B PDG Master
B PDG Master
B PDG Master
Version 5.5
SC32-0142-01
Version 5.5
SC32-0142-01
Note! Before using this information and the product it supports, read the general information in the Notices appendix.
Edition notice This edition applies to Version 5 Release 5 of the IBM Tivoli Storage Manager Problem Determination Guide (program numbers 5608-ACS, 5608-APD, 5608-APE, 5608-APH, 5608-APR, 5608-APW, 5608-CSS, 5608-HSM, 5608-ISM, 5608-ISX, 5608-SAN, 5698-A11, 5698-A12, 5698-A13, 5698-A25, 5698-USS) and to any subsequent releases until otherwise indicated in new editions or technical newsletters. Changes since the previous edition are marked with a vertical bar (|) in the left margin. Ensure that you are using the correct edition for the level of the product. Copyright International Business Machines Corporation 1993, 2007. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Preface . . . . . . . . . . . . . . vii Who should read this guide . . . . . . ix Publications. . . . . . . . . . . . . xi
Tivoli Storage Manager publications . . . . . . xi
| |
Support information . . . . . . . . . xv
Getting technical training . . . . . . . . . . xv Searching knowledge bases . . . . . . . . . xv Searching the Internet . . . . . . . . . . xv Using IBM Support Assistant . . . . . . . xv Finding product fixes . . . . . . . . . . xvi Getting E-mail notification of product fixes . . xvi Contacting IBM Software Support . . . . . . xvi Determine the business impact . . . . . . xvii Describe your problem and gather background information . . . . . . . . . . . . . xvii Submit your problem to IBM Software Support xvii Accessibility features . . . . . . . . . . xviii
. 12 . 12 . 12 . 13 . 14 . 15 . 15 . 15 . 16 . 16 . 16
Linux Snapshot image backup fails with error message ANS1258E . . . . . . . . . . . Resolving errors during AIX JFS2 snapshot-based backup-archive and image backup . . . . . . API problem determination . . . . . . . . . Support solutions for the Tivoli Storage Manager API . . . . . . . . . . . . . . . . Determining if data is sent to the IBM Tivoli Storage Manager storage agent rather than the server . . . . . . . . . . . . . . . Running applications that use the API as a non-root user . . . . . . . . . . . . . JBB problem determination . . . . . . . . . Determining if a backup will be journal-based . . Running the Journal Daemon in the foreground Using the journal database viewing utility . . . Using open file support and the logical volume snapshot agent . . . . . . . . . . . . . Examining the Windows system event log . . . Obtaining debug print output . . . . . . . Configuring the system for a full dump . . . . Forcing a dump for a system hang when a logical volume snapshot agent problem is suspected . . . . . . . . . . . . . . Best practices for open file support . . . . . Windows Volume Shadow Copy Services . . . . Determining VSS transient errors . . . . . . Defining Windows VSS test flags . . . . . . Windows 2003 VSS hot fixes . . . . . . . . Microsofts VSS tuning recommendations . . . VSS diagnostic information for Microsoft assistance . . . . . . . . . . . . . . Using the vsreq.exe sample program . . . . . Comparing Tivoli Storage Manager and Ntbackup.exe interaction with VSS . . . . . Show commands for the backup-archive client . . CACHE . . . . . . . . . . . . . . CLUSTER . . . . . . . . . . . . . . DOMAIN . . . . . . . . . . . . . . OPTIONS . . . . . . . . . . . . . . OPTTABLE . . . . . . . . . . . . . PLUGINS . . . . . . . . . . . . . . SESSION . . . . . . . . . . . . . . SYSTEMOBJECT . . . . . . . . . . . . SYSTEMSERVICES . . . . . . . . . . . SYSTEMSTATE . . . . . . . . . . . . TRACEFLAGS . . . . . . . . . . . . VERSION . . . . . . . . . . . . . .
