ESS Comand Line Interface
ESS Comand Line Interface
ESS Comand Line Interface
SC26-7494-04
SC26-7494-04
Note
Before using this information and the product it supports, read the information in Notices on page 129.
Contents
Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
About this guide . . . . .
Who should use this guide . .
Conventions used in this guide
Syntax diagrams . . . .
Special characters . . . .
Related information . . . .
ESS library . . . . . .
Other IBM publications . .
Ordering IBM publications .
Non-IBM publications. . .
Web sites . . . . . . . .
How to send your comments .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Summary of Changes . . . . . . . . . . . . .
Summary of Changes for SC26-7494-04 IBM TotalStorage
Server Command-Line Interfaces Users Guide . . . .
New Information . . . . . . . . . . . . . . .
Deleted Information . . . . . . . . . . . . . .
Summary of Changes for SC26-7494-03 IBM TotalStorage
Server Command-Line Interfaces Users Guide . . . .
New Information . . . . . . . . . . . . . . .
Deleted Information . . . . . . . . . . . . . .
Summary of Changes for SC26-7494-02 IBM TotalStorage
Server Command-Line Interfaces Users Guide . . . .
New Information . . . . . . . . . . . . . . .
Changed Information . . . . . . . . . . . . .
|
|
|
|
|
|
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . . .
Enterprise
. . . .
. . . .
. . . .
Enterprise
. . . .
. . . .
. . . .
Enterprise
. . . .
. . . .
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. ix
. ix
. ix
. ix
. xi
. xii
. xii
. xiv
. xix
. xx
. xx
. xxi
. . . .
Storage
. . . .
. . . .
. . . .
Storage
. . . .
. . . .
. . . .
Storage
. . . .
. . . .
. . . .
xxiii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xxiii
xxiii
xxiii
xxiii
xxiii
xxiv
xxiv
xxiv
xxiv
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1
. 1
. 1
. 1
. 3
. 5
. 5
. 12
. 12
. 17
. 19
. 24
. 24
command .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
25
25
25
25
26
34
34
38
43
50
iii
Modifying the ESS using multiple clients (Specialist, Web Copy Services, CLI)
78
|
|
|
|
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 95
. 95
. 95
. 95
. 97
. 98
. 98
. 99
. 99
. 99
. 100
. 101
. 102
. 102
. 102
. 102
. 103
. 103
. 104
. 104
. 105
. 105
. 106
. 107
. 109
. 109
. 109
. 111
. 111
. 112
. 112
. 112
iv
. .
. .
. .
. .
. .
. .
host
Notices . . . . . . . . . . . . . . .
Trademarks. . . . . . . . . . . . . .
Electronic emission notices . . . . . . . .
Federal Communications Commission (FCC)
Industry Canada compliance statement . .
.
.
.
.
.
. . . .
. . . .
. . . .
statement
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . .
. . .
. . .
. . .
. . .
. . .
system
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
123
123
125
125
126
127
.
.
.
.
.
129
130
131
131
132
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . . 132
. . . 133
. . . 133
. . . 133
.
.
.
.
.
.
.
.
.
.
.
.
135
135
135
135
. . . . . . . . . . . . . . . . . . . . . . . . . . 137
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Contents
vi
Tables
|
|
|
|
|
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
37
45
46
47
50
52
52
53
54
55
55
56
58
59
62
63
64
65
66
68
72
73
74
75
76
77
78
79
95
96
. . . . . . . . . . 110
vii
viii
Syntax diagrams
A syntax diagram uses symbols to represent the elements of a command and to
specify the rules for using these elements. This section shows you how to read the
syntax diagrams that represent the Storage Management CLI and the Copy
Services CLI commands. In doing so, it defines the symbols that represent the CLI
command elements.
Main path line
Begins on the left with double arrowheads (>>) and ends on the right with
two arrowheads facing each other (><). If a diagram is longer than one line,
each line to be continued ends with a single arrowhead (>) and the next
line begins with a single arrowhead. Read the diagrams from left-to-right,
top-to-bottom, following the main path line.
ix
Keyword
esscli
-a
-u
AccessFile
UserName
-p
Password
Indicate the parameters or arguments you must specify for the command.
Required keywords appear on the main path line. Mutually exclusive
required keywords are stacked vertically.
Optional keywords
-h
-help
-?
Indicate the parameters or arguments you can choose to specify for the
command. Optional keywords appear below the main path line. Mutually
exclusive optional keywords are stacked vertically.
Default value
protocol =
FCP
FICON
newports =
ALL
PortId1,PortId2,...
Represents a parameter or argument that you can specify more than once.
A repeatable keyword or value is represented by an arrow returning to the
left above the keyword or value.
Variable
AccessFile
-u
Userid
-p
Password
ess = EssId
profile = ProfileName
ess =
EssId
profile =
ProfileName
Fragment name
Fragment name:
( fragment details
Breaks up syntax diagrams that are too long, too complex, or repetitious.
The fragment name is inserted in the main diagram, and the actual
fragment is shown below the main diagram.
Special characters
The following special characters are used in the CLI command examples:
(minus) or / (slash) sign
Flags are prefixed with a (minus) or / (slash) sign. Flags define
the action of a command or modify the operation of a command.
You can use multiple flags, followed by parameters, when you issue
a command.
[] square brackets
Optional values are enclosed in square brackets.
{ } braces
| vertical bar
... ellipsis
xi
Related information
The tables in this section list and describe the following publications:
v The publications that make up the IBM TotalStorage Enterprise Storage
Server (ESS) library
v Other IBM publications that relate to the ESS
v Non-IBM publications that relate to the ESS
See Ordering IBM publications on page xix for information about how to order
publications in the IBM TotalStorage ESS publication library. See How to send your
comments on page xxi for information about how to send comments about the
publications.
ESS library
The following customer publications make up the ESS library. Unless otherwise
noted, these publications are available in Adobe portable document format (PDF) on
a compact disc (CD) that comes with the ESS. If you need additional copies of this
CD, the order number is SK2T-8803. These publications are also available as PDF
files by clicking on the Documentation link on the following ESS Web site:
http://www-1.ibm.com/servers/storage/support/disk/2105.html
See IBM publications center on page xx for information about ordering these and
other IBM publications.
Order
Number
Title
Description
IBM TotalStorage
Enterprise Storage
Server: Command-Line
Interfaces Users Guide
This guide describes the commands that you can use from the ESS Copy SC26-7494
Services command-line interface (CLI) for managing your ESS
(See Note.)
configuration and Copy Services relationships. The CLI application
provides a set of commands that you can use to write customized scripts
for a host system. The scripts initiate predefined tasks in an ESS Copy
Services server application. You can use the CLI commands to indirectly
control peer-to-peer remote copy and FlashCopy configuration tasks
within an ESS Copy Services server group.
IBM TotalStorage
Enterprise Storage
Server: Configuration
Planner for
Open-systems Hosts
This guide provides guidelines and work sheets for planning the logical
configuration of an ESS that attaches to open-systems hosts.
SC26-7477
(See Note.)
IBM TotalStorage
Enterprise Storage
Server: Configuration
Planner for S/390 and
IBM ERserver zSeries
Hosts
This guide provides guidelines and work sheets for planning the logical
configuration of an ESS that attaches to either the IBM S/390 and IBM
ERserver zSeries host system.
SC26-7476
(See Note.)
IBM TotalStorage
Enterprise Storage
Server: Host Systems
Attachment Guide
This guide provides guidelines for attaching the ESS to your host system SC26-7446
and for migrating to fibre-channel attachment from either a small computer (See Note.)
system interface or from the IBM SAN Data Gateway.
IBM TotalStorage
Enterprise Storage
Server: DFSMS
Software Support
Reference
This publication provides an overview of the ESS and highlights its unique SC26-7440
(See Note.)
capabilities. It also describes Data Facility Storage Management
Subsystems (DFSMS) software support for the ESS, including support for
large volumes.
xii
Order
Number
Title
Description
IBM TotalStorage
Enterprise Storage
Server: Introduction and
Planning Guide
This guide introduces the ESS product and lists the features you can
order. It also provides guidelines for planning the installation and
configuration of the ESS.
IBM TotalStorage
Enterprise Storage
Server: Quick
Configuration Guide
This booklet provides flow charts for using the TotalStorage Enterprise
SC26-7354
Storage Server Specialist (ESS Specialist). The flow charts provide a
high-level view of the tasks that the IBM service support representative
performs during initial logical configuration. You can also use the flow
charts for tasks that you might perform when you are modifying the logical
configuration.
GC26-7444
IBM TotalStorage
This publication describes the functions of the ESS and provides
SC26-7298
Enterprise Storage
reference information, such as channel commands, sense bytes, and error
Server: S/390 Command recovery procedures for IBM S/390 and zSeries hosts.
Reference
IBM TotalStorage Safety
Notices
GC26-7229
IBM TotalStorage
Enterprise Storage
Server: SCSI Command
Reference
SC26-7297
Subsystem Device
Driver Users Guide for
the IBM TotalStorage
Enterprise Storage
Server and the IBM
TotalStorage SAN
Volume Controller
This publication describes how to use the IBM Subsystem Device Driver
SC26-7540
(SDD) on open-systems hosts to enhance performance and availability on
the ESS. SDD creates redundant paths for shared logical unit numbers.
SDD permits applications to run without interruption when path errors
occur. It balances the workload across paths, and it transparently
integrates with applications.
IBM TotalStorage
Enterprise Storage
Server: Users Guide
This guide provides instructions for setting up and operating the ESS and
for analyzing problems.
SC26-7445
(See Note.)
IBM TotalStorage
Enterprise Storage
Server: Web Interface
Users Guide
This guide provides instructions for using the two ESS Web interfaces,
ESS Specialist and ESS Copy Services.
SC26-7448
(See Note.)
IBM TotalStorage
Common Information
Model Agent for the
Enterprise Storage
Server: Installation and
Configuration Guide
This guide introduces the common interface model (CIM) concept and
GC35-0485
provides instructions for installing and configuring the CIM Agent. The CIM
Agent acts as an open-system standards interpreter, allowing other
CIM-compliant storage resource management applications (IBM and
non-IBM) to interoperate with each other.
IBM TotalStorage
Enterprise Storage
Server Application
Programming Interface
Reference
GC35-0489
Note: No hardcopy book is produced for this publication. However, a PDF file is available from the following Web
site:
http://www-1.ibm.com/servers/storage/support/disk//2105.html
xiii
Order
Number
Description
Data-copy services
This publication helps you understand and use IBM Advanced Copy
SC35-0428
Services functions. It describes three dynamic copy functions and several
point-in-time copy functions. These functions provide backup and recovery
of data if a disaster occurs to your data center. The dynamic copy functions
are peer-to-peer remote copy, extended remote copy, and coupled
extended remote copy. Collectively, these functions are known as remote
copy. FlashCopy, ShapShot, and concurrent copy are the point-in-time copy
functions.
DFSMS/MVS V1:
This publication provides guidelines for using remote copy functions with
Remote Copy Guide and S/390 and zSeries hosts.
Reference
SC35-0169
This publication, from the IBM International Technical Support Organization, SG24-5465
introduces the ESS and provides an understanding of its benefits. It also
describes in detail the architecture, hardware, and functions, including the
advanced copy functions, of the ESS.
Implementing Copy
Services 0n S/390
This publication, from the IBM International Technical Support Organization, SG24-5680
tells you how to install, customize, and configure Copy Services on an ESS
that is attached to an S/390 or zSeries host system. Copy Services
functions include peer-to-peer remote copy, extended remote copy,
FlashCopy, and concurrent copy. This publication describes the functions,
prerequisites, and corequisites and describes how to implement each
function into your environment.
This publication, from the IBM International Technical Support Organization, SG24-5757
tells you how to install, customize, and configure ESS Copy Services on
UNIX, Windows NT, Windows 2000, Sun Solaris, HP-UX, Tru64,
OpenVMS, and iSeries host systems. The Copy Services functions that are
described include peer-to-peer remote copy and FlashCopy. This
publication describes the functions and shows you how to implement them
into your environment. It also shows you how to implement these functions
in a high-availability cluster multiprocessing environment.
Fibre channel
Fibre Channel
This publication provides information about the fiber-channel I/O interface.
Connection (FICON) I/O This book is also available as a PDF file from the following Web site:
Interface: Physical Layer
www.ibm.com/servers/resourcelink/
Fibre-channel
Subsystem Installation
Guide
This publication tells you how to attach the IBM xSeries 430 and
NUMA-Q host systems with fibre-channel adapters to the ESS.
SA24-7172
No order
number
xiv
Order
Number
Title
Description
This guide explains how to convert the IBM SAN Fibre Channel Managed
Hub from a Fibre-Channel Arbitrated Loop (FC-AL) configuration to a
fabric-capable switched environment.
This guide describes how to install and maintain the IBM SAN Fibre
Channel Switch 2109 Model S08.
SC26-7350
This guide describes the IBM SAN Fibre Channel Switch and the IBM
TotalStorage ESS Specialist. It provides information about the commands
and how to manage the switch with Telnet and the Simple Network
Management Protocol.
SC26-7349
This publication describes how to install and maintain the IBM SAN Fibre
Channel Switch 2109 Model S16. It is intended for trained service
representatives and service providers.
SC26-7352
This guide introduces the IBM SAN Fibre Channel Switch 2109 Model S16 SC26-7351
and tells you how to manage and monitor the switch using zoning and how
to manage the switch remotely.
Implementing Fibre
Channel Attachment on
the ESS
This publication, from the IBM International Technical Support Organization, SG24-6113
helps you install, tailor, and configure fibre-channel attachment of
open-systems hosts to the ESS. It provides you with a broad
understanding of the procedures that are involved and describes the
prerequisites and requirements. It also shows you how to implement
fibre-channel attachment. This book also describes the steps required to
migrate to direct fibre-channel attachment from native SCSI adapters and
from fibre-channel attachment through the SAN Data Gateway.
SY277616
Open-systems hosts
ESA/390: ESCON I/O
Interface
SA22-7202
This publication, from the IBM International Technical Support Organization, SG24-6119
helps you install, tailor, and configure the ESS when you attach Compaq
AlphaServer (running Tru64 UNIX), HP, and Sun hosts. This book does not
cover Compaq AlphaServer that is running the OpenVMS operating
system. This book also focuses on the settings that are required to give
optimal performance and on the settings for device driver levels. This book
is for the experienced UNIX professional who has a broad understanding of
storage concepts.
Fibre-channel
Subsystem Installation
Guide
This publication tells you how to attach the IBM xSeries 430 and NUMA-Q
host systems with fibre-channel adapters to the ESS.
No order
number
xv
Order
Number
Title
Description
This publication, from the IBM International Technical Support Organization, SG24-5757
tells you how to install, customize, and configure ESS Copy Services on
UNIX, Windows NT, or Windows 2000 host systems. The Copy Services
functions that are described include peer-to-peer remote copy and
FlashCopy. This publication describes the functions and shows you how to
implement them into your environment. It also shows you how to
implement these functions in a high-availability cluster multiprocessing
environment.
Implementing Fibre
Channel Attachment on
the ESS
This publication, from the IBM International Technical Support Organization, SG24-6113
helps you install, tailor, and configure fibre-channel attachment of
open-systems hosts to the ESS. It gives you a broad understanding of the
procedures that are involved and describes the prerequisites and
requirements. It also shows you how to implement fibre-channel
attachment. This book also describes the steps that are required to migrate
to direct fibre-channel attachment from native SCSI adapters and from
fibre-channel attachment through the SAN Data Gateway.
S/390 and zSeries hosts
Device Support
Facilities: Users Guide
and Reference
GC35-0033
This publication helps you understand and use IBM Advanced Copy
SC35-0428
Services functions. It describes three dynamic copy functions and several
point-in-time copy functions. These functions provide backup and recovery
of data if a disaster occurs to your data center. The dynamic copy functions
are peer-to-peer remote copy, extended remote copy, and coupled
extended remote copy. Collectively, these functions are known as remote
copy. FlashCopy, SnapShot, and concurrent copy are the point-in-time copy
functions.
DFSMS/MVS V1:
This publication provides guidelines for using remote copy functions with
Remote Copy Guide and S/390 and zSeries hosts.
Reference
SC35-0169
SA22-7202
Fibre Transport Services This publication provides information about fibre-optic and ESCON-trunking GA22-7234
(FTS): Physical and
systems.
Configuration Planning
Guide
Implementing ESS Copy This publication, from the IBM International Technical Support Organization, SG24-5680
Services on S/390
tells you how to install, customize, and configure Copy Services on an ESS
that is attached to an S/390 or zSeries host system. Copy Services
functions include Peer-to-Peer Remote Copy, Extended Remote Copy,
FlashCopy, and Concurrent Copy. This publication describes the functions,
prerequisites, and corequisites and describes how to implement each
function into your environment.
xvi
Order
Number
Title
Description
ES/9000, ES/3090:
IOCP User Guide
Volume A04
GC38-0097
SB10-7029
www.ibm.com/servers/resourcelink/
IOCP Users Guide, IBM
Eserver zSeries
SB10-7037
www.ibm.com/servers/resourcelink/
S/390: Input/Output
Configuration Program
Users Guide and
ESCON
Channel-to-Channel
Reference
GC38-0401
This guide provides conceptual and procedural information to help you use
the z/OS Hardware Configuration Definition (HCD) application. It also
explains:
v How to migrate existing IOCP/MVSCP definitions
v How to use HCD to dynamically activate a new configuration
v How to resolve problems in conjunction with MVS/ESA HCD
SC33-7988
OS/390: Hardware
Configuration Definition
Users Guide
SC28-1848
GC28-1784
This publication provides device-specific information for the various models GG26-4575
of the 3390 and describes methods you can use to manage storage
efficiently using the VM operating system. It provides guidance on
managing system performance, availability, and space through effective
use of the direct access storage subsystem.
This publication helps you use the 3390 in a VSE environment. It includes
planning information for adding new 3390 units and instructions for
installing devices, migrating data, and performing ongoing storage
management activities.
z/Architecture Principles
of Operation
GC26-4576
SA22-7832
xvii
Title
Order
Number
Description
SAN
SC28-1848
This guide explains how to convert the IBM SAN Fibre Channel Managed
Hub from a Fibre-Channel Arbitrated Loop (FC-AL) configuration to a
fabric-capable switched environment.
