met. Output queues Output queues are areas where printer output files (also called spooled files) wait to be processed and sent to the printer. Printer output is created either by the system or by the user using a print file. Job logs A job log contains information related to requests entered for a job. A job log has two forms, a pending form and a spooled form. Job accounting The job accounting function gathers data so that you can determine who is using your system and what system resources they are using. It also assists you in evaluating the overall use of your system. Job accounting is optional. You must take specific steps to set up job accounting. You can request the system to gather job resource accounting data, printer file accounting data, or both. You can also assign accounting codes to user profiles or specific jobs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-24

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Performance tuning education

IBM i Performance Tuning - I: IBM i Structure, Tailoring and Basic Tuning Course code: OL23G Skill level: Intermediate Delivery type: Classroom Duration: 2.0 days

IBM i Performance Tuning - II: Advanced Analysis and Capacity Tuning Course code: OL66G Skill level: Intermediate Delivery type: Classroom Duration: 2.0 days

http://www.ibm.com/training

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-19. Performance tuning education

IBM i Performance Tuning - I: IBM i Structure, Tailoring and Basic Tuning Course code: OL23G This classroom course of two days explains how to balance the workload on the IBM i system to ensure optimum performance. Specifically, this course explains how to manage workloads, measure system performance, and tune the operating system to meet processing requirements. Hands-on exercises give you the opportunity to use the system functions that are available for controlling workload and tuning system performance. Evaluation criteria presented in this course are based on the latest information available from IBM development labs. IBM i Performance Tuning - II: Advanced Analysis and Capacity Tuning Course code: OL66G This course will help you to better understand the techniques of performance analysis and capacity planning on systems and partitions running IBM i and develop an appreciation of how IBM i operates and interfaces with applications. This course is expected to build skills to better manage performance and capacity on systems and partitions running IBM i. The course explains IBM i concepts, including the Technology Independent Machine Interface (TIMI), main storage pools, auxiliary storage pools, management of jobs, threads, and tasks, job run-time structure, performance monitoring, data collection, and analysis of performance data. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-25

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

This 4-day course includes hands-on activities using performance data from IBM i systems to help the student appreciate the concepts discussed. This course is designed for those running Power Systems on IBM i. While it includes i 7.2 content, it is suitable for those currently using prior versions of IBM i. The first day of class (units 1-6) focuses on teaching the performance management process, the performance considerations of key hardware components and virtualization options, and tuning options to help optimize performance. During these lectures, students should gain an appreciation of the unique storage management and work management components in the IBM i architecture and how these components need to be managed for optimal performance. Days 2-4 of the class focus on the tools and techniques to monitor, analyze, and plan for performance of Power Systems with IBM i and Logical partitions (LPARs). The primary analysis tool that will be used is the Performance Data Investigator (PDI) which is included with IBM Navigator for i. PDI is also used with IBM Systems Workload Estimator (WLE) for capacity planning activities.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-26

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Review questions (1 of 2) 1. The (blank) specifies the maximum number of jobs that can be concurrently active from a job queue. A. B. C. D.

SEQNBR MAXACT MAXPTYn MAXJOBS

2. The (blank) can limit the number of jobs of a specific priority that can be released at one time from the job queue. A. B. C. D.

SEQNBR MAXACT MAXPTYn MAXJOBS

3. True or False: Timeslice indicates the amount of uninterrupted CPU time a job can use during a single turn in an activity level. Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-20. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-27

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Review answers (1 of 2) 1. The MAXACT specifies the maximum number of jobs that can be concurrently active from a job queue. a. SEQNBR b. MAXACT c. MAXPTYn d. MAXJOBS The answer is MAXACT.

2.

The MAXPTYn can limit the number of jobs of a specific priority that can be released at one time from the job queue. a. SEQNBR b. MAXACT c. MAXPTYn d. MAXJOBS The answer is MAXPTYn.

3. True or False. Timeslice indicates the amount of uninterrupted CPU time a job can use during a single turn in an activity level. The answer is true. Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-21. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-28

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Review questions (2 of 2) 4. True or False: Run priority is used to determine the order in which jobs are chosen to use a processor. 5. True or False: Autostart jobs can only run on specific subsystems. 6. True or False: The job routing for QSPL is identical to that of batch. 7. Which of the following is the supplied subsystem used to run communication jobs? a. b. c. d.

QINTER QBATCH QBATCH QCMN

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-22. Review questions (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-29

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Review answers (2 of 2) 4. True or False: Run priority is used to determine the order in which jobs are chosen to use a processor. The answer is true.

5. True or False: Autostart jobs can only run on specific subsystems. The answer is false.

6. True or False: The job routing for QSPL is identical to that of batch. The answer is true.

7. Which of the following is the supplied subsystem used to run communication jobs? a. QINTER b. QBATCH c. QBATCH d. QCMN The answer is QCMN. Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-23. Review answers (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-30

V11.0 Unit 14. Work management: Job processing concepts of other job types

Uempty

Unit summary

• • • • • •

Explain where work is processed on the system Explain the function provided by the MAXACT attribute in a job queue Explain the function provided by the MAXPTYn attribute in a job queue Explain the batch job routing process Explain the function served by the timeslice attribute Explain the function served by the runpriority attribute

Work management: Job processing concepts of other job types

© Copyright IBM Corporation 2001, 2016

Figure 14-24. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

14-31

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Unit 15. Work management: Submitting and tracking of batch jobs Estimated time 00:20

Overview This unit will discuss batch processing and spooling. We will look at the ways to submit batch jobs and how to track these jobs as they go through the system. The spooling readers and writers are system batch jobs which are used by interactive and jobs when they generate print output. We are going to discuss how spooling interfaces with the user's job and how to control readers and writers.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-1

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Unit objectives

• Describe what command is used to submit a job to run in batch mode • Explain the process on the system when a job is submitted to run in • • • • •

batch Explain how to schedule a batch job List and explain the commands you can use to track jobs on the system Explain how data management intercepts output generated by a program Explain the function of a printer device file Explain the decision process used by the system to determine where to send your output

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-2

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Putting a job on a job queue SBMJOB

CMD(Command to run)

+

DEFAULT TO *CURRENT PRTDEV OUTQ USER PRTTXT SYSLIBL CURLIB INLLIBL

PARAMETERS BELOW

DEFAULT TO *JOBD SCDDATE SCDTIME SBMFOR SRTSEQ LANGID CNTRYID CCSID

Work management: Submitting and tracking of batch jobs

JOB JOBQ JOBPTY OUTPTY LOG LOGCLPGM INQMSGRPY HOLD DATE SWS JOBMSGQMX JOBMSGQFL ALWMLTTHD

OTHER DEFAULTS

JOBD(*USRPRF) RTGDTA(QCMDB) RQSDTA(*CMD) DSPSBMJOB(*YES) MSGQ(*USRPRF) CPYENVVAR(*NO)

© Copyright IBM Corporation 2001, 2016

Figure 15-2. Putting a job on a job queue

The Submit Job (SBMJOB) command allows a job that is running to submit another job to a job queue to be run later as a batch job. Only one element of request data can be placed on the new job's message queue. The request data can be a CL command if the routing entry used for the job specifies a CL command processing program (such as the IBM-supplied QCMD program).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-3

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Submitting a batch job SBMJOB CMD(CALL PGMY) JOB(JOBY) JOBQ(QBATCH) RTGDTA(QCMDB) MONITOR JOB QUEUE QBATCH SUBSYSTEM PGM BATCH

JOBY

JOBQ

POOL

QBATCH

*BASE

Routing Entries RTGDTA= QCMDB

*BASE QCMD

SEQNBR

CMPVAL

PGM

CLS

10

QCMDB

QCMD

QBATCH

MAXACT *NOMAX

POOLID 1

JOB MESSAGE QUEUE - JOBY CALL PGMY

PGMY

QCMD Executes

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-3. Submitting a batch job

Since batch jobs are typically low priority jobs that require a special system environment in which to run (such as running at night) they are placed in batch job queues. In the job queue, the batch job receives a run-time schedule and a priority. To submit a job to a batch job queue, you use the character-based interface and one of two commands. Command: Submit Job (SBMJOB) Command: Submit Database Job (SBMDBJOB) The difference in these commands is the source of the job: The SBMJOB command submits a job to a batch job queue by specifying a job description and by specifying a CL command or request data, or specifying routing data to run a program. If you want to run a single CL command in a batch job, use the CMD parameter on SBMJOB, which does syntax checking and allows prompting. The SBMDBJOB command can be used to submit a job to a batch job queue from a database file. For these jobs, the job description comes from the BCHJOB statement in the input stream.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-4

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Inline data files An inline data file is a data file that is included as part of a batch job when the job is read by a reader or a submit jobs command. You use SBMDBJOB or STRDBRDR to queue a CL batch stream (stream of CL commands to be run). That CL batch stream can include data to be placed into inline data files (temporary files). When the job ends, the inline data files are deleted. Considerations for opening inline data files You need to consider these elements when you open inline date files.

1+1 2 Example In the following example, the SBMJOB command submits a job named WSYS, using the job description QBATCH, to the job queue QBATCH. The CMD parameter gives the CL command that will run in the job. SBMJOB JOBD(QBATCH) JOB(WSYS) JOBQ(QBATCH) CMD(WRKSYSSTS) Note: If you get a message that the job was not submitted, you can display the job log spooled file to find errors. Use the WRKJOB command. Specify the job that was not scheduled, select option 4 for spooled files. Display the job log spooled file to find the errors. A user submits a job. The job searches for job attributes. If the job attributes are not found on the Submit Job (SBMJOB) command, the job looks in the job description (specified on the SBMJOB command). Once the job has all of its attributes, it resides on the job queue. When the subsystem is ready to handle a job, it looks for jobs in the job queues (those that the subsystem has allocated). Then, like interactive job processing, the subsystem checks the job description for the routing data. The subsystem uses the routing data to find a routing entry. The routing entry provides information about which pool the job uses, which routing program is used, and from which class the job gets its run-time attributes. After this information is obtained, the routing program is run. If you use QCMD, QCMD carries out the SBMJOB command. It runs the command specified on the CMD or RQSDTA parameters user profile, and the currently active job (the job issuing the SBMJOB command).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-5

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Job message queue SBMJOB CMD(CALL PGMY) JOB(JOBY) Uses: – Diagnostic messages – Program termination messages – Commands JOBY

JOBQ

CALL PGMY

Allocated automatically by the system

Job Msg Queue Same name as job = JOBY Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-4. Job message queue

The job message queue is the same as the job.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-6

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Scheduling a batch job SBMJOB SCDDATE(

) SCDTIME(

)

or ADDJOBSCDE . . . Add an entry to the Job Schedule Object QDFTJOBSCD in QUSRSYS

WRKJOBSCDE ADD... CHG... HLD... RLS... RMV...

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-5. Scheduling a batch job

You can schedule a job to run using the Advanced Job Scheduler, by using the IBM® Navigator for i Job Properties window, or by changing the job schedule entry via the character-based interface 5250. In the 5250 interface, you can run WRKJOBSCDE command or ADDJOBSCDE you can also use SBMJOB with SCDDATE( ) SCDTIME( ). To schedule a job using IBM® Navigator for i, use the following instructions: • Expand Work Management > Job Queues > Active Job Queues or All Job Queues > The job queue that contains your job. • Right-click the job and click Properties. • On the Job Properties window, click the Job Queues tab. To schedule the job, use the options that are located under “When to make job available to run”. The IBM Advanced Job Scheduler for i (5770-JS1) licensed program is a powerful scheduler that allows unattended job processing 24 hours a day, 7 days a week. This scheduling tool provides more calendar features and offers greater control over scheduled events than the base scheduler. You can also view job completion history and manage notification of a job's status.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-7

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Putting jobs on a job queue: Summary QINTER Subsystem

ADDJOBSCDE Job Schedule Object entry . . . entry . . .

Interactive Jobs Workstation

Pool 2 SBMJOB JOBA JOBB JOBC

*INTERACT

Batch Jobs Pool1 *BASE

JOBQ

QSPL Subsystem Writers *SPOOL Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-6. Putting jobs on a job queue: Summary

On the diagram you can see the process of putting job to job queue.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-8

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Tracking jobs WRKJOBSCDE Job Schedule Object entry . . . entry . . .

QINTER Subsystem

Workstation

JOBA JOBB JOBC

WRKJOB WRKSBMJOB WRKACTJOB WRKUSRJOB WRKSBS

Interactive Jobs *INTERACT Batch Jobs *BASE

JOBQ WRKJOBQ QSPL

Subsystem

Writers *SPOOL Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-7. Tracking jobs

There are a lot of commands to control the job. From commands like WRKJOBSCDE, which allows you to prepare a job, through the command which allows you to control a job when it is running, to the commands which help you control output.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-9

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Spooling intercept Program

Device File QPRINT SPOOL(*YES)

Data Management

Spooling Intercept

QPRINT OUTQ

Work management: Submitting and tracking of batch jobs

Spooled File

Print Data

© Copyright IBM Corporation 2001, 2016

Figure 15-8. Spooling intercept

Spooling functions are performed by the system without requiring any special operations by the program that creates the output. When a program opens a printer file, the operating system determines whether the output is to be spooled by looking at the printer file SPOOL parameter. When a printer file specifying spooling is opened, the spooled file containing the output of the program (data to be printed) is placed on the appropriate output queue in the system. A spooled file can be made available for printing when the printer file is opened, when the printer file is closed, or at the end of the job. This is done by specifying a particular value on the schedule parameter. *IMMED makes the spooled file available to the writer as soon as the program is opened. *FILEEND makes the spooled file available to the writer as soon as the file is closed. *JOBEND makes the spooled file available to the writer as soon as the job is complete. This process of spooling prevents a potential job limitation imposed by the availability or speed of the printer devices. That is, the system can process application programs that generate printed output much faster than printers can print the output. By spooling (that is, sending the output to output queues to await printing), the system does not have to wait until the printing for that application program is complete before it can start processing the next application program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-10

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Spooling is especially important in a multiple-user environment where the number of jobs running often exceeds the number of available printer devices. Using spooling, output can be easily redirected from one output queue to another or from one printer to another.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-11

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Printer device file Program Writes to file QPRINT

Device file from CRTPRTF command

QPRINT SPOOL

=

(*YES)

OUTQ

=

(*JOB)

FORMTYPE

=

(*STD)

COPIES

=

(1)

SCHEDULE

=

(*FILEEND)

SAVE

=

(*NO)

DEV

=

(*JOB)

QPRINT OUTQ

More . . .

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-9. Printer device file

When spooled files are created, the spooled file name is typically the same as the name of the printer file that was used to create it. For example, if the Print key is pressed, the spooled file is called QSYSPRT because QSYSPRT is the printer file used by the Print key operation. There are several ways in which the spooled file can have a different name: 1. The Override with Printer File (OVRPRTF) command was used and a name was specified in the SPLFNAME parameter. For example, typing the following command: OVRPRTF QSYSPRT SPLFNAME(REPORT1) causes the name of the spooled file to be REPORT1 instead of QSYSPRT. 2. The OVRPRTF command was used and a different printer file is specified in the TOFILE parameter. For example, typing the following command: OVRPRTF QSYSPRT TOFILE(PRTF2) causes the spooled file to be called PRTF2 (the name of the printer file specified in the TOFILE parameter of the OVRPRTF command). Some IBM applications might create spooled files that have names different from the printer files used to create them. Users have no control over spooled file names in this situation.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-12

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Printer and output queue defaults (1 of 2) Printer Device File OUTQ (*JOB) DEV (*JOB)

At job initiation, this search process determines the default output queue for the job.

Job Description OUTQ (*USRPRF) PRTDEV (*USRPRF)

User Profile OUTQ (*WRKSTN) PRTDEV (*WRKSTN)

Device Description PRTDEV (*SYSVAL) OUTQ (*DEV)

System Value QPRTDEV (PRTO1)

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-10. Printer and output queue defaults (1 of 2)

When a printer is configured to the system, the system automatically creates the printer's default output queue in library QUSRSYS. The output queue is given a text description of 'Default output queue for printer xxxxxxxxxx', where xxxxxxxxxx is the name assigned to the printer during configuration. The printer name is specified in the device description (DEVD) parameter. The AUT parameter for the output queue is assigned the same value as that specified by the AUT parameter for the printer device description. All other parameters are assigned their default values. Use the Change Command Default (CHGCMDDFT) command to change the default values used when creating output queues with the CRTOUTQ command. The default output queue for a printer is owned by the user who created the printer device description. In the case of automatic configuration, both the printer and the output queue are owned by the system profile QPGMR. The system is shipped with the defaults set to use the default output queue for the system printer as the default output queue for all spooled output. The system printer is defined by the Default printer (QPRTDEV) system value. When a spooled file is created by opening a printer file and the output queue specified for the file cannot be found, the system attempts to place the spooled file on output queue QPRINT in library QGPL. If for any reason the spooled file cannot be placed on output queue QPRINT, an error message is sent and the output is not spooled. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-13

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

When job starts first will be taken defaults from printer file after from job description and user profile and in the end from the device description and system value.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-14

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Printer and output queue defaults (2 of 2) QINTER Subsystem Interactive Jobs

Workstation

*INTERACT

Batch Jobs JOBA JOBB JOBC

*BASE

QPRINT

WRKOUTQ OUTQ

WRKJOB

JOBQ

WRKSPLF

QSPL Subsystem WRKSPLFA

Writers *SPOOL Work management: Submitting and tracking of batch jobs

Spooled Files

© Copyright IBM Corporation 2001, 2016

Figure 15-11. Printer and output queue defaults (2 of 2)

By default each job which want to print something sends data to default outq QPRINT. You can control the whole process using these commands: WRKJOB WRKOUTQ WRKSPLF WRKSPLFA

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-15

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Spool writers QINTER Subsystem

Interactive Jobs *INTERACT

QPRINT

Batch Jobs

OUTQ

*BASE

Spooled Files

QSPL

Subsystem

Writers *SPOOL Work management: Submitting and tracking of batch jobs

WRKWTR

© Copyright IBM Corporation 2001, 2016

Figure 15-12. Spool writers

The spooled file subsystem, QSPL, is used for processing the printer writer programs and must be active when printer writer programs are active. The spooled file subsystem and the individual printer writer programs can be controlled from jobs that run in other subsystems. The Start Printer Writer (STRPRTWTR) command submits writer jobs to the job queue of the spooled file subsystem. Requests for writer jobs are placed on the QSPL job queue, and the next entry on the QSPL job queue is selected to run if: • The number of active jobs is less than the QSPL subsystem attribute of MAXJOBS. • The number of active jobs from the QSPL job queue is less than the MAXACT attribute for the job queue. A writer is an IBM i program that takes spooled files from an output queue and produces them on an output device. The spooled files that have been placed on a particular output queue remain stored in the system until a writer is started to the output queue. The writer takes spooled files one at a time from the output queue, based on their priority. The writer processes a spooled file only if its entry on the output queue indicates that it has a ready (RDY) status. You can display the status of a particular spooled file using the Work with Output Queue (WRKOUTQ) command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-16

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

If the spooled file has a ready status, the writer takes the entry from the output queue and prints the specified job or file separators or both, followed by the output data in the file. If the spooled file does not have a ready status, the writer leaves the entry on the output queue and goes on to the next entry. In most cases the writer continues to process spooled files (preceded by job and file separators) until all files with a ready status have been taken from the output queue. The AUTOEND parameter on the start writer commands determines whether the writer continues to wait for new spooled files to become available to be written, end after processing one file, or end after all spooled files that have a ready status have been taken from the output queue.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-17

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Spooling summary Job queues: • Any number of job queues is allowed. • Ordered by job queue sequence number. • IBM shipped queues use sequence number. • More than one job queue can be activated in a subsystem. • Any job queue can be fed at any time.

Output queues: • Any number of output queues is allowed. • One output queue can be active to up to 10 printers at a given time. • Any output queue can be fed at any time by any program executing in the system.

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-13. Spooling summary

Job queues: • Any number of job queues is allowed. • Ordered by job queue sequence number. • IBM shipped queues use sequence number. • More than one job queue can be activated in a subsystem. • Any job queue can be fed at any time. Output queues: • Any number of output queues is allowed. • One output queue can be active to up to 10 printers at a given time. • Any output queue can be fed at any time by any program executing in the system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-18

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Review questions 1. True or False: The submit job command is used to run an interactive job. 2. Which of the following objects is checked first by work management when the system is trying to determine where to send your output? a. b. c. d.

User profile System value Printer device file Job description

3. True or False: The submit job command allows you to specify a schedule date and time for a job.

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-14. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-19

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Review answers 1. True or False: The submit job command is used to run an interactive job. The answer is False.

2. Which of the following objects is checked first by work management when the system is trying to determine where to send your output? a. User profile b. System value c. Printer device file d. Job description The answer is Printer device file.