18 19 20 20
22 23 25 25 26 27 28 28 28 29
29 30 30 30 30 31 31 31 32 32 33 33 33 33 33 34 34 34 34 35 35 35 35
37
. 37 . 37 . 37 . 37
iii
Resolving errors from reading or writing to a device . . . . . . . . . . . . . . . Changing server options or settings creates errors Failing a scheduled client operation . . . . . Resolving server space issues . . . . . . . Server error messages indicate a code page conversion failure . . . . . . . . . . . Resolving a server crash . . . . . . . . . . Resolving database errors. . . . . . . . . . Resolving a hang or loop . . . . . . . . . . Using recovery log information . . . . . . . . Defining processes . . . . . . . . . . . . AUDIT VOLUME . . . . . . . . . . . BACKUP DB . . . . . . . . . . . . . BACKUP STGPOOL . . . . . . . . . . CHECKIN LIBVOLUME . . . . . . . . . CHECKOUT LIBVOLUME . . . . . . . . EXPIRATION . . . . . . . . . . . . . IMPORT . . . . . . . . . . . . . . LABEL LIBVOLUME . . . . . . . . . . MIGRATION . . . . . . . . . . . . . MOVE DATA . . . . . . . . . . . . . MOVE DRMEDIA . . . . . . . . . . . MOVE MEDIA . . . . . . . . . . . . MOVE NODEDATA . . . . . . . . . . PREPARE . . . . . . . . . . . . . . RECLAMATION . . . . . . . . . . . RESTORE STGPOOL . . . . . . . . . . RESTORE VOLUME . . . . . . . . . . Using the process messages . . . . . . . . . Using the process symptoms to resolve problems . . Resolving storage pool issues . . . . . . . .
37 38 38 38 38 39 42 44 44 46 47 47 47 48 48 48 48 49 49 49 49 50 50 50 50 51 51 51 54 57
Conditions that can cause a warning or critical database status . . . . . . . . . . . . Conditions that can cause a warning or critical storage status . . . . . . . . . . . . . When to resynchronize the ADMIN_CENTER administrator ID password . . . . . . . . Administration Center task fails with a message . . ANRW0089E . . . . . . . . . . . . . ANRW0090E . . . . . . . . . . . . . ANRW0126E . . . . . . . . . . . . . ANRW0127E . . . . . . . . . . . . . ANRW0128E . . . . . . . . . . . . . ANRW0129E . . . . . . . . . . . . . ANRW0130E . . . . . . . . . . . . . ANRW0131E . . . . . . . . . . . . . ANRW0132E . . . . . . . . . . . . . ANRW0209E . . . . . . . . . . . . . ANRW0212E . . . . . . . . . . . . . ANRW0213E . . . . . . . . . . . . . ANRW0221E . . . . . . . . . . . . . ANRW0257E . . . . . . . . . . . . . Administration Center task fails or returns unexpected results . . . . . . . . . . . . Check the server activity log. . . . . . . . Errors caused by starting or stopping a wizard or portlet . . . . . . . . . . . . . . . Problems caused by internal errors . . . . . Administration Center messages versus Tivoli Storage Manager server messages . . . . . . . Understanding Tivoli Storage Manager messages . . Problems with the Tivoli Storage Manager server command definition file . . . . . . . . . . Diagnosing red error messages . . . . . . . . Administration Center support utility . . . . .
83 83 84 85 86 86 86 87 87 88 88 88 89 89 89 90 90 90 91 91 91 92 92 94 96 97 99
iv
| | | | | | | | | | | |
Data Protection for Exchange . . . . . . . . Determining if the problem is a Data Protection for Exchange issue or an Exchange issue . . . Tracing Data Protection for Exchange . . . . Locating solutions for Data Protection for Exchange . . . . . . . . . . . . . . Gathering information before contacting IBM (Data Protection for Exchange) . . . . . . Gathering files before calling IBM (Data Protection for Exchange). . . . . . . . . What to gather if the silent install fails (Data Protection for Exchange). . . . . . . . . Data Protection for Exchange with VSS backup/restore support . . . . . . . . . . Determining if the problem is a Data Protection for Exchange issue or a general VSS issue . . . Tracing the Data Protection client when using VSS technology . . . . . . . . . . . . Gathering information before calling IBM (Exchange with VSS) . . . . . . . . . . Gathering files before calling IBM (Exchange with VSS) . . . . . . . . . . . . . Troubleshooting Data Protection for Exchange VSS and SAN Volume Controller . . . . . . Data Protection for SAP . . . . . . . . . . Troubleshooting Data Protection for SAP . . . Tracing Data Protection for SAP . . . . . . Locating solutions for Data Protection for SAP Gathering information before calling IBM (Data Protection for SAP) . . . . . . . . . . Gathering files before calling IBM (Data Protection for SAP) . . . . . . . . . . Data Protection for SQL . . . . . . . . . . Tracing Data Protection for SQL . . . . . . Locating solutions for Data Protection for SQL Gathering information before calling IBM (Data Protection for SQL) . . . . . . . . . . Gathering files before calling IBM (Data Protection for SQL) . . . . . . . . . . Gathering items if the silent install fails (Data Protection for SQL) . . . . . . . . . . Data Protection for SQL with VSS backup-restore support . . . . . . . . . . . . . . . Determining if the problem is a Data Protection for SQL issue or a general VSS issue . . . . Tracing the Data Protection client when using VSS technology (SQL) . . . . . . . . . Gathering information before calling IBM (SQL with VSS) . . . . . . . . . . . . . Gathering files before calling IBM (SQL with VSS) . . . . . . . . . . . . . . . Troubleshooting Data Protection for SQL VSS and SAN Volume Controller . . . . . . .