SY277616
This guide provides an overview of the product and discussed the features GC26-7391
and upgrades available. It also tells you how to install the hub, how to
manage and monitor it using zoning, and how to manage it remotely. It also
tells you how to use the IBM 3534 SAN Fibre Channel Managed Hub
TotalStorage ESS Specialist.
This guide describes how to install and maintain the IBM SAN Fibre
Channel Switch 2109 Model S08.
SC26-7350
This guide describes the IBM SAN Fibre Channel Switch and the IBM
TotalStorage ESS Specialist. It provides information about the commands
and how to manage the switch with Telnet and the Simple Network
Management Protocol (SNMP).
SC26-7349
This publication describes how to install and maintain the IBM SAN Fibre
Channel Switch 2109 Model S16. It is intended for trained service
representatives and service providers.
SC26-7352
This guide introduces the IBM SAN Fibre Channel Switch 2109 Model S16 SC26-7351
and tells you how to manage and monitor the switch using zoning and how
to manage the switch remotely.
Implementing Fibre
Channel Attachment on
the ESS
This publication, from the IBM International Technical Support Organization, SG24-6113
helps you install, tailor, and configure fibre-channel attachment of
open-systems hosts to the ESS. It provides you with a broad
understanding of the procedures that are involved and describes the
prerequisites and requirements. It also shows you how to implement
fibre-channel attachment. This book also describes the steps required to
migrate to direct fibre-channel attachment from native SCSI adapters and
from fibre-channel attachment through the SAN Data Gateway.
Seascape family
xviii
This publication, from the IBM International Technical Support Organization, SG24-5465
introduces the ESS and provides an understanding of its benefits. It also
describes in detail the architecture, hardware, and functions, including the
advanced copy functions, of the ESS.
Order
Number
Title
Description
This publication introduces the IBM Versatile Storage Server and lists the GC26-7223
features you can order. It also provides planning information for both 2105
Models B09 and 100.
This publication, from the IBM International Technical Support Organization, SG24-5420
can help you install, tailor, and configure the ESS in your environment.
Storage management
Device Support
Facilities: Users Guide
and Reference
IBM TotalStorage
Solutions Handbook
This handbook, from the IBM International Technical Support Organization, SG24-5250
helps you understand what makes up enterprise storage management. The
concepts include the key technologies that you must know and the IBM
subsystems, software, and solutions that are available today. It also
provides guidelines for implementing various enterprise storage
administration tasks so that you can establish your own enterprise storage
management environment.
IBM TotalStorage Expert: This guide, from the IBM International Technical Support Organization,
Hands-On Usage Guide helps you install, tailor, configure, and use TotalStorage ESS Expert.
SG24-6102
This guide helps you install the IBM TotalStorage Expert (formerly the IBM
StorWatch Expert) program. The IBM TotalStorage Expert provides asset,
capacity, and performance management information for disk and tape
storage systems.
GC26-7436
This publication provides device-specific information for the various models GG26-4575
of the 3390 and describes methods that you can use to manage storage
efficiently using the VM operating system. It provides guidance for
managing system performance, availability, and space through effective
use of the direct access storage subsystem.
This publication helps you use the 3390 in a VSE environment. It includes
planning information for adding new 3390 units and instructions for
installing devices, migrating data, and performing ongoing storage
management activities.
GC26-4576
xix
Non-IBM publications
Other related publications are not available through IBM ordering systems. To order
them, contact the sales representative at the branch office in your locality.
Title
Description
Quick Start Guide: An Example with Network File System This guide tells you how to configure the Veritas Cluster
(NFS)
Server. See also the companion document, Veritas
Cluster Server Users Guide.
Veritas Cluster Server Installation Guide
Web sites
The following Web sites provide information about the ESS and other IBM storage
products.
xx
Web Site
http://www.storage.ibm.com/software/sms/sdm/
http://www.storage.ibm.com/disk/ess/index.html?/ess.htm
http://www-1.ibm.com/servers/storage/support/software/cscli.html
ESS publications
http://www-1.ibm.com/servers/storage/support/disk/2105.html
Click Documentation.
http://www.storage.ibm.com/software/sms/sdm/
http://www-1.ibm.com/servers/storage/support/disk/2105.html
http://www.storage.ibm.com/
http://www.ibm.com/servers/storage/support/
Click Storage Virtualization.
http://publib.boulder.ibm.com/xseries/
http://www.storage.ibm.com/software/sms/sdm/
http://www.ibm.com/storage/fcswitch/
http://www-1.ibm.com/servers/storage/support/san/index.html?
http://www-1.ibm.com/servers/storage/support/software/sdd.html
TotalStorage Expert
http://www-1.ibm.com/servers/storage/support/software/swexpert.html
http://www.storage.ibm.com/software/sms/sdm/
xxi
xxii
Summary of Changes
This document contains terminology, maintenance, and editorial changes. Technical
changes or additions to the text and illustrations are indicated by a vertical line to
the left of the change. This summary of changes describes new functions that have
been added to this release.
New Information
This edition includes the following new information for the Storage Management
CLI:
v New installation instructions that allow you to install the command line interface
through Installshield, the console, or in silent mode. OpenVMS is the only
operation system that can only be performed using the console.
v Updates to list server output fields in support of the ESS Model 750
v Updates to the show task output fields in support of the asynchronous PPRC
feature.
This edition includes the following new information for the Copy Services CLI:
v The new rsFlashCopyQuery command that allows you to synchronously query a
user-specified volume or group of volumes to retrieve FlashCopy data.
v Updates to the rsQuery output fields in support of the asynchronous PPRC
feature.
Deleted Information
v Previous installation instructions for the Storage Management CLI and the Copy
Services CLI.
New Information
This edition includes the following new information for the Storage Management
CLI:
v The create perfstats command that allows you to register a client to collect
performance information from your ESS
xxiii
v The delete perfstats command that allows you to remove a client registration
that was created using the create perfstats command
v Addition of the following new messages for the ESS Storage Management CLI:
557, 559, 706, 707, 708
Deleted Information
Support for the ESS Storage Management CLI set perfstats command
New Information
This edition includes the following new information for the Storage Management
CLI:
v Space management that provides commands to create new volumes from a
volume space and allow you to query the available free space. You can also
create and delete volume spaces.
v Deleting parallel access volumes
v Adding, modifying, or deleting ESS Web user accounts including changing
passwords and access levels to the ESS
v Setting remote support on an ESS
v
v
v
v
v
v
This edition includes the following new information for the Copy Services CLI:
v Support for the following operating systems: Windows Server 2003 and AIX 5.2
Changed Information
Definitions for -s (primaryserver) and -b (backupserver) in the Copy Services
Commands section have changed to support the dual active servers function.
xxiv
v
v
v
v
the bash (.sh) shell. You must perform all Compaq Tru64 and NumaQ ptx
installations using the setupgenericunix.sh file that is located on the installation
compact disc.
v You must remove any existing version of the Storage Management CLI before
you can install LIC level 2.4.0 on your system. See the previous version of the
IBM TotalStorage Enterprise Storage Server Command-Line Interface Users
Guide (SC26-7494-03) for removal instructions. The removal instructions that are
provided in this publication will only remove LIC level 2.4.0.
v The installation process installs the CLI in the following default directory:
AIX
/opt/ibm/ESScli
HPUX /opt/ibm/ESScli
Linux /opt/ibm/ESScli
Sun Solaris
/opt/ibm/ESScli
Windows
C:\Program Files\IBM\ESScli
HP Tru64
/opt/ibm/ESScli
IBM NumaQ
/opt/ibm/ESScli
Novell Netware
SYS:\ESScli
1. Log on to your host system as a root user or administrator.
2. Insert the CLI product CD into the CD drive. If a window pops up for the CD
drive, close the window.
3. Mount the CD drive using the mount command according to your system. You
can mount your CD drive using the following examples:
AIX
HPUX Mount the CD to your SD_CDROM using the path name for your
environment by typing the following commands:
ioscan -fmkC disk | more
mount /dev/ask/c?t?d? /SD_CDROM
Sun Solaris
Type the following command:
mkdir /mnt
mount -F hsfs -r /dev/dsk/c0t6d0s2 /mnt
Note: The device name /dev/dsk/c0t6d0s2 is the default name for Sun
Solaris. The device name may be different on your system
depending on your hardware configuration.
Windows
You do not need to mount the CD if you are using this operating
system.
HP Tru64
Type the following command:
mount -t cdfs -o noversion /dev/rznn /mnt
If cd0 does not exist, type the following command to find the CD device
name:
/etc/dumpconf | grep cd
Substitute cd0 with the device name that you just found, and type the
following command again:
/etc/mount/ -r -f cdfs /dev/dsk/your_device_name /mnt
where your_device_name is the name of the device that you just found.
Novell Netware
You do not need to mount the CD if you are using this operating
system.
4. Navigate to your CD drive and proceed with either the silent, console, or
Installshield installation.
|
# This file can be used to create an options file (i.e., response file) for the
# wizard "Install". Options files are used with "-options" on the command-line
# to modify wizard settings.
#
# The settings that can be specified for the wizard are listed below. To use
# this template, follow these steps:
#
#
1. Enable a setting below by removing leading ### characters from the
#
line (search for ### to find settings you can change).
#
#
2. Specify a value for a setting by replacing the characters <value>.
#
Read each settings documentation for information on how to specify its
#
value.
#
#
3. Save the changes to the file.
#
#
4. To use the options file with the wizard, specify -options <file name>
#
as a command-line argument to the wizard, where <file name> is the name
#
of this options file.
#
########################################################################
########################################################################
#
# License Agreement State
#
# The initial state of the License Agreement panel. Legal values are:
#
#
0 - Nothing will be selected
#
1 - "I accept the terms of the license agreement." will be selected
#
2 - "I do not accept the terms of the license agreement." will be
#
selected
#
# For example, to configure the panel to initially display "I do not accept the
# terms of the license agreement.", use
#
#
-W bean.selection=2
#
-W bean.selection=1
########################################################################
#
# User Input Field - Win_Novell_select
#
#
#
0 - Novell 4
#
1 - Novell 5/6
#
2 - Windows
-W win_user_input.Win_Novell_select="2"
########################################################################
#
# command-line Interface Install Location
#
# The install location of the product. Specify a valid directory into which the
# product should be installed. If the directory contains spaces, enclose it in
# double-quotes. For example, to install the product to C:\Program Files\My
# Product, use
#
#
-P installLocation="C:\Program Files\My Product"
#
-P installLocation="C:\temp\CLI"
If you are installing on Windows, your system will automatically restart when the
installation is complete. You can verify that the command-line interface has installed
correctly by reviewing the CLI.CFG file in the directory that you chose for
installation.
Note: In CLI.CFG file, the JAVA_INSTALL variable must be set to the location of
the Java executable, for example, JAVA_INSTALL=/usr/java/jre/bin. If the
Java executable is named jre, then JAVA_JRE must be set to JRE:
JAVA_JRE=JRE. If it is called java, then JAVA_JRE should be empty, for
example, JAVA_JRE= .
The installer will typically be able to auto-detect the correct values. If the
correct values are not detected, then you should edit the CLI.CFG file to
reflect the actual java installation location.
|
|
|
|
The CLI can be removed silently through the command-line. If you only use the
silent option the uninstallation program uses the default options rather than allowing
you to select options.
To install in silent mode, type the following command at that command prompt:
<install directory>/_uninst/uninstaller.<exe|sh|bin> -silent
setuplinux.bin
setupwin32console.exe
setup.jar
setuphp1020.bin
setupsolarisSparc.bin
setupaix.bin
setuphp11x.bin
setupwin32.exe
4. The License Agreement screen is displayed. You must accept the terms of the
license agreement to continue with the installation. If there is already an X next
to I accept the terms of the license agreement, press Enter to continue. If
not, press 1, then Enter and the screen should redisplay.
Read the following license agreement carefully.
Use of the IBM TotalStorage Enterprise Storage Server (ESS) command-line
interface (CLI) is governed by the IBM Agreement for Licensed Internal Code, a
copy of which has been provided with your ESS Machine.
(C) Copyright 2000, 2003 International Business Machines
Corporation All rights reserved.
Please choose from the following options:
[X] 1 - I accept the terms of the license agreement.
[ ] 2 - I do not accept the terms of the license agreement.
To select an item enter its number, or 0 when you are finished: [0]
5. Once you have accepted the terms of the license agreement, press Enter. The
following screen is displayed. Press Enter to continue.
Press 1 for Next, 2 for Previous, 3 to Cancel or 4 to Redisplay [1]
6. The Window Users screen is displayed. This screen is only displayed if you
are installing on a Windows system or are pointing to a Novell system. If you
want Windows, press Enter. If you want one of the Novell systems, enter 1 or
2, and then press Enter. If you choose 1 or 2, the screen is updated with an X
next to the Novell system that you selected.
Select the appropriate target system for the CLI installation:
[ ] 1 - Novell 4
[ ] 2 - Novell 5/6
[X] 3 - Windows
To select an item enter its number, or 0 when you are finished: [0]
7. Once you have selected a target system, press Enter. The following screen is
displayed. Press Enter to continue.
Press 1 for Next, 2 for Previous, 3 to Cancel or 4 to Redisplay [1]
8. The Installation Location screen is displayed. If you are satisfied with the given
directory shown in brackets, press Enter. If not, enter the directory where you
want to install the CLI, and press Enter.
command-line Interface Install Location
Please specify a directory or press Enter to accept the default directory.
Directory Name: [C:\Program Files\ibm\ESScli]
Press 1 for Next, 2 for Previous, 3 to Cancel or 4 to Redisplay [1]
11. The Installation Preview screen is displayed. Press 1 or Enter to continue after
the installation completes.
Installing command-line Interface. Please wait...
|-----------|-----------|-----------|------------|
0%
25%
50%
75%
100%
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Creating uninstaller...
13. The Readme screen displays specific operating system information that you
need to know about the command-line interface. Press Enter to review the
readme information, then 1 and Enter to continue if you are installing on a
Windows system. For all other systems, press 3 and Enter to finish the
installation.
Read the following information below.
IBM(R) TotalStorage(TM) Enterprise Storage Server(TM)
Storage Management Command-Line Interface
for Windows NT(R) or Windows 2000(R) Host Systems
README
---------------------------------------------------------------Contents
1.0
1.1
1.2
2.0
3.0
4.0
5.0
--------------------------------------------------------------1.0
About this README file
1.2
Help contacts
1. For administrative or non-technical support:
---------------------------------------------------------------
3.0
10
14. If you are installing on a Windows system, the Restart screen is displayed.
Press 3 to complete the installation.
To complete the installation you must restart your computer.
[X] 1 - Yes, restart my computer.
[ ] 2 - No, I will restart my computer at a later time.
To select an item enter its number, or 0 when you are finished:
[0] To select an item enter its number, or 0 when you are finished: [0] 2
[] 1 - Yes, restart my computer.
[X] 2 - No, I will restart my computer at a later time.
To select an item enter its number, or 0 when you are finished: [0]
Press 3 to Finish or 4 to Redisplay [3]
You can verify that the command-line interface has installed correctly by reviewing
the CLI.CFG file in the directory that you chose for installation.
Note: In CLI.CFG file, the JAVA_INSTALL variable must be set to the location of
the Java executable, for example, JAVA_INSTALL=/usr/java/jre/bin. If the
Java executable is named jre, then JAVA_JRE must be set to JRE:
JAVA_JRE=JRE. If it is called java, then JAVA_JRE should be empty, for
example, JAVA_JRE= .
The installer will typically be able to auto-detect the correct values. If the
correct values are not detected, then you should edit the CLI.CFG file to
reflect the actual java installation location.
Chapter 1. Installing and removing the CLI
11
|
|
|
|
12
v setupsolarisSparc.bin
v setupaix.bin
v setuphp11x.bin
v setupwin32.exe
2. Execute the setup file that is appropriate for your operating system.
3. The Welcome screen is displayed. Click Next to continue or Cancel to exit the
installation.
5. The Window Users panel is displayed. This panel only is displayed if you are
installing on a Windows system or pointing to a Novell system. Select the
appropriate target system, and then click Next to continue or Cancel to exit
Chapter 1. Installing and removing the CLI
13
the installation.
6. The Installation Location panel is displayed. If you are satisfied with the default
directory, click Next. If not, type the directory path where you want to install
the CLI and click Next. Click Cancel if you want to exit the installation.
7. The Installation Preview panel is displayed. This panel reviews where the
command-line interface will be installed and how much space it will take up on
your drive. Click Next to continue or Cancel to exit the installation. You can
14
8. The Installation Progress panel is displayed. This panel shows the progress of
the command-line interface installation. Click Next to continue or Cancel to
exit the installation.
15
9. The Installation Summary panel is displayed. This panel shows the installation
summary information. Click Next to continue or Cancel to exit the installation.
10. The Readme panel contains information that is specific to the operating system
that you are installing on. These instructions display an example of the
Windows operating system. Review the information, then click Finish to
complete the installation, or click Next if you are installing on a Windows
system.
Note: If you are installing on a Windows system, another panel asks if you
want to restart your computer to complete the installation. Click Yes to
16
You can verify that the command-line interface has installed correctly by reviewing
the CLI.CFG file in the directory that you chose for installation.
Note: In CLI.CFG file, the JAVA_INSTALL variable must be set to the location of
the Java executable, for example, JAVA_INSTALL=/usr/java/jre/bin. If the
Java executable is named jre, then JAVA_JRE must be set to JRE:
JAVA_JRE=JRE. If it is called java, then JAVA_JRE should be empty, for
example, JAVA_JRE= .
The installer will typically be able to auto-detect the correct values. If the
correct values are not detected, then you should edit the CLI.CFG file to
reflect the actual java installation location.
|
|
|
|
|
|
|
|
|
|
Note: If you have a Windows system, you must start the removal by using the
Add/Remove Programs feature.
Chapter 1. Installing and removing the CLI
17
|
|
|
|
|
|
|
|
3. A summary panel that shows where the command-line interface will be removed
from is displayed. Click Next to Continue or Cancel to exit the uninstaller.