3. True or False: The submit job command allows you to specify a schedule date and time for a job. The answer is True.

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-15. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-20

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Exercise: Work management: Job and subsystem management

• At the end of the exercise, you should be able to: ƒ Use system commands to determine job status and job definition ƒ Use system commands to locate and work with jobs on the system ƒ Use system commands to determine the relationship between active subsystems and allocated main storage ƒ Use system commands to submit batch work to the system and track it through completion

Systems to be used for class: Name

Teach system

TCP/IP Address

__________ __________

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-16. Exercise: Work management: Job and subsystem management

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-21

V11.0 Unit 15. Work management: Submitting and tracking of batch jobs

Uempty

Unit summary

• Describe what command is used to submit a job to run in batch mode • Explain the process on the system when a job is submitted to run in • • • • •

batch Explain how to schedule a batch job List and explain the commands you can use to track jobs on the system Explain how data management intercepts output generated by a program Explain the function of a printer device file Explain the decision process used by the system to determine where to send your output

Work management: Submitting and tracking of batch jobs

© Copyright IBM Corporation 2001, 2016

Figure 15-17. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

15-22

V11.0 Unit 16. Programming concepts

Uempty

Unit 16. Programming concepts Estimated time 00:10

Overview This unit is provided to teach the students how to write a simple Control Language (CL) program. In this unit, we will discuss the concepts of programming.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-1

V11.0 Unit 16. Programming concepts

Uempty

Unit objectives

• Discuss the concepts behind programming • Explain the steps involved in creating a program

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-2

V11.0 Unit 16. Programming concepts

Uempty

The manual process To back up a journal receiver, the following steps are required:

1. INZTAP

Prepare the tape for the SAVOBJ command.

2. CHGJRN

Create a new journal receiver and begin journaling to it.

3. SAVOBJ

Save the detached journal receiver.

4. DLTJRNRCV Delete the saved journal receiver from the system. Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-2. The manual process

You can create a program to perform the needed steps in the sequence you specify. The name of the CL program will be MIDDAY. Here is an example of a series of steps an operator would want to automate. You might never have heard of journaling or of a journal receiver, but the steps will still look logical. Rather than going into detail on each CL command concentrate on the process of grouping together a series of CL commands that must be run each day. Ask the instructor about explanation of a journal receiver as an object that holds a copy of each record changed in a file. Journaling makes it possible to recover a file up to the last record processed rather than to the last file backup. At noon, this company plans to set up a new receiver for the afternoon work and to back up the receiver used in the morning. These are a series of CL commands that a system operator enters on a daily basis to back up a journal receiver in the middle of the day. The operator enters these same CL commands in the same sequence every day. Wouldn't it be nice, then, to place those commands in a program that executed the commands in the proper sequence?

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-3

V11.0 Unit 16. Programming concepts

Uempty

The automated process: CL program INZTAP CHGJRN SAVOBJ DLTJRNRCV

Instead of typing the four commands, create a CL program. This program’s name is MIDDAY.

Program name = MIDDAY Object type = *PGM

Whenever you need to execute the commands in the program. You enter: CALL MIDDAY

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-3. The automated process: CL program

Because the commands are placed in a program called MIDDAY, operators now needs only to CALL the MIDDAY program. When they do this, the four commands will be executed in the correct sequence.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-4

V11.0 Unit 16. Programming concepts

Uempty

What is a program?

A program definition is a sequence of instructions that a computer can interpret and run.

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-4. What is a program?

You might also add that the instructions should be organized in a detailed and logical sequence. Next, we will look at the steps involved in creating a program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-5

V11.0 Unit 16. Programming concepts

Uempty

Steps involved in creating a program

The basic steps are as follows:

1. Design a program.

2. Type it into the system.

Programming concepts

3. Change the program into a form the system can use. © Copyright IBM Corporation 2001, 2016

Figure 16-5. Steps involved in creating a program

The steps to create a program are as follows: 1. Someone in the organization identifies the need for a program and the program is written. 2. The program, that is; its source code, is entered (keyed) into the system. 3. The source code is compiled and in the process is changed into an object type (either *PGM or *MODULE) that the system can process. Creating a CL program is easy. • First, someone identifies an idea for a program and the program is written. During this step, as the problem is analyzed, it might change. ▪ For example, a problem that first appeared simple can become complex. This will cause the program to change. • Second, the program is typed into the system by using a programming language. • Third, after it is keyed into the system, it needs to be translated into something the system can understand. Fourth, the program must be thoroughly tested. In the original program model (OPM), output from the compiler is identified to the system as object type *PGM. In the Integrated Language Environment (ILE), the output from the compiler is identified to the system as object type *MODULE. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-6

V11.0 Unit 16. Programming concepts

Uempty

What is needed to create a program? The following are needed to create a program: Knowledge of a programming language

PDM and SEU: Traditional green screen tool ƒ A compiler for the language in which your program is written

IBM Rational Developer for i - PC-based graphical tools ƒ Includes the compilers

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-6. What is needed to create a program?

The following are needed to create a program: • Knowledge of a programming language. Here are a couple of examples: ▪ CL commands ▪ RPG ▪ COBOL • SEU is the traditional tool used to create and change source and print members, and to copy records into a member from another member or spooled file. • IBM RD for i is a better toolset with more functions. • A compiler for the language in which your program is written. A compiler is a program that translates programming language into machine language that can be used by the system. IBM Rational Developer for i is an integrated development environment (IDE) built on the Eclipse platform. Designed for creating and maintaining applications on IBM i systems, it resides on the developer’s desktop, supporting development in both host-connected and disconnected modes.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-7

V11.0 Unit 16. Programming concepts

Uempty

The three editions of IBM Rational Developer for i represent the evolutions of products previously marketed under the following names: IBM Rational Developer for Power Systems Software RPG and COBOL Tools for i, IBM Rational Developer for Power Systems Software Power Tools for i, and IBM Rational Developer for i for SOA Construction.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-8

V11.0 Unit 16. Programming concepts

Uempty

Process for creating a CL program 1. Create a source physical file QCLSRC

2. Add member and edit source 3. Create program 4. Call the program

Object Type *FILE

Member MIDDAY

PGM INZTAP . . . CHGJRN . . . SAVOBJ . . . DLTJRNRCV . . . ENDPGM

More source members can be added. MIDDAY Object Type *PGM Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-7. Process for creating a CL program

A source physical file contains the uncompiled program source statements. A source physical file contains one or more source members. Each source member contains the source for one program or object. Generally, the source physical file name reflects the type of source that it contains. For example QCLSRC for CL programs, QRPGSRC for RPG programs, QDDSSRC for a DDS file source, and so on. You can have multiple QCLSRC files (in different libraries) each containing the source for CL programs for one library or one application.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-9

V11.0 Unit 16. Programming concepts

Uempty

Review questions 1. True or False: Tasks or operations that are repetitive in nature are prime candidates for a CL program. 2. True or False: Creating a CL program requires that you know either RPG or COBOL. 3. True or False: You can only create one source physical file on your system. 4. Which of the following source physical files is used to store RPG programs? A. B. C. D.

QCLSRC QCBLSRC QRPGSRC QDDSSRC

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-8. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-10

V11.0 Unit 16. Programming concepts

Uempty

Review answers 1. True or False: Tasks or operations that are repetitive in nature are prime candidates for a CL program. The answer is True.

2. True or False: Creating a CL program requires that you know either RPG or COBOL. The answer is False.

3. True or False: You can only create one source physical file on your system. The answer is False.

4. Which of the following source physical files is used to store RPG programs? a. QCLSRC b. QCBLSRC c. QRPGSRC d. QDDSSRC The answer is QRPGSRC. Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-9. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-11

V11.0 Unit 16. Programming concepts

Uempty

Unit summary

• Discuss the concepts behind programming • Explain the steps involved in creating a program

Programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 16-10. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

16-12

V11.0 Unit 17. CL programming concepts

Uempty

Unit 17. CL programming concepts Estimated time 00:35

Overview This unit is provided to teach the students how to write a simple Control Language (CL) program. In this unit, we will discuss some of the basics of CL programming.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-1

V11.0 Unit 17. CL programming concepts

Uempty

Unit objectives

• • • • •

Discuss the basic statement required in a CL program Discuss the basic structure of a CL program Explain some of the basic coding rules for a CL program Explain how to communicate between a user and the CL program Explain how to set up prompting for some of the CL commands or parameters

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-2

V11.0 Unit 17. CL programming concepts

Uempty

CL programs

• • • • •

Are compiled into executable code Can control work flow Can perform logical operations Can communicate with the user Can allocate required resources

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-2. CL programs

A couple of facts about CL programs: • Because they are compiled into executable code, they process faster than CL commands, which are not compiled. • They can control work flow and make logical decisions. • They can communicate with users to inform them, or to acquire information that is needed. • They can reserve resources so that they are available when they are actually needed. There are several different types of programs. • A control language (CL) program is a program that is created from source statements consisting entirely of control language commands. IBM i supports two types of programs. • An ILE program is a program written in an Integrated Language Environment (ILE)-conforming high-level language. ILE programs are IBM I objects that contain one or more modules. Modules cannot be run until they are bound into programs. These programs must have a program entry procedure. The CL compiler generates a program entry procedure in each module it creates. A single-module ILE program can be created using the Create Bound CL Program (CRTBNDCL) command. The Create Program (CRTPGM) command can be used to create an ILE program that contains module objects generated by different ILE compilers, including ILE CL.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-3

V11.0 Unit 17. CL programming concepts

Uempty

• An OPM CL program is a program that conforms to the original program model (OPM). OPM CL programs are objects that result from compiling source using the Create CL Program (CRTCLPGM) command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-4

V11.0 Unit 17. CL programming concepts

Uempty

Commands allowed in CL programs

• Thousands of CL commands are shipped with the system • Most CL commands are allowed in CL programs

GOTO SNDMSG

SAVLIB CHKOBJ

VRYCFG STRPRTWTR

CL programming concepts

SAVOBJ DSPMSG

© Copyright IBM Corporation 2001, 2016

Figure 17-3. Commands allowed in CL programs

Thousands of CL commands are shipped as part of the base operating system and optionally installable parts of the base operating system. Other CL commands are shipped with licensed program products (LPPs). For example: • The Start Performance Tools (STRPFRT) command is shipped with Performance Tools. • The Work with Saved Objects Using BRM (WRKOBJBRM) command is shipped with Backup, Recovery, and Media Services (BRMS).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-5

V11.0 Unit 17. CL programming concepts

Uempty

Some familiar CL programming commands The following are examples of commands that can be used in CL programming:

• CALL • CHKOBJ • CHKTAP • CRTSAVF • DSPMSG • RSTLIB • RSTOBJ

• SAVLIB • SAVOBJ • SNDMSG • SNDBRKMSG • STRPRTWTR • WRKOUTQ • WRKWTR

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-4. Some familiar CL programming commands

You have probably used all of these commands by entering them on a command line or executing them by using a menu option. All of these commands can be used in a CL program. In fact, most other commands can be used in a CL program as well. • CALL (Call Program) -SAVLIB (Save Library) • CHKOBJ (Check Object) - SAVOBJ (Save Object) • CHKTAP (Check Tape) - SNDMSG (Send Message) • CRTSAVF (Create Save File) - SNDBRKMSG (Send Break Message) • DSPMSG (Display Message) - STRPRTWTR (Start Print Writer) • RSTLIB (Restore Library) - WRKOUTQ (Work Out Queue) • RSTOBJ (Restore Object) - WRKWTR (Work Writer)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-6

V11.0 Unit 17. CL programming concepts

Uempty

CL commands allowed only in CL programs The following are commands that can only be used in CL programming:

DO ENDDO

PGM ENDPGM IF ELSE

DCL

CL programming concepts

GOTO Label

© Copyright IBM Corporation 2001, 2016

Figure 17-5. CL commands allowed only in CL programs

There are some CL commands which can only be executed from within a CL program. You might not be familiar with these commands because they cannot be executed from a command line. This visual shows some of these commands. Notice the grouping to used to indicate that these two commands work in conjunction with each other. • PGM (Program) ENDPGM (End Program) • DCL (Declare Variable, File) • IF (If) ELSE (Else) • DO (Do) ENDDO (End Do) • GOTO (Go To) Label

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-7

V11.0 Unit 17. CL programming concepts

Uempty

Command format SAVLIB +

Command prompting

F4

Free format--keyword SAVLIB LIB(AS2700) Free format--positional SAVLIB AS2700 TAP01

DEV(TAP01)

ENDOPT(*UNLOAD)

*UNLOAD

CL programming concepts

SAVLIB

LIB(AS2700)

Command name

Keyword

Value © Copyright IBM Corporation 2001, 2016

Figure 17-6. Command format

There are three ways you can enter a command that is not part of a CL program: Command Prompting If you need help entering the parameters for a command, you can request that a display be shown that is tailored to the command name. The display prompts for the parameters. You can request command prompting either by pressing F4 after you type just the command name, or you can type a question mark immediately preceding the command name and press Enter. Free format method - Keyword format In the keyword format method you enter the command name followed by a keyword followed by the appropriate value for the keyword. You can enter the keywords in any order. You must be familiar with the commands and their parameters to use this method. Free format method - Positional format This method requires that you be very familiar with the keywords and their parameters. In this method, you enter the command name followed by the parameters in the exact order that IBM i expects them to be. The order in which the values are entered is of utmost importance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-8

V11.0 Unit 17. CL programming concepts

Uempty

Command format in a CL program

• Keyword CLRLIB

LIB(AS2700)

or

• Positional CLRLIB

AS2700

• Label LABEL: CLRLIB

LIB(AS2700)

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-7. Command format in a CL program

When you enter a command in a CL program, the command format is the same as when you enter the command on a command line. One addition is that you can add is a label to allow you to identify a command or a specific record within the program. This label can be used for branching when using conditional logic. The only addition to the format that the students already know is the optional LABEL: parameter. • A label identifies the statement in the procedure to which processing is directed by the GOTO command. • To use a GOTO command, the command you are branching to must have a label. • The label in this example is LABEL. • A label can have as many as 10 characters and must be immediately followed by a colon, but blanks can occur between the label and the command name.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-9

V11.0 Unit 17. CL programming concepts

Uempty

Coding rules for CL commands Coding rules for CL commands Name Blank

Definition Separates parts of a command (command name, and its parameters)

Example SAVLIB

LIB(AS2700)

DEV(TAP01)

Separate keywords and values

SAVLIB

LIB(AS2700)

DEV(TAP01)

Slash /

Connects parts of a qualified name or path name

WRKOBJ

Single apostrophe ' '

Indicates the beginning and end of a SNDMSG MSG ('Program completed') TOUSR(QPGMR) quoted character string (a constant)

*N

Indicates the absence of a positional SAVLIB parameter

Parentheses (

)

Predefined values

Generic name

IBM-defined values that have predefined uses in CL and are reserved in OS/400. They begin with an asterisk (*).

AS2700/MIDDAY or 'Dir1/Dir2/Dir3/ObjA'

SAVLIB

Contains one or more characters that are the first group of characters SAVLIB in the names of several objects. An asterisk (*) means the following characters can be anything.

AS2703 TAP01 *N *N AS2700

LIB(*ALLUSR)

LIB(AS27*)

DEV(*SAVF)

DEV(TAP01)

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-8. Coding rules for CL commands

When typing in the entire command (that is, without prompting) there are certain rules that apply. This visual shows some of these rules. This visual shows coding rules with which you should be familiar. Since most new operators enter command parameters via prompting, these rules might not be familiar to you.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-10

V11.0 Unit 17. CL programming concepts

Uempty

Additional coding rules for CL commands Additional coding rules for CL commands Name

Syntax

Definition

Beginning and end comment

/*

*/

Indicate the beginning and end of a comment line

Variable name

&xxx

Used to store and update data and to receive parameters; it must begin with an ampersand (&)

Colon

:

Ends a command label

Coding rules for CL programs in SEU Name

Syntax

Plus sign or minus sign

Definition + -

When a command is longer than one record, indicates that a command is continued on the next record

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-9. Additional coding rules for CL commands

Here are some additional rules for coding CL programs. • Comments should be used to document your program. • Variables give you a great deal of flexibility. They will be covered in detail later in this unit.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-11

V11.0 Unit 17. CL programming concepts

Uempty

Example of coding rules

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-10. Example of coding rules

This example CL program shows: • A comment • Declaring a display file that has formats and variables • IF conditional tests • A label (START) which is used to control logical flow of the program (to reiteratively loop through the program)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-12

V11.0 Unit 17. CL programming concepts

Uempty

The structure of a CL program Description

Program statement

Start of program

PGM (optional) COPYRIGHT (optional)

Declare file and variables

DCLF (maximum of five) DCL DCL

Program-level monitor messages

MONMSG MONMSG

IBM commands

IF ELSE COMMAND

Command-level monitor messages

MONMSG MONMSG

and/or User commands End of program

ENDPGM (optional)

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-11. The structure of a CL program

A CL program has a clear structure. • It always begins with the Program (PGM) command and ends with the End Program (ENDPGM) command. • The declaration section (DCL or DCLF) allows you to set up variables for use within the body of the program. • It is followed by the CL commands that make up the program. • It should always end with an End program (ENDPGM).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-13

V11.0 Unit 17. CL programming concepts

Uempty

Declare CL variable DCL VAR(&NAME) TYPE( ) LEN( ) VALUE( )

TYPE( )

LEN( )

VALUE( )

*DEC (1 to 15 digits)

default (15 5) max (15 9)

default (0)

*INT or *UINT (2 or 4 bytes)

default (4) max (4)

default (0)

*CHAR (1 to 9999 chars)

default (32) max (9999)

default ('b')

*LGL

default (1) max (1)

default ('0')

Examples:

DCL

&A

*LGL

DCL

VAR(&B)

DCL

&C

*DEC

CL programming concepts

VALUE('1') TYPE(*CHAR) (6 2)

LEN(5)

VALUE('ABCD')

543.21 © Copyright IBM Corporation 2001, 2016

Figure 17-12. Declare CL variable

Character variables are just one type of variable that you can declare. They are used to store and update data within a program. Their value is assigned or changed while the program is running. This visual shows the Declare (DCL) command parameters. Following is an explanation of these parameters: • VAR (Variable): Specifies the name of the CL variable being declared. The variable name must begin with an ampersand (&). • TYPE (Type): Specifies the type of variable. In the example shown on the visual you are learning how to declare a character (*CHAR) variable. • LEN (Length): Specifies the number of characters that the value in this CL variable can have. The minimum, maximum and default values are shown on the visual. • VALUE (Value): Specifies the initial value assigned to the CL variable when it is declared in the program. If no value is specified, a character variable is set to blanks. A character variable can be used to hold a user's response to an inquiry message so that it can be tested. We will see this in the upcoming examples.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-14

V11.0 Unit 17. CL programming concepts

Uempty

DCL examples

• DCL VAR(&WEEKEND) TYPE(*CHAR) LEN(8) • DCL &X *CHAR 1 /* Y=YES, N=NO */ • DCL &FROM TYPE(*CHAR) LEN(6) VALUE('JAN') • DCL &TO *CHAR LEN(6) • DCL &FILNAM *CHAR VALUE(FILEA)

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-13. DCL examples

The DCL command must include: • The variable name • The type of variable • The length of the variable data • An initial or default value for the variable is optional The following is an explanation of the DCL commands shown on the visual: DCL VAR(&WEEKEND) TYPE(*CHAR) LEN(8) This command declares a CL variable named &WEEKEND that contains a character value that is 8 characters in length. The initial value of &WEEKEND is blanks. DCL &X *CHAR 1 /* Y=YES, N=NO */ This command declares a CL variable named &X that contains a character value that is one character in length. The value for &X is Y or N. DCL &FROM TYPE(*CHAR) LEN(6) VALUE('JAN') This command declares a CL variable named *FROM that contains a character value that is 6 characters in length. The initial value for *FROM is JAN. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-15

V11.0 Unit 17. CL programming concepts

Uempty

DCL &TO *CHAR LEN(6) This command declares a CL variable named &TO that contains a character value that is 6 characters in length. The initial value of &TO is blanks. DCL &FILNAM *CHAR VALUE(FILEA) This command declares a CL variable named FILNAM whose initial value is FILEA. Because the value contains 5 characters, and the LEN parameter is not specified, the length of the variable is also 5 characters.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-16

V11.0 Unit 17. CL programming concepts

Uempty

What is the purpose of SNDUSRMSG?

Which library do you want to save? Reply________

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-14. What is the purpose of SNDUSRMSG?

The Send User Message (SNDUSRMSG) command is used by a program to: • Send a message to a message queue • And optionally, receive a reply to that message There is a need to communicate with an end user. One way to communicate with an end user is by using the SNDUSRMSG (Send User Message) command. It can be used within a program to send a message to a user and, for an inquiry message, receive the user's reply.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-17

V11.0 Unit 17. CL programming concepts

Uempty

SNDUSRMSG parameters MSG ('message-text') VALUES

*NONE allowable-values (20-max)

DFT ('default-reply-value') MSGTYPE *INQ *INFO TOUSR

*SYSOPR *REQUESTER user-profile-name

TOMSGQ

* *SYSOPR *EXT message-queue-name

MSGRPY (&CL - variable-name) CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-15. SNDUSRMSG parameters

This is a partial list of the SNDUSRMSG command parameters: • MSG: The message text enclosed in apostrophes. • VALUES: A list of valid replies (maximum of 20) to an inquiry message sent by this command. If the reply to the inquiry message does not match one of the specified values, an error message is sent to the reply's sender and the inquiry message is sent again. This value is valid only when a value is specified for the MSGRPY parameter. This parameter is valid only if MSGTYPE (*INQ) is specified. • DFT (Default reply): Specifies the value used as the reply to an inquiry message (sent by this command) if the inquiry message is sent to a message queue that is in default delivery mode, or if, for any other reason, the default reply is sent. The value specified here as the default reply does not have to match an entry in the list of valid replies specified in the VALUES parameter. • MSGTYPE (Message type): Specifies the type of message sent. Only inquiry and informational messages can be specified. • TOUSR (To user profile): Specifies that the message is sent to the message queue specified in the user profile for the user named on this parameter. This parameter cannot be used if TOMSGQ is specified.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-18

V11.0 Unit 17. CL programming concepts

Uempty

• TOMSGQ (To message queue): Specifies the qualified name of the message queue to which the message is sent. If ‘*’ is specified for an interactive job, the message is sent to the external message queue (*EXT), while for a batch job, the message is sent to the system operator's message queue (QSYS/QSYSOPR). • MSGRPY (Message reply): Specifies the CL character variable (of up to 132 characters) that contains the reply received in response to an inquiry message. This parameter is valid only if MSGTYPE(*INQ) is specified. If the reply is longer than the variable, it is truncated; if it shorter, it is padded to the right with blanks.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-19

V11.0 Unit 17. CL programming concepts

Uempty

SNDUSRMSG example SNDUSRMSG

• MSG('WHICH LIBRARY DO YOU WANT TO SAVE?') • VALUES(APLIB PAYROLL ORDENTRY) • MSGRPY(&LIB)

Question: How and where is &LIB defined?