122 122 123 123 124 124 125 125 126 128 128 129 131 132 132 134 135 135 136 136 136 137 137 138 138 139 139 141 142 143 144
Storage agent diagnostic tips . . . . . . . Storage agent LAN-free setup . . . . . . . Show commands for the server or storage agent Enabling trace for the Tivoli Storage Manager device driver . . . . . . . . . . . . . Tracing from the server console/admin client Tracing from a command shell (only valid for 5.2.2 and above) - all platforms . . . . . . Tracing for the client . . . . . . . . . . . Client and Journal Daemon traceflags . . . . Enabling trace for the client . . . . . . . Enabling backup-archive client trace . . . . . Determining if data is encrypted or compressed during backup/archive through trace . . . . Tracing for the API . . . . . . . . . . . ODBC tracing . . . . . . . . . . . . .
174 175 178 191 191 192 193 194 194 204 213 214 215
217 217 218 218 218 218 219 219 219 220 220 221 221 223 223 223 224 224 224 224 225 225 226 226 226 227 227 228 229 229 230
SAN device mapping hints and tips . . . . . . Disabling SAN device mapping . . . . . . Platform-specific information . . . . . . . SAN device mapping problems . . . . . . . SAN devices are missing from the display of QUERY SAN server command . . . . . . Error message ANR1745I: Unable to discover SAN devices. Function is busy. . . . . . . Error messages ANR1786W, ANR1787W or ANR1788W were issued . . . . . . . . . ANR1789W Get HBA target mapping failed . . ANR1790W SAN discovery failed . . . . . ANR1791W HBAAPI wrapper library xxxxx failed to load or is missing . . . . . . . . ANR1792W HBAAPI vendor library failed to load or is missing . . . . . . . . . . . Error message ANR1793W . . . . . . . . ANR1794W Tivoli Storage Manager SAN discovery is disabled by options . . . . . . ANR2034E QUERY SAN: No match found using this criteria . . . . . . . . . . . . . ANR8226E Error detecting version of HBA-API library . . . . . . . . . . . . . . . ANR8227E Fileset devices.common.IBM.fc.hbaapi is not at the required level . . . . . . .
232 233 233 234 238 240 241 241 241 241 242 242 243 243 244 244
Accessing server or storage agent help for commands . . . . . . . . . . . Accessing help for messages . . . . . Command-line interface help for server or storage agent . . . . . . . . . . Help system does not display . . . . . . Verifying that the help system is running . Resolving help system installation problems Starting and stopping the help system . . Adding the publications to the Integrated Solutions Console help server . . . . . Reporting a problem with a help topic . .
. . . . . . . . .
. 265 . 265
Notices . . . . . . . . . . . . . . 271
Programming interface information . . . . . . 273
Appendix A. Using gt script . . . . . 279 Appendix B. Installing and running the tsmdiag utility . . . . . . . . . 281
| Appendix C. IBM Global Security Kit | return codes . . . . . . . . . . . . 285
Index . . . . . . . . . . . . . . . 295
vi
Preface
This publication helps you determine the source of problems with the servers and clients in your Tivoli Storage Manager environment. Before using this publication, you should be familiar with the following areas: v The operating systems on which your Tivoli Storage Manager servers and clients reside v The communication protocols installed on your client and server machines
vii
viii
ix
Publications
Tivoli Storage Manager publications and other related publications are available online. You can search all the Tivoli Storage Manager publications in the Information Center: http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp You can download PDF versions of publications from the IBM Publications Center: http://www.elink.ibmlink.ibm.com/public/applications/publications/cgibin/ pbi.cgi You can also order some related publications from this Web site. The Web site provides information for ordering publications from countries other than the United States. In the United States, you can order publications by calling 800-879-2755.