18
|
|
|
|
|
19
Polycenter installation utility uses your current default device. If you omit the
directory name, the Polycenter installation utility uses the [vms$common] directory
as the default destination directory.
If you do not use the /destination= devicename:[directoryname] qualifier at all, the
Polycenter installation utility installs the software in a directory that is defined by the
pcsi$destination logical name. If you do not define this logical name, the Polycenter
installation utility installs the command-line interface in the
sys$sysdevice:[vms$common.ibm2105...] directory.
Perform the following steps to install the command-line interface on your OpenVMS
system.
1. Log on to your host system as a user with syslck, sysnam, sysprv, (or a
system UIC), tmpmbx, and cmkrnl privileges.
2. Insert the CLI product CD into the CD drive.
3. Mount the CD drive. For example, for an IDE CD device DQA0, type the
following command:
mount/noassist/override=identification/media_format=cdrom dqa0. A message
similar to the following is displayed:
mount/noassist/override=identification/media_format=cdrom dqa0:
%MOUNT-I-WRITELOCK,volume is write locked
%MOUNT-I-CDROM_ISO, : (1 of 1) , mounted on VMS1$DQA0:
|
|
|
|
Directory DQA0:[000000]
IBM-AXPVMS-IBM2105CLI-V0201-0F1-1.PCSI;1
File ID: (4,7,0)
Size:
62560/62560
Owner:
[0,0]
Created: 16-AUG-2002 20:47:00.00
Revised: 16-AUG-2002 20:47:00.00 (1)
Expires: <None specified>
Backup:
<No backup recorded>
Effective: <None specified>
Recording: 16-AUG-2002 21:22:00.00
File organization: Sequential
Shelved state:
Online
Caching attribute: Writethrough
File attributes:
Allocation: 62560, Extend: 0, Global buffer count: 0,
Version limit: 0, Backups disabled
Record format:
Undefined, maximum 0 bytes, longest 0 bytes
Record attributes: None
RMS attributes:
None
Journaling enabled: None
File protection:
System:RWED, Owner:RWED, Group:RWED, World:RWED
Access Cntrl List: None
Client attributes: None
Total of 1 file, 62560/62560 blocks.
5. Type the following command and press Enter to extract the command-line
interface for OpenVMS release notes: product extract release_notes
ibm2105cli /source=dqa0:[000000]- [/file= filespec]
20
Note: If you do not use the /file=filespec qualifier, the release notes are written
to the default.pcsi$release_notes file in your current default directory.
The release notes contain additional installation, postinstallation, and
related information about the command-line interface for an OpenVMS
Alpha host system. It might also contain last-minutes technical changes.
6. Type the following command and press Enter to invoke the command-line
interface installation process: product install ibm2105cli
/source=dqa0:[000000]- [/destination= devicename:[directoryname]]. A
message similar to the following is displayed:
The following product has been selected:
IBM AXPVMS IBM2105CLI V9.9-9F1 Layered Product
Do you want to continue? [YES]
7. Type Yes and press Enter to continue the installation process. The following
configuration options message is displayed:
Configuration phase starting ...
You will be asked to choose options, if any, for each selected product and for
any products that may be installed to satisfy software dependency requirements.
IBM AXPVMS IBM2105CLI V9.9-9F1: IBM command-line Interface for ESS 2105
This product uses the registered key : IBM2105
International Business Machines Corporation (IBM)
Copyright 2002 International Business Machines. All rights reserved.
Do you want the defaults for all options? [YES]
8. Type No and press Enter to review the installation options. The following Java
license message is displayed:
Java RTE OpenVMS Alpha License Agreement
The IBM2105CLI requires the Java 1.3 Java Runtime Environments.
Installing the CLI program automatically installs the required Java. The
installed Java JRE is the intellectual property of and licensed by Compaq
Corp. You can view the license agreement on the World Wide Web at :
http://www.compaq.com/java/documentation/1.3.1/ovms/jre/LICENSE.TXT
The full text of the agreement is also available in the README_OpenVMS.txt
file on the installation CD in the cliReadmes directory. You can also view
the full copyright statement on the World Wide Web at
http://www.compaq.com/java/documentation/1.3.1/ovms/jre/COPYRIGHT.TXT
Answer "Yes" to install the Java code. By installing this code, you are
certifying that you have read and accept the Compaq Java License agreement.
Answer "No" to terminate and exit the IBM2105CLI installation.
Do you want to continue? [YES]
Note: You can answer Yes if you install with the default options.
9. Type Yes and press Enter to accept the Java license agreement. The
command-line interface requires Java 1.3.1 on an OpenVMS Alpha host
system. If you answer No, the installation process automatically ends and
exits. The following library update warning message is displayed:
WARNING: The global Help and Message libraries will be updated.
The IBM2105CLI program provides local Help and Message Library files.
By default, the CLI instalation integrates the local libraries into the
global Help and Message libraries. To prevent the modification of
Chapter 1. Installing and removing the CLI
21
10. Type Yes and press Enter to update the global libraries with the CLI library
contents. The following option review message is displayed:
Do you want to review the options?
11. Type Yes and press Enter to review and confirm selected options. The
following library update confirmation message is displayed:
IBM AXPVMS IBM2105CLI V9.9-9F1: IBM command-line Interface for ESS 2105
Integrate the local and global libraries? [YES]
12. Type Yes and press Enter to confirm the library update option. The following
confirmation message is displayed:
IBM AXPVMS IBM2105CLI V9.9-9F1: IBM command-line Interface for ESS 2105
Are you satisfied with these options? [YES]
13. Type Yes and press Enter to confirm and accept all selections. The following
installation message with completion status is displayed:
Execution phase starting ...
The following product will be installed to destination:
IBMAXPVMS IBM2105CLI V9.9-9F1
DISK$V73_COMMON:[VMS$COMMON.]
14. Review the Installation Verification Procedure (IVP) report which is similar to
the following output and check for possible errors:
Beginning IBM 2105 CLI Installation Verification Procedure
--- Logical name verification started
--- Logical name verification passed
--- Image file verification started
--- Image file verification passed
--- Object file verification started
--- Object file verification passed
--- Java class verification started
--- Java class verification passed
--- Installed images verification started
--- Installed images verification passed
--- JRE verification started
--- JRE verification passed
--- Functionality verification started
The following test checks if rsList2105s runs correctly:
You will see a list of all IBM2105 volumes attached to this node.
If there are no such volumes, you get error %IBM2105-E-NO2105VOL.
Any other warning or error indicates a problem!
disk name
2105 serial number
------------ -----------------_$1010$DKA300 40213550
_$1010$DKA400 50513550
--- Functionality verification passed
--- Command help verification started
--- Command help verification passed
22
15. Make sure that the installation completes. When the Polycenter installation
utility finishes the command-line interface installation process, you will see a
message similar to the following:
The following product has been installed:
IBM AXPVMS IBM2105CLI V9.9-9F1
Layered Product
IBM AXPVMS IBM2105CLI V9.9-9F1: IBM command-line Interface for ESS 2105
Release notes for IBM 2105 command-line Interface available
23
Layered Product
3. Type Yes and press Enter to confirm the uninstallation. The following
uninstallation confirmation message with completion status is displayed:
The following product will be removed from destination:
IBM AXPVMS IBM2105CLI V2.1-0F0
DISK$V73_COMMON:[VMS$COMMON.]
Layered Product
5. Remove the command-line interface startup, login, and shutdown functions from
your system startup, login, and shutdown processes.
|
24
Description
You can use the esscli command to perform the following tasks:
v Manage one or more ESS servers by reporting about the volumes, volume
spaces, I/O ports, disk groups, and host systems connected to each server
v Perform LUN masking by associating or disassociating a volume with a
fibre-based host initiator and by providing volume access information even if the
volume is not associated with an initiator
v Manage volume space by querying space availability and creating new volumes
within a volume space
v Identify volumes with user-specified labels, if required
v List, create, and delete parallel access volumes (PAVs)
v Generate an audit log about user ID-specific configuration activities
v Define, undefine, and modify a host connection that provides the ESS server with
the information about the host type and worldwide port name.
v Manage ESS Copy Services tasks by monitoring and querying the tasks in the
Copy Services task repository
v Query and report the status of PPRC paths
v Manage remote support
v Manage Call home
v Manage Web or esscli user names and passwords
v List, create, and delete performance data entries
General guidelines
The esscli command has two types of parameters: parameters with arguments and
parameters without arguments. Parameters without arguments refer to those
parameters that follow a flag and function as an individual argument to the flag,
such as AccessFile in -a AccessFile. They do not have arguments to themselves.
See Parameters without arguments on page 34 for more information.
Parameters with arguments refer to those parameters that precede a flag. These
parameters consist of two main parts: keywords and arguments. Keywords are a
verb-noun phrase, which represents an action-category relationship, for example,
list server. The action keyword specifies the type of functions to be performed by
the command, and the category keyword specifies the type of configuration objects
to be manipulated.
25
Arguments refer to the -d flag followed with one or more name-value pairs enclosed
in a set of double quotation marks. For example, -d "ess=EssID name=LogName" is
the argument to the list log parameter, in which ess= is the name and Essid is
the value in the name-value pair.
Follow these general guidelines when you use the esscli command and associated
parameters and arguments:
v Specify at least one action-category parameter when you issue the esscli
command for purposes other than requesting help.
v Specify only one action-category parameter in a single instance of the esscli
command as the parameters of this type are mutually exclusive.
v Specify a flag prefixed with a minus (-) symbol as required for a particular
parameter.
v Position the command flags and parameters in any desired order at the
command line. For example, you can enter either one of the following
commands:
esscli -a AccessFile list server -d "ess=EssId"
esscli list server -d "ess=EssId" -a AccessFile
v If a parameter or name-value argument pair allows multiple values, separate
each value with a comma (,) as in ports=A0,80,04; do not add any space
between values for the name in a pair.
v Enclose one or more name-value pairs in a set of double quotation marks for a
particular parameter or argument. If the value of a parameter or name-value pair
contains a blank or white space, enclose the entire value in a set of double
quotation marks, as in:
esscli -a "c:\data files\esscli\ess access file.dat"
or single quotation marks, as in:
create hostconnection -d "ess=2105.12345 host=Jean Luc profile=linux".
v Specify the esscli command and associated flags, parameters, and arguments in
any case of your desire. The command is not case-sensitive.
Syntax
The following is the complete syntax of the esscli command. See Syntax
diagrams on page ix for syntax reading instructions.
26
27
set port
list port
-d
-u
-a
ess= EssId
BackupAddr
-nov
-v
ess= EssId
lss= LssId1,...
-d
-fmt
-hdr
-nohdr
UserName
AccessFile
Format
-ssl
-nossl
-p
-debug
-nodebug
-key
KeyName
Password
-refresh
-norefresh
-fmt
Format
intervol=
dg= DgId
disable
enable
voltype=
-fmt
FB
CKD
-fmt
port= PortId
ess= EssId
ess= EssId
ess= EssId
redundancy=
protocol=
topology=
raid5
raid10
nonraid
P2P
FCAL
undefined
FCP
FICON
Format
Format
ess= EssId
-fmt
server,vs,raid,fmt,cap,free,on,vols,lss,status,ssid
Fragment 1: Argument for create volumespace
-d
ess= EssId
vs= VsId
-d
-d
-b
-d
-d
create volumespace
delete volumespace
list diskgroup
list volumespace
list server
ServerAddr
-h
-help
-?
-s
esscli
esscli syntax
28
esscli
-d
delete pav
show remotesupport
set remotesupport
-d
-d
-d
delete volumeaccess
-d
qty=
-fmt
max
quantity
-fmt
Format
Format
Format
-fmt
Format
ess= EssId
init= WwName
host= HostName
assigned
volume=
unassigned
all
VolId1,...
init= WwName
ess= EssId
volume= VolId
host= HostName
init= WwName
ess= EssId
volume=
all
host= HostName
VolId1,...
ess= EssId
ess= EssId
callhome=
enabled
pepwd= reset
disabled
remoteacc=
enabled
disabled
remoteaccpwd= ServicePassword
name= TaskName
-d
ess= EssId
pav= VolId
volume= VolId
lss= LssId
ess= EssId
name= LogName
-d
ess= EssId
srclss= LssId
ess= EssId
-fmt
lss= LssId
volume= VolId
volume= VolId
lss= LssId
ess= EssId
ess= EssId
-d
create volumeaccess
-d
list volumeaccess
list task
show task
list log
-d
list pprcpaths
-d
-d
create pav
list pav
list featurecode
29
-d
raid5
raid10
nonraid
ess= EssId
redundancy=
placement=
voltype= FB
voltype= CKD
spread
seq
cap= Gb
cyls= Cyls
-d
ess= EssId
init= WwName
host= HostName
-d
ports=
lss= LssId1,...
vs= VsId1,...
profile= ProfileName
qty= Qty
newports=
all
PortId1,...
all
PortId1,...
ess= EssId
-fmt
Format
lss= LssId1,...
voltype= Voltype
set volume
-d
ess= EssId
volume= VolId
label= VolLabel
create volume
Fragment 2: Argument for create volume
list hostconnection
-d
ess= EssId
host= HostName
-fmt
Format
init= WwName
create hostconnection
Fragment 3: Argument for create hostconnection
delete hostconnection
-d
ess= EssId
init= WwName
host= HostName
set hostconnection
-d
ess= EssId
init= WwName
newinit= WwName
host= HostName
newhost= HostName
list volume
esscli
30
-d
ess= EssId
pwd= PagerPassword
-d
type=
num
alphanum
phone= PagerNumber
pin= Number
status=
enabled
disabled
test=
user= UserName
newphone= PhoneNumber
newuser= UserName
newpin= PinNumber
newpwd= Password
newtype=
alphanum
num
newstatus=
enabled
disabled
pin= Number
pin= PinNumber
ess= EssId
ess= EssId
Fragment 4: Argument for create pager
-d
ess= EssId
phone= PagerNumber
-d
phone= PhoneNumber
set pager
show pager
create pager
delete pager
esscli
max= Number
test=
yes
no
yes
no
31
show problem
delete problem
create perfstats
delete perfstats
list problem
ess= EssId
ess= EssId
ess= EssId
ess= EssId
create perfstats
-d
ess=
-d
-d
EssId
test=
comname= CommunityName
contact= ContactName
location= SystemLocation
mibread=
enabled
disabled
traps=
enabled
disabled
esstraps=
enabled
disabled
max= MaxTraps
test=
yes
no
addr= IpAddr1,...
addr= IpAddr1,...
yes
no
outputdir= DirectoryPath
hostname= IpAddr
port=
PortNumber
frequency=
ess= EssId
ess= EssId
probid= ProblemId
ess= EssId
probid= ProblemId
Minutes
Seconds
duration= TimeInHours
ess= EssId
-fmt
Format
Fragment 5: Argument for create perfstats
-d
ess= EssId
hostname= hostname
port= PortID
-d
-d
-d
-d
-d
-d
delete snmp
list perfstats
set snmp
show snmp
create snmp
esscli
async=
On
Off
32
delete webuseraccount
create webuseraccount
set webuseraccount
list webuseraccount
ess= EssId
accfile= AccessFile
user= NewUserName
-d
pwd= NewUserPassword
auth=
admin
config
op
view
iprange= IpRange
comments= Text
ess= EssId
-fmt
cluster, sz, extsz, server
Fragment 6: Argument for create webuseraccount
-d
ess= EssId
accfile= AccessFile
user= UserName
newuser= NewUserName
newpwd= NewUserPassword
newauth=
admin
config
op
view
newiprange= IpRange
newcomments= Text
-d
ess= EssId
user= UserName
-d
esscli
33
esscli
-d
delete email
set email
-d
-d
-d
show email
create email
addr= EmailAddress
addr= EmailAddress
ess= EssId
ess= EssId
max= Number
test=
yes
no
addr= EmailAddress
ess= EssId
ess= EssId
all
info
err
none
newaddr= EmailAddress
newtrigger=
err
info
all
none
trigger=
test=
no
yes
-refresh
Provides access to the most recent information.
|
|
-norefresh
Provides the cache copy of the data on the server.
-a AccessFile
Specifies the user name, password, and other parameters to access and use
the esscli command from your host system. If you include an access file as
part of your command instances, you do not need to specify the flags and
parameters it contains on the command line.
The access file has the following two valid formats:
Simple format
A simple text file that is supported by both the Copy Services CLI and
the Storage Management CLI. An access file in this format functions the
same way as the securityfilepath file for the Copy Services CLI
commands. It simply contains a user name and a password, separated
by two spaces, on the same line. For example, you can create a
test01.txt access file to include tester1 (the username) and -testcase1
(the password). The test01.txt file looks like the following:
tester1 testcase1
You can then specify the -a AccessFile parameter when you issue the
esscli command, for example:
esscli list task -s 9.46.23.187 -b 9.46.23.203 -a test01.txt
Extended format
A text file that is supported by the Storage Management CLI. An access
file in extended format contains flags and parameters in addition to the
user name and the password.
Begin the access file in this format with the word !VERSION, followed
by the version number, on the first line. Continue onto additional lines,
as many as necessary, to specify arguments and parameters other than
the action-category parameters, such as list task. Make sure that a
parameter or argument is preceded by a valid flag and place both of
them on the same line. The esscli command ignores any blank or
comment (#) lines in the access file.
The following example shows the test01.txt file in extended format:
34
!VERSION 1.0
-u tester1 -p testcase1
-s 9.46.23.187
-b 9.46.23.203
-nov
-d "ess=2105.12345"
-fmt "server,vol,label,cap,units,volser"
You can then specify the -a AccessFile parameter when you issue the
esscli command, for example:
esscli list volume -a test01.txt
You can further expand the access file to include a list of keys that are
defined for specific sets of flags, parameters, and arguments for
commonly-performed command operations. Begin the key list portion of
the access file with the word !KEYLIST, and follow it with a list of key
names. The following shows the test01.txt file in extended format with a
key list:
!VERSION 1.0
#------------------------------------------------------------------------# Command Options portion of access file (optional)
#-------------------------------------------------------------------------nohdr -nov
#------------------------------------------------------------------------# Key-list portions of access file (optional)
#------------------------------------------------------------------------# Note: Lines with CS are used for TASK and PPRCPATHS command categories
#
Lines with CFG are used for all other command categories.