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-16. SNDUSRMSG example

This visual shows an example of the SNDUSRMSG command. Review the parameters that are used. Ask which message queue will receive the message. Ask how and where is &LIB defined. • &LIB is defined in a Declare (DCL) command earlier in the CL program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-20

V11.0 Unit 17. CL programming concepts

Uempty

Using SNDUSRMSG in CL program

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-17. Using SNDUSRMSG in CL program

Notice all the places where the variable name &LIB appears. • First, it is declared (DCL). • Then, it holds the reply to the message. • Then, it is used to identify which library should be saved. Notice that when a command is longer than one line you can use a plus sign (+) to indicate continuation of the command on the next line. This visual shows the SNDUSRMSG used in a CL program. • This program sends a message to the user and tests for the user's reply. • The reply is used to decide which library is to be saved. • When the library is saved, a message is sent to the user that called the program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-21

V11.0 Unit 17. CL programming concepts

Uempty

GOTO and labels The GOTO command allows unconditional branching within the CL program. PGM GOTO CMDLBL(DAYEND) DAYEND: ENDPGM

Branching is to the label of another command. CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-18. GOTO and labels

The GOTO command allows unconditional branching within a CL program. The branching is always to a LABEL. After the branch to the labeled statement, processing begins at that statement and continues in consecutive sequence. It does not return to the GOTO command unless specifically directed back by another instruction. The GOTO command has one parameter which contains the label of the statement branched to. A label can have a maximum of 10 characters and must be immediately followed by a colon. Blanks can occur between the label and command name.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-22

V11.0 Unit 17. CL programming concepts

Uempty

If-Then ELSE (1 of 2)

relational IF COND( or logical ) THEN (command) expression

ELSE CMD (command)

THEN parameter or ELSE command is optional

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-19. If-Then ELSE (1 of 2)

Examples: IF COND(&X='Y') THEN(GOTO SAVEFILE) IF COND(&YREND *NE '1231') THEN(GOTO MTHEND) IF (&TIME>170000) RLSJOBQ NIGHTTIME The IF command is used to state a condition that, if true, specifies some statement in the program to run. The command includes an expression, which is tested (true or false), and a THEN parameter that specifies the action to be taken if the expression is true. Following is the format of the command: IF COND(logical-expression) THEN(CL command) The IF command allows conditional processing within CL programs. If the IF condition is true, the CL command or group of commands specified within the THEN parameter is executed. If it is false, the CL command or group of commands is not executed. Review the examples of IF commands at the bottom of the visual. Both COND and THEN are keywords on the command which can be omitted. The last example on the visual shows these keywords omitted. Embedded IF commands can be used in a CL program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-23

V11.0 Unit 17. CL programming concepts

Uempty

If-Then Else (2 of 2)

• ELSE CMD(CL-COMMAND) ƒ Used with an IF command ƒ Processed only if the preceding IF command is false ƒ Examples

IF (&X='Y') (CALL WEEKEND) ELSE CMD(CALL MONTHEND) IF (&INZ='OK') (INZTAP TAP01 CHECK(*NO)) ELSE DO CRTSAVF DLY01 SAVLIB XYZ *SAVF SAVF(DLY01) CALL PROGA ENDDO

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-20. If-Then Else (2 of 2)

The IF command can specify activity to be done if the condition is TRUE. The ELSE command can be used with the IF command to specify a command or commands that should be processed if the associated IF command is false. Each ELSE command must have an associated IF command. The real usefulness of the ELSE command is shown when it is combined with DO groups as shown on the last example on the visual. If processing is dependent on a condition being false, then use the ELSE command immediately after an IF command (or ENDDO if DO was specified for the THEN parameter). If more than one command needs to be processed for the false condition, the DO can be specified with the ELSE command. Nested IF commands can be used in a CL program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-24

V11.0 Unit 17. CL programming concepts

Uempty

Relational and logical expressions

• Expression: (Operand Operator Operand) • Result of a relational or logical expression: '1' True or '0' False • Operands: Constant, Variable, and Another Expression Operators

Description < *LT

Less than

= *EQ

Equal to

> *GT

Greater than

*NG

Not greater than

>= *GE = *NE

and *AND (&) or *OR (|)

Greater than or equal to Not equal to

&

*AND

True if both operands are '1'

|

*OR

True if both or either operand is '1'

*NOT CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-21. Relational and logical expressions

The IF command uses these relational operators to make its comparisons. The relational operators can become complex statements if they are linked by AND (*AND (&)) or *OR (|). This visual shows the valid relational operators that can be used within an IF command. Review the examples at the bottom of the visual. Notice the complex tests that can be performed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-25

V11.0 Unit 17. CL programming concepts

Uempty

DO / ENDDO DO/ENDDO allows processing of multiple CL commands if the logical expression of an IF* is true.

IF (&X='YES') THEN(DO) CRTSAVF SAVOBJ ENDDO

*We will see later that DO/ENDDO can be associated with additional commands. CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-22. DO / ENDDO

The DO command allows you to process a group of commands together. The group is all of the commands between the DO command and the next ENDDO command. Processing of the group of commands is usually conditioned on the evaluation of an associated command, such as the IF command. • If the evaluation of the command is true, then the DO group is processed. • If the expression is not true, then processing starts after the ENDDO command. Sometimes when a condition is true, you want to process more than one CL command. • If so, then for the THEN parameter specify DO. The DO command says that if the condition is true, process all the subsequent commands in sequence up to the ENDDO command. • If, however, the condition is false, do not process the THEN command, but continue processing at the statement following the ENDDO. DO groups can be nested within other DO groups. There can be a maximum of 10 levels of nesting.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-26

V11.0 Unit 17. CL programming concepts

Uempty

Command prompting ?SNDMSG TOUSR(*SYSOPR) ? PRECEDING COMMAND CAUSES ENTIRE COMMAND TO BE PROMPTED

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-23. Command prompting

A question mark (?) preceding a command causes the entire command to be prompted at execution time. • All parameters will be displayed. • Only parameters which do not have specified values can be entered. F10 will allow the user to see and change the additional command parameters. Within a CL program that is designed to run interactively, you can include simple command prompting to enhance the flexibility of the program. Using the question mark (?) character, you can control whether a prompt display is shown, as well as control which fields of the prompt the user can modify. In effect, you are allowing the user of the program to change the CL command as the program runs. The user will see the same prompted command parameters that they would see when keying a command after pressing F4 (Prompt). Prompting at execution time can be done in two ways. • If the ? precedes the command name then all parameters will be prompted except those that are specifically coded and these can not be changed. This gives your user great flexibility but still allows you to control some of the parameters. • To prevent a parameter from being changed, simply fix a value for it in the program. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-27

V11.0 Unit 17. CL programming concepts

Uempty

• If you do not want the user to see that parameter, put ?- immediately in front of its keyword. If you want a more controlled prompting, where the user does not need to be prompted for every parameter, then do not place the ? in front of the command. Instead, put it selectively in front of keywords that need to be changed. The following visuals illustrate both methods. This visual shows an example of command processing. • Notice that TOUSR has a specified value so this parameter is protected on the display and cannot be changed. • Notice as well, that the user can press F10 to view additional parameters which can be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-28

V11.0 Unit 17. CL programming concepts

Uempty

Selective command prompting (1 of 2) ?SNDMSG ?-TOUSR(*SYSOPR) ?- preceding a parameter will omit that parameter from the display

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-24. Selective command prompting (1 of 2)

To omit parameters from the prompt display, use "?-". The user can press F10 to view additional parameters, but the parameter marked with "?-" will not be displayed. "?-" preceding a parameter in a command that is being prompted means that the parameter will not be displayed. Notice again that the user is able to press F10 to see additional parameters. The only parameter the user will not see is the coded parameter is the TOUSR parameter. This means that the user is free to make this an informational or inquiry message, which is probably just what is needed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-29

V11.0 Unit 17. CL programming concepts

Uempty

Selective command prompting (2 of 2) Allows prompting and entering of selected parameters Preceding parameter ?* Show parameter Cannot change parameter ?? Show parameter Can change parameter

SAVLIB

??LIB(APLIB)

?*DEV(TAP01)

CL programming concepts

ENDOPT(*UNLOAD)

© Copyright IBM Corporation 2001, 2016

Figure 17-25. Selective command prompting (2 of 2)

Without the "?" in front of the command, only those parameters you mark with "?" or "??" will be displayed. F10 is not available for the additional parameters. Therefore, all other parameters will use the defaults. Notice that in this example the "?" is not in front of the command. • This is controlled prompting. • The LIB parameter will be prompted and can be changed. • The DEV parameter will be shown on the prompt screen but cannot be changed. • The ENDOPT parameter has been coded with a value and will not be seen nor can it be changed. What is important is that the user will not be able to press F10 to get additional prompting for other parameters. All other parameters will use the defaults.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-30

V11.0 Unit 17. CL programming concepts

Uempty

Whoops!

Does this look familiar? Would you like to avoid this?

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-26. Whoops!

You can use the Monitor Message (MONMSG) command to: • Intercept messages sent to the program • Direct the program what to do next There might be occasions when a CL program cannot successfully execute some or all of the commands contained within the program. When this happens the program stops executing and a program error, such as the one shown on the visual, will appear. The error message number is shown on the display. No matter how well designed and written a CL program is there will be times when a program cannot execute all of the commands within the program. This results in a program error. The MONMSG command allows the program to monitor for escape, notify, and status messages and take responsibility for handling the situation. It cannot detect diagnostic or completion messages.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-31

V11.0 Unit 17. CL programming concepts

Uempty

MONMSG example Let us try to clear a save file that might or might not already exist. If it does not exist, create it.

CLRSAVF FILE(APSAVF) MONMSG MSGID(CPF9812)

EXEC(CRTSAVF

FILE(APSAVF))

MSGID CPF9812 File filename In library, library name not found. For MSGIDs, see online help for each command.

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-27. MONMSG example

The MONMSG command has the following parameters: • MSGID (Message ID): Specifies the message identifiers of up to 50 escape, notify, or status messages you want to monitor for. • CMPDTA (Compare Data): Specifies the comparison data that is used to determine whether the monitored message (having one of the specified message identifiers) received on the program's message queue is acted on by this command. The message data specified in the MSGDTA parameter of the Send Program Message (SNDPGMMSG) command is compared with this comparison data. If the first part (up through the first 28 characters, or less) of the message's substitution values match the comparison data specified, the action specified in the EXEC parameter of this command is taken. The action is also taken if no comparison data is specified. • EXEC (Execute): Specifies the CL command (and its parameters) to be processed when a monitored message sent to the program's message queue meets the conditions specified in this command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-32

V11.0 Unit 17. CL programming concepts

Uempty

MONMSG: Monitoring for range of messages

• MONMSG MSGID(CPF0000) ƒ Monitors for all messages beginning with ‘CPF’

• MONMSG MSGID(CPF3400) ƒ Monitors for messages beginning with ‘CPF34’

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-28. MONMSG: Monitoring for range of messages

You can monitor for a range of messages, instead of for specific messages. This visual shows two examples of monitoring for a range of messages.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-33

V11.0 Unit 17. CL programming concepts

Uempty

Example: Control work flow

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-29. Example: Control work flow

This program runs a typical series of commands that a system operator might have to perform: 1. First, it initializes a tape on device TAP01. 2. Then, it saves the libraries PAYROLL and APLIB to the device TAP01 and it unloads the tape. 3. Lastly, it calls the program PAYENDDAY. Having these commands in a program ensures that no matter who runs the program for end of day, the same commands are always run and in the correct order. This and the next visual can be used to summarize the ideas taught in this unit. This visual shows an example of a simple program an operator can run. Work flow is controlled by the sequence of the CL commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-34

V11.0 Unit 17. CL programming concepts

Uempty

Example: Communicating with user

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-30. Example: Communicating with user

Adding the variable and the SNDUSRMSG command allows the program and the user to communicate. This program includes many of the programming techniques discussed in this unit. The program will continue to loop and perform the INZTAP command until the user decides to stop. After the tapes are initialized, the SAVLIB command executes and when it is done, a message is sent to the workstation.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-35

V11.0 Unit 17. CL programming concepts

Uempty

Create a CL program using PDM and SEU Enter CL source Using RD for i or SEU Listing of source code and errors

Create CL program CRTCLPGM (Compile CL source)

*PGM Program object User steps

Syntax checking

*FILE QCLSRC source file

PROGA PROGB PROGC

Test CL program by executing

Data paths CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-31. Create a CL program using PDM and SEU

The command used to create the source physical file that will be used to store all CL programs is: CRTSRCPF FILE(QCLSRC). You enter the source code for a CL program by using Programming Development Manager (PDM) and Source Entry Utility (SEU) or by using Rational Developer for i editor.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-36

V11.0 Unit 17. CL programming concepts

Uempty

Review questions

1. True or False: All CL commands are available to be used from a command line or within a CL program.

2. In a CL program, a comment statement will always begin and end with which of the following? a. b. c. d.

( ) + /* */ &

3. True or False: A CL program should always start with a PGM command and end with an ENDPGM command.

4. Which of the following is used within a CL program to monitor for a specific message? a. b. c. d.

MONITOR PGMLST MONMSG SNDMSG

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-32. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-37

V11.0 Unit 17. CL programming concepts

Uempty

Review answers 1. True or False: All CL commands are available to be used from a command line or within a CL program. The answer is False.

2. In a CL program, a comment statement will always begin and end with which of the following? a. ( ) b. + c. /* */ d. & The answer is /*

*/.

3. True or False: A CL program should always start with a PGM command and end with an ENDPGM command. The answer is True.

4. Which of the following is used within a CL program to monitor for a specific message? a. MONITOR b. PGMLST c. MONMSG d. SNDMSG The answer is MONMSG. CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-33. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-38

V11.0 Unit 17. CL programming concepts

Uempty

Unit summary

• • • • •

Discuss the basic statement required in a CL program Discuss the basic structure of a CL program Explain some of the basic coding rules for a CL program Explain how to communicate between a user and the CL program Explain how to set up prompting for some of the CL commands or parameters

CL programming concepts

© Copyright IBM Corporation 2001, 2016

Figure 17-34. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

17-39

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Unit 18. CL programming using PDM and SEU Estimated time 00:20

Overview This unit is provided to teach the students how to write a simple Control Language (CL) program. In this unit, the students will learn how to use the traditional application development tools used from a green screen 5250 emulation session. Specifically, you will be using Programming Development Manager (PDM) and Source Entry Utility (SEU). The lecture materials will then be reinforced with a lab exercise.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-1

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Unit objectives

• Use PDM and SEU to create a CL program • Use prompting for CL program statements • Perform the steps to compile a CL program

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-2

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Programming Development Manager

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-2. Programming Development Manager

Programming Development Manager (PDM), Source Entry Utility (SEU) and Screen Design Aid (SDA) are part of the IBM Application Development Tool Set (ADTS) for System i which is a licensed program. Being a licensed program means this software might or might not be installed on the customer system. Rational Developer for i allows users to perform the same functions as in PDM, SEU, and SDA by using a Windows interface. The Start PDM (STRPDM) command starts the programming development manager. From the Programming Development Manager (PDM) menu, you can work with libraries, objects, members, and user-defined options. Because source code is typed into members of a source physical file, select option 3 (Work with members). The role of PDM is to create a productive working environment. It does so by making it easy to use the functions of the system while letting the user look at the objects and members in it. Option 1 is for users looking for the ‘big picture’. Taking this option lets them see all or some of the libraries. If users decide to choose this option, they will be able to save a whole library, delete a whole library, and so on.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-3

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Option 2 is for users who need to work with finished goods, the objects of the system. When this option is chosen, users see the objects in a particular library and can save an individual object, delete an object, and so forth. Option 3 is for users interested in the development of source code. If they choose this option, they are able to delete a source program, copy a source program, and so forth. Option 9 is not covered in this unit. It allows users to add more functions to PDM. Since we are going to enter a source program, let’s select option 3.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-4

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Specify source file and library

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-3. Specify source file and library

On this page you will first need to specify the name of the library that contains the source file. The second value to specify is the name of the source file where your program will be stored. Optionally you can specify the name and type for a member that already exists. To display or make changes.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-5

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Work with Members screen

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-4. Work with Members screen

This screen will display the name of the source file and the name of the library where this file is stored in the upper left of the screen. The screen will display any members that already exist as well as the type of member. Even though it is possible to store all different types of members within one source file, the standard is to create a source specific to the type of members it will contain. There are several options that can be performed against an existing member. Use the F23 key to display additional options that can be performed. Press the F6 = Create key to display the screen capture on the next page that is used to create a new member. This screen can be reached also using WRKMBRPDM command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-6

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Specify member name and type

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-5. Specify member name and type

On this page you will specify the name and type of member to be created. The system will perform syntax checking based on the type of member specified on this page. It is also recommended that you fill in something meaningful and descriptive every time that you create a new member.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-7

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Specify member entries and prompt

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-6. Specify member entries and prompt

On this screen you can either: a. Enter and prompt one command at a time. b. If you know all the CL commands that need to be entered, then you can enter all of them as in the example. Once a CL command has been entered then you can use the F4 prompt key on each line or command so the system can assist with the parameters as displayed in the lower right part of the display.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-8

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Specify entries and exits

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-7. Specify entries and exits

After you enter all commands you can exit with save option. To do that press F3 key and press Enter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-9

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Select compile options

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-8. Select compile options

To compile program type option 14 Compile next to member name and press F4 to see parameters prompt screen. You can specify the name of the program (default is same as member name), library where program will be created. If you set Replace program * YES if program exist in library will be replaced.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-10

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Reference materials

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-9. Reference materials

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-11

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

IBM Knowledge Center

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-10. IBM Knowledge Center

The website can be reached at the following address: http://www.ibm.com/support/knowledgecenter/ssw_ibm_i_73/rbam6/rbam6clmain.htm

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-12

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Programming education (1 of 2)

Control Language Programming Workshop for IBM i Course code: OL20G Delivery type: Classroom

Skill level: Intermediate Duration: 4.0 days

IBM i Programming Facilities Workshop Course code: U5AS527G Delivery type: Classroom

CL programming using PDM and SEU

Skill level: Intermediate Duration: 2.0 days

© Copyright IBM Corporation 2001, 2016

Figure 18-11. Programming education (1 of 2)

OL20G Learn to write easy to use and efficient control language (CL) programs which can be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input). You will learn to write Control Language (CL) programs which can be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input). U5AS527G Gain an introduction to IBM i features and programming facilities, including: Rational Developer for IBM i (LPEX Editor, Remote Systems Explorer (RSE), Screen Designer and Report Designer Programming Development Manager (PDM) Source Entry Utility (SEU) Control Language (CL) Access for Windows and IBM i Navigator Interactive SQL Also covered, but with less emphasis: Screen Design Aid (SDA) Data File Utility (DFU) Web Query/Query for IBM i Hands-on machine exercises give you the opportunity to use and experiment with these facilities.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-13

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Programming education (2 of 2)

RPG IV Programming Fundamentals Workshop for IBM i Course code: Code AS06G Delivery type: Classroom

CL programming using PDM and SEU

Skill level: Intermediate Duration: 4.0 days

© Copyright IBM Corporation 2001, 2016

Figure 18-12. Programming education (2 of 2)

AS06G RPG IV Programming Fundamentals Workshop for IBM i (AS06G) teaches the basics of the IBM i RPG IV programming language. It is the first of two courses that should be attended in sequence. This course is a comprehensive exposure to the basic features and functions of RPG IV for Version 7. It does not introduce either information processing or programming in general. Students who are new to programming should attend other courses that are offered by local technical colleges or self-study methods. This course is designed to enable a trained programmer to develop and maintain simple RPG IV programs written using the latest features and techniques available in the Version 7 compiler.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-14

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Review questions (1 of 2) 1. True or False: PDM, SEU and SDA are all part of the IBM Application Development ToolSet (ADTS).

2. In order to key a new CL program, which of the following PDM options is best? a. b. c. d.

Work with libraries Work with objects Work with members Work with user-defined options

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-13. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-15

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Review answers (1 of 2) 1. True or False. PDM, SEU and SDA are all part of the IBM Application Development ToolSet (ADTS). The answer is True.

2. In order to key a new CL program, which of the following PDM options is best? a. Work with libraries b. Work with objects c. Work with members d. Work with user-defined options The answer is Work with members.

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-14. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-16

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Review questions (2 of 2) 3. True or False: PDM option 16 is used to compile a CL program. 4. Which of the following function keys is used to create a new member in your source file? a. b. c. d.