IBM Tivoli Storage Manager for System Backup and Recovery Installation SC32-6543 and Users Guide
xi
Tivoli Storage Manager storage agent publications Publication Title IBM Tivoli Storage Manager for SAN for AIX Storage Agent Users Guide IBM Tivoli Storage Manager for SAN for HP-UX Storage Agent Users Guide IBM Tivoli Storage Manager for SAN for Linux Storage Agent Users Guide IBM Tivoli Storage Manager for SAN for Sun Solaris Storage Agent Users Guide IBM Tivoli Storage Manager for SAN for Windows Storage Agent Users Guide Order Number SC32-0129 SC32-0130 SC32-0131 SC32-0132 SC32-0133
Tivoli Storage Manager client publications Publication Title IBM Tivoli Storage Manager for Macintosh: Backup-Archive Clients Installation and Users Guide IBM Tivoli Storage Manager for NetWare: Backup-Archive Clients Installation and Users Guide IBM Tivoli Storage Manager for UNIX and Linux: Backup-Archive Clients Installation and Users Guide IBM Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and Users Guide Order Number SC32-0143 SC32-0144 SC32-0145 SC32-0146
IBM Tivoli Storage Manager for Space Management for UNIX and Linux: SC32-0148 Users Guide IBM Tivoli Storage Manager for HSM for Windows Administration Guide SC32-1773 IBM Tivoli Storage Manager Using the Application Program Interface SC32-0147
Tivoli Storage Manager Data Protection publications Publication Title IBM Tivoli Storage Manager for Advanced Copy Services: Data Protection for Snapshot Devices for SAP Installation and Users Guide for Oracle IBM Tivoli Storage Manager for Advanced Copy Services: Data Protection for Snapshot Devices for DB2 Installation and Users Guide IBM Tivoli Storage Manager for Advanced Copy Services: Data Protection for WebSphere Application Server Installation and Users Guide IBM Tivoli Storage Manager for Databases: Data Protection for Informix Installation and Users Guide IBM Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server Installation and Users Guide IBM Tivoli Storage Manager for Databases: Data Protection for Oracle for UNIX and Linux Installation and Users Guide IBM Tivoli Storage Manager for Databases: Data Protection for Oracle for Windows Installation and Users Guide Order Number SC33-8207 SC33-8330 SC32-9075 SH26-4095 SC32-9059 SC32-9064 SC32-9065
IBM Tivoli Storage Manager for Enterprise Resource Planning: Data Protection for SC33-6341 SAP Installation and Users Guide for DB2
xii
Tivoli Storage Manager Data Protection publications Publication Title Order Number
IBM Tivoli Storage Manager for Enterprise Resource Planning: Data Protection for SC33-6340 SAP Installation and Users Guide for Oracle IBM Tivoli Storage Manager for Hardware: Data Protection for Enterprise Storage SC32-9060 Server for DB2 UDB Installation and Users Guide IBM Tivoli Storage Manager for Hardware: Data Protection for Snapshot Devices for Oracle Installation and Users Guide IBM Tivoli Storage Manager for Mail: Data Protection for Lotus Domino for UNIX, Linux, and OS/400 Installation and Users Guide IBM Tivoli Storage Manager for Mail: Data Protection for Lotus Domino for Windows Installation and Users Guide IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and Users Guide GC32-1772 SC32-9056 SC32-9057 SC32-9058
Publications
xiii
xiv
Support information
You can find support information for IBM products from a number of different sources: v Getting technical training v Searching knowledge bases v Contacting IBM Software Support on page xvi
xv
v Education links v Ability to submit problem management reports For more information, see the IBM Support Assistant Web site at http://www.ibm.com/software/support/isa/
xvi
an IBM sales representative or an IBM Business Partner. For more information about support for eServer software products, go to the IBM Technical Support Advantage Web page: http://www.ibm.com/servers/eserver/techsupport.html. If you are not sure what type of software maintenance contract you need, call 1-800-IBMSERV (1-800-426-7378) in the United States. For a list of telephone numbers of people who provide support for your location, go to the IBM Contacts Web page, http://techsupport.services.ibm.com/guides/contacts.html, and click the name of your geographic region. Perform these actions to contact IBM Software Support: 1. Determine the business impact of your problem. 2. Describe your problem and gather background information. 3. Submit your problem to IBM Software Support.
xvii
site http://www.ibm.com/software/support/probsub.html . Enter your information into the appropriate problem submission tool. By phone For the phone number to call in your country, go to the contacts page of the IBM Software Support Handbook on the Web and click the name of your geographic region. If the problem you submit is for a software defect or for missing or inaccurate documentation, IBM Software Support creates an Authorized Program Analysis Report (APAR). The APAR describes the problem in detail. Whenever possible, IBM Software Support provides a workaround for you to implement until the APAR is resolved and a fix is delivered. IBM publishes resolved APARs on the IBM product support Web pages daily, so that other users who experience the same problem can benefit from the same resolutions.