!KEYLIST
turbo5
turbo5
gazelle
gazelle
silver1
silver1
CS
CFG
CS
CFG
CFG
CS
-s
-s
-s
-s
-s
-s
prime1.xyz.com
ess1c0.xyz.com
prime2.xyz.com
x25b_3.xyz.com
sil1c0.xyz.com
sil1c0.xyz.com
-b
-b
-b
-b
second1.xyz.com
ess1c1.xyz.com
second2.xyz.com
x2b_3c1.xyz.com
-u shrek
-u
-u
-u
-u
-p
tester1 -p testcase1
porky -p pig -nossl
top
-p secret
bush
-p broccoli -hdr
fiona -d "ess=2105.12345"
You can then specify -a AccessFile and -key KeyName when you issue
the esscli command as in
esscli list pav -a test01.txt -key gazelle -d "ess=2105.67890
lss=04"
-b BackupAddr
Specifies an alternate server IP address, DNS address, or host name of the
requested service. The type of alternate server address must be either the ESS
Specialist server or the Copy Services server according to what you defined
using the -s flag. The -b flag is optional.
-d name=value
Specifies the name and value as part of the argument to the action-category
parameters. The -d flag is required and its argument uses the name=value
format.
You must specify a valid value for each of the name=value pairs in an argument.
See Argument names and values on page 43 for a detailed description of all
valid arguments and values.
-fmt format
Specifies the order of fields or columns you want to see in the output of the
35
esscli command. The -fmt flag is optional. You can specify the -fmt flag for any
of the list parameters. You can enclose the format value in the optional
double-quotation marks.
-h Provides brief online help about the esscli command. The -h flag is optional
and is the same as the -help and -? flags. The command ignores all other flags
and parameters when the -h flag is specified.
-hdr
Includes all header lines in the output of the esscli command. The -nohdr flag
is optional, but it is on by default.
-help
Provides brief online help about the esscli command. The -help flag is optional
and is the same as the -h and -? flags. The command ignores all other flags
and parameters when the -help flag is specified.
-key KeyName
Specifies the name of the key that is associated with the predefined flags and
parameters to be included in the access file. The -key flag is optional and
applicable only when the access file is in extended format. If you specify a key
name as part of your command instance, you must also include the access file
that contains the key name. In this case, you do not need to specify the flags
and parameters associated with that key entry on the command line. See
Extended format on page 34 for more information.
-nohdr
Omits all header lines in the output of the esscli command. The -nohdr flag is
optional.
-nossl
Specifies that the esscli command is sent in plain, unencrypted text. The -nossl
flag is optional. To avoid possible security exposures, use this parameter only
within a secure local or internal network environment.
-nov
Omits the progress status information when the esscli command is being
executed. The -nov flag is optional.
-p Password
Specifies the password that is authorized to execute the esscli command. The
-p flag, along with the -u flag, is required when you do not specify the -a flag.
The -p flag, combined with the -u flag, is not required if you specify the -a flag.
Make sure to use your password for the ESS Copy Services server when you
specify the list task, show task, and list pprcpaths parameters. Use your
password for the ESS Specialist Server when you specify all other parameters.
-s ServerAddr
Specifies the server IP address, DNS address, or host name of the requested
service. The -s flag is required.
As Table 1 on page 37 shows, you must specify the Copy Services server
address when you use this name-value pair as part of the argument for the
list task, show task, and list pprcpaths parameters. Specify the ESS
Specialist server address when you use it for all other parameters.
Note: Make sure to use your user name and password for the ESS Copy
Services server when you specify the list task, show task, and list
pprcpaths parameters. Use your user name and password for the ESS
Specialist server when you specify all other parameters.
36
|
|
Parameter Name
Required IP
Address
list server
1.5.2.63
list volumespace
1.5.2.63
list diskgroup
1.5.2.63
list port
1.5.2.63
set port
2.0.0.*
list volume
1.5.2.63
|
|
|
create/set volume
1.5.2.63 (fixed-block
only) 2.2.0.* and
3380 in 2.3.0
list pav
2.0.0.*
create/delete pav
2.0.0.*
list volumeaccess
1.5.2.63
|
|
create/delete/set
volumeaccess
1.5.2.63
list hostconnection
1.5.2.63
|
|
create/set/delete
hostconnection
1.5.2.63
list log
2.0.0.*
list task
show task
list pprcpaths
list featurecode
2.1.0.*
list webuseraccount
2.0.0.*
|
|
create/set/delete
webuseraccount
2.0.0.*
show remotesupport
2.0.0.*
set remotesupport
2.0.0.*
show email
2.0.0.*
|
|
create/set/delete
email
2.0.0.*
show pager
2.0.0.*
|
|
create/set/delete
pager
2.0.0.*
show snmp
2.0.0.*
|
|
create/set/delete
snmp
2.0.0.*
list perfstats
2.0.0.*
|
|
create/delete
perfstats
2.3.0.
list/show problem
2.0.0.*
delete problem
2.0.0.*
Minimum Access
37
|
|
Parameter Name
Required IP
Address
|
|
create/delete
volumespace
|
|
|
* Indicates that this is the minimum required LIC level. More recent LIC levels are also
supported for these parameters.
Minimum Access
-ssl
Establishes a secure connection to the ESS Specialist server and indicates that
the esscli command is encrypted. The -ssl flag is optional, but it is on by
default.
-debug
Displays the stack trace of an exception only if the -v optional flag is specified.
Under all other circumstances, the stack trace is not displayed unless a java
error occurs.
-nodebug
Turns off the debug function if it has been defined in the access file. The default
is nodebug.
|
|
|
-u UserName
Specifies the user name that is authorized to execute the esscli command. The
-u flag, along with the -p flag, is required when you do not specify the -a flag.
The -u flag, combined with the -p flag, is not required if you specify the -a flag.
Note: Make sure to specify your user name for the ESS Copy Services server
when you specify the list task, show task, and list pprcpaths
parameters. Specify your user name for the ESS Specialist Server for all
other parameters.
-v Displays the progress status information when the esscli command is being
executed. The entries in the output all start with trc for diagnosis and
troubleshooting purposes. The -v flag is optional.
38
list hostconnection
Displays all host initiators that are known to an ESS and assigned to SCSI-3
and fibre-channel host connections.
set hostconnection
Modifies one or more attributes of an existing initiator. The attributes include the
worldwide name, the host name, or associated ports of an initiator. Specify this
parameter for fibre-channel attached host connections only.
list log
Returns an audit log about all the configuration operations that were performed
using the ESS Specialist in the past 10 days.
create pav
Configures one or more PAVs for a CKD base volume. The total number of
PAVs and base volumes in an LSS cannot exceed 256.
list pav
Displays information about PAVs configured for a particular logical subsystem or
logical volume in an ESS. You can configure one or more PAVs for each base
(non-PAV) volume in a LSS, but the total number of base and PAV volumes in
an LSS cannot exceed 256.
delete PAV
Removes one or more existing parallel access volumes (PAVs) for a CKD base
volume.
list pprcpaths
Displays the status of each established PPRC path between a source and one
or more target logical subsystems.
list port
Displays information about all host adapter ports installed in an ESS server. A
host adapter port enables the attachment of a host to the ESS through a SCSI,
ESCON, or fibre-channel protocol.
set port
Modifies the configuration properties of a fibre-channel-only host adapter port,
such as assigning a topology or protocol to an unconfigured port.
list server
Displays storage server information. You can specify the optional ess=EssId pair
to filter the output list and display information about a specific server.
list task
Generates a report about all defined tasks in the Copy Services task repository.
show task
Displays all available information, such as source and target volumes, about
one or all Copy Services tasks. You can specify the optional name=TaskName
name-value pair to query a particular task or leave it out to query all tasks in
the repository.
create volume
Allocates one or more logical volumes of the same size within the ESS. There
must be one or more volume spaces defined in the ESS, with sufficient
available (free) capacity to fit the volumes to be allocated. You can explicitly
indicate the location of the volumes by specifying where the volume spaces are
to be allocated, or you can implicitly indicate the location by specifying the
logical subsystems where the volumes spaces are to be allocated (in which
case, all volume spaces that are associated with the specified LSSs are eligible
for the allocation). You can further determine the location of the volumes by
Chapter 2. Using the Storage Management CLI command
39
specifying the redundancy characteristics that are required for the volumes and
by specifying a placement algorithm for allocating multiple volumes over
multiple volume spaces.
list volume
Displays information about one or more fixed-block (FB) or count key data
(CKD) volumes within an ESS server. You specify either the voltype=VolType
name-value pair to query about volumes of a particular type, or the lss=LssId
name-value pair to query the volume associated with a particular logical
subsystem.
set volume
Modifies the label of an existing volume in an ESS server.
create volumeaccess
Assigns one or more volumes to an initiator. LUN IDs are automatically
assigned by the ESS. Specify multiple volume IDs for the vol=VolId
name-value pair to assign volumes to an initiator.
delete volumeaccess
Removes one or more volume access definitions. You can specify vol=all to
remove all volume accesses to an initiator or vol=VolId to remove a particular
volume access. You can specify multiple volume IDs to remove more than one
volume access at a time. If you specify a volume access ID that is not assigned
to an initiator, you will receive a warning message to that effect, but the
command will still return with a successful status code.
list volumeaccess
Displays LUN assignments for a specific FB volume, initiator, or all volumes,
including the unexposed ones that are associated with open-systems hosts.
Volume size is reported in gigabytes. Volume and LUN identifiers are reported
as hexadecimal characters (0 - 9 and A - F). You can specify this parameter to
see the assignments of up to 256 LUNs or 4096 LUNs if your host system
supports the report LUNs SCSI command.
list volumespace
Lists information about configured storage space. A volume space represents a
contiguous space from which storage volumes are allocated. For the ESS, a
volume space is a RAID array or a non-RAID (JBOD) disk. When a disk group
is configured as a RAID array, one volume space is created. When a disk group
is configured as non-RAID, up to eight volume spaces are created, one for each
disk in the group. Disk groups are configured using the ESS Specialist.
create volumespace
Creates configured storage space. A volume space represents a contiguous
space from which storage volumes are allocated. For the ESS, a volume space
is a RAID array or a non-RAID (JBOD) disk. When a disk group is configured
as a RAID array, one volume space is created. When a disk group is configured
as non-RAID, up to eight volume spaces are created, one for each disk in the
group. Disk groups are configured using the ESS Specialist.
delete volumespace
Deletes configured storage space. A volume space represents a contiguous
space from which storage volumes are allocated. For the ESS, a volume space
is a RAID array or a non-RAID (JBOD) disk. When a disk group is configured
as a RAID array, one volume space is created. When a disk group is configured
as non-RAID, up to eight volume spaces are created, one for each disk in the
group. Disk groups are configured using the ESS Specialist. Because the
command returns before the actual volume space is formatted, delete and
40
create perfstats
Sets up a particular client to receive performance statistics from an ESS.
Enabling statistics collection allows you to retrieve cache and rank statistics
from the ESS. When initializing the data collector, you must provide an output
directory where the collected statistics can be stored in a file that is created by
the Storage Management CLI. The command finishes when the data collector is
notified that the entry has been deleted. This command does not stop until it is
disabled. The ESS Storage Management CLI automatically assumes that if the
host name and port information are not specified, it must automatically create
one for you. If you attempt to set up performance statistics for another machine,
performance statistics are automatically sent to the registered machine. The
create perfstats command accepts multiple receivers. Multiple hosts can
receive performance statistics at the same time.
41
delete perfstats
Notifies the host that the registration for receiving performance statistics has
been deleted. You can perform this command on the same host system, but
from a different DOS session.
|
|
|
|
show remotesupport
Displays the current settings set for the ESS remote support. These settings
indicate whether incoming and outgoing calls are enabled.
set remotesupport
Modifies or sets the remote support properties that are available in the ESS.
You can set the call home and remote access properties, as well as the service
and PE passwords.
show email
Displays all the information regarding e-mail addresses that are configured for
problem notification. This command produces the e-mail addresses and the
corresponding error notification trigger value. That value indicates the types of
problems for which the e-mail address is notified.
create email
Adds a new e-mail address to the problem notification configuration.
delete email
Removes an e-mail address from the current problem notification configuration.
set email
Modifies an existing e-mail address and its corresponding options. For example,
you can change the trigger options on an existing e-mail address or can
rename the existing e-mail address with a new address. You can also change
the global settings of e-mails, such as the maximum number of e-mails that are
sent per problem or test e-mails that are sent.
show pager
Displays a list of all pagers, along with all related information and global pager
settings.
create pager
Adds a new pager number to the problem notification configuration. The phone
field is required, as well as the pin number, if one exists. The pin is not
required.
delete pager
Removes a pager from the current problem notification configuration.
set pager
Modifies existing pager information. The pager number and pin are required to
locate the entry to be modified. Use this set command to update the global
properties of pagers.
show snmp
Displays a list of all SNMP traps and the contact information that is currently
configured for problem notification.
create snmp
Adds trap addresses to the existing problem notification configuration.
set snmp
Modifies existing SNMP information. This does not include the trap addresses.
At least one of the name=value pairs must be specified. This does not include
ess=EssId.
42
delete snmp
Deletes trap addresses from the SNMP problem notification configuration.
list problem
Lists all outstanding problems that are active on the ESS. The list problem
parameter produces a table that displays the problem ID, cluster, and
description of each active problem on the ESS.
show problem
Shows the active problems on the ESS. The ESS constantly monitors the
operation of its internal components and logical resources. If it detects an
abnormal condition, the ESS creates an entry in the problem log. The show
problem parameter enables you to view the currently active problem log
records.
delete problem
Cancels any outstanding problems that are active on the ESS. The delete
problem parameter cancels the active problem on the ESS so that the ESS
performs correctly for configuration changes or noncurrent code loads.
async=on | off
Indicates whether or not the asynchronous PPRC statistics are displayed. When
this flag is specified, only asynchronous PPRC statistics are displayed. This
argument automatically changes the frequency from minutes to seconds.
cap=Gigabytes
Defines the size of a FB volume to be allocated. Specify the size, in gigabytes
(GB), as a floating point value, with only a single digit after the decimal point,
for example, cap=27.9.
Use this name-value pair as part of the argument for the create volume
parameter only.
cyls=Cylinders
Defines the size of a CKD volume to be allocated. Specify the size, in cylinders,
as an integer value, for example, cyls=3339.
Use this name-value pair as part of the argument for the create volume
parameter only.
ess=EssId
Identifies the ESS. The ESS ID format is machine type.serial number; that is,
the machine type number is followed with a period delimiter and then by the
machine serial number, for example, ess=2105.FA123.
host=HostName
Specifies the name of a host system connected to an ESS. Each of the host
names, up to 30 characters in length, must be unique. If a host name contains
spaces, make sure to enclose it in single-quotation marks, for example,
host=ess test.
init=WwName
Defines the worldwide port name (WWPN) for an initiator. The initiator name
must be exactly 16 hexadecimal characters (0 - 9, a - f, A - F) in length and
unique among all initiator names defined for an ESS.
Chapter 2. Using the Storage Management CLI command
43
label=VolLabel
Identifies the label for a particular logical volume. Specify the volume label, up
to eight characters in length, as part of the argument for the set volume
parameter only.
lss=LssId1,...
Specifies one or more ESS logical subsystem (LSS) identifiers. Each LSS ID
contains one or two hexadecimal characters. The range of its valid value is 0
<= LssId <= 15 for CKD logical subsystems or 16 <= LssId <= 31 for FB logical
subsystems.
name=LogName
Identifies the log file that records userid-specific configuration activities. Use this
name-value pair as part of the argument for the list log parameter only.
name=TaskName
Identifies the Copy Services task to be displayed. Use this name-value pair as
the argument for the show task parameter only.
newhost=HostName
Assigns a new name to an existing host system for an ESS. Each of the host
names, up to 30 characters in length, must be unique. If a host name contains
spaces, make sure to enclose it in single-quotation marks, for example,
host=ess test.
Use this name-value pair as part of the argument for the set hostconnection
parameter only.
newinit=WwName
Assigns a new WWPN to an existing initiator for an ESS. The initiator name
must be exactly 16 hexadecimal characters (0 - 9, a - f, A - F) in length and
unique among all initiator names defined for an ESS.
Use this name-value pair as part of the argument for the set hostconnection
parameter only.
newport=all | PortId1,...
Defines new ports to an existing initiator. You can specify the default ports=all
to turn off port assignment filtering and allow the initiator to access an ESS
through any of the installed fibre-channel ports. You can also assign specific
ports to an initiator by specifying their identifiers. Table 2 on page 45 lists the
valid port identifiers for the host adapter ports of an ESS.
Use this name-value pair as part of the argument for the set hostconnection
parameter only.
pav=VolId
Specifies an ESS logical volume that is associated with a PAV. The VolId value
is the same as that in the volume=VolId pair.
placement=seq | spread
Specifies the algorithm for organizing volumes if multiple volumes are being
allocated and if multiple volume spaces are eligible for the allocation. If you
specify placement=seq, the allocated volumes will be sequentially placed, filling
up the first volume space before trying the next. If you specify the default
placement=spread, the allocated volumes will be randomly placed, filling up any
eligible volume spaces.
Use this name-value pair as part of the argument for the create volume
parameter only.
44
ports=all | PortId1,...
Assigns ports to an initiator. You can specify ports=all to turn off port
assignment filtering and allow the initiator to access an ESS through any of the
installed fibre-channel ports. You can also assign specific ports to an initiator by
specifying their identifiers. Table 2 lists the valid port identifiers for the host
adapter ports in an ESS.
Table 2. Identifiers for ESS host adapter ports
Port ID (hex)
Bay
Adapter
Port
00
01
04
05
08
09
0C
0D
20
21
24
25
28
29
2C
2D
80
81
84
85
88
89
8C
8D
A0
A1
A4
A5
A8
A9
AC
AD
profile=ProfileName
Defines the platform (hardware) and operating system (software) of a host
system. Table 3 on page 46 lists the valid profile names.
Chapter 2. Using the Storage Management CLI command
45
Use this name-value pair as part of the argument for the create
hostconnection parameter only.