F5 F6 F10 F23

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-15. Review questions (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-17

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Review answers (2of 2) 3. True or False: PDM option 16 is used to compile a CL program. The answer is false.

4. Which of the following function keys is used to create a new member in your source file? a. F5 b. F6 c. F10 d. F23 The answer is F6.

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-16. Review answers (2of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-18

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Exercise: CL programming using PDM and SEU

• At the end of the exercise, you should be able to: ƒ ƒ ƒ ƒ

Start Programming Development Manager (PDM) Start and use Source Entry Utility (SEU) Create a basic CL program Perform the steps to compile a CL program

Systems to be used for class: Name

Teach system

TCP/IP Address

__________ __________

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-17. Exercise: CL programming using PDM and SEU

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-19

V11.0 Unit 18. CL programming using PDM and SEU

Uempty

Unit summary

• Use PDM and SEU to create a CL program • Use prompting for CL program statements • Perform the steps to compile a CL program

CL programming using PDM and SEU

© Copyright IBM Corporation 2001, 2016

Figure 18-18. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

18-20

V11.0 Unit 19. Creating a menu using SDA

Uempty

Unit 19. Creating a menu using SDA Estimated time 00:45

Overview This unit will teach students how to create a menu using Screen Design Aid (SDA).

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-1

V11.0 Unit 19. Creating a menu using SDA

Uempty

Unit objectives

• Start SDA • Explain the steps necessary to create a menu using SDA • Explain the available options to customize your menu

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-2

V11.0 Unit 19. Creating a menu using SDA

Uempty

SDA features

• SDA offers the following functionality: • Design or modify displays which are used in high-level language • • • •

programs. Create or modify menus. Create or modify help information for displays and menus. Test displays without the need of the high-level program which uses it. With SDA you can develop menus and displays in an interactive manner by answering questions: ƒ Fill-in-the-blank ƒ Yes/no

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-2. SDA features

SDA can be used to design: • Screens which can be used with programs • Menus • Help screens for displays and menus In this unit, we will concentrate only on menus. You start with a list of options to be included in a menu. Each of these options runs a command or a CL program or an application program. This visual shows all the functions that can be performed with SDA, including some of the ease-of-use features. This topic only addresses menu creation. Mention to the students that SDA is part of the IBM Application Development ToolSet (ADTS) for System i which is a licensed program. This means that this licensed program can not be installed on their system. Mention Rational Developer for Power Systems Software with the screen Designer Tool is the GUI tool that is available to design screens to be used with HLL (high-level language) programs. But there really is no GUI tool available to design menus. The presentation assumes that the students know what a menu is and how to execute a CL command. This sample menu, MYMENU, is the menu that will be created with SDA in the following visuals. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-3

V11.0 Unit 19. Creating a menu using SDA

Uempty

Screen Design Aid menu

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-3. Screen Design Aid menu

The Start Screen Design Aid (STRSDA) command is used to start SDA. SDA allows you to easily create menus to run commands or programs. STRSDA begins an SDA session. To bypass this display, you could enter STRSDA 2.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-4

V11.0 Unit 19. Creating a menu using SDA

Uempty

Design Menus display

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-4. Design Menus display

Just as with CL programs, the source for menus is stored in a source physical file. Standard practice calls for a menu source file to be created for storing all menus created on a system. The naming convention is for the menu source file to be name QMNUSRC. The command used to create this source file is CRTSRCPF. In the Menu field, enter the name for the menu that you will be creating.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-5

V11.0 Unit 19. Creating a menu using SDA

Uempty

Specify Menu Functions display

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-5. Specify Menu Functions display

Make sure the Work with menu image and commands field is set to Y. Notice also that you can design help for your menus. Note the message at the bottom of the screen. SDA is now starting to create the menu MYMENU.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-6

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (1 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-6. Define menu image work screen (1 of 10)

Type the text you want for your menu options directly onto this display. Avoid using keys which delete and insert characters (field exit, insert and delete). Rather, use the left, right, up, and down arrow keys (the cursor movement keys) to position the cursor. The reason is that the data in the display is created like one long field, starting with row 1, column 1 and ending with row 24, column 80. This is the work screen. On this display you type what you want the menu to look like.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-7

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (2 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-7. Define menu image work screen (2 of 10)

To delete something, type a “d” in the attribute byte (the byte preceding the text) and press Enter. In the class example we will delete the title that is created by default to replace it with a different title.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-8

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (3 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-8. Define menu image work screen (3 of 10)

The text has been deleted.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-9

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (4 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-9. Define menu image work screen (4 of 10)

When typing new text enclose phrases that are to be treated as a unit in quotation marks. This makes moving and defining attributes simple.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-10

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (5 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-10. Define menu image work screen (5 of 10)

When Enter is pressed, the quotation marks disappear. Now the entire string of text is treated as a whole.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-11

V11.0 Unit 19. Creating a menu using SDA

Uempty

Define menu image work screen (6 of 10)

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-11. Define menu image work screen (6 of 10)

The text for the title should be centered, so type AC into the attribute byte and overlay the first character of the field, General Backup Menu. • Lines 1 through 20 are the menu body. • When you create a new menu, the menu name and the title are on line 1. • The menu outline on lines 3 to 18 are all SDA defaults. These can be changed or deleted. • Lines 19 and 20 can be used if the display function keys prompt is set to *NO on the Create Menu display. • The first position (line 01, column 01) is reserved by SDA as an attribute position. You cannot place anything in this position. To use special editing attributes or color attributes against a constant on line 01, column 02, you must first shift the constant right. Reposition fields on the work screen by using their attribute position. The attribute position is the space directly in front of the field. Press F19 to go to the attribute position of the previous field. Press F18 to go to the attribute position of the next field.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-12

V11.0 Unit 19. Creating a menu using SDA

Uempty

Choose from the following methods and press Enter: • Centering a field: Type AC in the attribute position of the field to move the field to the center of the same row. If a field starts and ends on different rows, then the field will be centered on the row where the field starts. • Moving a field -, =: Type - in the attribute position of the field and type = where you want the field to appear. • Copying a field -, ==: Type - in the attribute position of the field and type == where you want a copy of the field to appear. • Moving a block of fields -, -, =: Type - in the upper left corner of the block of fields. Type - in the lower right corner of the block of fields so the - is one character beyond the longest field in the block. Type = where you want the group of fields to be moved to. If any fields partially or completely overlap, a field that overlaps is not moved. • Copying a block of fields -, -,==: Type - in the upper left corner of the block of fields. Type - in the lower right corner of the block of fields so the - is one character beyond the longest field in the block. Type == where you want a copy of the group of fields to appear. If any fields partially or completely overlap, a field that overlaps is not copied. • Shifting a field : Type > after the field (over the ending attribute byte), to shift the field left or right as far as the signs extend. You can type as many > or < as you want, and you can shift more than one field at a time on the work screen. • Shifting single- and multiple-choice selection fields: Single-choice and multiple-choice selection fields occupy a rectangle on the work screen. The size of the rectangle is determined by the length of the choice with the most characters and the last choice in the list. You can press F20 to make the rectangle visible. The ending attribute is in the lower right corner of the rectangle. To shift all the fields within the rectangle to the right, type >>> over the ending attribute byte. To shift all the fields within the rectangle to the left, type __________________________________________________________ F3=Exit F4=Prompt F9=Retrieve F12=Cancel F13=Information Assistant F16=AS/400 main menu

*NONE Selection or command ____ F3=Exit F12=Cancel F13=Information Assistant F16=AS/400 main menu

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-25. Command line

*Long:

153 bytes

*Short:

73 bytes

*None:

4 - byte option field

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-29

V11.0 Unit 19. Creating a menu using SDA

Uempty

Delete menu and all associated objects

• Delete menu object/reference objects ƒ DLTMNU

MENU(LIBRARY/NAME) DLTREFOBJ(*DSPF *MSGF)

• Delete two source members ƒ RMVM ƒ RMVM

FILE(LIBRARY/SOURCE-FILE) FILE(LIBRARY/SOURCE-FILE)

Creating a menu using SDA

MBR(MENU-NAME) MBR(MENU-NAMEQQ)

© Copyright IBM Corporation 2001, 2016

Figure 19-26. Delete menu and all associated objects

To completely delete all parts of a menu including the source, delete the menu object by name and its reference objects, a *DSPF and a *MSGF. From the source file QMNUSRC, you remove two members: one with the menu name and another with the menu name and 'QQ' appended.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-30

V11.0 Unit 19. Creating a menu using SDA

Uempty

Review questions (1 of 2) 1. True or False: The tool used to create a menu is Menu Design Aid. 2. Which of the following source physical files is the file traditionally used to save menu objects? a. b. c. d.

QRPGSRC QCLSRC QMNUSRC QCBLSRC

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-27. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-31

V11.0 Unit 19. Creating a menu using SDA

Uempty

Review answers (1 of 2) 1. True or False: The tool used to create a menu is Menu Design Aid. The answer is False.

2. Which of the following source physical files is the file traditionally used to save menu objects? a. QRPGSRC b. QCLSRC c. QMNUSRC d. QCBLSRC The answer is QMNUSRC.

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-28. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-32

V11.0 Unit 19. Creating a menu using SDA

Uempty

Review questions (2 of 2) 3. True or False: Command prompting is available when entering commands in an SDA menu. 4. Which of the following attributes is used to center text in SDA? a. b. c. d.

CB H R AC

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-29. Review questions (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-33

V11.0 Unit 19. Creating a menu using SDA

Uempty

Review answers (2 of 2) 3. True or False. Command prompting is available when entering commands in an SDA menu. The answer is True.

4. Which of the following attributes is used to center text in SDA? a. CB b. H c. R d. AC The answer is AC.

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-30. Review answers (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-34

V11.0 Unit 19. Creating a menu using SDA

Uempty

Exercise: Creating a menu using SDA

• At the end of the exercise, you should be able to: ƒ ƒ ƒ ƒ

Start SDA Perform the steps to create a menu using SDA Create a menu that runs commands and CL programs Customize your menu

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-31. Exercise: Creating a menu using SDA

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-35

V11.0 Unit 19. Creating a menu using SDA

Uempty

Unit summary

• Start SDA • Explain the steps necessary to create a menu using SDA • Explain the available options to customize your menu

Creating a menu using SDA

© Copyright IBM Corporation 2001, 2016

Figure 19-32. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

19-36

V11.0 Unit 20. Tips for improved operation

Uempty

Unit 20. Tips for improved operation Estimated time 01:30

Overview This unit will cover ways to change defaults, make the system easier for the users, and make operations more streamlined for the system operator and otherwise improve system operations.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-1

V11.0 Unit 20. Tips for improved operation

Uempty

Unit objectives

• • • • • • • • •

Create a user-defined proxy command Change how a command is used Permanently change a command's defaults Explain how to use the System Reply List to automatically reply to messages Explain how to leave a job temporarily through the attention key or how to disconnect a job Use printers efficiently through printer load balancing Describe the process of creating a virtual optical device to use when performing a software upgrade or installing PTFs Describe how perform FTP transfer included batch mode Explain some SST/DST function to diagnostic problems

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-1. Unit objectives

The tools that will be covered in this unit to achieve these objectives are: • CRTPRXCMD: Create proxy (shortcuts) to target commands • CHGCMD: Change how a command is used • CHGCMDDFT: Permanently change a command's defaults • System Reply List: Use the System Reply List to reply to messages • QUSRTOOL: Tools available from QUSRTOOL library • Set Attention Program: How to leave a job temporarily • DSCJOB: How to disconnect a job • CRTDEVOPT: Create virtual optical device as a tool to upgrade software or install PTF’s that were downloaded electronically • Printer Load Balancing: Using printers more efficiently

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-2

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 1: Proxy commands, using CHGCMD and CHGCMDDFT

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-2. Topic 1: Proxy commands, using CHGCMD and CHGCMDDFT

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-3

V11.0 Unit 20. Tips for improved operation

Uempty

Proxy commands

• Instead of duplicating a command, you can now create a shortcut to a target command: ƒ Use the Create Proxy Command (CRTPRXCMD) to create the proxy. ƒ Requires a command name (the new proxy command) and a target command (the original command) ƒ Optional parameters include a text description (TEXT), authority (AUT), and a replace command (REPLACE) option.

• Specifying a proxy command for the TGTCMD parameter is allowed. • When creating a proxy command, you do not specify the command definition source. • Does not contain any parameter information, prompt control information, or interparameter dependency information. • Use Display Command (DSPCMD) to determine whether a command is a proxy or if it is an original command.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-3. Proxy commands

Proxy commands are used to create shortcuts to target commands. A proxy command differs from a typical IBM i command in its ability to run a target command, rather than a command processing program. • Use the Create Proxy Command (CRTPRXCMD) to create a proxy command. • Create Proxy Command (CRTPRXCMD) requires a Command name (CMD) and a Target command (TGTCMD). • Optional parameters include a Text description (TEXT), Authority (AUT) and a Replace command (REPLACE) option. For example, to create a proxy command that has a target command of QSYS/DSPJOB, enter the following command: ▪CRTPRXCMD CMD(MYLIB/PCMD1) TGTCMD(QSYS/DSPJOB) TEXT(‘dspjob proxy’) • Specifying a proxy command for the TGTCMD parameter is allowed. ▪ A proxy “chain” can be up to 5 proxy commands in length, ending with a 6th non-proxy command. ▪ Running a proxy command with a chain of more than 5 proxy commands will cause a CPD0196 error “Number of chained proxy commands exceeds 5.” • When you create a proxy command, you do not specify command definition source. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-4

V11.0 Unit 20. Tips for improved operation

Uempty

• A proxy command does not contain any parameter information, prompt control information, or interparameter dependency information. When a proxy command is used, all of that information is inherited from the target command defined in the proxy command. You specify all the same parameters for the proxy command that you would for the target command. Use the Change Proxy Command (CHGPRXCMD) command to change a proxy command or the Delete Command (DLTCMD) command to delete a proxy command. To run or process a command that is “resolved to” using a proxy chain, the user must have the correct authority for that command and library, as well as *USE authority for each of the proxy commands (and libraries) in the chain. Determine whether the QSYS command is a proxy command. You can do this interactively using the Display Command (DSPCMD) command or programmatically by using the Retrieve Command Information (QCDRCMDI) API. Since proxy commands run other commands, attempting to register an exit program for a proxy command is not allowed, and will cause the error message CPF019A to be issued. When a proxy command is run, and the non-proxy command that it resolves to has a registered exit program, the proxy chain that was followed will be placed in the RTVC0100 or CHGC0100 returned format data.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-5

V11.0 Unit 20. Tips for improved operation

Uempty

IBM commands and LPP commands

• IBM OS commands are stored in the QSYS library. • Some LPPs include their own commands: ƒ A proxy command is created in QSYS pointing to the target command in the LPP library.

• The system uses the security in place for the LPP (the target) command when you prompt or run the proxy command: ƒ Running CHGCMD or CHGCMDDFT to a proxy will alter the original command.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-4. IBM commands and LPP commands

The command (*CMD) objects of most licensed program products (LPPs) and all options of IBM i that ship commands in a product library (other than QSYS) are copied to the QSYS library when the LPP or OS option is installed. Proxy commands are created in the system library QSYS. A proxy command is a *CMD object that points to a target command. When the proxy *CMD is prompted or run, the operating system uses the target command. Attempts to prompt or run the proxy command in QSYS will check the authority of the target command in the product library. Therefore, you should grant private authorities for the command only to the regular command in the product library. Some of the IBM commands in QSYS could be proxy commands. If you duplicate any of these commands from QSYS into another library by using the Create Duplicate Object (CRTDUPOBJ) command, your duplicate commands might be proxy commands. When using the CHGCMD and CHGCMDDFT on a proxy command, the actual command changed will be the command that is the target of the proxy. For LPP proxy commands in QSYS, if you change the proxy command by using CHGCMD or CHGCMDDFT, you will change the target command in the LPP library.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-6

V11.0 Unit 20. Tips for improved operation

Uempty

If you want CHGCMDDFT and CHGCMD to affect only the duplicate that you create, then do the following: • Determine whether the QSYS command is a proxy command. You can do this interactively using the Display Command (DSPCMD) command or programmatically by using the Retrieve Command Information (QCDRCMDI) API. ▪ If it is not a proxy command, use CRTDUPOBJ to duplicate it. ▪ If it is proxy command, use DSPCMD or QCDRCMDI to determine the target of the proxy command, and duplicate the target command instead of duplicating the proxy command in QSYS. If an exit program had been previously registered for the copy of a licensed program command in the QSYS library, the exit program will not be run for the proxy command that replaced it when. You will need to register your exit program against the original command in the product library. For example, if you had an exit program registered for the QIBM_QCA_CHG_COMMAND exit point for the Create SQL ILE RPG Object (CRTSQLRPGI) command in QSYS, you will need to register your exit program for the original command in the QSQL library.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-7

V11.0 Unit 20. Tips for improved operation

Uempty

Change command: CHGCMD

Why?

Memory Interactive Prog1

Create a program interactively

Interactive Prog2

Waiting for memory Interactive Prog3 Prog4 Prog5

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-5. Change command: CHGCMD

Would not it be nice to keep users from disrupting the system by running interactive jobs that should only be run in batch? Operations like compilations that run interactively and intensive queries can negatively affect the response time of true interactive jobs. The Change Command (CHGCMD) can be used to change the attributes of a command. It can be used to specify for example: • In what environments the command can be processed • What current library and product library should be used when the command is executed The user must have object management authority for the command that is being changed. Although this example deals with specifying the operating environment, other parameters of CHGCMD include: • The mode: production, debug, or service • The current library • The product library • Whether to allow limited capability users to run • The help panel group © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-8

V11.0 Unit 20. Tips for improved operation

Uempty

Remember in the work management topic how interactive jobs (or threads) shared memory (paging)? Does a batch job ever reach a point where it can go into a long wait? Probably not. A batch job does not share memory fairly with interactive jobs. Look at the jobs in the queue waiting for memory. Ask how the additional wait time for the interactive jobs affects their response time.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-9

V11.0 Unit 20. Tips for improved operation

Uempty

CHGCMD: Where allowed to run parameter ALLOW • Specifies where the command can be processed.

(Some choices) *ALL

*BATCH *INTERACT *BPGM *IPGM

In a batch input stream, in a CL program, in a REXX procedure, in a CL ILE module, or when processed interactively. Can also be passed to system program QCMDEXC (or QCAEXEC) for processing. In a batch input stream, external to a compiled CL program. Interactively, external to a compiled CL program. In a compiled CL program that is called from batch entry. In a compiled CL program that is called from an interactive entry.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-6. CHGCMD: Where allowed to run parameter

Other options include: • *BREXX: The REXX procedure runs in a batch job. • *IREXX: The command can be used in a REXX procedure run in an interactive job. • *EXEC: The command can be used as a parameter on the CALL command and be passed as a character string to the system program QCMDEXC (or QCAEXEC) for processing. If *EXEC is specified, either *BATCH or *INTERACT must also be specified. • *BMOD: The command can be used in a batch CL ILE program only. • *IMOD: The command can be used in an interactive CL ILE program only. • *SAME: The environment does not change. You can change a command with the CHGCMD command and only allow it to process under certain situations. All of the available options for this parameter are listed on this page. They begin and in visual and continue in the student notes. Verify that you are making changes to an ‘original’ command. If you make a change to a proxy command, then the original command is what will be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-10

V11.0 Unit 20. Tips for improved operation

Uempty

Which commands should be changed • Commands that create programs should not be run interactively: CHGCMD CMD(CRTxxxPGM) ALLOW(*BATCH

*BPGM)

CBL CL DFU JVA RPG And so on…

• Commands that create files or commands should not be run interactively:

CHGCMD

CMD

CRTLF CRTPF CRTPRTF CRTDSPF CRTCMD

Tips for improved operation

ALLOW(*BATCH

*BPGM)

© Copyright IBM Corporation 2001, 2016

Figure 20-7. Which commands should be changed

The Change Command (CHGCMD) command changes the attributes of a command definition. This command gives you the ability to specify a different command processing program to process the command. You can also change the type of operating environment (production, debug, or service) in which the command can be processed, and the text description of the command. CL programs that use the command being changed by the Change Command (CHGCMD) command do not have to be created again. The Change Command (CHGCMD) command does not change the parameter descriptions or validity checking information in the command definition object. Listed in the visual are some of the create program commands, those commands that compile a program, which you might not want to allow to run interactively on your system. Any of the commands that are used to compile programs or any commands that are used to run batch type programs are prime candidates to be changed. All of these commands should be changed so that they cannot be run interactively. Any other commands that create objects on your system while probably not as resource intensive as the program compile commands should also run in batch mode. Verify that you are making changes to an ‘original’ command. If you make a change to a proxy command, then the original command is what will be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-11

V11.0 Unit 20. Tips for improved operation

Uempty

Change command defaults: CHGCMDDFT SAVOBJ OBJ( ) LIB( ) DEV(

SAVLIB LIB( ) DEV( )

PRECHK(*NO) ACCPTH(*SYSVAL)

)

PRECHK(*NO) ACCPTH(*SYSVAL)

Make an educated decision on what the defaults should be for: PRECHK ACCPTH

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-8. Change command defaults: CHGCMDDFT

CHGCMDDFT permanently changes the default value of a command parameter. Requirements: • The parameter must have an existing default value. • The new default value must be valid for the parameter. Object pre-check (PRECHK) - Specifies whether the save operation for a library ends if any of the following are true: • The objects do not exist • The library or the objects were previously found to be damaged • The library or the objects are locked by another job • The requester of the save operation does not have authority for the library or to save the objects. The valid values that can be specified for this parameter are: • *NO - The save operation for a library continues, saving only those objects that can be saved. • *YES - If, after all specified objects are checked, one or more objects cannot be saved, the save operation for a library ends before any data is written. If multiple libraries are specified, the save operation continues with the next library. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-12

V11.0 Unit 20. Tips for improved operation

Uempty

Save access paths (ACCPTH) - Specifies whether the logical file access paths that are dependent on the physical files being saved are also saved. The access paths are saved only in the case of the following: • All members on which the access paths are built are included in this save operation. • The access paths are not invalid or damaged at the time of the save. The system checks to ensure the integrity of the access paths. Any discrepancies found by the system will result in the access paths being rebuilt. The valid values that can be specified for this parameter are: • *SYSVAL - The QSAVACCPTH system value determines whether to save the logical file access paths that are dependent on the physical files that are being saved. • *NO - Only those objects specified on the command are saved. No logical file access paths are saved. • *YES - The specified physical files and all eligible logical file access paths over them are saved. QSAVACCPTH - Help System Value QSAVACCPTH - Save access paths. This system value specifies whether the logical file access paths that are dependent on the physical files being saved are also saved when ACCPTH(*SYSVAL) is specified on a save command. A change to this system value takes effect at the start of the next save operation. The shipped value is 1 = Save access paths. The defaults for the parameters (prechk and accpth) is what is displayed on the visual. Saving Access Paths • The default for this parameter is to use the QSAVACCPTH system value. If this system value is set to YES, then all access paths on the system will be saved. • The alternative is to control this at the command level. If the system value is set to NO, then at run time you can determine whether you want to save access paths or not. This will put both the control and the responsibility in the operators hands! Verify that you are making changes to an ‘original’ command. If you make a change to a proxy command, then the original command is what will be changed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-13

V11.0 Unit 20. Tips for improved operation

Uempty

Changing an IBM-supplied command

• Recommendations for changing an IBM-supplied command: ƒ Do not change the original command. ƒ Verify that you are copying the original not a proxy. ƒ Use CRTDUPOBJ to create a duplicate of the command in a user library í

CRTDUPOBJ OBJ (command) FROMLIB (QSYS) OBJTYPE (*CMD) TOLIB (user library)

ƒ Change the command by using CHGCMD or CHGCMDDFT. ƒ Test. ƒ Change the system portion of the library list to move the user library before QSYS. CHGSYSLIBL í CHGSYSVAL í

USRQSYS QSYSLIBL ('USRQSYS QSYS...')