Accessibility features
Accessibility features help a user who has a physical disability, such as restricted mobility or limited vision, to use software products successfully. The major accessibility features of Tivoli Storage Manager are described in this topic. v Server and client command-line interfaces provide comprehensive control of Tivoli Storage Manager using a keyboard. v The Windows client-graphical interface can be navigated and operated using a keyboard. v The Web backup-archive client interface is HTML 4.0 compliant, and accessibility is limited only by the choice of Internet browser. v All user documentation is provided in HTML and PDF format. Descriptive text is provided for all documentation images. v The Tivoli Storage Manager for Windows Console follows Microsoft conventions for all keyboard navigation and access. Drag and Drop support is handled using the Microsoft Windows Accessibility option known as MouseKeys. For more information about MouseKeys and other Windows accessibility options, please refer to the Windows Online Help (keyword: MouseKeys).
xviii
v Does this problem occur for specific files, files in a specific directory, files on a specific drive, or all files? v Does this problem occur for clients on a specific network, subnet, or all parts of the network? v Does this problem occur only for the command-line client, the GUI client, or the web client? v Does the Tivoli Storage Manager always fail when processing the same file or directory, or is it different from run to run?
v A list of all the software installed on the client system. The client may experience problems due to interactions with other software on the machine or because of the maintenance levels of software that the client uses. v Client option sets defined on the server that apply to this client node. Issue the QUERY CLOPTSET command to search for the client option sets. v Server options. There are a number of server options that are used to manage the interaction between the client and server. An example of one such server option is TXNGROUPMAX. v Information about this node as it is defined to the server. To collect this information, issue the QUERY NODE nodeName F=D command using an administrative client connected to the server. v Schedule definitions for the schedules that apply to this node. These can be queried from the server using the QUERY SCHEDULE command. v The policy information configured for this node on the IBM Tivoli Storage Manager server. This information can be queried from the server using the QUERY DOMAIN, QUERY POLICYSET, QUERY MANAGEMENTCLASS, and QUERY COPYGROUP commands.
Note: The dsmerror.log file is used only as an example file in the message. With Tivoli Storage Manager Version 5.3 and later, client applications will not run without a log to which you can write and the system will deny write access to the log file named in the message. If the log does not exist, it will be created with default permissions. The following rules apply: v The name and the directory specified by the ERRORLOGNAME option are used. v If the option is absent, the name dsmerror.log in the directory specified in the DSM_LOG environment variable, if present, is used. Otherwise, the name dsmerror.log in the current working directory is used. | | | | Because default permissions are used, a log created by the root user may not be written to by any other user. If this is the case, the root user must set the proper permissions or access control lists (ACLs) to allow free use of the client application by all users who need to use it. If the log is successfully created, an error-free session will leave a zero-length (empty) log file. The Tivoli Storage Manager client does not try to create logs in the root directory. Message ANS1398E is displayed when the method in the first rule, above, directs the log file to be created in the root directory.
If a log file exists and can be located, Tivoli Storage Manager uses the method from the first rule. It can also be in the root directory if you so choose. Furthermore, whatever permissions you give that log file will be preserved by Tivoli Storage Manager code.
Recommendations
Create your log file in advance of first use, ensuring that all eligible users have write access to it. Define the ERRORLOGNAME option or the DSM_DIR environment variable to designate your predefined log file. Attention: A system log error indicates that you cannot write to the dsmerror.log file. Certain background Tivoli Storage Manager applications might not start due to errors writing to dsmerror.log. When these errors occur, a number of errors are recorded in the Windows system event log.
C:\Program Files\Tivoli\Tsm\baclient>net start "TSM Sched" The server scheduling service is starting. The server scheduling service could not be started. A service specific error occurred: 12.
Additional setup steps are required for non-root users in order for them to be able to run Tivoli Storage Manager applications or Tivoli Storage Manager for Data Protection applications. You will receive the ANS1398E error if you attempt to run Tivoli Storage Manager applications using an error log which has already been generated by root, that is left with default permissions. For data protection clients, you may only receive a Tivoli Storage Manager API error. Here is one method for setting up dsmerror.log for use by non-root users: 1. Set ERRORLOGNAME in dsm.sys. For example, errorLogName /var/msgs/tsm/dsmerror.log 2. Generate dsmerror.log. dsmc q sess 3. Modify the permissions on dsmerror.log to allow writing by all users. chmod 666 /var/msgs/tsm/dsmerror.log
DELETE CLOPTSET COPY CLOPTSET QUERY CLOPTSET UPDATE CLOPTSET REGISTER NODE QUERY NODE UPDATE NODE
DEFINE CLIENTOPT DELETE CLIENTOPT UPDATE CLIENTOPT v Tivoli Storage Manager client options: Tivoli Storage Manager Backup-Archive Client Installation and Users Guide. Note: A list of supported Tivoli Storage Manager client options can be found in the Tivoli Storage Manager Administrators Reference in the DEFINE CLIENTOPT command.