Table 3. Profile names for host systems
Profile Name
Description
aix
dgux
dynix
hpux
irix
iscsigate
linux
linuxppc
linux390
lodestone
netware
newport_a
newport_b
nt4
openvms
os400
solaris251
solaris26
tru64
sunmpxio
Sun MPXIO
protocol=FCP | FICON
Defines the configured protocol type. You can specify protocol=FCP for FB
volumes attached to open-systems hosts or protocol=FICON for CKD volumes
attached to zSeries hosts. The default type for a fibre-channel port is FCP.
qty=max | Quantity
Specifies the number of volumes or parallel access volumes (PAVs) to create. If
you specify qty=max, you must allocate PAVs for all remaining volume
addresses in the LSS. If you specify qty=Quantity, the quantity must be an
integer value.
Use this name-value pair as part of the argument for the create volume and
create pav parameters only.
redundancy=raid5 | raid10 | nonraid
Specifies the storage type of a volume space, with RAID5 as the default type.
Use this name-value pair as part of the argument for the create volume
parameter only.
srclss=LssId
Specifies the LSS about which you want to display information. Each LSS ID
contains one or two hexadecimal characters. The range of its valid value is 0
<= LssId <= 15 for CKD logical subsystems or 16 <= LssId <= 31 for FB logical
subsystems.
46
Use this name-value pair as part of the argument for the list pprcpaths
parameter only.
topology=P2P | FCAL | undefined
Specifies the type of fibre connection to a particular fibre-channel port. Valid
topology types are undefined, Point-to-Point (P2P), and fibre-channel arbitrated
loop (FCAL), with P2P as the default value.
voltype=VolType
Specifies the ESS logical volume type. Table 4 lists the valid ESS logical
volume types.
Table 4. ESS logical volume type identifiers
Volume Type
Description
AS400*
AS400U*
FB
A fixed-block volume, the default volume type, that can be mixed with
both AS/400-protected and AS/400-unprotected volumes in the same
volume space
3380
An IBM Eserver zSeries volume, with 3390 track format in 3380 track
emulation mode, that does not tolerate mixed volume types in the same
volume space
3390
An IBM Eserver zSeries volume, with 3390 track format, that does not
tolerate mixed volume types in the same volume space
* AS400 and AS400U are only for the command create volumes. These volume types
cannot be used with the create volumespace command.
47
48
accfile=Accessfile
Allows the client to directly hide the password from the user. The user can use
this entry in place of the following parameters: svcpwd, newpwd, newuser, pin,
newpin, and pwd.
pepwd=reset
Generates and displays a new PE password.
addr=EmailAddress
Indicates the e-mail address that is being used for the display.
addr=IpAddr1, IpAddr2, ...
Indicates the SNMP IP address. You can enter more than one IP address for an
SNMP trap.
trigger= info | err | all | none
Indicates the level that the messages be sent to the specified e-mail address.
newaddr=EmailAddress
Allows you to create a new address of this object.
newtrigger= info | err | all | none
Allows you to create a new trigger level to the specified e-mail.
test=yes | no
Indicates that you want to test the newly created information. You can test
e-mail, pager, or SNMP traps.
phone=PhoneNum
Indicates the pager number of the client pager.
pin=PinNum
Indicates the specified pin number of the client pager.
newuser=Username
Indicates the new user name of the pager number that you are specifying.
newphone=Phonenum
Indicates the new pager number of the client pager.
newpin=PinNum
Indicates the new pin number of the pager.
newpwd=PagerPwd
Indicates the new pager password of the client pager. This is used with the
pager user name.
newtype=numeric | alphanum
Indicates the new type of pager that is associated with the pager number that
you are using.
status=enabled | disabled
Indicates the status of the specified pager.
max=MaxTraps
Gives you the ability to change the number of SNMP traps that are sent per
problem.
max=MaxEmails
Gives you the ability to change the number of e-mails that are sent per
problem.
max=MaxPager
Gives you the ability to change the number of pager notifications that are sent
per problem.
Chapter 2. Using the Storage Management CLI command
49
comname=CommunityName
Indicates the contact information of the community that the ESS is located in.
contact=Contactname
Indicates the contact information of the ESS.
location=SystemLocation
Indicates the system location of the ESS.
mibread=enabled | disabled
Indicates the ability to have read access to the ESS. You can enable or disable
read access to the Management Information Base.
traps=enabled | disabled
Indicates the ability to enable or disable generic SNMP traps.
esstraps=enabled | disabled
Indicates the ability to enable or disable SNMP traps.
duration=TimeInHours
Indicates the duration that performance statistics are collected. The default is 24
hours.
Examples
This section includes sample reports for each of the esscli command parameters.
These samples are for reference only; the actual reports and contents vary based
on your command specifications.
esscli list diskgroup
The following sample report is similar to what you see when you issue the
esscli list diskgroup -d "ess=2105.FA123" command:
Sun Aug 11 02:23:49 PST 2002 IBM ESSCLI 2.1.0.8
DG
--dg1
dg2
dg4
dg5
dg6
Redundancy
---------raid5
raid10
raid10
undefined
raid5
The fields in this output are described in Table 5. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,dg,loc,raid,width,cap,rpm,dd, status"
Table 5. Output fields for the list diskgroup parameter
50
Name
Identifier
Value
Description
Server
server
10 characters
DG
dg
char[1...4]
Redundancy
raid
Identifier
Value
Description
Width
width
DCap
dcap
9.1 | 18.2 |
36.4 | 72.8 |
145.6
RPM
rpm
Members
dd
char[1...64]
Location
loc
char[1...6]
(AxPyGz)
Status
status
10 characters
|
|
|
|
Initiator
---------------3007ACF30A2399E1
***
3007ACF30A2399E2
3007ACF30A270012
3007ACF30A260012
3007ACF30A260013
3007ACF30A270014
Profile
--------HPUX
NOVELL
SOLARIS26
LINUX
AIX
AIX
NT4
Ports
--------00,80
AD
04,84
40,80,A0
ALL
ALL
04
The fields in this output are described in Table 6 on page 52. You can select
specific fields and determine their order for display by specifying field identifiers
in the optional -fmt "Format" parameter. The default format is as follows:
-fmt "host,profile,attach,init,ports"
51
Identifier
Value
Description
Initiator
init
16 hexadecimal
characters
Host
host
char[1..30]
Profile
profile
mixed characters
Ports
ports
char[1..256]
Attachment
attach
FC | SCSI
52
Name
Identifier
Value
Description
Type
type
16 hexadecimal
characters
Identifier
Value
Description
Date
date
char[1..10]
Time
time
char[1..12]
User
usr
char[1..15]
ID
msgID
4 characters
Msg
msg
char[1..256]
The fields in this output are described in Table 8. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,pav,lss,basevol"
Table 8. Output fields for the list pav parameter
Name
Identifier
Value
Description
Server
server
10 characters
PAV
pav
0000..1FFF
PAV identifier
53
Identifier
Value
Description
Lss
lss
00..0F
BaseVol
basevol
0000..0FFF
The fields in this output are described in Table 9. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "srclss,srcport,tgtserver,tgtlss,tgtport,conn,status,swid,swport"
Table 9. Output fields for the list pprcpaths parameter
Name
Identifier
Value
Description
SrcLss
srclss
00..1F
SrcPort
srcport
2 hexadecimal
characters
TgtServer
tgtserver
10 characters
TgtLss
tgtlss
00..1F
Conn
conn
Fabric | P2P
Status
status
2 hexadecimal
characters
TgtPort
tgtport
2 hexadecimal
characters
SwId
swid
Decimal number
Switch identifier
SwPort
swport
Decimal number
54
Description
A path is established.
Resources are not available at the primary site for the logical path
establishment.
Resources are not available at the secondary site for the logical path
establishment.
A path is offline due to lack of light detection from a host, peer, or switch.
0A
The port at the primary storage server cannot be converted to channel mode
because an inbound logical path is already established.
10
11
12
13
17
Loc
-----B1A1PA
B1A2PA
B2A3PA
B4A3PA
B4A3PB
WWN
---------------***
***
3007ACF30A2399E1
3007ACF30A2399E4
3007ACF30A2399E1
Status
----------operational
unconfigured
quiesced
failed
operational
The fields in this output are described in Table 11. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,port,loc,type,speed,protocol,topology,wwn,status"
Table 11. Output fields for the list port parameter
Name
Identifier
Value
Description
Server
server
10 characters
Port
port
2 hexadecimal
characters
55
Table 11. Output fields for the list port parameter (continued)
Name
Identifier
Value
Description
Loc
loc
6 characters
Type
type
FIBRE | SCSI |
ESCON
Adapter type
Speed
speed
xxMB | xxGB
Protocol
protocol
FCP | FICON
Topology
topology
P2P | FCAL |
undefined
WWN
wwn
16 hexadecimal
characters
Status
status
operational |
rebuilding | read-only
| failed
The fields in this output are described in Table 12. You can select specific fields
and determine which order you want them displayed by specifying field
identifiers in the optional -fmt "Format" parameter. The default format is as
follows:
-fmt "server,model,mfg,wwn,codeec,cache,nvs,racks"
Table 12. Output fields for the list server parameter
|
|
56
Name
Identifier
Value
Description
Server
server
10 characters
Model
model
3 characters
Table 12. Output fields for the list server parameter (continued)
Name
Identifier
Value
Description
Mfg
mfg
3 characters
WWN
wwn
16 hexadecimal
characters
CodeEC
codeec
char[1..9]
Cache
cache
Decimal number
Nvs
nvs
Decimal number
Racks
racks
Decimal number
|
|
|
The following sample report is similar to what you see when you issue the
esscli -s primary server show task -d nam=sdf command to display
information about all tasks:
57
|
|
|
|
|
|
|
|
|
The following sample report is similar to what you see when you issue the
esscli -s primary server show task -d name=async1 command to display
information about starting or resuming a task:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The fields in this output are described in Table 13. Additional fields might be
displayed based on specific Copy Services task types.
|
Name
Identifier
Value
Description
|
|
TaskName
TaskName
char[1...16]
TaskType
TaskType
char[1...30]
|
|
Options
Options
mixed
characters
|
|
|
SourceServer
SourceServer
10 characters
|
|
|
TargetServer
TargetServer
10 characters
|
|
SourceLSS
SourceLSS
00...1F
|
|
TargetLSS
TargetLSS
00...1F
|
|
|
SourceVol
SourceVol
char[4]
58
Name
Identifier
Value
Description
|
|
|
TargetVol
TargetVol
char[4]
Session ID
Session ID
1 - 255
|
|
|
ESS
Sequence
Number
ESS
Sequence
Number
char[5]
LSS Number
LSS Number
hexidecimal
|
|
Session
Volumes
Session
Volumes
hexidecimal
|
|
|
Master ESS
Sequence
Number
Master ESS
Sequence
Number
char[5]
|
|
Subordinate
Count
Subordinate
Count
0 - 16
|
|
|
Consistency
Consistency
0 - 32766
Group Interval Group Interval
Time
Time
|
|
|
|
|
|
Extended
Distance
Consistency
Max
Coordinates
Interval
Extended
Distance
Consistency
Max
Coordinates
Interval
50 - 32766
|
|
|
|
Max
Consistency
Group Drain
Time
Max
Consistency
Group Drain
Time
240 - 32766
|
|
Master
SSID(s)
Master SSIDs
char[5]
|
|
|
|
Subordinate
ESS
Sequence
Numbers
Subordinate
ESS
Sequence
Numbers
char[5]
|
|
|
Subordinate
SSID(s)
Subordinate
SSIDs
char[5]
Table 14 lists and describes the available options of ESS Copy Services tasks.
|
Option value
Description
|
|
AcceleratedDestageMode
|
|
Addvolumetosession
CascadingPPRC
|
|
|
CopyAllTracks
59
Option value
Description
|
|
|
CopyOutOfSyncTracks
Closesession
|
|
|
CriticalVolumeMode
|
|
|
|
DoNotCopyVol
|
|
|
DoNotDestageModifiedData
|
|
Donotmodify
|
|
DoNotRemovePPRCPathIfPairsExist
|
|
FibreAdapter
|
|
FlashCopyWithdrawToTarget
|
|
FlashCopyStartBackgroundCopy
FlashCopyConsistencyGroup
|
|
ForceRemovalOfPPRCPath
FreezeFlashCopyConsistencyGroup
|
|
|
|
InbandCommand
|
|
IncrementFlashCopy
|
|
InhibitWritesToTarget
|
|
IssueToPrimaryDevice
|
|
IssueToSecondaryDevice
Master
|
|
Modify
|
|
NoBackgroundCopy
|
|
NoForceEstablish
Opensession
60
Option value
Description
PersistentFlashCopy
PPRCConsistencyGroup
PPRCExtendedDistance
PPRCFailback
PPRCFailover
|
|
ReadFromSecondary
|
|
Removevolumefromsession
|
|
ReverseRestore
|
|
SecondaryOnlineOk
|
|
SingleDeviceSpecified
StartChangeRecording
Subordinate
|
|
|
SuspendAfterEstablish
|
|
|
|
|
|
Note: The output of this command is dependent on the ESS microcode version
that you are running. Recent versions (1.5.2.63 and later) indicate the
volume IDs of the volumes that were created successfully. Earlier
versions do not show this information.
esscli list volume
The following sample report is similar to what you see when you issue the
esscli list volume -d "ess=2105.FA123" command:
61
Cap
---3339
3339
10.1
8.6
Serial
-------DBA001
DBA002
A2CFA123
A01FA123
Label
------Anakin
Shmi
Qui-Gon
Sebulba
The fields in this output are described in Table 15. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,vol,cap,units,voltype,lss,vs,label, ssid"
Table 15. Output fields for the list volume parameter
|
|
Name
Identifier
Value
Description
Server
server
10 characters
Volume
vol
0000...1FFF
Cap
cap
Decimal number
Units
units
GB | Cyls
VolType
voltype
VS
vs
char[1...5]
Lss
lss
2 hexadecimal
characters (00...1F)
Label
label
char[1...8]
VolSer
volser
char[1...8]
SSID
ssid
up to 4 hexadecimal
characters
62
Note: The output of this command is dependent on the ESS version that you
are running. Recent versions will indicate the volume IDs that were
created successfully. Earlier versions will not show
esscli list volumeaccess
The following sample report is similar to what you see when you issue the
esscli list volumeaccess -d "init=3007ACF30A2399E1" command (with the
initiator option):
Sun Aug 11 02:23:49 PST 2002 IBM ESSCLI 2.1.0.8
Volume
-----1A45
1A46
1A47
LUN
Size(GB) Initiator
Host
---- -------- ---------------- ---0000
4.0 3007ACF30A2399E1 Sun1
0001
8.0 3007ACF30A2399E1 Sun1
0002
16.0 3007ACF30A2399E1 Sun1
The fields in this output are described in Table 16. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,vol,target,lun,sz,host,init,ports"
Table 16. Output fields for the list volumeaccess parameter
Name
Identifier
Value
Description
Server
server
10 characters
Volume
vols
0000...1FFF
LUN
lun
0000...5FFF
Size
size
Decimal number
Initiator
init
16 hexadecimal
characters
Host
host
char[1...30]
Target
target
Decimal number
Ports
ports
char[1...256]
63
The fields in this output are described in Table 17. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "server,vs,raid,cap,free,fmt,on,vols,lss,status, ssid"
Table 17. Output fields for the list volumespace parameter
64
Name
Identifier
Value
Description
Server
server
10 characters
ESS
ESS
10 characters
LSS
LSS
00...1F
VS
vs
char[1...5]
Redundancy
raid
Cap
cap
Decimal
number
Free
free
Decimal
number
Format
fmt
FB | 3390 |
3380
BasedOn
on
char[1...6]
Vols
vols
Decimal
number
(0..255)
Lss
lss
Status
status
operational |
rebuilding |
read-only |
failed
Table 17. Output fields for the list volumespace parameter (continued)
Name
Identifier
Value
Description
SSID
ssid
4 hexidecimal
characters
Cap Limit
12TB
12TB
12TB
12TB
Cap Used
1.8765TB
1.2345TB
1.8765TB
1.2345TB
Cap Types
S/390
S/390
ESS
ESS
The fields in this output are described in Table 18. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "code,desc,sn,cap,used,type"
Table 18. Output fields for the list featurecode parameter
Name
Description
Feature Code
Description
Serial Number
Cap Limit
65
Table 18. Output fields for the list featurecode parameter (continued)
Name
Description
Cap Used
Cap Types
The fields in this output are described in Table 19. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "user,acclvl,iprange,comments"
Table 19. Output fields for the list webuseraccount parameter
Name
Description
User Name
This field contains the user ID that you must enter in the user
authentication dialog box when you access the ESS through ESS
Specialist. The log appears in your Web browser after you enter the
address of the ESS and then click ESS Specialist in the ESS
Launch page. The case-sensitive name uniquely identifies a
particular user account.
Access Level
This field displays the following four levels of access to the ESS:
View Only
Allows you to view the operational status and configuration
information of the ESS.
Operation
Allows you to modify the remote service and PE password
settings on the ESS, in addition to the permissions of the
View Only access level.
Configuration
Allows you to make changes to the entire configuration
(including the remote service and PE password settings) of
the ESS, in addition to the permissions of the Operation
access level.
Administration
Allows you to administer user accounts, including defining
new user IDs, deleting old user IDs, and changing
passwords, in addition to the the permissions of the
Configuration access level.
66
Table 19. Output fields for the list webuseraccount parameter (continued)
Name
Description
IP Range
This field contains a log in address filter that is applied to the user
account for additional security. ESS CLI rejects any attempt by the
specified user to log in from a host outside of the assigned IP
address range.
Comments
This field contains an optional free-form field that can help identify
the person who is assigned the user account.