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-9. Changing an IBM-supplied command

It is recommended that you do not change the original IBM-supplied command. Instead, duplicate it and change your copy. The format of the command is as follows: CHGCMDDFT CMD(LIBRARY/COMMAND) NEWDFT('PARAMETER(NEW DEFAULT)') The following is an example of two ways to run CHGCMDDFT for multiple parameters in the same command. You could run the command twice to change the two defaults: CHGCMDDFT CMD(USRQSYS/SAVLIB) NEWDFT('PRECHK(*YES)') CHGCMDDFT CMD(USRQSYS/SAVLIB) NEWDFT('ACCPTH(*YES)') Or you could combine these two commands into a single command: CHGCMDDFT CMD(USRQSYS/SAVOBJ) NEWDFT('PRECHK(*YES) ACCPTH(*YES)') Some OS functions that use IBM commands can specify a library in which to locate the command, rather than the library list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-14

V11.0 Unit 20. Tips for improved operation

Uempty

Example of a CL program to change commands PGM DLTCMD USRQSYS/SIGNOFF CRTDUPOBJ OBJ(SIGNOFF) FROMLIB(QSYS) OBJTYPE(*CMD) + TOLIB(USRQSYS) CHGCMDDFT CMD(USRQSYS/SIGNOFF) NEWDFT('LOG(*LIST)')

Repeat DLTCMD, CRTDUPOBJ and CHGCMDDFT for each command you want changed

ENDPGM

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-10. Example of a CL program to change commands

When installing a new release of a licensed program, the system will replace all IBM-supplied commands. A new release might cause changed commands not to function properly. We suggest by using a CL program to change IBM-supplied commands. This will allow you to recreate the changed commands after installing a new version or a new release of the OS. This technique applies to commands changed by using the CHGCMD / CHGCMDFT commands as well as changes made to other system objects, such as subsystem descriptions and job descriptions. A CL program allows you to track the changes and recreate them after installing the new release. Why is it important to keep track of changes made to IBM-supplied commands? All changes will be made to an ‘original’ command and not to a proxy. In this case we are creating duplicate commands to keep a copy of the original command (with its original settings) on the system as a backup. Users will be instructed to use the new duplicated, customized command. Because new releases replace the IBM commands, you might want to make your changes to the commands via a program. Then when installing a new release on the system, you will only need to rerun the program to recreate the commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-15

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 2: System Reply List

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-11. Topic 2: System Reply List

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-16

V11.0 Unit 20. Tips for improved operation

Uempty

What is the System Reply List?

This is a system-wide list of replies that can be automatically sent in response to inquiry messages.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-12. What is the System Reply List?

There is one System Reply List on the system.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-17

V11.0 Unit 20. Tips for improved operation

Uempty

How the System Reply List works QSYSOPR

DSP25 SEND *INQ MESSAGE ABC1234 TO SYSTEM OPERATOR'S MESSAGE QUEUE

1

MESSAGE ABC1234 REPLY: RIGHT

INQMSGRPY(*SYSRPYL)

3 REPLY MESSAGE ABC1234

*MSGQ System Reply List MESSAGE ID

REPLY

ABC1234

RIGHT

2

REPLY: RIGHT

The system operator does not respond to the message. The System Reply List does this instead.

*MSGQ Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-13. How the System Reply List works

This visual is an example of how a message called ABC1234 will be answered if the job is using the System Reply List (INQMSGRPY (*SYSRPYL)). 1. The user job sends a message to the system operator message queue. 2. The message is found on the System Reply List with a reply value of 'RIGHT'. 3. The reply 'RIGHT' is sent with no action by the system operator. This is a pictorial demonstration of what happens when inquiry messages of a job are responded to via the System Reply List. • The interactive job has the job attribute INQMSGRPY(*SYSRPYL). • Therefore any inquiry message that this job sends, is responded to by the System Reply List. 1. DSP25 sends an inquiry message to the system operator message queue. 2. The system operator does not enter the reply; 3. the reply is entered from the System Reply List. 4. The message queue which receives the reply like it always has.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-18

V11.0 Unit 20. Tips for improved operation

Uempty

When is the System Reply List used? For jobs with the following attribute: Inquiry message reply . . . . . INQMSGRPY(*SYSRPYL) How the inquiry message reply attribute is specified: Interactive jobs

*JOBD CHGJOB

Batch jobs

*JOBD CHGJOB SBMJOB

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-14. When is the System Reply List used?

The job description can specify whether to use the System Reply List. Both CRTJOBD and CHGJOBD have the parameter INQMSGRPY with possible values as follows: • *RQD: A reply is required for any predefined inquiry message that is issued by a job that uses this job description. • *DFT: The default message reply is used to answer any predefined inquiry messages issued during running of a job that uses this job description. The default reply is either defined in the message description or is the default system reply. • *SYSRPYL: The System Reply List is checked to determine whether an entry matches the message identifier and optional compare value for any inquiry message issued by a job that uses this job description. If a match occurs, the reply value in that reply list entry is used. If no entry exists for that message, a reply is required. Use the INQMSGRPY parameter to override the job description value on the CHGJOB or SBMJOB command. At job initiation time it is the job description that determines the value for INQMSGRPY. Print jobs run in the QSPL subsystem and have characteristics similar to batch jobs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-19

V11.0 Unit 20. Tips for improved operation

Uempty

There are additional job descriptions for print writers: • QSPLAFPW: Advanced Function Printing Writer • QSPLRMTW: Remote Spooling Writers • QSPLSTRWTR: Auto start Remote Spooling Writers All of these job descriptions have the INQMSGRPY (*SYSRPYL) attribute. The INQMSGRPY parameters determine whether the *INQ messages for a job uses the System Reply List. You can specify that: • Inquiry messages need to be answered in the usual manner • A default reply is issued • If certain conditions are met, an answer is issued to the inquiry based on those conditions and the reply specified in the System Reply List

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-20

V11.0 Unit 20. Tips for improved operation

Uempty

System Reply List WRKRPYLE Opt

Sequence Number

Message ID

Reply

Dump

Compare Compare Value Start

_____ _____ _____ _____

10 20 30 40

CPA0700 RPG0000 CBE0000 PLI0000

D D D D

*YES *YES *YES *YES

*NONE *NONE *NONE *NONE

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-15. System Reply List

IBM ships the System Reply List with these initial entries defined. For the system to use these entries, you must specify *SYSRPL for the inquiry message reply attribute for the job. These entries indicate that a reply of ‘D’ is to be sent and a job dump is to be taken if the message • CPA0700-CPA0799 • RPG0000-RPG9999 • CBE0000-CBE9999 • PLI0000-PLI9999 (which indicate a program failure) is sent by a job using the System Reply List. The Work with System Reply List Entries (WRKRPYLE) command can be used to display or print all the reply entries currently in the system message reply list. The System Reply List contains replies that are automatically sent in response to inquiry messages. The following information is shown for each reply in the System Reply List: • Sequence number: The number that is used to specify the search order of the entries in the reply list. • Message ID: The identifier of an inquiry message for which automatic system action is to be taken. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-21

V11.0 Unit 20. Tips for improved operation

Uempty

• Reply: The default reply to the inquiry message is sent (*DFT) or a specific reply to the inquiry message is required (*RQD) or a character string (the character string to be sent as the reply to the inquiry message). • Dump indication: The job that sent the inquiry message is not dumped (*NO) or the job that sent the inquiry message is dumped before control is returned to it (*YES). • Compare value: The character string that is compared with the message data of the inquiry message. • Compare start position: A position in the message data of the inquiry message at which the comparison with the Compare Value starts. From this display the user can add, change, or remove individual reply list entries. The reply list is only used when an inquiry message is sent by a job that has the inquiry message reply attribute of the System Reply List specified (*SYSRPYL is specified on the INQMSGRPY parameter). The INQMSGRPY attribute can be changed with the CHGJOB command. The user can add reply list entries with the Add Reply List Entry (ADDRPYLE) command. Specific attributes of a reply list entry can be changed with the Change Reply List Entry (CHGRPYLE) command. Each reply list entry remains in the list until it is removed by the Remove Reply List Entry (RMVRPYLE) command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-22

V11.0 Unit 20. Tips for improved operation

Uempty

Reply column of System Reply List RPY('Message-reply') Character string sent as reply RPY(*RQD)

Requires an explicit reply

RPY(*DFT)

Default reply of the inquiry message

To determine valid and default replies of an inquiry message

DSPMSGD RANGE(MESSAGE ID) Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-16. Reply column of System Reply List

By displaying the message description for IBM-supplied messages, using the Display Message Description (DSPMSGD) command, you can see all of the valid replies. • *DFT specifies that the default reply is issued, or any of the other valid replies can be specified. • *RQD means that a reply is required from the user, and causes the message to act as though the reply list was not in effect. The default message file in which the system looks for the specified message ID is QCPFMSG. Program products such as RPG and COBOL have their own message files, such as QRPGMSGE and QCBLMSGE.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-23

V11.0 Unit 20. Tips for improved operation

Uempty

Inquiry messages that might not need a reply Add messages to the System Reply List CPA4002

Verify alignment on printer PRT01 (I G N R E C) ADDRPYLE SEQNBR(100) MSGID(CPA4002) CMPDTA('ACCTPRT' 21) RPY(*RQD) ADDRPYLE SEQNBR(110) MSGID(CPA4002) RPY(*DFT)

CPA3387

Device PRT01 not available (C R) ADDRPYLE SEQNBR(120) MSGID(CPA3387) RPY(*DFT)

CPA3394

Load form type '*STD' device PRT01 writer PRT01 (G B I H R C) ADDRPYLE SEQNBR(130) MSGID(CPA3394) CMPDTA('PRT01' 41) RPY(I) ADDRPYLE SEQNBR(140) MSGID(CPA3394) RPY(*RQD) Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-17. Inquiry messages that might not need a reply

To have the System Reply List reply to printer messages CPA4002, CPA3387, and CPA3394, you add them to the System Reply List. The compare value allows you to vary the response, in this case, by printer. • For message CPA4002, suppose alignment is only an issue for the printer in the accounting department, printer ACCTPRT, where preprinted forms are used and which are changed frequently. These reply list entries will direct the system to send the default reply (I) to all printers except ACCTPRT. The specific entry for printer ACCTPRT must be before the general entry. Once a match is found, entries further down the list are not considered. • For message CPA3387, this entry directs the system to always send a cancel reply if a print device is not available. • For message CPA3394, suppose that load form type messages are generally important to you and you want the user to have to answer them, but for printer PRT01 the paper type is never changed and you want to print regardless on what is loaded. These entries will handle this policy. The specific entry must be before the general entry. Once a match occurs, entries further down the list are not considered. At job initiation time it is the job description that determines the value for INQMSGRPY. Print jobs run in the QSPL subsystem and have characteristics similar to batch jobs. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-24

V11.0 Unit 20. Tips for improved operation

Uempty

These printer messages can annoy a system operator, especially if they occur for a printer that always has the same type of paper loaded and stays aligned. So, these messages would be ideal candidates to have the system respond to these automatically. An easy way to find out the message ID for a message is to place the cursor on the message and press F1. The message ID field will be in the upper left corner of the display. For a message to be automatically responded to via the System Reply List, the message must first be added to the System Reply List with the wanted reply.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-25

V11.0 Unit 20. Tips for improved operation

Uempty

System Reply List with user entries

Sequence Number

Message ID

Reply

Dump

10 20 30 40 100 110 120 130 140

CPA0700 RPG0000 CBE0000 PLI0000 CPA4002 CPA4002 CPA3387 CPA3394 CPA3394

D D D D *RQD *DFT *DFT I *RQD

*YES *YES *YES *YES *NO *NO *NO *NO *NO

Tips for improved operation

Compare Value

Compare Start

*NONE *NONE *NONE *NONE ACCTPRT

21

PRT01

41

© Copyright IBM Corporation 2001, 2016

Figure 20-18. System Reply List with user entries

Here is the System Reply List in which the entries have been added for the printer messages.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-26

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 3: Attention program and DSCJOB

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-19. Topic 3: Attention program and DSCJOB

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-27

V11.0 Unit 20. Tips for improved operation

Uempty

Set attention program

Attention key

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-20. Set attention program

The Attention key can be pressed to: • Interrupt the current program • Run another program or use a menu • Return the user to the first program exactly where the user left it This differs from using the System Request key which • Allows the user to sign on to an entirely different job • Do any function for which they are authorized, just as though they were signing on at the beginning of the day The Attention key calls a specified program within the current program. Use the system value QATNPGM (Attention program) to specify the default program for the system. You can specify one of the following: • *ASSIST: The Operational Assistant Main menu is displayed when the Attention key is pressed. • *NONE: No attention program is called when the Attention key is pressed. • Program name/library: The name of the attention program/library to call when the Attention key is pressed.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-28

V11.0 Unit 20. Tips for improved operation

Uempty

User profile: Attention program ATNPGM(PROGRAM-NAME)

Attention key

The program specified in this parameter in the user’s profile, is called when the Attention key is pressed.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-21. User profile: Attention program

One of the parameters in a user profile is the Attention program (ATNPGM) parameter. The possible values for this parameter are: • *SYSVAL: Calls the program specified in the System Value QATNPGM. • *ASSIST: This is a special value that calls the Operational Assistant Main menu. It allows the user to execute options from this menu as though they had used GO ASSIST, but without having to end their current task or use the command line to do so. *ASSIST could also be the value of QATNPGM, if you would like it to be the default for the system • *NONE: No initial attention program is specified for this user. • Program-name: This is the name of the program called when the Attention key is pressed. This could be a special CL program, a menu of options for this user, or it could be an application program written specifically to do Attention key handling. The value in the user profile can be overridden by the SETATNPGM command. Generally this command is used within a CL program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-29

V11.0 Unit 20. Tips for improved operation

Uempty

An experienced programmer should be involved when specifying anything other than *SYSVAL, *ASSIST, or *NONE in a user profile or when naming a specific program in the system value QATNPGM. Because the attention program runs within the interrupted program, there are special considerations. See the Work Management manual for more information on using the SETATNPGM command to override the value in the user profile on a job or application basis and on defining a program as an attention-key-handling program.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-30

V11.0 Unit 20. Tips for improved operation

Uempty

Disconnect Job - DSCJOB Executive payroll top secret

Time for lunch (DSCJOB) Sign on User:_______ Password: Return to work. Sign on to same workstation with same password.

Tips for improved operation

Executive payroll top secret

© Copyright IBM Corporation 2001, 2016

Figure 20-22. Disconnect Job - DSCJOB

The Disconnect Job (DSCJOB) command is not an end of job. It is a command that is valid only for interactive jobs. It allows the interactive user to disconnect a job from a workstation and return to a sign-on display. At the next sign-on to the same workstation with the same user profile, the interactive job reconnects to the workstation exactly where it was prior to DSCJOB. The system value QDSCJOBITV (Time value before disconnected job ends) indicates the length of time in minutes, that an interactive job can be disconnected before it is ended by the system. The values allowed are: • Five through 1440:The number of minutes that the system waits before ending a disconnected job. • The default value for this parameter is 240 minutes. • *NONE: The system will not automatically end a disconnected job. This visual shows conceptually how DSCJOB works. DSCJOB takes less system resource than signing off and then signing back on. However, the DSCJOB job is tracked by the system. Another interactive job can be started on the device under a different user name. The DSCJOB command can also be run by selecting option 13 = Disconnect on the Work with User Jobs display.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-31

V11.0 Unit 20. Tips for improved operation

Uempty

Some considerations when using DSCJOB: • A TCP/IP TELNET job can be disconnected if the session is using a named device description. You can create a named device description using one of the following ways: ▪ Network Stations with the DISPLAY NAME parameter ▪ System i Access support with the workstation ID function ▪ TCP/IP TELNET Device Initialization exit point to specify a workstation name • All jobs will be disconnected for group jobs. When they are connected again, you return to the place where the disconnect was issued. If the last active group job ends before you connect again you return to the next group job. • All disconnected jobs in the subsystem end when the subsystem ends. • If a subsystem is ending, the DSCJOB command cannot be issued in any of the jobs in the subsystem. • Disconnected jobs that have not exceeded the QDSCJOBITV value, end when the subsystem is ended or when an IPL occurs.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-32

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 4: Managing writers and printing

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-23. Topic 4: Managing writers and printing

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-33

V11.0 Unit 20. Tips for improved operation

Uempty

Using multiple writers for an OUTQ

Max 10 writers per OUTQ *READY to next printer

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-24. Using multiple writers for an OUTQ

Some implementation considerations for multiple writers to an output queue: • Up to 10 print writers can be active to an output queue at one time. • For local writers, each will specify a printer device (PRTDEV). • For remote writers, the output queue parameters will determine whether, where, and how spool files are to be sent. • Writers get spooled files in the order the writers are started. • Each waits for a file with *READY status. • If there is an attribute mismatch (AFPDS data to SCS or ASCII printer or forms type), the status is changed to *HELD. • For a remote writer, status is changed to *SENDING until sent; then it will either be deleted or saved depending on SAVE parameter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-34

V11.0 Unit 20. Tips for improved operation

Uempty

Manage printing by spool file size Maximum 15 pages 12:00 to 13:00

CRTOUTQ, CHGOUTQ (MAXPAGES (100 0800 1700) (15 1200 1300) (500 0000 2400))

Maximum 100 pages 8:00 to 17:00

Maximum 500 pages 00:00 to 24:00 (could say 17:00 to 08:00)

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-25. Manage printing by spool file size

You could schedule your printing such that the following guidelines apply: ▪ No more than 100 pages printed from 8:00 to 17:00 ▪ No more than 15 pages printed from noon to 13:00 ▪ Never print more than 500 pages without explicit operator control In order to do so, you can implement the following: • MAXPAGES parameter on output queue commands (CRTOUTQ, CHGOUTQ): ▪ Maximum pages allowed in time range ▪ Start time ▪ Stop time • Up to five sets or iterations of this parameter is allowed ▪ Ranges can overlap for maximum flexibility ▪ Smallest maximum has priority • Status: *DEFERRED

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-35

V11.0 Unit 20. Tips for improved operation

Uempty

▪ Spool files greater than maximum will be assigned *DEFERRED status until the ending time expires. ▪ When maximum time expires, spool file set to *READY status. Deferred (DFR) spooled file status can change: • When a writer is started for an output queue, it will calculate the maximum spooled file size for the current time and change any RDY files which exceed the limit to DFR. Any spooled files which are added to the output queue (created or moved) after a writer is started for the queue, will have a status of DFR if the file exceeds the current limit. When the system time-of-day changes such that a new maximum spooled file size is to take effect, the writer will go through the output queue again and update RDY files to DFR, or DFR to RDY, depending on the new limit and the size of the particular spooled file. When the writer is ended, all DFR spooled files will return to RDY. • When time ranges for the maximum spooled file size overlap, the smaller of the number of pages values will be used. For example, assume that there were two time ranges of 08:00:00-16:00:00 and 12:00:00-12:30:00, with number of pages 40 and 10, respectively. The largest spooled file that would print from 8:00 a.m. to 12:00 p.m. would be 40 pages, the largest file that would print from 12:00 p.m. to 12:30 p.m. would be 10 pages, and the largest file that would print from 12:30 p.m. to 4:00 p.m. would be 40 pages. If a file is *DEFERRED, it is not *HELD, and therefore cannot be *RELEASED. A file can be *DEFERRED and then changed to *HELD. Then, when *RELEASED, it will either change to *READ or *DEFERRED status, depending on the MAXPAGES limit in effect at that time.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-36