INCLEXCL
You can use the INCLEXCL option instead of INCLUDE or EXCLUDE. Options that are passed to the Tivoli Storage Manager client from the Tivoli Storage Manager server are provided in groups. This means that if the INCLUDE and EXCLUDE options are supported on the Tivoli Storage Manager server, that all INCLUDE options would be sent in a group and all EXCLUDE options would be sent in a group. You could not intermix these options to get desired results of including some files from excluded directories. Using the INCLEXCL option allows you to intermix and order the include and exclude options.
This sequence results in the exclusion of all files on the Novell NetWare SYS while the files in the SYS:\SYSTEM\* and SYS:\TMP\* paths are backed up.
The customer has a critical environment and restoring is a high priority. v The user wishes to use collocatebyfilespec so that all filespec data is stored on as few tapes as possible. This will enhance restore processing because fewer tape mounts are needed. v The user does not want the client to be able to override this option. Tivoli Storage Manager server command:
Define cloptset crit_rest description="Critical Restore Option Sets" Define clientopt crit_rest collocatebyfilespec yes force=yes Update node dale cloptset=crit_rest
The customer has machines on a slow network and limited space on the Tivoli Storage Manager server for data. v Use the compression option to limit the amount of data sent and stored. Tivoli Storage Manager server command:
Define Define Define Update cloptset space_rest description="Space Restriction Option Sets" clientopt space_rest compressalways no force=yes clientopt space_rest compression yes force=yes node mark cloptset=space_rest
The customer has a 24/7 database which cannot be stopped. Since the files are open, the server cannot back them up. The customer wants to exclude all files and subdirectories from Tivoli Storage Manager backups and add this to the existing space_rest client option set. v exclude.dir, specify the directory path to be excluded. Tivoli Storage Manager server command:
The customer has a fast network and wants to make the best possible use of Tivoli Storage Manager client resources to complete backups. v Wants resourceutilization set to the maximum amount. Tivoli Storage Manager server command:
Define cloptset unix_srv description="Unix Server Option Sets" Define clientopt unix_srv resourceutilization 10 force=yes
| | | |
using the DSMC SCHED command, Tivoli Storage Manager uses the nodename in the client options file to contact the server. However, when the scheduler runs as a Windows service, Tivoli Storage Manager uses the node name in the Windows registry instead. Issue the DSMCUTIL UPDATE SCHEDULE command to achieve the following results: v With the node parameter, address how to change the nodename used with the Tivoli Storage Manager scheduler service on Windows v With the validate:yes parameter, contact the Tivoli Storage Manager server to authenticate (and store the updated password) For more information, see the Changing the processing options used by the scheduler service section of the Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and Users Guide.
ANS1874E login denied to NetWare target service agent server-name or ANS2025E login failed to NetWare file server server-name
The ANS1874E and ANS2025E messages indicate an authentication problem between the Tivoli Storage Manager NetWare client and the NetWare server. The most probable cause of this error is either not ensuring that the proper Target Service Agent (TSA) is loaded, or not using the Novell distinguished name. The password for the NetWare TSA is encrypted and stored in the same file that stores the Tivoli Storage Manager password. The process of storing the password in this file is not related to the client option PASSWORDACCESS GENERATE. If you do not want the password stored locally, enter the NWPWFILE NO option in the dsm.opt file. Some things to verify: v LOAD TSAFS (depending on NetWare OS version). v For NDS backups, LOAD TSANDS. v Use the Novell typeful name. For example, instead of Admin, use .CN=Admin.O=IBM. v Ensure that NWPWFILE YES (the default setting) is in the dsm.opt options file. v Issue the DSMC QUERY TSA command to check to see if the Tivoli Storage Manager can connect to the file system TSA. v Issue the DSMC QUERY TSA NDS command to check to see if the server can connect to the NDS TSA. v Note: The DSMC QUERY TSA command can be used to store the password in the local password file and also to test to see if the stored password is valid. The following is a list of other things to check for when experiencing NetWare login failures: v The NetWare user-id has been disabled. v The NetWare user-id/password is invalid or expired. v The NetWare user-id has inadequate security access. v The NetWare user-id has insufficient rights to files and directories. v The NetWare user-id that is specified has a login restriction based on time-of-day. v The NetWare user-id that is specified has a Network address restriction.
v The NetWare user-id that is specified has a login restriction based on the number of concurrent connections. v NetWare is not allowing logins (DISABLE LOGIN was issued at the console). v The temporary files in SYS:\SYSTEM\TSA are corrupt, which can prevent logging in. Shut down all Tivoli Storage Manager processes and SMS modules and then either move or delete these temporary files. The following Novell TID reviews this issue: error: FFFDFFD7 when the tape software tries to login in order to backup nds v The SMDR configuration is corrupt. Reset the SMDR by issuing the following command: LOAD SMDR /NEW at the NetWare console. v If the message is displayed intermittently during a multiple session backup or restore, the probable cause is that there are not enough available Novell licenses. Each Tivoli Storage Manager session requires at least one licensed connection to the file server. Either add more NetWare licenses or reduce the RESOURCEUTILIZATION setting. The NetWare utility, Nwadmn32, can be used to determine the current number of licenses. v Check the SYS volume for free space. A lack of free space can cause the authentication failure. v If the above items have checked out, contact Novell for additional support to resolve this issue.