The fields in this output are described in Table 20 on page 68. You can select
specific fields and determine their order for display by specifying field identifiers
in the optional -fmt "Format" parameter. The default format is as follows:
-fmt "hostname, port, staus, and frequency"
67
Description
Host Name
Identifies the host name (IP address) of the host that is receiving
performance statistics
Port
Identifies the port number of the host where the incoming data is
sent
Status
Frequency
Identifies the interval that data collection uses for gathering data
and sending it to the host system
|
|
|
|
|
Note: The frequency cannot be less than 5. If you specify a number less than
5, esscli returns an error stating that the specified value is invalid.
|
|
|
68
Filename:
PStats_2105.22232_2003-07-29_13-50-MST_0.txt
ESSID
DATE
Disk Group Statistics: 4
=========================
TIMEZONE
Cluster
69
70
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
71
PPRC Statistics: 1
================
PPRC Link Performance Data: #0:
-------------------------------Stats Available
yes
TimeStamp:
Tue Jul 29 14:25:00 MST 2003
Interface ID:
0020
Link Type:
Fibre Channel 1 Gb/s
Byte Increment:
128K bytes
Time Increment:
16 milliseconds
ECKD Requests:
Read Byte Count:
2649
Write Byte Count:
1824
Read Operations:
47
Write Operations:
25
Read Time:
27492
Write Time:
48347
PPRC Requests:
Send Byte Count:
38932
Receive Byte Count: 28492
Send Operations:
3829
Receive Operations: 1948
Send Time:
28395
Receive Time:
27829
SCSI Requests:
Read Byte Count:
83728
Write Byte Count:
57386
Read Operations:
9382
Write Operations:
4839
Read Time:
4713
Write Time:
2782
|
|
|
Table 21 describes the fields in this output. You can select specific fields and
determine their display order by specifying field identifiers in the optional -fmt
"Format" parameter. The default format is as follows:
Name
Description
|
|
ess
|
|
outputdir
Identifies the directory where the collected statistics are stored. The
files are created automatically by the Storage Management CLI.
|
|
|
hostname
Identifies the host name of the client that receives the statistics that
are sent by the ESS. This is typically the IP address of the machine
that enables the data collector.
|
|
port
Identifies the port number from where the statistics are received.
The port number must be greater than 0.
|
|
frequency
Identifies the interval (in minutes) that the ESS sends statistics data
to the client machine.
|
|
|
duration
Identifies the range of time that you want the application to receive
performance statistics from an assigned ESS.
The following sample report is similar to what you see when you issue the
esscli -u user -p password create PerfStats -d "ess=serial hostname=name
port=1234 frequency=10 duration=1 async=on" command to view
asynchronous PPRC statistics:
|
|
|
|
|
72
Date/Time
Tue Apr-6-04 15:08:22
Machine
Fail
delta: name
0
cum:
name
0
Coord. Time
Interval Time
0 (ms)
0 (sec)
Success % Success
0
0
0
0
Max Drain Time
0 (sec),
|
|
|
Table 22 describes the fields in this output. You can select specific fields and
determine their display order by specifying field identifiers in the optional -fmt
"Format" parameter. The default format is as follows:
|
|
-fmt "Date, Machine, Coord Time (ms), Interval (sec), Drain (sec), Failed CGs,
Successful CGs, Percent Successful"
Name
Description
Date/Time
Machine
|
|
|
|
|
|
Interval (sec
|
|
|
|
|
Drain (sec)
Failed CGs
Successful CGs
Percent Successful
Delta
|
|
|
Cum
Total of all of the queries for the fail, success, and percent success
statistics.
|
|
|
|
|
73
The fields in this output are described in Table 23. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "addr, trigger"
Table 23. Output fields for the show email parameter
|
|
Name
Description
Address
Trigger
74
The fields in this output are described in Table 24. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "user, phone, pin, status, type"
Table 24. Output fields for the show pager parameter
Name
Description
UserName
Phone
Pin
Status
Type
75
The fields in this output are described in Table 25. You can select specific fields
and determine their order for display by specifying field identifiers in the optional
-fmt "Format" parameter. The default format is as follows:
-fmt "addr, comname, contact, location, mibread, traps, esstraps, maxtraps"
Table 25. Output fields for the show snmp parameter
Name
Description
Trap Addresses
System Community
Name
System Contact
System Location
Generic Traps
ESS Traps
76
Description
ProbId
Clust
Description
77
Description
ProbId
Reporting Cluster
Problem Description
Problem Age
Identifies the date and time of the first and last occurrence of this
problem, provides an indication of how often it occurred, and if it
occurred more than once.
Problem Status
Service Status
User Action
Probably Cause
Additional Info
|
|
|
|
|
|
When you configure a component of the ESS, that resource will be locked so
another client (CLI or Specialist) cannot modify it at the same time. Having two
clusters allows you to use the other cluster to configure the ESS if the first cluster
fails.
|
|
|
|
|
|
|
|
Notes:
1. The second cluster (and its Specialist) exists for failover purposes only. Do not
concurrently use Specialist and other clients (CLI, Expert, and so forth.) against
both clusters. Use only one cluster for all configuration activity. Switch over to
the second cluster only if the first cluster becomes unavailable.
2. Coordinate your configuration activity to avoid conflicting and overlapping
updates. For maximum efficiency and to ensure no conflicts, make sure that
only one configuration change request is in progress at a time.
|
|
|
|
Although the resource is locked while it is being modified (which prohibits any other
client from using that resource at the same time), you can configure Copy Services
using one Web browser and concurrently configure other ESS components as long
as they are not associated with the Copy Services function being modified.
78
Category
Description
Success
Parameter error
Communication error
Timeout
Version mismatch
User error
User-specific errors
Server exception
Client-side error
79
003
009
Action: None
004
|
|
|
010
|
|
|
|
|
102
007
80
104
109
81
121
126
123
129
124
130
125
140
82
145
83
301
403
84
501
505
506
511
85
512
86
518
523
533
528
87
534
540
538
88
548
89
552
558
Action: You can list the problems on the ESS and find
the entry for the problem you are attempting to delete.
You can then use the corresponding problem ID to
specify the problem to be deleted.
553
559
90
|
|
560
|
|
|
|
|
|
|
561
|
|
|
|
603
605
610
606
Registration failed.
91
612
701
613
702
| 616
|
|
92
706
93
94
Description
The Copy Services CLI provides six commands for you to monitor and manage
predefined ESS Copy Services tasks. Table 29 briefly lists the commands and
describes the name variations of each command.
Table 29. Summary of Copy Services CLI commands
Name
Description
Details (Page)
rsExecuteTask
rsExTask (See
Note)
97
rsList2105s
rsL2105s (See
Note)
102
rsPrimeServer
Creates, updates, or removes a list view of
rsPSrv (See Note) volumes associated with a particular host in the
ESS Copy Services server. You can see the same
view in the Volumes panel of the ESS Copy
Services Web-based interface.
103
rsQuery
rsQ (See Note)
105
rsQueryComplete
rsQComp (See
Note)
109
rsTestConnection
rsTConn (See
Note)
111
99
Note: This command applies to a Novell Netware 4.2 host system only.
General guidelines
Follow these general guidelines when you use the Copy Services CLI commands:
v To use the commands on all but OpenVMS Alpha host system, open a Shell or
DOS command prompt and change to the directory where you have installed the
Copy Services CLI. On an OpenVMS Alpha host system, you can invoke the
commands from any directory.
Copyright IBM Corp. 2001, 2004
95
v Issue the commands exactly the way as they are shown in the syntax diagrams.
The Copy Services CLI commands and parameters are case-sensitive on all but
the OpenVMS Alpha and Windows host systems. You can issue the commands
in lower, upper, or mixed cases on an OpenVMS Alpha or Windows host system.
v Use the name of each command appropriate to your host system as described in
Table 29 on page 95 and Table 30. The names of all the Copy Services CLI
commands for a Novell Netware 4.2 system differ slightly from those for other
supported host systems. For example, use rsExTask, instead of rsExecuteTask
on a Novell Netware 4.2 system.
|
Table 30. Platform-based notation conventions for Copy Services CLI commands
|
|
|
Commands
|
|
|
|
|
|
|
|
|
|
|
|
rsExecuteTask
rsList2105s
rsPrimeServer
rsQuery
rsQueryComplete
rsTestConnection
rsFlashCopy
Query*
File
ext.
Flag
.sh
ParaHost systems
meter
Example
rsExecuteTask.sh -a
securityfilepath -s
primaryservername
es_pair_12
OpenVMS Alpha
rsExecuteTask -a
"securityfilepath" -s
"primaryservername"
"es_pair_12"
|
|
|
|
.exe
Windows NT,
Windows 2000,
Windows 2000
Datacenter
rsExecuteTask.exe /a
securityfilepath /s
primaryservername
es_pair_12
|
|
|
|
.nlm
rsExecuteTask.nlm /a
securityfilepath /s
primaryservername
es_pair_12
.nlm
Novell 4.2
rsExTask.nlm /a
securityfilepath /s
primaryservername
es_pair_12
.sh
rsFlashCopyQuery.sh -a
securityfilepath -s
primaryservername
es_pair_12
.exe
Windows NT,
Windows 2000,
Windows 2000
Datacenter
rsFlashCopyQuery.exe /a
securityfilepath /s
primaryservername
es_pair_12
|
|
|
|
|
|
rsExTask
rsL2105s
rsPSrv
rsQ
rsQComp
rsTConn
|
|
|
|
rsFlashCopy
Query*
|
|
|
|
|
v Suffix each command with an executable file extension (for example, sh, exe, or
nlm) when using it on host systems other than OpenVMS Alpha. See Table 30 for
detailed descriptions and examples.
v Place the username, password, taskname, and hostname parameters inside
quotation marks when specified on an OpenVMS host system. These parameters
are passed to the ESS server where they are handled in a case-sensitive
manner. See Table 30 for examples.
v Prefix each command flag with a minus (-) or slash (/) symbol. See Table 30 for
more information.
v If necessary and authorized, use the Administration panel of the ESS Copy
Services Web-based interface to manage the user ID and password for a host
96
system that uses the Copy Services CLI. If you enable the password-protection
option on the ESS Copy Services server, you must specify one of the following
flags when issuing the Copy Services CLI commands on a host system:
Both the u flag with the username parameter and the p flag with the password
parameter
The a flag with the securityfilepath parameter. The securityfilepath file contains
both the user name and the password. Use this option for additional security.
See IBM TotalStorage Enterprise Storage Server: Web Interface Users Guide for
detailed instructions about how to define and remove the CLI user name and
password.
v When using commands other than rsList2105s, specify the s flag, the b flag, or
both based on the following scenarios:
The server that is specified by the s flag is the server that the CLI makes
connection to first. The server, specified by the b flag is an alternate server
that the CLI will makes connection to if it fails to make connection to the
server that is specified by the s flag.
In primary and backup server environment, the s flag is the primary server
and the b flag is the backup server.
In dual active server environment with both servers are active, the s flag is
serverA and the b flag is serverB
In mixed environment with a dual active server and a non-active backup
server, the s flag is the dual active server and b flag is the backup server
Specify only the s flag with a server to check the connection to this server. If
the command can establish a connection, the server starts processing it.
Otherwise, it fails.
Specify only b flag with an alternate server to check the connection to this
alternate server. If the command can establish a connection, the alternate
server starts processing it. Otherwise, it fails.
Specify both s and b flag with different servers to check connection to the
specified server with s flag. Check the alternate server that is specified with b
flag if the connection to the server that is specified with s flag fails.
If a CLI command can establish a connection to the server that is specified by
the s flag, it is sent to the server for processing. If the command fails to establish
a connection to the server that is specified by the s flag, the connection to the
alternate server that is specified by b flag is checked. If the command can
establish a connection to the alternate server specified by the b flag, it is send to
the alternate server for processing.
Restrictions:
Do not append an executable file extension to the Copy Services CLI
commands on an OpenVMS Alpha host system. The OpenVMS Alpha system
defines the Copy Services CLI programs as foreign command symbols and,
therefore, does not append any extension.
Do not issue more than 15 CLI commands simultaneously to the ESS. If you
want to run more than 15 commands, they must be run one after another
rather than at the same time to prevent memory exceptions.
|
|
|
|
|
|
|
|
rsExecuteTask
|
|
|
|
The rsExecuteTask command executes one or more ESS Copy Services tasks, as
defined and saved using the ESS Copy Services Web-based interface. The
command waits for the given tasks to complete processing, but will time out if not
completed within 15 minutes.
Chapter 4. Using Copy Services CLI commands
97
Syntax
The following is the complete syntax of the rsExecuteTask command. See Syntax
diagrams on page ix for syntax reading instructions.
rsExecuteTask
rsExTask
-u
/u
-a
/a
-s
/s
.sh
.exe
.nlm
-v
/v
username
-p
/p
securityfilepath
password
primaryserver
tasknames
-b
/b
backupserver
98
tasknames
Specifies the name of one or more previously saved ESS Copy Services tasks.
Separate the task names with a space when you specify more than one task.
This parameter does not require a flag.
u username
Specifies the user name that is authorized to execute the Copy Services CLI
commands. The u flag with the username parameter is required if the
administrator for the ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
v
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
When you invoke the rsExecuteTask command on an AIX host system, output
similar to the following is displayed:
# ./rsExecuteTask.sh -v -u yourusername -p yourpassword -s primaryservername es_pair_12
rsExecuteTask: Got task manager reference
rsExecuteTask: *************Finding the tasks****************
rsExecuteTask: Task es_pair_12 found by task manager
rsExecuteTask: *************Scheduling the tasks****************
rsExecuteTask: Task es_pair_12 scheduled with copy services server
rsExecuteTask: *************Monitoring the tasks****************
rsExecuteTask: Waiting on server...
rsExecuteTask: Task es_pair_12 completed successfully
rsExecuteTask: Command successful
rsFlashCopyQuery
The rsFlashCopyQuery command synchronously queries the user-specified volume
or group of volumes to retrieve FlashCopy data. This data includes FlashCopy
peers, out-of-sync tracks, sequence numbers, date established, date synced, and
attributes.
|
|
|
|
|
Syntax
|
|
|
|
rsFlashCopyQuery
|
|
-u
/u
-a
/a
username
|
|
-q
/q
-f
/f
volumename
.sh
.exe
-p
/p
securityfilepath
-v
/v
password
filename
99
-s
/s
primaryserver
-b
/b
backupserver
|
|
|
|
You can specify one or more of the following flags and parameters when you issue
the rsFlashCopyQuery command:
|
|
|
|
|
|
|
a securityfilepath
Specifies the full path to the file that contains the user name and password that
are defined at the ESS Copy Services server for using Copy Services CLI
commands on a host system. The a flag with the securityfilepath parameter is
required if the administrator for the ESS Copy Services server has enabled
password protection for CLI commands and if the u and p flags and associated
parameters are not used.
username password
f filename
Specifies the name of a file that contains vpath names, host volume names,
and volume serial numbers, all of which are to be queried. Use the f flag with
the filename parameter if the q flag with the volume parameter is not used.
|
|
|
|
|
|
|
|
|
sourceVolumeN targetVolumeN
or
volume1
volume2
volume3
...
volumeN
|
|
|
|
|
|
|
|
|
b backupserver
Specify the IP address or the complete host name of an alternate ESS Copy
Services backup server. The b flag with the backupserver parameter is optional.
|
|
|
|
|
|
p password
Specifies the password of a user name that is authorized to execute the Copy
Services CLI commands. The p flag with the password parameter is required if
the administrator for the ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
|
|
|
|
s primaryserver
Specifies the IP address or the complete host name of a ESS Copy Services
server. Before you use the s flag with primaryserver parameter, you must
identify and configure an ESS Copy Services server.
|
|
|
|
q volumename
Specifies the vpath name, host volume name, or volume serial number. Use the
q flag with the volume parameter if the f flag with the filename parameter is not
used.
100
|
|
|
Use the m flag if you use the rsQuery command for the vpath name or host
volume name. Do not use the m flag if you use the rsQuery command for a
serial number.
|
|
|
|
|
|
u username
Specifies the user name that is authorized to execute the Copy Services CLI
commands. The u flag with the username parameter is required if the
administrator for the ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
|
|
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
|
|
The following example shows the output that you see when you invoke the following
command:
|
|
The sample output contains one of the following fields and values:
|
|
|
State
Peer
|
|
|
|
|
Sequence Number
Specifies the user-specified ID for the FlashCopy pair. This ID must
be greater than 1 and less than 256.
|
|
Date Established
Specifies the date when the FlashCopy was established.
Date Synced
Specifies the date when the last background copy was completed.
Attributes
101
rsList2105s
The rsList2105s command displays the mapping of a host disk name to a 2105
volume serial number.
If you have the IBM Subsystem Device Driver (SDD) running on a host system
other than Linux, NUMA-Q, Tru64, and OpenVMS and if you have changed the
configuration for the host, you must restart the host so that the SDD can recognize,
add, or remove the paths.
If you use the rsList2105s command on an OpenVMS Alpha host system that is a
member of an OpenVMS cluster, the output does not display information about the
following devices:
v ESS volumes to which the host system has only MSCP paths
v ESS volumes to which the host system uses only MSCP paths at this time even
though it has both MSCP and direct paths.
Syntax
The following is the complete syntax of the rsList2105s command. See Syntax
diagrams on page ix for syntax reading instructions.
rsList2105s
rsL2105s
.sh
.exe
.nlm
Examples
If SDD is installed, output similar to the following is displayed when you invoke the
rsList2105s command on an AIX host system:
>./rsList2105s.sh
VpathName
----------vpath10
vpath11
vpath13
vpath14
Serial
-----40EFC102
40FFC102
40CFC102
40DFC102
VolumeNames
----------hdisk14
hdisk15
hdisk17
hdisk18
If SDD is not installed, output similar to the following is displayed when you invoke
the rsList2105s command on an AIX host system:
102
>./rsList2105s.sh
disk name
--------hdisk14
hdisk15
hdisk17
hdisk18
rsPrimeServer
The rsPrimeServer command creates, updates, or removes a list of volumes
associated with a particular host in the ESS Copy Services server. You can see the
same list in the Volumes panel of the ESS Copy Services Web-based interface.
This command is useful when you use the ESS Copy Services Volumes panel to
perform FlashCopy, PPRC, or both functions. In a single view, it shows the names
of all hosts that are connected to the same volume.
If SDD is installed on your host system and if you have changed the configuration
for the host, such as adding or removing volumes, you must perform the following
steps:
1. Restart your host system so that SDD can recognize, add, or remove the paths.
2. Run the rsPrimeServer command to generate the current mapping for the host
volumes.