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 5: Virtual optical image catalog

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-26. Topic 5: Virtual optical image catalog

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-37

V11.0 Unit 20. Tips for improved operation

Uempty

Virtual optical image catalog

• Can be used to perform the following: ƒ ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Install or upgrade to the next version / release of the OS Perform a software upgrade Install PTFs (fixes) Install a single LPP Distribute programs Perform backups Create distribution media for central site support Create save LIC media

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-27. Virtual optical image catalog

You can also use a tape image catalog and a virtual tape device to install PTFs or to install single licensed programs. However you cannot use a virtual tape device to install or upgrade to an OS release. Image catalog requirements: • An image catalog upgrade works like a D-mode IPL without a console during the installation of Licensed Internal Code (LIC). Reference codes are used to display the status. • Installations done by using image catalogs requires an OS command line to initiate the installation. • Image files cannot reside in an independent auxiliary storage pool (iASP). An installation cannot be performed from an (iASP). • To perform an installation using image catalogs, you must have at least 1074 MB of free storage on the load-source disk unit. You can use virtual optical media to save images directly to system disk units for convenience, flexibility, and in some cases improved performance.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-38

V11.0 Unit 20. Tips for improved operation

Uempty

Virtual optical is beneficial for unattended saves because it eliminates media errors that could halt an unattended save. If you do not allocate enough space in the image catalog to save the intended information, virtual optical will use the autoload feature to create additional images with the same capacity as the last image you loaded, provided the disk storage is available.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-39

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (1 of 8)

1. Create a virtual CD device.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-28. Steps to create an optical image catalog (1 of 8)

These steps show how you create an image catalog and an image catalog entry, add an image catalog entry, and load the image catalog in preparation of performing an OS software upgrade. The specific steps to use a virtual optical device are: 1. Create a virtual optical device. Once it has been created this device can be reused so it is not necessary to recreate every time this is needed. To create a device description, enter the following command: CRTDEVOPT DEVD(virtual-device-name) RSRCNAME(*VRT) ONLINE(*YES) TEXT(text-description)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-40

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (2 of 8)

2. Vary on this virtual optical device.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-29. Steps to create an optical image catalog (2 of 8)

2. Vary on the virtual optical device. Enter the following: VRYCFG CFGOBJ(virtual-device-name) CFGTYPE(*DEV) STATUS(*ON)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-41

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (3 of 8)

3. Create an image catalog.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-30. Steps to create an optical image catalog (3 of 8)

3. Create an image catalog. Create an image catalog for the licensed programs that you want to install. The Create Image Catalog (CRTIMGCLG) command associates an image catalog with a target directory where the optical image files are loaded. CRTIMGCLG IMGCLG(catalog-name) DIR(catalog-path) CRTDIR(*YES) TEXT(text-description Note Specify CRTDIR(*YES) only if the directory specified in the DIR parameter does not exist.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-42

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (4 of 8)

4. Add the downloaded image file to the image catalog.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-31. Steps to create an optical image catalog (4 of 8)

4. Add an image catalog entry. Add an image catalog entry for each physical media or optical image file that you have. You need to repeat this step for each volume of media. You should add the physical media or optical image files in the same order as if you were going to install from them. Start with the first media in the list and continue until all the media are loaded. You can add the entries from either an optical device or from an existing optical image file. Select one of the following ways: From an image file: ▪ (This is the fastest way.) To add an image entry to an image catalog from an integrated-file-system file that is already in the image catalog directory, enter the following: ADDIMGCLGE IMGCLG(catalog-name) FROMFILE(file-name) TOFILE(*fromfile) TEXT(text-description) ▪ To add an image catalog entry to an image catalog from an existing integrated-file-system optical image file from a directory other than the image catalog directory, enter the following: ADDIMGCLGE IMGCLG(catalog-name) FROMFILE(/directory-name/directory-name/file-name) TOFILE(file-name or *FROMFILE) TEXT(text-description)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-43

V11.0 Unit 20. Tips for improved operation

Uempty

From a physical device: ▪ To add an image catalog entry to an image catalog from a physical optical media using optical device named OPT01, enter the following: ADDIMGCLGE IMGCLG(catalog-name) FROMDEV(OPT01) TOFILE(file-name or *GEN) TEXT(text-description) Note: To generate a name for the TOFILE parameter, specify *GEN. To generate a text description from the media, specify *GEN.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-44

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (5 of 8)

5. Load the image catalog.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-32. Steps to create an optical image catalog (5 of 8)

5. Load the image catalog. This step associates the virtual optical device to the image catalog. Only one image catalog at a time can be associated with a specific virtual optical device. To load the image catalog, type the following command: LODIMGCLG IMGCLG(catalog-name) DEV(virtual-device-name) OPTION(*LOAD) You can also use the WRKIMGCLG command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-45

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (6 of 8)

6. Verify that the images are in the correct order.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-33. Steps to create an optical image catalog (6 of 8)

6. Verify that the images are in the correct order Attention If you are here because you are performing the steps in Preselecting the licensed programs to install, do not perform this step at this time. You are directed to perform this step later. • If you are preparing for an upgrade, you need to verify that the required media for an upgrade exist and are sorted in the correct sequence. You also need to verify that your software agreements have been accepted, that you have enough storage on the load source, and that you have enough reserved storage for the Licensed Internal Code. • Enter the following command: VFYIMGCLG IMGCLG(catalog-name) TYPE(*UPGRADE) SORT(*YES) • To verify that images are added. An additional method would be to enter the following: WRKIMGCLGE IMGCLG(catalog-name)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-46

V11.0 Unit 20. Tips for improved operation

Uempty

• Then press PF7 to prompt for the VFYIMGCLG command. Enter *UPGRADE for the type and *YES for the sort field. • The system puts the images in the correct order. (If you are not successful, refer to Image catalog recovery.) By default, the volume with the lowest index is mounted. Then all the other volumes are loaded. To see the order of the images, use the Work with Image Catalog Entries (WRKIMGCLGE) command: WRKIMGCLGE IMGCLG(catalog-name) After completing these steps, your image catalog is ready for use.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-47

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (7 of 8)

7. Verify the status of ready.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-34. Steps to create an optical image catalog (7 of 8)

You can check the status by using the WRKIMGCLG command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-48

V11.0 Unit 20. Tips for improved operation

Uempty

Steps to create an optical image catalog (8 of 8)

8. Load the PTFs.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-35. Steps to create an optical image catalog (8 of 8)

To load PTF's you have to: 1. Run Go PTF. 2. From menu choose option 8 Install program temporary fix package. 3. Enter the Optical image name and confirm with Enter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-49

V11.0 Unit 20. Tips for improved operation

Uempty

Web address for virtual optical devices

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-36. Web address for virtual optical devices

The URL to display the web page in the visual is: http://www.ibm.com/support/knowledgecenter/ssw_ibm_i_73/rzam4/rzam4virtual.htm When a save is complete to virtual optical: • You can transfer it to physical media at any time and not interfere with system operations. • You also have the capability to send the stream files from the virtual optical save to another system by using FTP. • If you have multiply systems your strategy could be to save each system to virtual optical and then FTP the stream files to a single system where the save to physical media could take place. • You can save the virtual images to tape in optical format or you can use the Duplicate Optical (DUPOPT) command to save the image to optical media. Note: In a disaster recovery situation: • You must have physical media of the Licensed Internal Code and the operating system to begin your recovery. • If you have saved to virtual optical as part of your disaster protection strategy, you must then save your Licensed Internal Code and operating system to physical media from the virtual images. • You must also have access to all of your user data either on a remote system or on physical media. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-50

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 6: FTP transfer

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-37. Topic 6: FTP transfer

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-51

V11.0 Unit 20. Tips for improved operation

Uempty

Transfer data to and from IBM i

FTP in/out FTP in/out

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-38. Transfer data to and from IBM i

There are a few methods to transfer data to and from IBM i partition. One of them is FTP (File Transfer Protocol). Transfer data using FTP is easy but depending on the environment it might required a different syntax.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-52

V11.0 Unit 20. Tips for improved operation

Uempty

FTP PC-IBM i

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-39. FTP PC-IBM i

If you want to transfer data to or from IBM i on the workstation open command line Start > Run > type CMD end press Enter. In the pop-up window type: ftp and press Enter. If need help type ftp /? and press Enter. Once connected to the partition enter your IBM i user name and password to logon. Depending on the data you transfer you can chose different mode in most case it is binary mode (the binary mode transmits all 8 bits per byte and thus provides less chance of a transmission error and must be used to transmit files other than ASCII files) for example to transfer PTF’s package you have to use binary mode. On the command line type bin and press Enter. By default, FTP (File Transfer Protocol) uses the traditional IBM i file naming conventions Libraries, which contain Files, which in turn contain Members. This is also known as the *LIB Naming Format, and looks like the following: Libraryname/Filename.Membername.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-53

V11.0 Unit 20. Tips for improved operation

Uempty

FTP PC-IBM i name format Default Naming Format NAMEFMT 0

IFS Naming Format NAMEFMT 1

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-40. FTP PC-IBM i name format

By default, FTP (File Transfer Protocol) uses the traditional IBM i file naming conventions Libraries, which contain Files, which in turn contain Members. This is also known as the *LIB Naming Format, and looks like the following: Libraryname/Filename.Membername. When you type DIR command, you will be see your current library if you do not have specified library in your profile by default it will be QGPL. If you want to work with object in IFS you have to change naming format to IBM i Integrated File System Naming Format. This looks much more like a UNIX or Personal Computer Directory system. We must use this Naming Format known as *PATH or 'NAMEFMT 1' to access files in the Integrated File System, the document library services QDLS folders, QOPT optical files, or to send save files. To change format type cd/. A lot of ftp clients offer a graphical interface where you can easy change the naming format.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-54

V11.0 Unit 20. Tips for improved operation

Uempty

FTP PC-IBM i transfer Sending command put

Downloading command get Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-41. FTP PC-IBM i transfer

By default, FTP (File Transfer Protocol) uses the traditional IBM i file naming conventions Libraries, which contain Files, which in turn contain Members. This is also known as the *LIB Naming Format, and looks like the following: Libraryname/Filename.Membername. When you type DIR command you will be see your current library if you don’t have specified library in your profile by default it will be QGPL. If you want to work with object in IFS you have to change naming format to IBM i Integrated File System Naming Format. This looks much more like a UNIX or Personal Computer Directory system. We must use this Naming Format known as *PATH or 'NAMEFMT 1' to access files in the Integrated File System, the document library services QDLS folders, QOPT optical files, or to send save files. To change format type cd/. A lot of ftp clients offer a graphical interface where you can easy change the naming format. To send something you have to use command put or mput (for group of files. To download you have to use get command or mget (for group of files). To close ftp session type quit and press Enter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-55

V11.0 Unit 20. Tips for improved operation

Uempty

FTP IBM i - IBM i transfer

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-42. FTP IBM i - IBM i transfer

Transfer between two IBM i partitions is similar to PC-IBM i transfer. You have to type in the command line command ftp and press Enter. After you enter the user name and password you will be connected to remote system (default) in QGPL library using default name format.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-56

V11.0 Unit 20. Tips for improved operation

Uempty

FTP IBM i - IBM i IFS name format

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-43. FTP IBM i - IBM i IFS name format

To change name format use command namefmt 1 If you wan to back to IBM i library name convention use namefmt 0. To end ftp session type quit and press Enter or press F3 function key and type 1 Yes and confirm with Enter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-57

V11.0 Unit 20. Tips for improved operation

Uempty

FTP - batch mode

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-44. FTP - batch mode

It is possible to ftp something to a few systems by using a batch job. To prepare ftp batch you have to create a simple CL pgm, where you declare file in this example INPUTFILE with IP addresses of systems or systems name if your system can resolved the names. In the physical file exist field SYSTEM_IP where are IP addresses (or system names). Example: PGM DCLF FILE(AS2700/INPUTFILE) DCL VAR(&NAME) TYPE(*CHAR) LEN(8) LOOP: RCVF MONMSG MSGID(CPF0864) EXEC(GOTO CMDLBL(END)) CHGVAR VAR(&NAME) VALUE(&SYSTEM_IP)

OVRDBF

FILE(INPUT) TOFILE(AS2700/QCLSRC) MBR(FTP_REQ)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-58

V11.0 Unit 20. Tips for improved operation

Uempty

OVRDBF FTP

FILE(OUTPUT) TOFILE(AS2700/QCLSRC) MBR(FTP_RES) RMTSYS(&NAME)

GOTO CMDLBL(LOOP) END: ENDPGM When you create it compile to CL program. In program you work with two file members. First is an input member where you have to type the user password, name format, binary mode and what do you want transfer. Example: USER PASSWORD BIN NA 0 PUT AS2700/CUSTMASTER AS2700/CUSTMASTER QUIT However the member is in QCLSRC file but type must be TXT and do not try to compile it. Second member is an output which receive messages from ftp server here you can find any errors during connection or transfer. In the member you can find this same information when you try connect to any system interactive.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-59

V11.0 Unit 20. Tips for improved operation

Uempty

FTP - batch mode run

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-45. FTP - batch mode run

To start ftp transferring call the program ftp_auto and see result in the ftp_res member in the QCLSRC file. Of course you can connect to any operating system not only IBM i.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-60

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 7: Advanced spool file management

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-46. Topic 7: Advanced spool file management

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-61

V11.0 Unit 20. Tips for improved operation

Uempty

Too many files

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-47. Too many files

A large number of spooled files are generated every day, some of them are important some not and can be deleted by a simple clear outq.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-62

V11.0 Unit 20. Tips for improved operation

Uempty

Spool file expiration

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-48. Spool file expiration

For each spool file you can set an expiration. To set the expiration: Select the spool file. Select option 2 Change press the F10 function key. PGDWN and find Expiration date for file (EXPDATE keyword). Of course this is good for one or many files. You can also use: Change Spooled File Attributes (CHGSPLFA) command or by taking Option 8 (Attributes) from the Work with Spooled Files (WRKSPLF) or Work with Output Queue (WRKOUTQ) commands. For example: CHGSPLFA FILE(QPRTLIBL) JOB(*) SPLNBR(1) EXPDATE(*DAYS) DAYS(30) CHGSPLFA FILE(QPRTLIBL) JOB(*) SPLNBR(1) EXPDATE(*NONE)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-63

V11.0 Unit 20. Tips for improved operation

Uempty

Spool files expiration

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-49. Spool files expiration

For multiple files the better method might be: Create Printer File (CRTPRTF), Change Printer File (CHGPRTF) and Override with Printer File (OVRPRTF) commands. For example: CRTPRTF FILE(library/printer-file) EXPDATE(*DAYS) DAYS(30) CHGPRTF FILE(QPJOBLOG) EXPDATE(*DAYS) DAYS(30) OVRPRTF FILE(QPJOBLOG) EXPDATE(*DAYS) DAYS(30) OVRSCOPE(*JOB) All created spool files will have expiration data.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-64

V11.0 Unit 20. Tips for improved operation

Uempty

BRMS spool files expiration

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-50. BRMS spool files expiration

If you using BRMS (Backup and Recovery Media Solution) you can setup expiration of saved spool files. To do that you have to create or change (use WRKLBRM command) the Spooled File List which will be added to Control Group. On the Create/Change Spooled File List enter which spool file will be saved and press F11 function key to setup spool file expiration. There are two available values: *SAVDAT The number of days specified in the Expiration field is added to the start date of the save operation. *CRTDAT The number of days specified in the Expiration field is added to the creation date for each spool file.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-65

V11.0 Unit 20. Tips for improved operation

Uempty

Delete expired spooled files

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-51. Delete expired spooled files

After expiration is set for a spool file you can use the DLTEXPSPLF command to delete expired spooled files. You can also to do this with: SBMJOB CMD(DLTEXPSPLF ASPGRP(*ALL)) JOB(DLTEXPSPLF) ADDJOBSCDE JOB(DLTEXPSPLF) CMD(DLTEXPSPLF ASPGRP(*ALL)) FRQ(*WEEKLY) SCDDATE(*NONE) SCDDAY(*ALL) SCDTIME(010000) JOBQ(QSYS/QSYSNOMAX) TEXT('Delete expired SPLFs on a weekly basis') The Delete Expired Spooled Files (DLTEXPSPLF) command removes expired spooled files on the system or the auxiliary storage pool (ASP) group specified by the user. A spooled file expires at 23:59:59, system local time on the date specified in the Expiration date for file (EXPDATE) spooled file attribute.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-66

V11.0 Unit 20. Tips for improved operation

Uempty

Topic 8: SST/DST Advance Operator functionality

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-52. Topic 8: SST/DST Advance Operator functionality

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-67

V11.0 Unit 20. Tips for improved operation

Uempty

Problem determination

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-53. Problem determination

For simple problem reporting you can use two tools Product Activity Log (PAL) and Work with service action log (SAL). To use this tool on the command line type STRSST (Start Service Tools) and press Enter. On the SST menu chose option 1 Start a service tool and then again option 1 Product activity log.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-68

V11.0 Unit 20. Tips for improved operation

Uempty

Product activity log

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-54. Product activity log

Chose Option 1 Analyze log. On the select subsystem data you can select all logs or logs for specific group. You can also set the date/time scope. Define report option depending on your or service requirements.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-69

V11.0 Unit 20. Tips for improved operation

Uempty

Log Analysis Report

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-55. Log Analysis Report

If you chose report output on the display you can work with existing problems.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-70

V11.0 Unit 20. Tips for improved operation

Uempty

Work with service action log

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-56. Work with service action log

To Work with service action log (SAL) from the SST menu select option 1 Start service log. Then select option 7 Hardware service manager and chose option 6 Work with service action log.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-71

V11.0 Unit 20. Tips for improved operation

Uempty

Service action log

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-57. Service action log

From the action log you can also chose data and time. On the report list you can display, close entry, or delete closed entry.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-72

V11.0 Unit 20. Tips for improved operation

Uempty

Service action log entry details

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-58. Service action log entry details

On the display detail you can analyze the problem.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-73

V11.0 Unit 20. Tips for improved operation

Uempty

Check disks status

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-59. Check disks status

Using SST you can analyze of the disk health status. Because now is the trend to move to external disks. The external this are present to the system with multipath connection. It is very important to verify all path are in proper state. Internal disks presented by modern SAS adapter will show on the system more than one access path to the disks. Work with disks you have to select from SST menu option 3 Work with disk units option 1 Display disk configuration. Here you can analyze more disks health information one them is path status. To work with path status chose option 9 Display disk path status.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-74

V11.0 Unit 20. Tips for improved operation

Uempty

Disk path status

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-60. Disk path status

Depending on the configuration you can see all path Active or mix Active Passive (often in SAS disks).

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-75

V11.0 Unit 20. Tips for improved operation

Uempty

Review questions (1 of 2) 1. True or False: A proxy command is the same as a duplicated command. 2. A maximum of up to (blank) print writers can be active to an output queue at one time. a. b. c. d.

1 5 10 32

3. True or False: A job that is disconnected will remain on the system indefinitely.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-61. Review questions (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-76

V11.0 Unit 20. Tips for improved operation

Uempty

Review answers (1 of 2) 1. True or False. A proxy command is the same as a duplicated command. The answer is False.

2. A maximum of up to 10 print writers can be active to an output queue at one time. a. 1 b. 5 c. 10 d. 32 The answer is 10.

3. True or False. A job that is disconnected will remain on the system indefinitely. The answer is False.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-62. Review answers (1 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-77

V11.0 Unit 20. Tips for improved operation

Uempty

Review questions (2 of 2) 4. An optical image catalog can be used to: a. b. c. d.

Upgrade to the next version or release of OS Install PTFs Install an LPP All of the above

5. True or False: Batch FTP mode is not available on IBM i. 6. True or False: You can delete expired spooled file in IBM i. 7. True or False: You cannot check status of the disk path.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-63. Review questions (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-78

V11.0 Unit 20. Tips for improved operation

Uempty

Review answer (2 of 2) 4. An optical image catalog can be used to: a. Upgrade to the next version or release of OS b. Install PTFs c. Install an LPP d. All of the above The answer is All of the above.

5. True or False: Batch FTP mode is not available on IBM i. The answer is False.

6. True or False: You can delete expired spooled file in IBM i. The answer is True.

7. True or False: You cannot check status of the disk path. The answer is False.

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-64. Review answer (2 of 2)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-79

V11.0 Unit 20. Tips for improved operation

Uempty

Exercise: Tips for improved operations

• At the end of the exercise, you should be able to: ƒ Use CHGCMDDFT and CHGCMD to tailor commands to your operating environment ƒ Use CRTPRXCMD to create a proxy command ƒ Display messages and determine the default reply

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-65. Exercise: Tips for improved operations

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-80

V11.0 Unit 20. Tips for improved operation

Uempty

Unit summary

• • • • • • • • •

Create a user-defined proxy command Change how a command is used Permanently change a command's defaults Explain how to use the System Reply List to automatically reply to messages Explain how to leave a job temporarily through the attention key or how to disconnect a job Use printers efficiently through printer load balancing Describe the process of creating a virtual optical device to use when performing a software upgrade or installing PTFs Describe how perform FTP transfer included batch mode Explain some SST/DST function to diagnostic problems

Tips for improved operation

© Copyright IBM Corporation 2001, 2016

Figure 20-66. Unit summary

This unit has covered ways to change defaults, make the system easier for the users, and make operations more streamlined for the system operator as well as otherwise improve system operations.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

20-81

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Unit 21. Journaling overview and basic operation Estimated time 01:00

Overview Journal management is a very valuable and powerful tool which is an integral part of the operating system. When used properly as part of a comprehensive recovery plan, it significantly improves the ability of the administrator to recover from many types of job and system failures.