Client scheduling
The Tivoli Storage Manager administrator can schedule the Tivoli Storage Manager to perform tasks automatically. If you are experiencing problems with your client scheduler, there are several diagnostic steps to help determine the cause of the problem. The following are methods to help find the cause of the problem: v Issue the QUERY EVENT command to determine the status of a scheduled event. The server maintains a record of all scheduled events, which is useful when managing Tivoli Storage Manager schedules on numerous client machines. The QUERY EVENT command allows an administrator to view the event records on the server. A useful query that shows all of the event results for the previous day is:
query event * * begind=today-1 begint=00:00:00 endd=today-1 endt=23:59:59
The query results include a status field that gives a summary of the result for a specific event. By using the format=detailed option you can also see the result of an event that is the overall return code passed back by the Tivoli Storage Manager client. The following define the status and meaning of the event status codes that might exist for a scheduled event that has already taken place: Completed The scheduled client event ran to completion without a critical failure. There is a possibility that the event completed with some errors or warnings. Query the event with detailed format to inspect the event result for more information. The result can either be 0, 4, or 8.
Missed The schedule start window has elapsed without action from the Tivoli Storage Manager client. Common explanations for this result include the schedule service not running on the client, or a previously scheduled event not completing for the same or a different schedule. Started Typically, this indicates that a scheduled event has begun processing. However, if an event showing a status of Started is followed by one or more Missed events, it is possible that the client scheduler encountered a hang while processing that event. One common cause for a hanging client schedule is the occurrence of a user interaction prompt such as a prompt for an encryption key that is not responded to. Failed The client event ran to completion; however, a critical failure occurred. v If a scheduled event is missed but other consecutive scheduled events for that node show a result of Completed, check for errors in the server activity log and the client schedule log for more information. When checking the server activity log, narrow the query results down to the time frame surrounding the scheduled event. Begin the event log query at a time shortly before the start window of the scheduled event in question. For example, if investigating the following suspect event:
Scheduled Start Actual Start Schedule Name Node Name Status -------------------- -------------------- ------------- ------------- ------08/21/2003 08:27:33 HOURLY NODEA Missed
The Tivoli Storage Manager client keeps a detailed log of all scheduled activities. If queries of the servers activity log cannot explain a failed scheduled event, check the clients local schedule log. You must have access to the client machine in order to inspect the schedule log. The schedule log file is typically stored in the same directory as the dsmerror.log in a file named dsmsched.log. The location of the log file can be specified using client options, so you may need to refer to the options file to see if the SCHEDLOGNAME option was used to relocate the log file. On Windows, the schedule log can also be relocated by an option setting which is part of the schedule service definition. You can issue the DSMCUTIL QUERY command to check if this option has been set. When you locate the schedule log, search through the file to find the time period corresponding with the start date and time of the scheduled event in question. The following are some tips on what you might search: - If you are investigating a missed event, check the details of the previous event, including the time at which the previous event completed. - If you are investigating a failed event, look for error messages that explain the failure (such as the server session limit being exceeded). - When an explanation is still not clear, the last place to check is the clients error log file (usually named dsmerror.log). v Use the SHOW PENDING diagnostic tool to display schedules, nodes, and when they should next run. v Other helpful information you can use when diagnosing the reasons why a node missed a scheduled event include viewing the dsm.sys stanza for the node and the MANAGEDSERVICES, PRESCHEDCMD, and POSTSCHEDCMD option values from the client options file.