If SDD is not installed on your host system and if you have changed the
configuration for the host, such as adding or removing volumes, you must run the
rsPrimeServer command to generate the current mapping for the host volumes.
If you use the rsPrimeServer command on an OpenVMS Alpha host system with
MSCP-only access to some ESS volumes, these volumes are not shown in the
host-specific list of volumes in the ESS Copy Services server.
Note: This command sometimes times out if it is not completed within 15 minutes.
Syntax
The following is the complete syntax of the rsPrimeServer command. See Syntax
diagrams on page ix for syntax reading instructions.
rsPrimeServer
rsPSrv
-u
/u
-a
/a
username
.sh
.exe
.nlm
-p
/p
securityfilepath
-v
/v
password
-d
/d
hostname
103
-s
/s
primaryserver
-b
/b
backupserver
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
The following example shows the output that you see when you invoke the
rsPrimeServer command to add a host name on an AIX host system:
104
The following example shows the output that you see when you invoke the
rsPrimeServer command to delete a host name on an AIX host system:
# ./rsPrimeServer.sh -v -u yourusername -p yourpassword -d abc.def.ghi.com
-s primaryservername
rsPrimeServer: host to unregister is abc.def.ghi.com
rsPrimeServer: Got task manager reference
rsPrimeServer: Host abc.def.ghi.com unregistered
rsPrimeServer: Configuration change requested made to primaryserver
rsPrimeServer: Command successful
rsQuery
The rsQuery command queries the status of one or more volumes.
You can invoke the rsQuery command for the vpath name, the host volume name,
or the volume serial number under various conditions.
If the SDD is installed, use the rsQuery command for the vpath name or volume
serial number. If the SDD is not installed, use the rsQuery command for the host
volume name or volume serial number.
The rsQuery command fails on an OpenVMS host system if you specify the -m flag
for a volume to which the host system has MSCP-only access. In other words, if
your OpenVMS host system only has MSCP access to a volume, specify the
volume serial number when using the rsQuery command.
Note: This command sometimes times out if it is not completed within 15 minutes.
Syntax
The following is the complete syntax of the rsQuery command. See Syntax
diagrams on page ix for syntax reading instructions.
rsQuery
rsQ
.sh
.exe
.nlm
-u
/u
-a
/a
username
-p
/p
securityfilepath
-q
/q
-f
/f
volumename
-v
/v
-m
/m
password
filename
105
-s
/s
primaryserver
-b
/b
backupserver
Use the m flag if you use the rsQuery command for the vpath name or host
volume name. Do not use the m flag if you use the rsQuery command for a
serial number.
b backupserver
Specify the IP address or the complete host name of an alternate the ESS
Copy Services backup server. The b flag with the backupserver parameter is
optional.
p password
Specifies the password of a user name that is authorized to execute the Copy
Services CLI commands. The p flag with the password parameter is required if
106
the administrator for ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
s primaryserver
Specifies the IP address or the complete host name of a ESS Copy Services
server. Before you use the s flag with primaryserver parameter, you must
identify and configure an ESS Copy Services server.
q volumename
Specifies the vpath name, host volume name, or volume serial number. Use the
q flag with the volume parameter if the f flag with the filename parameter is not
used.
Use the m flag if you use the rsQuery command for the vpath name or host
volume name. Do not use the m flag if you use the rsQuery command for a
serial number.
u username
Specifies the user name that is authorized to execute the Copy Services CLI
commands. The u flag with the username parameter is required if the
administrator for the ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
v
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
The following example shows the output that you see when you invoke the rsQuery
command to query a serial number on an AIX host system:
|
|
|
|
|
|
|
|
|
|
|
|
The following example shows the output that you see when you invoke the rsQuery
command to query a serial number on an AIX host system:
|
|
|
|
|
|
|
|
|
|
|
|
107
Type
Status
PPRCPendingTracks
Specifies the number of out of sync tracks in the relationship at the
time of the last Copy Services refresh. This data may be outdated.
To obtain up-to-date track information, use the rsquerycomplete
command.
FlashCopy_state
Specifies the current state of a volume in a FlashCopy relationship
with one of the following values:
v Source
v Target
v None
v Unknown
|
|
|
|
|
|
|
|
Session Number
Specifies the number of the asynchronous PPRC session with a
value of 1 - 255.
|
|
|
Session State Specifies the current state of the asynchronous PPRC relationship
with one of the following values:
v Active
v Yes
v No
108
v Join Pending
v Remove Pending
|
|
First Pass
|
|
|
|
|
|
|
A volume remains in this state until the entire volume has been sent
at least once to the secondary for an initial full volume establish or
when all of the out-of-sync tracks that were indicated in the
suspension bit map prior to a resynch order have been sent to the
secondary. This state is specified with one of the following values:
v Yes
v No
rsQueryComplete
The rsQueryComplete command accepts the ESS Copy Services server tasks as
defined and saved with the ESS Copy Services Web-based interface. It determines
whether all volumes defined in the given tasks have completed the initial PPRC
synchronization or FlashCopy background copying.
Note: When querying FlashCopy tasks, the initial establish should be done using
the Persistent FlashCopy option and the With Background Copy option.
Non-persistent pairs or pairs without the background copy option specified
should not be used.
When you use the rsQueryComplete command for grouped tasks, the output
displays the first subtask until it reaches the completion threshold; and then it
displays the next subtask until it reaches the completion threshold. This process
repeats until all the subtasks are queried.
Syntax
The following is the complete syntax of the rsQueryComplete command. See
Syntax diagrams on page ix for syntax reading instructions.
rsQueryComplete
rsQComp
-u
/u
-a
/a
.sh
.exe
.nlm
-v
/v
username
-p
/p
securityfilepath
password
-m
/m
minutes
-t
/t
-s
/s
threshold
primaryserver
tasknames
-b
/b
backupserver
109
a securityfilepath
Specifies the full path to the file that contains the user name and password that
are defined at the ESS Copy Services server for using Copy Services CLI
commands on a host system. The a flag with the securityfilepath parameter is
required if the administrator for the ESS Copy Services server has enabled
password protection for CLI commands and if the u and p flags and associated
parameters are not used.
The format of the security path file is as follows:
username password
m minutes
Specifies the number of minute and second intervals between status queries of
the PPRC synchronization and the FlashCopy background copying. The -m flag
and the minutes parameter are optional. The default is 1 minute.
The format of this parameter is as follows:
mm:ss
where mm stands for the number of minutes and ss for the number of seconds
before the command issues a new query.
b backupserver
Specify the IP address or the complete host name of an alternate the ESS
Copy Services backup server. The b flag with the backupserver parameter is
optional.
p password
Specifies the password of a user name that is authorized to execute the Copy
Services CLI commands. The p flag with the password parameter is required if
the administrator for ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
s primaryserver
Specifies the IP address or the complete host name of a ESS Copy Services
server. Before you use the s flag with primaryserver parameter, you must
identify and configure an ESS Copy Services server.
tasknames
Specifies the name of one or more previously saved ESS Copy Services tasks.
Separate the task names with a space when you specify more than one task.
This parameter does not require a flag. The supported tasks for this command
are establish FlashCopy and establish PPRC.
t threshold
Specifies the threshold percentage that defines the query completion status.
The t flag and the threshold parameter are optional. Table 31 lists the default
percentages.
Table 31. Default Values
Task
Synchronous PPRC
Extended Distance PPRC
FlashCopy with Background Copy
FlashCopy without Background Copy
110
Default Value
100%
0%
100%
0%
u username
Specifies the user name that is authorized to execute the Copy Services CLI
commands. The u flag with the username parameter is required if the
administrator for the ESS Copy Services server has enabled password
protection for CLI commands and if the a flag with the securityfilepath
parameter is not used.
v
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
The following example shows the output that you see when you invoke the
rsQueryComplete command and specify the minutes (m) parameter with a value of
0:10 and the threshold (t) parameter with a value of 80% on an AIX host system:
>./rsQueryComplete.sh -v -u yourusername -p yourpassword -m 0:10 -t 80
-s primaryservername es_pair_12
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
rsQueryComplete:
The sample output contains one of the following fields and values:
PPRC Type
FlashCopy Options
Specifies one of the following types of FlashCopy tasks:
v Background Copy
v No Background Copy
rsTestConnection
The rsTestConnection command determines whether you can successfully
connect to the ESS Copy Services server.
Note: Use the rsTestConnection command to monitor the ESS Copy Services
server. In an automated script, you might use this command for error
notification. For example, if the rsTestConnection command fails, the
automated script can send an e-mail or other notification to the storage
administrator.
111
Syntax
The following is the complete syntax of the rsTestConnection command. See
Syntax diagrams on page ix for syntax reading instructions.
rsTestConnection
rsTConn
.sh
.exe
.nlm
-v
/v
-s
/s
primaryservername
Displays all responses from the server. This verbose flag is optional and does
not require a parameter.
Examples
The following example shows the output that you see when you invoke the
rsTestConnection command on an AIX host system:
#./rsTestConnection.sh -v -s primaryservername
rsWebTest: Using yourhostname as server name
sWebTest: rsVSServer reference obtained successfully
rsWebTest: rsVSServer reference narrowed successfully
rsWebTest: HeartBeat to the server was successful.
rsWebTest: Command successful
112
Action: None
113
the f flag with a valid file name of the file that contains
the volumes that you want to query.
114
115
116
HP-UX
Sun Solaris
Novell Netware
Red Hat and SuSE Linux
v Windows NT 4.0
v Windows 2000
v Windows 2000 Datacenter
0
Action: None
1
9
3
Missing parameters
11
117
Conflicting parameters
20
16
21
No parameter specified
17
22
118
23
Unsuccessful
27
119
60
65
50
66
120
80
Command failed
121
122
123
2. From the ESS Specialist Welcome panel, click Tools to invoke the Tools panel.
3. Click Determine IPs for copyservices active servers.
4. Click Display the active CopyServices server.
The next panel displays two tables, the first of which contains the current
configuration information.
5. In the current Configuration table, verify that the servers are configured and that
the IP addresses are correct.
To correct the IP address, perform the following steps:
a. From the ESS Specialist Welcome panel, click Tools to invoke the Tools
panel.
b. Click the Define copyservices active servers link.
c. Click the Define copyservices server link.
d. Click the Define Servers button.
e. Verify or correct the IP addresses.
Note: The servers work correctly only under the following conditions:
v If server A is defined and server B is not defined. If server B is the
only server defined, you will receive an error.
v If both server A and B are defined
f. Click the Submit Configuration button.
Note: If the window displays an error message, verify the correct IP address
was entered by clicking the Back button. After you verify the IP
address, submit the change by clicking the Submit Configuration
button.
If the problem persists, contact IBM support.
6. In the Current Configuration table, verify that the IP address of the ESS Copy
Services primary server matches the IP address that you used when you
invoked the rsTestConnection command.
Recommendation: Configure server A as your primary and highest configured
server, and server B as you backup server.
If the IP addresses match, proceed to the next diagnostic task, Checking the
ESS Copy Services server operational status on page 125.
If the IP addresses do not match, perform the following steps:
a. Use the IP address of the ESS Copy Services primary server to execute the
rsTestConnection command.
b. If the rsTestConnection command is still not successful, proceed to the
next diagnostic task, Checking the ESS Copy Services server operational
status on page 125.
124
125
126
127
128
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the users responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATIONS AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply to
you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements and/or
changes in the product(s) and/or the program(s) described in this publication at any
time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those
Web sites. The materials at those Web sites are not part of the materials for this
IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Copyright IBM Corp. 2001, 2004
129
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM
has not tested those products and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those
products.
All statements regarding IBMs future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
Trademarks
The following terms are trademarks of the International Business Machines
Corporation in the United States, other countries, or both:
AIX
Application System/400
AS/400
DB2
DFSMS/MVS
DFSMS/VM
DYNIX/ptx
ES/9000
ESCON
Enterprise Storage Server
Enterprise Systems Architecture/390
Enterprise Systems Connection Architecture
ES/3090
FICON
FlashCopy
GDPS
HACMP
IBM
IBM Global Network
IntelliStation
iSeries
MVS
MVS/ESA
Netfinity
NetVista
NUMA-Q
Operating System/400
OS/390
OS/400
Parallel Sysplex
POWERparallel
pSeries
RETAIN
130
RS/6000
S/360
S/390
Seascape
SP
Subsystem Device Driver
System/360
System/370
System/390
TotalStorage
Versatile Storage Server
VM/ESA
VSE/ESA
xSeries
z/Architecture
z/OS
z/VM
zSeries
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in
the United States, other countries, or both.
NetWare and Novell are trademarks of the Novell Corporation.
UNIXis a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Notices
131
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device might not cause harmful interference, and
(2) this device must accept any interference received, including interference that
might cause undesired operation.
Germany only
Zulassungsbescheinigung laut Gesetz ueber die elektromagnetische
Vertraeglichkeit von Geraeten (EMVG) vom 30. August 1995.
Dieses Geraet ist berechtigt, in Uebereinstimmung mit dem deutschen EMVG das
EG-Konformitaetszeichen - CE - zu fuehren.
Der Aussteller der Konformitaetserklaeung ist die IBM Deutschland.
Informationen in Hinsicht EMVG Paragraph 3 Abs. (2) 2:
Das Geraet erfuellt die Schutzanforderungen nach EN 50082-1 und
EN 55022 Klasse A.
Anmerkung:
Um die Einhaltung des EMVG sicherzustellen, sind die Geraete wie in den
Handbuechern angegeben zu installieren und zu betreiben.
132
Notices
133
134
Accessibility
Accessibility features help a user who has a physical disability, such as restricted
mobility or limited vision, to use software products successfully.
Features
These are the major accessibility features in the IBM TotalStorage Enterprise
Storage Server information:
1. You can use screen-reader software and a digital speech synthesizer to hear
what is displayed on the screen. IBM Home Page Reader version 3.0 has been
tested.
2. You can operate features using the keyboard instead of the mouse.
Navigating by keyboard
You can use keys or key combinations to perform operations and initiate menu
actions that can also be done through mouse actions. You can navigate the IBM
TotalStorage Enterprise Storage Server information from the keyboard by using the
shortcut keys for your browser or Home Page Reader. See your browser Help for a
list of shortcut keys that it supports. See the following Web site for a list of shortcut
keys supported by Home Page Reader:
http://www-306.ibm.com/able/solution_offerings/keyshort.html
You can access the information using IBM Home Page Reader 3.0.
135
136
Glossary
This glossary includes terms for the IBM
TotalStorage Enterprise Storage Server (ESS) and
other Seascape solution products.
This glossary includes selected terms and
definitions from:
v The American National Standard Dictionary for
Information Systems, ANSI X3.1721990,
copyright 1990 by the American National
Standards Institute (ANSI), 11 West 42nd
Street, New York, New York 10036. Definitions
derived from this book have the symbol (A)
after the definition.
v The IBM Glossary of Computing Terms, which
is available online at the following Web site:
http://www.ibm.com/ibm/terminology/. Definitions
derived from this book have the symbol (GC)
after the definition.
v The Information Technology Vocabulary
developed by Subcommittee 1, Joint Technical
Committee 1, of the International Organization
for Standardization and the International
Electrotechnical Commission (ISO/IEC
JTC1/SC1). Definitions derived from this book
have the symbol (I) after the definition.
Definitions taken from draft international
standards, committee drafts, and working
papers that the ISO/IEC JTC1/SC1 is
developing have the symbol (T) after the
definition, indicating that final agreement has
not been reached among the participating
National Bodies of SC1.
This glossary uses the following cross-reference
forms:
See
See also
Refers the reader to one or more related
terms.
Contrast with
Refers the reader to a term that has an
opposite or substantively different
meaning.
Numerics
750. A model of the Enterprise Storage Server
featuring a 2-way processor with limited physical
storage capacity. This model can be updated to the
model 800.
800. A model of the Enterprise Storage Server
featuring a standard processor or an optional Turbo
processor. The Model 800 supports RAID 5, RAID 10,
and 15000 rpm drives. Model 800 supersedes Model
F20.
2105. The machine number for the IBM TotalStorage
Enterprise Storage Server (ESS). Models of the ESS
are expressed as the number 2105 followed by Model
<xxx>, such as 2105 Model 800. The 2105 Model 100
is an ESS expansion enclosure that is typically referred
to simply as the Model 100. See also IBM TotalStorage
Enterprise Storage Server and Model 100.
3390. The machine number of an IBM disk storage
system. The ESS, when interfaced to IBM S/390 or
zSeries hosts, is set up to appear as one or more 3390
devices, with a choice of 3390-2, 3390-3, or 3390-9
track formats.
3990. The machine number of an IBM control unit.
7133. The machine number of an IBM disk storage
system. The Model D40 and 020 drawers of the 7133
can be installed in the 2105-100 expansion enclosure of
the ESS.
8-pack. See disk eight pack.
A
access. (1) To obtain the use of a computer resource.
(2) In computer security, a specific type of interaction
between a subject and an object that results in flow of
information from one to the other.
access-any mode. One of the two access modes that
can be set for the ESS during initial configuration. It
enables all fibre-channel-attached host systems with no
defined access profile to access all logical volumes on
the ESS. With a profile defined in ESS Specialist for a
particular host, that host has access only to volumes
that are assigned to the WWPN for that host. See also
pseudo host and worldwide port name.
ACK. See request for acknowledgment and
acknowledgment.
active Copy Services server. The Copy Services
server that manages the Copy Services domain. Either
the primary or the backup Copy Services server can be
137
138
B
backup Copy Services server. One of two Copy
Services servers in a Copy Services domain. The other
Copy Services server is the primary Copy Services
server. The backup Copy Services server is available to
become the active Copy Services server if the primary
Copy Services server fails. A Copy Services server is
software that runs in one of the two clusters of an ESS
and manages data-copy operations for that Copy
Services server group. See also Copy Services client
and primary Copy Services server. Contrast with active
Copy Services server.
bay. In the ESS, the physical space used for installing
SCSI, ESCON, and fibre-channel host adapter cards.