How you will check your progress • Review questions • Machine exercises

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-1

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Unit objectives

• Describe how journal management can be used to recover data lost during a failure • Implement journal management on your IBM Power System with IBM i as part of a comprehensive recovery plan • List the advantages and considerations of journal management

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-1. Unit objectives

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-2

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Topic 1: Journal management concepts

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-2. Topic 1: Journal management concepts

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-3

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Think about your most important data file Data file

• What if it disappeared? • How would you get it back? ƒ RSTOBJ ƒ Rekey all data from last save plus data since last save

• How much time would it take? • Do you need to shorten the recovery time for data files? Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-3. Think about your most important data file

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-4

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Single-level storage ON

OFF

Volatile storage Main memory

N

S

Magnetic storage disk drives

*PGM Delete Update Write

1

Or solid state disk drives

2 *JRNRCV

*JRN Buffer 3

Disk I/O 4

File A

File A

File A

Data file scatter loading Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-4. Single-level storage

Journal management enables you to recover the changes to an object that have occurred since the object was last saved. You can also use journal management to provide an audit trail or to help replicate an object. You use a journal to define what objects you want to protect with journal management. The system keeps a record of changes you make to objects that are journaled and of other events that occur on the system. 1. Journal management intercepts the database record (add, update, or delete). 2. Journal entry is forced to the journal receiver on a disk with a force ratio of one. 3. The database record is given to database data management. 4. The database record is written to disk FRCRATIO(*NONE) is recommended for journaled files. Information in volatile storage, also called main memory, gets destroyed while information on disk is still there. A file is a very complex object and a journal is a very simple object, so force write ratio uses more disk arm movement than journaling. With journaling, CPU power is not the issue, disk space, and disk I/O are. This topic also shows how to manage that disk space and I/O.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-5

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Updates to database pages are made in main storage. When the update is complete and journaling has been implemented, journal management writes the updated record to the receiver on disk. The physical file on disk is updated asynchronously when the system page out task is invoked at a later time. In addition to a copy of the updated data record, the journal entry contains information about the user, the time, the program, the file, and so on, for which the entry was made.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-6

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Journal objects Journaling data flow

PGMX Object A change

PGMY Object B change

Object B change

Object C change

Journal receiver Object A change Object B change Object B change Obj. A

Obj. B

Journaling overview and basic operation

Obj. C

© Copyright IBM Corporation 2001, 2016

Figure 21-5. Journal objects

The system keeps a record of changes you make to objects that are journaled and of other events that occur on the system. These records are called journal entries. You can also write journal entries for events that you want to record, or for objects other than the object that you want to protect with journaling. Contents of a journal entry: • Information identifying the type of change • Information identifying the record that was changed • After image of the record • Before image of the record (optional) (this is a separate journal entry) • Information identifying the job, the user, the time of change, and so forth • Information that identifies whether the file was opened, closed, reorganized, cleared, or saved • The journal identifier of the object A very important point here is the fact that journaling is done by file, not by program. This means no programming changes need be made. More important, journaling records all activity on the files being journaled no matter where or when the activity takes place, now or in the future, such as adding, deleting, or renaming a file member. © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-7

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Objects that can be journaled

• Ability to record changes into a journal of: ƒ Access paths ƒ Libraries ƒ Objects í í

Data area (*DTAARA) Data queue (*DTAQ)

ƒ Database physical files (*PF) ƒ IFS objects í í í

Stream files (*STMF) Directories (*DIR) Symbolic link (*SYMLNK)

ƒ Note: IFS objects must be in the root (/), QOpensys, user-defined file system

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-6. Objects that can be journaled

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-8

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Display Journal Entries

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-7. Display Journal Entries

The Display Journal (DSPJRN) command allows you to convert journal entries (contained in one or more receivers) into a form suitable for external representation. Output of the command can be displayed or printed with the job's spooled printer output or directed to a database output file. If the database output file exists, records can either replace or be added to the current data in the indicated file member. The system creates the specified database file and member if they do not exist. Database files created by the system have a standard format. A warning message is sent and the records are truncated if any of the entries are longer than the specified maximum record length of the output files. The Display Journal display shows a list of the journal entries that you requested to be displayed. Only basic information about the journal entry is shown on this display. From this display, you can request to see all of the information for a specific journal entry. To see all of the information for a specific journal entry, type 5 next to the journal entries that you want more information about, and press Enter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-9

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Display Journal Entry

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-8. Display Journal Entry

The Display Journal Entry (option 5) display shows all of the information about a specific journal entry. The journal entry shown is one that you requested on the Display Journal display. Sequence - The journal sequence number The sequence number is initially 1. Each journal entry is sequentially numbered without any breaks until the Change Journal (CHGHRN) command resets the sequence number. However, when journal entries are converted and displayed, there can be breaks in the sequence numbers. The system uses some journal entries only internally and combines some entries into one during conversion. Incomplete data Indicates whether this entry has entry-specific data which is not being displayed for one of the following reasons. • The length of the entry-specific data exceeds 32,766 bytes. • The entry is associated with a database file that has one or more fields of data type BLOB (binary large object), CLOB (character large object), or DBCLOB (double-byte character large object) The possible values are: • No - This entry has all possible data • Yes - This entry has incomplete data © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-10

V11.0 Unit 21. Journaling overview and basic operation

Uempty

The data which is not visible through this interface can only be accessed by using the Retrieve Journal Entries (QjoRetreiveJournalEntries) API or by specifying ENTFMT (*TYPEPTR) on the RCVJRNE command. Entry-specific data This is additional information about the entry. The contents of this field are dependent on the kind of journal entry. If there is no entry-specific data for the kind of entry being shown, the message No Entry specific data is shown in this field. The information shown in this field is not formatted. For a description of the format of the entry-specific data, see the IBM Power Systems with IBM Knowledge Center.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-11

V11.0 Unit 21. Journaling overview and basic operation

Uempty

F10 = Display only entry details

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-9. F10 = Display only entry details

The Display Journal Entry Details display shows only the detail entry data for a specific journal entry. The journal entry shown is one that you requested on the Display Journal display. If you see More... on the lower right side of your display, there is more information to view. Press Page Down (or Roll Up) to move toward the end of the information. Press Page Up (or Roll Down) to move toward the beginning of the information.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-12

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Topic 2: Steps to implement journaling

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-10. Topic 2: Steps to implement journaling

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-13

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Implementing journaling



For example: Implementation of object journaling 1. Create the journal receiver. CRTJRNRCV

JRNRCV(

)

2. Create the journal. CRTJRN

JRN(

)

JRNRCV(

)

3. Start journaling for selected objects. STRJRNOBJ

OBJ(

)

JRN(

)

4. Save the objects.



That is it!

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-11. Implementing journaling

The Create Journal Receiver (CRTJRNRCV) command creates a journal receiver. Once a journal receiver is attached to a journal (with the Create Journal (CRTJRN) or Change Journal (CHGJRN) command), journal entries can be placed in it. A preferred auxiliary storage pool (ASP), and a storage space threshold value can be specified for the journal receiver. The Create Journal (CRTJRN) command creates a journal as a local journal with the specified attributes, and attaches the specified journal receiver to the journal. Once a journal is created, object changes can be journaled to it or user entries can be sent to it. The journal state of the created journal is *ACTIVE. The different types of objects that can be journaled and the commands that you will use are: • Start to Journal an Access Path (STRJRNAP) command is used to start journaling the access paths for all members of a database file to a specified journal. Any new member that is later added to the file also has its access path journaled. • Start to Journal a Library (STRJRNLIB) command is used to start journaling changes (made to a library or list of libraries) to a specific journal, and optionally to start journaling changes to objects within the library or list of libraries. Objects created in, moved into, or restored into a journaled library can be automatically journaled to the same journal the library is journaled to.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-14

V11.0 Unit 21. Journaling overview and basic operation

Uempty

• Start to Journal an Object (STRJRNOBJ) command is used to start journaling changes (made to an object or list of objects) to a specific journal. The object types which are supported through this interface are Data Areas (*DTAARA) and Data Queues (*DTAQ). • Start to Journal a Physical File (STRJRNPF) command is used to start journaling changes made to a specific database physical file to a specific journal. Changes in new members added to the file are also journaled. • Start to Journal IFS Objects (STRJRN) command is used to start journaling changes (made to an object or list of objects) to a specific journal. The object types which are supported through this interface are Stream Files (*STMF), Directories (*DIR), and Symbolic Links (*SYMLNK). Only objects of type *STMF, *DIR, or *SYMLNK that are in the “root” (/), QOpenSys, and user-defined file systems are supported. For more information about the possible journal entries which can be sent, see the Journal management topic collection in the IBM Knowledge Center at: http://www.ibm.com/support/knowledgecenter. Search for “journal entry finder”. The commands follow this visual. When you start journaling for a physical file, the system assigns a unique journal identifier (JID) to every member. The JID is part of every journal entry for the file. The JID is used to associate the journal entry with the file. If a file is saved before journaling is started, it does not have a JID. If the file is restored, it does not have a JID. It is critical to save a journaled file every time a member has been added to it.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-15

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 1: CRTJRNRCV command

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-12. Step 1: CRTJRNRCV command

It is recommended that the journal receiver name should be unique for your system, not unique within a library. If you have two journal receivers with the same name in different libraries and they both become damaged, RCLSTG renames both journal receivers when they are placed in the QRCL library. The Create Journal Receiver (CRTJRNRCV) command creates a journal receiver. Once a journal receiver is attached to a journal (with the Create Journal (CRTJRN) or Change Journal (CHGJRN) command), journal entries can be placed in it. A preferred auxiliary storage pool (ASP), and a storage space threshold value can be specified for the journal receiver. Restrictions • A Journal receiver cannot be created in library QTEMP. • This command cannot be used to create a journal receiver for a remote journal. • If the library to contain the journal receiver is on an independent ASP, then ASP(*LIBASP) must be specified. Setting the threshold is very important for managing journaling disk space. More on this in later visuals. You must set the stage now however.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-16

V11.0 Unit 21. Journaling overview and basic operation

Uempty

It is recommended that the journal receiver name be unique for your entire system and not just unique within a library. If you have two journal receivers with the same name in different libraries and they both become damaged, RCLSTG renames both journal receivers when they are placed in the QRCL library. The ASP parameter determines in which auxiliary pool to place the journal receiver.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-17

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 2: CRTJRN command

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-13. Step 2: CRTJRN command

The Create Journal (CRTJRN) command creates a journal as a local journal with the specified attributes, and attaches the specified journal receivers to the journal. Once a journal is created, object changes can be journaled to it or user entries can be sent to it. The journal state of the created journal is *ACTIVE. Restrictions 1. A journal cannot be created in the library QTEMP. 2. The specified journal receivers must be created before the running of this command and they must be empty. That is, the receivers must not have been previously attached to a journal or have been in the process of being attached to a journal. 3. This command cannot be used to create a remote journal. See the Add Remote Journal (QjoAddRemoteJournal) API in the IBM Power Systems with IBM i Information Center (Programming -> APIs). 4. If the library to contain the journal is on an independent ASP, then the journal receiver specified must be located on an independent ASP that is in the same ASP group as the journal's library. Likewise, if the library to contain the journal is not on an independent ASP, then the journal receiver specified cannot be located on an independent ASP. 5. If the library to contain the journal is on an independent ASP, then ASP(*LIBASP) must be specified.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-18

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 3a: Access path command (STRJRNAP)

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-14. Step 3a: Access path command (STRJRNAP)

The Start Journal Access Path (STRJRNAP) command is used to start journaling the access paths for all members of a database file to a specified journal. Any new member that is later added to the file also has its access path journaled. If a physical file is specified, journaling can be started for its access paths. When access path journaling is started for a physical file, only the access paths for the physical file members are journaled. Journaling for any logical file access paths is started only when access path journaling is started for the logical file. The journal entries created after running this command cannot be used in any apply or remove journaled changes operation. These entries are used only to recover the access path without rebuilding it after an abnormal system operation ending. If you do not want the overhead of managing the access path journaling yourself, consider taking advantage of the system-managed access-path protection support SMAPP which will be covered later in this unit.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-19

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 3b: Library command (STRJRNLIB)

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-15. Step 3b: Library command (STRJRNLIB)

The Start Journal Library (STRJRNLIB) command is used to start journaling changes (made to a library or list of libraries) to a specific journal, and optionally to start journaling changes to objects within the library or list of libraries. Objects created in, moved into, or restored into a journaled library can be automatically journaled to the same journal the library is journaled to. After journaling begins for the object, the user should save the journaled object to preserve its journal attribute information. Also, the object must be saved because, for example, journaled changes cannot be applied to a version of the object that was saved before journaling was in effect. Objects created, moved, or restored into the library that is eligible for journaling can automatically start journaling to the same journal as the library. Which objects inherit the journal state of the library and what journaling attributes they start journaling with are determined by the inherit journaling attributes of the library.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-20

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 3c: Object command (STRJRNOBJ)

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-16. Step 3c: Object command (STRJRNOBJ)

The Start Journal Object (STRJRNOBJ) command is used to start journaling changes (made to an object or list of objects) to a specific journal. The object types which are supported through this interface are Data Areas (*DTAARA) and Data Queues (*DTAQ). Additionally, the user can specify that only the after image or both the before and the after images of an object of type *DTAARA be journaled. Before images are necessary to remove journaled changes by using the Remove Journaled Changes (RMVJRNCHG) command. After journaling begins for the object, the user should save the journaled object to preserve its journal attribute information. Also, the object must be saved because, for example, journaled changes cannot be applied to a version of the object that was saved before journaling was in effect.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-21

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 3d: Physical file command (STRJRNPF)

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-17. Step 3d: Physical file command (STRJRNPF)

The Start Journal Physical File (STRJRNPF) command is used to start journaling changes made to a specific database physical file to a specific journal. Changes in new members added to the file are also journaled. The user can specify that only the after image or both the before and after images of records in the journaled physical file be journaled. Before images are necessary to remove journaled changes by using the Remove Journaled Changes (RMVJRNCHG) command. In addition, the system will automatically capture the before images for a database file if the file is opened under commitment control. After journaling begins for the file, and after any new members are added to the file, the user should run the Save Changed Object (SAVCHGOBJ) command with OBJTYPE(*FILE) and OBJJRN(*YES) specified. The file must be saved because journaled changes cannot be applied to a version of the file that was saved before journaling was in effect. When the file being journaled is a distributed file, the STRJRNPF command is also distributed, if journaling was successfully started locally. Even if the distribution request fails, the local file remains journaled. Up to 50 files can be specified per command.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-22

V11.0 Unit 21. Journaling overview and basic operation

Uempty

There is no limit, other than a practical one, to the number of files that can be journaled to a single journal. From a security point of view, omitting the file opens and closes could be dangerous because if a program opened a file for read only, no entry would be recorded in the journal receiver. IMAGES(*BOTH) is recommended. It allows backout recovery (RMVJRNCHG). However, it takes more space. OMTJRNE(*OPNCLO) is not recommended. You cannot use the journal to audit who opened a file. You cannot apply entries to open and close boundaries by using the TOJOBO and TOJOBC parameters.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-23

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Step 3e: IFS object command (STRJRN)

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-18. Step 3e: IFS object command (STRJRN)

The Start Journal (STRJRN) command is used to start journaling changes (made to an object or list of objects) to a specific journal. The object types which are supported through this interface are Stream Files (*STMF), Directories (*DIR), and Symbolic Links (*SYMLNK). Only objects of type *STMF, *DIR or *SYMLNK that are in the “root” (/), QOpenSys, and user-defined file systems are supported. The user can specify that only the after image or both the before and the after images of an object of type *DTAARA be journaled. Before images are necessary to remove journaled changes by using the Remove Journaled Changes (RMVJRNCHG) command. After journaling begins for the object, the user should save the journaled object to preserve its journal attribute information. Also, the object must be saved because, for example, journaled changes cannot be applied to a version of the object that was saved before journaling was in effect.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-24

V11.0 Unit 21. Journaling overview and basic operation

Uempty

IBM Navigator for i: Journaling

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-19. IBM Navigator for i: Journaling

On the IBM Navigator for i you can manage journals and journal receivers. To manage journals on the IBM Navigator for i welcome page on the left pane click Journal Management then on the main pane you will be see the Journal Management window. The welcome page provides links to the most commonly used Journal Management tasks. There are links to manage journal and receiver and a button which allows you to set database and library. You can also manage journaling from the database perspective. 1. On the left pane, expand Database then expand Databases. 2. Expand your database (could be system name). 3. Click Schemas and from the Actions menu chose Select Schema to Display. 4. On the left pane, expand Schemas and find yours and click it. 5. On the main pane, you will be see all your schema objects icon. There will be also journal and journal receivers.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-25

V11.0 Unit 21. Journaling overview and basic operation

Uempty

IBM Navigator for i start/end journaling

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-20. IBM Navigator for i start/end journaling

To start journaling right-click the object and chose Journaling from pop-up menu.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-26

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Save objects

• When? ƒ Immediately after STRJRNxx or if a new member is added to the file

• Why? ƒ Checkpoint for recovery (F/MS journal entry) í í

Restore damaged object Apply journaled changes from *LASTSAVE

• Must have the system assigned journal identifier (JID) in every saved member used for recovery after a restore.

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-21. Save objects

When you start journaling for a physical file, the system assigns a unique journal identifier (JID) to every member. The JID is part of every journal entry for the file. The JID is used to associate the journal entry with the file. If a file is saved before journaling is started, it does not have a JID, and if the file is restored it does not have a JID. It is critical to save a journaled file every time a member has been added to it. The whole idea of journaling is to recover data files. Because of this, it is important to fix a point in the journal receiver so the recovery starts in the proper place. What better place than when the file was last saved? When you start journaling for a physical byte, the system assigns a unique journal identifier (JID) to every member. The JID is part of every journal entry for the file. The JID is used to associate the journal entry with the file. If a file is saved before journaling is started, it does not have a JID, and if the file is restored, it does not have a JID. It is critical to save a journaled file every time a member has been added to it.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-27

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Topic 3: Journal receiver considerations

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-22. Topic 3: Journal receiver considerations

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-28

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Managing the receiver chain CHGJRN JRN(name)

JRNRCV(*GEN) MNGRCV(*USER) SEQOPT(*CONT or*RESET) *PGM

RCV0001 Old receiver RCV0002 Current receiver *File

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-23. Managing the receiver chain

The Change Journal (CHGJRN) command changes the journal receiver, the journal message queue, the manage receiver attribute, the delete receiver attribute, the receiver size options, the journal state, allowing minimized entry-specific data, journal caching, the journal receiver's threshold, the journal object limit, the journal recovery count, or the text associated with the specified journal. The command allows one journal receiver to be attached to the specified journal. This replaces the previously attached journal receiver. The newly attached journal receiver begins receiving journal entries for the journal immediately. The sequence numbering of journal entries can be reset when the receiver is changed. If the sequencing is not reset, an informational message is sent indicating the first sequence number in the newly attached receiver. The Manage receivers (MNGRCV) parameter is used to specify how the changing of journal receivers (detaching the currently attached journal receiver and attaching a new journal receiver) is managed. You can specify a value for the MNGRCV parameter for both the CRTJRN and the CHGJRN commands.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-29

V11.0 Unit 21. Journaling overview and basic operation

Uempty

For this parameter you can specify: *USER The user manages the changing of journal receivers by issuing the Change Journal (CHGJRN) command to attach new receivers and detach old receivers. *SYSTEM • The system manages the changing of journal receivers. This function is called system change-journal management. • When an attached journal receiver reaches its size threshold, the system detaches the attached journal receivers and creates and attaches new journal receivers. Message CPF7020 is sent to the journal message queue when the journal receivers are detached. • Additionally, during an initial program load (IPL), the system performs a CHGJRN command to create and attach new journal receivers and to reset the journal sequence number of journals that are not needed for commitment control recovery for that IPL. • Also, the system attempts to perform a CHGJRN command to reset the sequence numbers when the journal receiver's sequence number exceeds 2,147,000,000.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-30

V11.0 Unit 21. Journaling overview and basic operation

Uempty

System change journal management

• CRTJRN ... MNGRCV(*SYSTEM) ƒ Threshold: Receiver changed automatically and message sent ƒ IPL: Receiver changed automatically with sequence number reset

• CRTJRN ... MNGRCV(*SYSTEM) DLTRCV(*YES) ƒ Detached receiver automatically deleted as soon as it is not needed for recovering access paths or rolling back uncommitted changes ƒ Caution: Journal receivers deleted automatically and without sending the usual inquiry message that it has not been saved

• DLTRCV(*YES) uses ƒ Journaling for commitment control or explicit access path protection ƒ Journal receiver is being replicated through remote journal

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-24. System change journal management