The ESS has four bays, two in each cluster. See also
service boundary.
bit. (1) Either of the digits 0 or 1 when used in the
binary numeration system. (T) (2) The storage medium
required to store a single binary digit. See also byte.
block. (1) A string of data elements recorded or
transmitted as a unit. The elements may be characters,
words, or physical records. (T) (2) In the ESS, a group
of consecutive bytes used as the basic storage unit in
fixed-block architecture (FBA). All blocks on the storage
device are the same size (fixed size). See also
fixed-block architecture and data record.
C
cache. A special-purpose buffer storage, smaller and
faster than main storage, used to hold a copy of
instructions and data obtained from main storage and
likely to be needed next by the processor. (T)
cache fast write. In the ESS, a form of the fast-write
operation in which the storage server writes the data
directly to cache, where it is available for later
destaging.
cache hit. An event that occurs when a read operation
is sent to the cluster, and the requested data is found in
cache. The opposite of cache miss.
cache memory. Memory, typically volatile memory,
that a storage server uses to improve access times to
instructions or data. The cache memory is typically
smaller and faster than the primary memory or storage
medium. In addition to residing in cache memory, the
same data also resides on the storage devices in the
storage facility.
cache miss. An event that occurs when a read
operation is sent to the cluster, but the data is not found
in cache. The opposite of cache hit.
call home. A communication link established between
the ESS and a service provider. The ESS can use this
link to place a call to IBM or to another service provider
when it requires service. With access to the machine,
service personnel can perform service tasks, such as
viewing error logs and problem logs or initiating trace
and dump retrievals. See also heartbeat and remote
technical assistance information network.
cascading. (1) Connecting network controllers to each
other in a succession of levels, to concentrate many
more lines than a single level permits. (2) In
high-availability cluster multiprocessing (HACMP),
cascading pertains to a cluster configuration in which
the cluster node with the highest priority for a particular
resource acquires the resource if the primary node fails.
The cluster node relinquishes the resource to the
primary node upon reintegration of the primary node
into the cluster.
catcher. A server that service personnel use to collect
and retain status data that an ESS sends to it.
CCR. See channel command retry.
CCW. See channel command word.
CD. See compact disc.
CEC. See computer-electronic complex.
Glossary
139
140
Glossary
141
142
E
E10. The predecessor of the F10 model of the ESS.
See also F10.
E20. The predecessor of the F20 model of the ESS.
See also F20.
EBCDIC. See extended binary-coded decimal
interchange code.
Glossary
143
F
F10. A model of the ESS featuring a single-phase
power supply. It has fewer expansion capabilities than
the Model F20.
F20. A model of the ESS featuring a three-phase
power supply. It has more expansion capabilities than
the Model F10, including the ability to support a
separate expansion enclosure.
fabric. In fibre-channel technology, a routing structure,
such as a switch, receives addressed information and
routes to the appropriate destination. A fabric can
consist of more than one switch. When multiple
fibre-channel switches are interconnected, they are said
to be cascaded.
failback. Pertaining to a cluster recovery from failover
following repair. See also failover.
144
G
GB. See gigabyte.
GDPS. See Geographically Dispersed Parallel
Sysplex.
Geographically Dispersed Parallel Sysplex (GDPS).
An S/390 multisite application- availability solution.
gigabyte (GB). A gigabyte of storage is 109 bytes. A
gigabyte of memory is 230 bytes.
group. In ESS documentation, a nickname for two
different kinds of groups, depending on the context. See
disk eight pack or Copy Services server group.
Glossary
145
146
147
J
Java Virtual Machine (JVM). A software
implementation of a central processing unit (CPU) that
runs compiled Java code (applets and applications).
(GC)
JVM. See Java Virtual Machine.
K
KB. See kilobyte.
key field. The second (optional) field of a count key
data record. The key length is specified in the count
field. The key length determines the field length. The
program writes the data in the key field and use the key
field to identify or locate a given record. The subsystem
does not use the key field.
kilobyte (KB). (1) For processor storage, real, and
virtual storage, and channel volume, 210 or 1024 bytes.
(2) For disk storage capacity and communications
volume, 1000 bytes.
Korn shell. Interactive command interpreter and a
command programming language.
KPOH. See thousands of power-on hours.
L
LAN. See local area network.
last-in first-out (LIFO). A queuing technique in which
the next item to be retrieved is the item most recently
placed in the queue. (A)
LBA. See logical block address.
LCU. See logical control unit.
148
M
machine level control (MLC). A database that
contains the EC level and configuration of products in
the field.
machine reported product data (MRPD). Product
data gathered by a machine and sent to a destination
such as an IBM support server or RETAIN. These
records might include such information as feature code
information and product logical configuration
information.
mainframe. A computer, usually in a computer center,
with extensive capabilities and resources to which other
computers may be connected so that they can share
facilities. (T)
maintenance analysis procedure (MAP). A hardware
maintenance document that gives an IBM service
representative a step-by-step procedure for tracing a
symptom to the cause of a failure.
Management Information Base (MIB). (1) A collection
of objects that can be accessed by means of a network
management protocol. (GC) (2) In the ESS, the MIB
record conforms to the Open Systems Interconnection
(OSI) standard defined by the International Organization
Glossary
149
150
O
octet. In Internet Protocol addressing, one of the four
parts of a 32-bit integer presented in dotted decimal
notation. See also dotted decimal notation.
OEMI. See original equipment manufacturers
information.
open system. A system whose characteristics comply
with standards made available throughout the industry
and that therefore can be connected to other systems
complying with the same standards. Applied to the ESS,
such systems are those hosts that connect to the ESS
through SCSI or FCP protocols. See also small
computer system interface and fibre-channel protocol.
organizationally unique identifier (OUI). An
IEEE-standards number that identifies an organization
with a 24-bit globally unique assigned number
referenced by various standards. OUI is used in the
family of 802 LAN standards, such as Ethernet and
Token Ring.
original equipment manufacturers information
(OEMI). A reference to an IBM guideline for a
computer peripheral interface. The interface uses
ESA/390 logical protocols over an I/O interface that
configures attached units in a multidrop bus topology.
N
name server. A server that stores names of the
participating ESS clusters.
Netfinity. IBM Intel-processor-based server;
predecessor to the IBM xSeries server.
151
152
R
R0. See track-descriptor record.
rack. See enclosure.
RAID. See redundant array of independent disks.
RAID is also commonly expanded to redundant array of
inexpensive disks. See also array.
RAID 5. A type of RAID that optimizes cost-effective
performance while emphasizing use of available
capacity through data striping. RAID 5 provides fault
tolerance for up to two failed disk drives by distributing
parity across all the drives in the array plus one parity
disk drive. The ESS automatically reserves spare disk
drives when it assigns arrays to a device adapter pair
(DA pair). See also device adapter, RAID 10, and
redundant array of independent disks.
RAID 10. A type of RAID that optimizes high
performance while maintaining fault tolerance for up to
two failed disk drives by by striping volume data across
several disk drives and mirroring the first set of disk
drives on an identical set. The ESS automatically
S
S/390. IBM enterprise servers based on Enterprise
Systems Architecture/390 (ESA/390). S/390 is the
currently accepted shortened form of the original name
System/390.
S/390 storage. (1) Storage arrays and logical volumes
that are defined in the ESS as connected to S/390
servers. This term is synonymous with count-key-data
storage. (2) In ESS documentation, when noted, the
term can refer to both S/390 and zSeries storage. See
also zSeries storage.
Glossary
153
154
Glossary
155
T
TAP. See Telocator Alphanumeric Protocol.
target. A SCSI device that acts as a subordinate to an
initiator and consists of a set of one or more logical
units, each with an assigned logical unit number (LUN).
The logical units on the target are typically I/O devices.
A SCSI target is analogous to an S/390 control unit. A
SCSI initiator is analogous to an S/390 channel. A SCSI
logical unit is analogous to an S/390 device. See also
small computer system interface.
156
W
Web Copy Services. See ESS Copy Services.
worldwide node name (WWNN). A unique 64-bit
identifier for a host that contains a fibre-channel port.
See also worldwide port name.
worldwide port name (WWPN). A unique 64-bit
identifier associated with a fibre-channel adapter port. It
Glossary
157
X
XD. See PPRC Extended Distance.
XRC. See Extended Remote Copy.
xSeries. The product name of an IBM Eserver
product that emphasizes industry-standard server
scalability and self-managing server technologies. It is
the successor to the Netfinity family of servers.
Z
z/Architecture. An IBM architecture for mainframe
computers and peripherals. The IBM Eserver zSeries
family of servers uses the z/Architecture architecture. It
is the successor to the S/390 and 9672 family of
servers. See also Enterprise Systems Architecture/390.
z/OS. An operating system for the IBM Eserver
product line that supports 64-bit real storage.
zSeries. (1) An IBM Eserver family of servers that
emphasizes near-zero downtime. (2) IBM enterprise
servers based on z/Architecture.
zSeries storage. Storage arrays and logical volumes
that are defined in the ESS as connected to zSeries
servers. See also S/390 storage.
158
Index
A
AccessFile
extended format 34
simple format 34
accessibility 135
arguments, Storage Management CLI
accfile=Accessfile 48
acclvl=admin | config | op | view 47
addr=EmailAddress 49
addr=IpAddr1, IpAddr2, ... 49
async=on | off 43
callhome=enabled|disabled 48
cap=Gigabytes 43
Comment=User Comments 47
comname=CommunityName 49
contact=Contactname 50
cyls=Cylinders 43
duration=TimeInHrs 50
ess=EssId 43
esstraps=enabled|disabled 50
host=HostName 43
init=WwName 43
iprange=filterIPAddress 47
label=VolLabel 43
location=SystemLocation 50
lss=LssId1,... 44
max=MaxEmails 49
max=MaxPager 49
max=MaxTraps 49
mibread=enabled|disabled 50
name=LogName 44
name=TaskName 44
newacclvl=NewAccessLevel 48
newaddr=EmailAddress 49
newcomments=NewUserComments 48
newhost=HostName 44
newinit=WwName 44
newiprange=IpRange 48
newphone=Phonenum 49
newpin=PinNum 49
newport=all | PortId1,... 44
newpwd=NewUserPwd 48
newpwd=PagerPwd 49
newtrigger=info|err|all|none 49
newtype=numeric|alphanum 49
newuser=NewUsrName 48
newuser=Username 49
pav=all | VolId | VolId ... 47
pav=VolId 44
pepwd=reset 49
phone=PhoneNum 49
pin=PinNum 49
placement=seq | spread 44
ports=all | PortId1,... 44
prodid=ProblemID 48
profile=ProfileName 45
protocol=FCP | FICON 46
Copyright IBM Corp. 2001, 2004
C
Canadian compliance statement 132
class A compliance statement, Taiwan 133
CLI (command-line interface)
Copy Services CLI
command 95
messages 113
Storage Management CLI
command 25
messages 79
return codes 79
CLI operating limitations 1
command-line interface (CLI)
Copy Services CLI
command 95
messages 113, 116
Storage Management CLI
command 25
messages 79
return codes 79
commands, Copy Services CLI
description 95
guidelines 95
rsExecuteTask
examples 99
flags 98
parameters 98
syntax 98
rsFlashCopyQuery
examples 101
flags 100
parameters 100
syntax 99
rsList2105s
examples 102
flags 102
parameters 102
syntax 102
159
160
D
delete email 42
delete hostconnection 38
delete pager 42
delete PAV 39
delete perfstats 41
delete problem 43
delete snmp 42
delete volume 39
delete volumeaccess 40
delete volumespace 40
delete webuseraccount 41
disability 135
E
electronic emission notices 131
European Community Compliance statement 132
extended format 34
F
FCC (Federal Communications Commission)
statement 131
Federal Communications Commission (FCC)
statement 131
flags
Copy Services CLI
a 98, 100, 104, 106, 109
b 98, 100, 104, 106, 110
d 104
f 100, 106
m 106, 110
p 98, 100, 104, 106, 110
q 100, 107
s 98, 100, 104, 107, 110, 112
t 110
u 99, 101, 104, 107, 111
v 99, 101, 104, 107, 111, 112
Storage Management CLI
-? 34
-a 34
-b 35
-d 35
-fmt 35
-h 36
-hdr 36
-help 36
-key 36
-nohdr 36
-norefresh 34
-nossl 36
-nov 36
-p 36
-refresh 34
-s 36
-u 38
-v 38
G
German compliance statement 132
I
Industry Canada compliance statement 132
installing
console mode 5
installing 5
Installshield mode 12
Open VMS 19
preparing 1
silent mode 3
Installshield mode
installing 12
removing 17
J
Japanese Voluntary Control Council for Interference
(VCCI) Class A statement 133
K
Korean Ministry of Information and Communication
(MIC) statement 133
L
legal notices 129
LIC level 24
license information code level 24
list diskgroup 38
list featurecode 41
list hostconnection 38
list log 39
list pav 39
list perfstats 41
list port 39
list pprcpaths 39
list problem 43
list server 39
list task 39
list volume 40
list volumeaccess 40
list volumespace 40
list webuseraccount 41
M
messages
Copy Services CLI
Compaq Tru64 host system 116
HP-UX host system 116
IBM AIX host system 116
IBM NUMA-Q host system 116
Novell Netware host system 116
OpenVMS Alpha host system 113
Red Hat Linux host system 116
Sun Solaris host system 116
SuSE Linux host system 116
Windows 2000 Datacenter system 116
Windows 2000 host system 116
Windows NT 4.0 host system 116
Storage Management CLI
client-side error 92
communication error 83
parameter error 80
return codes 79
server exception 90
timeout error 84
user error 85
version mismatch 84
N
notices
Canadian 132
Index
161
notices (continued)
electronic emission 131
European community 132
FCC statement 131
German 132
Japanese 133
Korean 133
legal 129
statement 129
Taiwan 133
O
Open VMS
installing 19
removing 24
OpenVMS Alpha host system, messages 113
operating systems
supported 1
P
parameters
Copy Services CLI
backupserver 98, 100, 104, 106, 110
filename 100, 106
hostname 104
minutes 110
password 98, 100, 104, 106, 110
primaryserver 98, 100, 104, 107, 110, 112
securityfilepath 98, 100, 104, 106, 109
tasknames 98, 100, 104, 107, 110
threshold 110
username 99, 101, 104, 107, 111
volumename 100, 107
Storage Management CLI
AccessFile 34
BackupAddr 35
create email 42
create hostconnection 38, 41
create pager 42
create pav 39
create perfstats 41
create snmp 42
create volume 39
create volumeaccess 40
create volumespace 40
create webuseraccount 41
delete email 42
delete hostconnection 38
delete pager 42
delete PAV 39
delete perfstats 41
delete problem 43
delete snmp 42
delete volumeaccess 40
delete volumespace 40
delete webuseraccount 41
format 35
KeyName 36
list diskgroup 38
162
parameters (continued)
Storage Management CLI (continued)
list featurecode 41
list hostconnection 38
list log 39
list pav 39
list perfstats 41
list port 39
list pprcpaths 39
list problem 43
list server 39
list task 39
list volume 40
list volumeaccess 40
list volumespace 40
list webuseraccount 41
name=value 35
Password 36
ServerAddr 36
set email 42
set hostconnection 39
set pager 42
set port 39
set remotesupport 42
set snmp 42
set volume 40
set webuseraccount 41
show email 42
show pager 42
show problem 43
show remotesupport 42
show snmp 42
show task 39
UserName 38
preparing
installation 1
R
radio frequency energy compliance statement 131
removing
console mode 12
Installshield mode 17
Open VMS 24
silent mode 5
return codes, Storage Management CLI
client-side error 92
communication error 83
messages 79
parameter error 80
server exception 90
timeout error 84
user error 85
version mismatch 84
rsExecuteTask 97
rsFlashCopyQuery 99
rsList2105s 102
rsPrimeServer 103
rsQuery 105
rsQueryComplete 109
rsTestConnection 111
S
set email 42
set hostconnection 39
set pager 42
set port 39
set remotesupport 42
set snmp 42
set volume 40
set webuseraccount 41
show email 42
show pager 42
show problem 43
show remotesupport 42
show snmp 42
show task 39
silent mode
installing 3
removing 5
simple format 34
statement of compliance
Canada 132
European 132
Federal Communications Commission 131
Japan 133
Korean Ministry of Information and Communication
(MIC) 133
Taiwan 133
Storage Management CLI
arguments
accfile=Accessfile 48
acclvl=admin | config | op | view 47
addr=EmailAddress 49
addr=IpAddr1, IpAddr2, ... 49
async=on | off 43
callhome=enabled|disabled 48
cap=Gigabytes 43
Comment=User Comments 47
comname=CommunityName 49
contact=Contactname 50
cyls=Cylinders 43
duration=TimeInHrs 50
ess=EssId 43
esstraps=enabled|disabled 50
host=HostName 43
init=WwName 43
iprange=filterIPAddress 47
label=VolLabel 43
location=SystemLocation 50
lss=LssId1,... 44
max=MaxEmails 49
max=MaxPager 49
max=MaxTraps 49
mibread=enabled|disabled 50
name=LogName 44
name=TaskName 44
newacclvl=NewAccessLevel 48
newaddr=EmailAddress 49
newcomments=NewUserComments 48
newhost=HostName 44
newinit=WwName 44
newiprange=IpRange 48
163
164
T
Taiwan class A compliance statement 133
trademarks 130
Troubleshooting
Copy Services CLI 123
checking communication link 125
checking server status 125
OpenVMS Alpha host system 127
testing server connection 123
verifying server configuration 123
verifying volume allocation 126
Overall satisfaction
Very Satisfied
h
Satisfied
h
Neutral
h
Dissatisfied
h
Very Dissatisfied
h
Neutral
h
h
h
h
h
h
Dissatisfied
h
h
h
h
h
h
Very Dissatisfied
h
h
h
h
h
h
How satisfied are you that the information in this book is:
Accurate
Complete
Easy to find
Easy to understand
Well organized
Applicable to your tasks
Very Satisfied
h
h
h
h
h
h
Satisfied
h
h
h
h
h
h
h Yes
h No
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you.
Name
Company or Organization
Phone No.
Address
SC26-7494-04
___________________________________________________________________________________________________
Cut or Fold
Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
_________________________________________________________________________________________
Please do not staple
Fold and Tape
Fold and Tape
SC26-7494-04
Cut or Fold
Along Line
Printed in USA
SC26-7494-04