The Manage receivers (MNGRCV) parameter is used to specify how the changing of journal receivers (detaching the currently attached journal receivers and attaching new journal receivers) is managed. The possible values are *USER or *SYSTEM. The Delete receivers (DLTRCV) parameter is used to specify whether the system deletes journal receivers when they are no longer needed or leaves them on the system for the user to delete after they have been detached by system change-journal management or by a user-issued CHGJRN command. Note This parameter can be specified only if MNGRCV(*SYSTEM) is specified. The possible values are: *NO The journal receivers are not deleted by the system. It is underlined because it is the default value for this parameter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-31

V11.0 Unit 21. Journaling overview and basic operation

Uempty

*YES The journal receivers are deleted by the system. When the journal has the DLTRCV(*YES) attribute, the following conditions can prevent the system from deleting the receiver. When one of these conditions occurs, the system sends message CPI70E6 to the journal message queue, and then retries the delete operation every 10 minutes until the operation is successful. • A lock conflict occurs for either the journal receiver or its journal. • An exit program that was registered by way of the QIBM_QJO_DLT_JRNRCV exit point indicates that a receiver is not eligible for deletion. • A journal has remote journals associated with it and one or more of the associated remote journals do not yet have full copies of this receiver. Use automatic deletion of journal receivers with care if you use save-while-active operations to save objects before they reach a commitment boundary. Ensure that you save the journal receivers before the system deletes them. If an object is saved before it reaches a commitment boundary it can have partial transactions. To avoid data loss, you must have access to the journal receivers that were attached during the save-while-active operation when you restore the objects with partial transactions.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-32

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Journal receiver chain J

PR

RCV0006

RCV0007 J

NR

RCV0008

J

PR

RCV0007

RCV0008 J

NR

Journaling overview and basic operation

RCV0009

© Copyright IBM Corporation 2001, 2016

Figure 21-25. Journal receiver chain

The PR and NR entries are automatically added when a receiver is created or changed. They are used by the system to make recovery seamless across a journal receiver chain. PR stands for previous receiver. NR stands for next receiver.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-33

V11.0 Unit 21. Journaling overview and basic operation

Uempty

WRKJRNA command

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-26. WRKJRNA command

The Work with Journal Attributes display shows the current attributes of this journal and the names of the journal receivers that are currently attached to this journal, if any. You can use function keys to display lists of objects associated with this journal. You can request the following lists: • F13 - Files journaled to this journal • F14 - Access paths journaled to this journal • F15 - Receivers that have been used or are being used by this journal • F16 - Remote journal information Some of these lists or options are not available when working with an internal system journal (*INTSYSJRN for JRN). The type of journal, the possible values are: • *LOCAL - A local journal • *REMOTE - A remote journal

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-34

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Journal state The journal state describes an attribute for a journal. The attribute value can be *ACTIVE, *INACTIVE (remote journal only), or *STANDBY (local journal only). For a local journal, *ACTIVE indicates that journal entries are currently allowed to be deposited into the journal. *STANDBY indicates that most journal entries are not deposited. The state of the journal, the possible values are: • *ACTIVE: If this is a local journal, this means journal entries can be deposited to this journal. If this is a remote journal, this means journal entries can be received from a source journal. • *INACTIVE: If this is a local journal, this means journal entries cannot be deposited to this journal, unless they have been designated as journal entries which must be deposited. See the 'Journal Entry Information' IBM Knowledge Center for the journal entry designations. If this is a remote journal, this means journal entries cannot be received from a source journal. • *FAILED: If this is a remote journal, this means journal entries cannot be received from a source journal due to a remote journal function failure, such as a communication line failure. Before inactivating the remote journal by issuing the Change Remote Journal (CHGRMTJRN) or the Change Journal (CHGJRN) command or by calling the Change Journal State (QjoChangeJournalState) API, you might want to receive, retrieve, or display any unconfirmed entries from the journal. • *STANDBY: This is the state of a local journal after the Change Journal (CHGJRN) command specifying JRNSTATE(*STANDBY) is used to not allow deposits into the local journal. The local journal can also be in *STANDBY state after an IPL if the local journal is in *STANDBY state when the system ends. Objects journaled to the local journal can be restored or changed, but most journal entries are not deposited until the journal state for the local journal is again changed to *ACTIVE. This can be performed by using the Change Journal (CHGJRN) command specifying JRNSTATE(*ACTIVE). • This value does not apply to local journals.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-35

V11.0 Unit 21. Journaling overview and basic operation

Uempty

F15 = Work with Receiver Directory

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-27. F15 = Work with Receiver Directory

The Work with Receiver Directory display shows a list of all journal receivers that are associated with this journal, if any. You can reach this screen by pressing function key F15 Work with receiver directory. The list of receivers is ordered from the oldest (first attached) at the top of the list, to the newest (currently attached) at the bottom of the list. You can make selections on the list to: • 8 - Display the attributes of the selected receivers • 4 - Delete the selected receivers Number column A number is associated with a journal receiver and assigned by the system which is relative to all other receivers in the receiver directory at a given time. The first 2 digits identify the journal chain number and the last 3 digits identify the receiver number within the chain. A chain identifies a group of receivers that are contiguous allowing the system to process entries across receivers within the same chain. The chain number starts with zero and is incremented sequentially each time a new chain is needed. New chains are started when a damaged receiver is recovered by restoring a partial version.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-36

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Status column The status of the receiver can be one of the following: ATTACHED: The receiver is currently attached to the journal. ONLINE: The receiver is online. The receiver has not been saved and it has been detached from the journal. SAVED: The receiver was saved after it was detached. The receiver storage was not freed when it was saved. FREED: The receiver was saved after it was detached. The receiver storage was freed when it was saved. PARTIAL: The receiver status is partial for one of the following reasons: • It was restored from a version that was saved while it was attached to the journal. Additional journal entries might have been written that were not restored. • It was one of a pair of dual receivers, and it was found damaged while attached to the journal. The receiver has since been detached. This receiver is considered partial because additional journal entries might have been written to the dual receiver. • It is associated with a remote journal and it does not contain all the journal entries that are in the associated journal receiver attached to the source journal. DELETED: The receiver has been deleted. This status is shown after option 4 (Delete) completes. If you refresh (F5) the list, deleted receivers are removed from the list.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-37

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Exercise: Journal management

• At the end of the lab, you should be able to: ƒ Create journal ƒ Display journaled objects ƒ Change journal receiver

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-28. Exercise: Journal management

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-38

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review questions (1 of 3) 1. Which of the following is not a valid object that can be journaled? a. b. c. d.

Database files Data area Data queue Root folders

2. A (blank) is a program that intercepts activity to an object that is being journaled. a. b. c. d.

Journal Journal receiver Trigger Referential constraint

3. What is the first object that needs to be created when you start journaling? a. b. c. d.

Journal audit trail Journal receiver Journal Journal access path

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-29. Review questions (1 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-39

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review answers (1 of 3) 1. Which of the following is not a valid object that can be journaled? Database files Data area Data queue Root folders The answer is root folders. a. b. c. d.

2. A journal is a program that intercepts activity to an object that is being journaled. Journal Journal receiver Trigger Referential constraint The answer is journal. a. b. c. d.

3. What is the first object that needs to be created when you start journaling? Journal audit trail Journal receiver Journal Journal access path The answer is journal receiver. a. b. c. d.

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-30. Review answers (1 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-40

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review questions (2 of 3) 4. Which object contains the images and details of the objects that are being journaled? a. b. c. d.

Journal audit trail Journal receiver Journal Journal access path

5. What is the command used to create the journal? a. b. c. d.

CRTJRN CRTJRNRCV STRJRNAP STRJRNPF

6. True or False: The management of journal receivers is something that must be done by the database administrator.

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-31. Review questions (2 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-41

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review answers (2 of 3) 4. Which object contains the images and details of the objects that are being journaled? Journal audit trail Journal receiver Journal Journal access path The answer is journal receiver. a. b. c. d.

5. What is the command used to create the journal? CRTJRN CRTJRNRCV STRJRNAP STRJRNPF The answer is CRTJRN. a. b. c. d.

6. True or False: The management of journal receivers is something that must be done by the database administrator. The answer is false. Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-32. Review answers (2 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-42

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review questions (3 of 3) 7. The (blank) command is used to see the attributes associated with your journal. a. b. c. d.

WRKJRN CRTJRN DSPJRNA WRKJRNA

8. What command is used to review the details of objects being journaled? a. b. c. d.

WRKJRN DSPJRN WRKJRNA DSPJRNA

9. True or False: When displaying journal information, you can specify to only show transactions performed by a specific program. Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-33. Review questions (3 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-43

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Review answers (3 of 3) 7.

The WRKJRNA command is used to see the attributes associated with your journal. a. b. c. d.

WRKJRN CRTJRN DSPJRNA WRKJRNA

The answer is WRKJRNA. 8.

What command is used to review the details of objects being journaled? a. b. c. d.

WRKJRN DSPJRN WRKJRNA DSPJRNA

The answer is DSPJRN. 9.

True or False: When displaying journal information, you can specify to only show transactions performed by a specific program. The answer is true.

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-34. Review answers (3 of 3)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-44

V11.0 Unit 21. Journaling overview and basic operation

Uempty

Unit summary

• Describe how journal management can be used to recover data lost during a failure • Implement journal management on your IBM Power System with IBM i as part of a comprehensive recovery plan • List the advantages and considerations of journal management

Journaling overview and basic operation

© Copyright IBM Corporation 2001, 2016

Figure 21-35. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

21-45

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Unit 22. Virtual IP versus EtherChannel Estimated time 00:45

Overview There are few methods to communicate IBM i system with network in this unit shows two of them Virtual IP and EtherChannel. However, intention of this unit is not teach how make configuration the process is shown. But the main target is understood how the configurations works.

How you will check your progress • Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-1

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Unit objectives

• • • •

Explain EtherChannel and Virtual IP differences Explain how works EtherChannel Explain how works Virtual IP Be able to manage both solutions

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-1. Unit objectives

There are few methods to communicate IBM i system with network in this unit shows two of them Virtual IP and EtherChannel. However, intention of this unit is not teach how make configuration the process is shown. But the main target is understood how the configurations works.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-2

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Topic 1: EtherChannel

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-2. Topic 1: EtherChannel

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-3

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-3. EtherChannel

Link aggregation, which is defined by the Institute of Electrical and Electronics Engineers (IEEE) as 802.3ad or 802.1ax, provides both redundancy and performance advantages. When properly implemented, link aggregation can both increase the resiliency of your system to network failures and provide a significant performance benefit. This tip refers to the technology as aggregation; however, it is also known as EtherChannel, teaming, or trunking.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-4

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel required resources

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-4. EtherChannel required resources

Before you create an aggregate line description, select the Ethernet resources to be aggregated. Up to eight ports can be aggregated in one line description. None of the ports can be in use by another line description, LAN console, or remote support. Virtual Ethernet ports (type 268C) are not supported in an aggregate line description. A Host Ethernet Adapter (HEA) logical port, native SR-IOV logical port, or virtual NIC (VNIC) port is only supported if it is the only logical port on its corresponding physical port, and if the aggregate line uses the Link Aggregation Control Protocol (LACP) by specifying *LNKAGG in the Aggregate Policy (AGGPCY) for the line description. Any other configuration can prevent the link partner from detecting faults, causing lost packets. All of the ports must support full duplex and the preferred line speed. Each port must support 1 Gbps or higher, even if that is not the preferred line speed. All of the ports must be connected to the same link partner (switch). If you use static aggregation (*ETHCHL), all of the corresponding ports on the link partner must be configured in a common static aggregation. If you use LACP (*LNKAGG), configure all of the corresponding ports on the link partner with LACP and share a common key.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-5

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

IBM i Link Aggregation supports static aggregation (*ETHCHL) with any link partner, and supports LACP (*LNKAGG) with Cisco and IBM Networking switches. Other LACP-capable link partners might work, but are not officially supported.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-6

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel creating line description (1 of 3)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-5. EtherChannel creating line description (1 of 3)

Use the WRKLIND command to work with all line description then press function key F6 to create new one. Enter the line name and type *ELAN.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-7

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel creating line description (2 of 3)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-6. EtherChannel creating line description (2 of 3)

An aggregated line description is created by using the Create Line Desc (Ethernet) (CRTLINETH) command. The following parameters are relevant to aggregation: Resource Name (RSRCNAME): set to new special value *AGG to indicate aggregation. Duplex (DUPLEX): Half duplex is not supported. Aggregated Resource List (AGGRSCL): up to eight Ethernet port resource names (starting with CMN) with the restrictions laid out in Preparing to Create an Aggregate Line Description. Aggregate Policy (AGGPCY): This parameter is split into two elements. The Standard controls any negotiation that is done with the link partner, and requires specific configuration with the link partner, as described under *ETHCHL and *LNKAGG. The Policy type describes the process for deciding what port is used for each outgoing Ethernet frame; this type can have performance implications. Choosing *ETHCHL as the Standard uses static aggregation, which performs no negotiation with the link partner. The link partner must also be configured for static aggregation. The Ethernet ports in the Aggregated Resource List (AGGRSCL) and the set of ports that are configured at the link partner should correspond exactly. If they do not, then some Ethernet packets might not get to the correct destination. There are several opportunities for error: Having ports in AGGRSCL that are © Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-8

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

connected to a different link partner or to the wrong ports in the correct link partner, or having ports that are selected in the link partner's aggregate that are connected to ports not in AGGRSCL. Setting the Standard as *LNKAGG forces use of the Link Aggregation Control Protocol (LACP) as described in the IEEE 802.3ad standard. This negotiation detects the identity of the link partner for each Ethernet port in the Aggregated Resource List (AGGRSCL). This Standard requires that the link partner to enable LACP with common identification information on all ports that are connected to ports in AGGRSCL. In order for a port to aggregate and be used for Ethernet traffic, its partner port must respond to the LACP negotiation, and the response must match the identifying information to all other aggregated ports. The aggregation panel in Display Line Description (DSPLIND) shows the aggregation status of each port, and the status helps describe why any other ports are not aggregated. The round-robin (*RNDRBN) is only accepted if Standard is *ETHCHL, and it directly forces each batch of outgoing packets to use the next available port, ensuring that all ports are used in near-equal fashion. However, that creates risk that packets can be delivered out of order, and out-of-order delivery within a TCP connection causes retransmissions and large delays. Use this option only if that is not a concern. The remaining policy types could all be called hash modes, and they describe what data within a packet is used to determine which Ethernet port is used for each outgoing frame. All of the hash modes force a specific TCP connection to stay single-threaded on a specific Ethernet port to avoid the out-of-order delivery problem. They differ in how much packet data is used to decide which port to use. The best network usage comes from configurations that split outgoing traffic roughly equally among the ports in the Aggregated Resource List (AGGRSCL). As more packet data is used, the system can do more to spread unrelated traffic among the ports. However, using more packet data also forces some additional processing and cache usage for each outgoing packet. The *DFT hash mode uses the least amount of data, looking only at the destination IP address (or MAC for non-IP frames). This mode uses little processor, but spreads evenly only if traffic is running too many different IP addresses at the same time (as for a busy server). The *SRCPORT, *DESTPORT, and *SRCDESTP hash modes also look at the source and destination TCP or UDP port numbers (if present) for each outgoing packet. This evaluation incurs more per-packet processing, but is better able to split unrelated traffic among multiple Ethernet ports, like parallel file transfers to the same remote host. If host processor is not known to be a constraint, *SRCDESTP is likely the best choice for most systems. To create a static two-port aggregate that uses as much packet data as possible to spread outgoing traffic, use the following example: CRTLINETH LIND(ETHAGG) RSRCNAME(*AGG) AGGPCY(*ETHCHL *SRCDESTP) AGGRSCL(CMN02 CMN03)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-9

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel creating line description (3 of 3)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-7. EtherChannel creating line description (3 of 3)

After line VARY ON you can check the status of physical resources. On the Work with Line Description screen use option 5 and press Enter seven times to see status of each physical adapter.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-10

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

EtherChannel new resources

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-8. EtherChannel new resources

A non-aggregate line description cannot be changed to an aggregate line description, nor can an aggregate be changed later into a non-aggregate. The AGGPCY and AGGRSCL parameters can be changed by the Change Line Desc (Ethernet) (CHGLINETH) command, but the line description must be varied off. When the line description is varied on, the configuration is verified and all of the resources are activated and establish link with the partner. If the system detects any configuration errors, the line description does not vary on successfully. Any ports that fail to establish link when varying on are not aggregated until the line description is varied off and back on. After the line description is varied on, the aggregation status of each resource can be viewed on a new panel from the Display Line Description (DSPLIND) command. The DSPLIND command can be used to monitor for any links that are not operational. On systems with support for link aggregation, resources with type 6B26 are displayed on the Work with Communication Resources panel. This panel can be displayed by using the Work with Hardware Resources (WRKHDWRSC) command and the Type (TYPE) parameter of *CMN. When an aggregate line description is varied on for the first time, a new Comm Port resource with type 6B26 might be added. When an aggregate line description is deleted, one of the Comm Port resources might be removed. All resources with type 6B26 are invalid for configuration by line descriptions or for LAN console or remote support. When an aggregate line description is deleted, a resource with type 6B26 might no longer be displayed on the Work with Communication Resources panel.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-11

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Topic 2: Virtual IP

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-9. Topic 2: Virtual IP

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-12

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP resources

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-10. Virtual IP resources

Easier way create and manage Virtual IP is using IBM Navigator for i: Before you start make sure you have two Ethernet adapters (virtual / physical) and created two interfaces on it. To create Virtual Interface by using IBM Navigator for i do: • On the left pane, expand Network. • Then, expand TCP/IP Configuration and IPv4. • Click the IPv4 Interfaces. • On the main pane click Actions and from the pop-up menu select New Interface and Virtual IP. A virtual IP interface defines a single IP address that can be used to redirect TCP/IP traffic to other interfaces or networks. Virtual IP interfaces are useful for TCP/IP load balancing, network address translation (NAT), frame relay multi-access, and unnumbered networks. The wizard will take you through the steps that are needed to configure a TCP/IP interface.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-13

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP wizard (1 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-11. Virtual IP wizard (1 of 4)

On the wizard welcome page click Next.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-14

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP wizard (2 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-12. Virtual IP wizard (2 of 4)

Enter Virtual IP address. The virtual IP address must be on the same subnet as the physical interfaces.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-15

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP wizard (3 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-13. Virtual IP wizard (3 of 4)

Depending on the requirements setup startup options and click Next.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-16

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP wizard (4 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-14. Virtual IP wizard (4 of 4)

Review summary and confirm creation with Finish. After you can test the interface if you want to or go on by click OK.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-17

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP created

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-15. Virtual IP created

Now your Virtual IP interface is created but before it is ready it needs some more work.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-18

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP associate physical interface (1 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-16. Virtual IP associate physical interface (1 of 4)

You have to assign physical interfaces to your Virtual IP. To do that on the virtual IP interface right-click and chose Properties.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-19

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP associate physical interface (2 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-17. Virtual IP associate physical interface (2 of 4)

On the properties click Advanced tab and in the Proxy ARP field chose Preferred interface and click OK.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-20

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP associate physical interface (3 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-18. Virtual IP associate physical interface (3 of 4)

On this screen you can select Available interfaces (left side) and use the Add button to add interfaces to manage. Use the Move Up or Move Down button to select which one will be preferred.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-21

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP associate physical interface (4 of 4)

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-19. Virtual IP associate physical interface (4 of 4)

After you setup the preferred IP (on the previous screen) physical address and confirm your choice by pressing the OK button, you will see the interfaces list preferred physical IP address (associated interface) for your virtual IP address.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-22

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP change preferred interface

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-20. Virtual IP change preferred interface

If preferred interface fails or stops the virtual IP interface will automatically switch to spare IP address. After the preferred interface is repaired or restarted the virtual IP interface will switch back to the preferred interface.

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-23

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Virtual IP 5250

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-21. Virtual IP 5250

The same can be done with 5250: ADDTCPIFC INTNETADR('192.168.1.10') LIND(ETHV1) SUBNETMASK('255.255.255.0') ADDTCPIFC INTNETADR('192.168.1.11') LIND(ETHV2) SUBNETMASK('255.255.255.0') ADDTCPIFC INTNETADR('192.168.1.200') LIND(*VIRTUALIP) SUBNETMASK('255.255.255.255') CHGTCPIFC INTNETADR('192.168.1.200') PREFIFC('192.168.1.10' '192.168.1.11‚)

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-24

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Review questions 1. True or False: Virtual Ethernet adapter can be used to create EtherChannel. 2. True or False: Virtual IP can be created on both interface IBM Navigator for i and 5250 interface. 3. True or False: When preferred interface in Virtual IP failed or stopped you need manually change the preferred interface.

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-22. Review questions

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-25

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Review answers 1. True or False: Virtual Ethernet adapter can be used to create EtherChannel. The answer is false.

2. True or False Virtual IP can be created on both interface IBM Navigator for i and 5250 interface. The answer is true.

3. True or False: When preferred interface in Virtual IP failed or stopped you need manually change the preferred interface The answer is false.

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-23. Review answers

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-26

V11.0 Unit 22. Virtual IP versus EtherChannel

Uempty

Unit summary

• • • •

Explain EtherChannel and Virtual IP differences Explain how works EtherChannel Explain how works Virtual IP Be able to manage both solutions

Virtual IP versus EtherChannel

© Copyright IBM Corporation 2001, 2016

Figure 22-24. Unit summary

© Copyright IBM Corp. 2001, 2016 Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

22-27

V11.0

backpg

®

© Copyright International Business Machines Corporation 2001, 2016.