10
v Start and stop the client service. When you manage a large number of clients running scheduler processes, you might want to be able to start and stop the client service from a remote machine. The Tivoli Storage Manager client for Windows provides a utility to assist with remote management of the scheduler service. For other platforms, standard operating system utilities are required. Windows To remotely manage the client scheduler service using dsmcutil with the /machine: option, you must have administrative rights in the domain of the target machine. To determine whether the scheduler service is running on a remote machine, check the Current Status field from a query similar to the following:
dsmcutil query /name:"TSM Client Scheduler" /machine:ntserv1.ibm.com
Issue the following queries to restart a scheduler service that is missing schedules:
dsmcutil stop /name:"TSM Client Scheduler" /machine:ntserv1.ibm.com dsmcutil start /name:"TSM Client Scheduler" /machine:ntserv1.ibm.com
Consequently, if you use the CAD to manage the scheduler, you may have to restart the CAD service or stop the scheduler service and restart the CAD service with the following queries:
dsmcutil dsmcutil dsmcutil dsmcutil dsmcutil query /name:"TSM Client Scheduler" /machine:ntserv1.ibm.com query /name:"TSM Client Acceptor" /machine:ntserv1.ibm.com stop /name:"TSM Client Scheduler" /machine:ntserv1.ibm.com stop /name:"TSM Client Acceptor" /machine:ntserv1.ibm.com start /name:"TSM Client Acceptor" /machine:ntserv1.ibm.com
UNIX A shell script can be written to search for and stop running Tivoli Storage Manager schedulers or client acceptor processes, and then restart the processes. Software products such as Symarks Power Broker allow Tivoli Storage Manager administrators limited access to UNIX servers for the purpose of managing the scheduler processes, and copying off the schedule log file. The following shell script is an example of how to recycle the Tivoli Storage Manager scheduler process:
#!/bin/ksh # Use the following script to kill the currently running instance # of the TSM scheduler, and restart the scheduler in nohup mode. # # This script will not work properly if more than one scheduler # process is running. # If necessary, the following variables can be customized to allow an # alternate options file to be used. # export DSM_DIR= # export DSM_CONFIG= # export PATH=$PATH:$DSM_DIR # Extract the PID for the running TSM Scheduler PID=$(ps -ef | grep "dsmc sched" | grep -v "grep" | awk {print $2}); print "Original TSM scheduler process using PID=$PID" # Kill the scheduler kill -9 $PID # Restart the scheduler with nohup, redirecting all output to NULL # Output will still be logged in the dsmsched.log nohup dsmc sched 2>&1 > /dev/null & # Extract the PID for the running TSM Scheduler PID=$(ps -ef | grep "dsmc sched" | grep -v "grep" | awk {print $2}); print "New TSM scheduler process using PID=$PID"
11
The following files are automatically excluded: Windows v Files enumerated in the HKLM\SYSTEM\CurrentControlSet\Control\ BackupRestore\FilesNotToBackup registry key v The client staging directory C:\ADSM.SYS v RSM database files (these files are processed in the system object or system state backup) v IIS metafiles (these files are processed in the system object or system state backup) v Registry files (these files are processed in the system object or system state backup) v Client trace file UNIX Client trace file NetWare Client trace file Macintosh v Volatile, temporary, and device files used by the operating system v Client trace file
12
| | |
To process these Windows system files, you must issue a DSMC BACKUP SYSTEMOBJECT command (Windows 2000 and Windows XP) or a DSMC BACKUP SYSTEMSTATE command (Windows 2003 and Windows Vista). The Windows system files are excluded from the system drive backup processing because they are usually sent during the system object or system state backups. System files are boot files, catalog files, performance counters, and files protected by the Windows system file protection (sfp). These files will not be processed during backup of the system drive but are excluded from the system drive processing internally instead of relying on explicit exclude statements. This is due to the sheer number of exclude statements that would be needed to represent all of these files. Backup performance can be adversely affected. You can issue the Backup-Archive client DSMC QUERY SYSTEMINFO command to identify the Windows system files. The output of this command is written to the dsminfo.txt file.
(partial contents of the dsmfino.txt file) ===================================================================== SFP c:\windows\system32\ahui.exe (protected) c:\windows\system32\apphelp.dll (protected) c:\windows\apppatch\apphelp.sdb (protected) c:\windows\system32\asycfilt.dll (protected)
The include statement in this example indicates that all files with a .o extension should be included, but the preceding exclude.dir statement will exclude all files in the /usr directory, even if they have a .o extension. This would be true regardless of the order of the two statements. If you want to back up all the files ending with .o use the following syntax:
exclude /usr/.../* include /.../*.o
When using wildcards in INCLUDE/EXCLUDE, use * if you want all the files rather than *.*.*.*, which means to include/exclude all files containing at least one dot (.) character, while * means to include/exclude all files. If you use *.*, files containing no dot characters (such as C:\MYDIR\MYFILE) will not be filtered.
13
If you issue a selective backup from the command-line client of a single file, the file is processed, even if there is an EXCLUDE.DIR statement which excludes one of the parent directories. For example, consider the following UNIX include/exclude statement which is used in subsequent command-line actions:
exclude.dir /home/spike
The selective backup shown below will always result in the file being processed:
dsmc selective /home/spike/my.file
If you issue a selective backup using a wildcard, no files are processed because the directory is excluded:
dsmc selective "/home/spike/my.*"
Note: A subsequent incremental backup of the /home file system will inactivate the file /home/spike/my.file. EXCLUDE.DIR statements should not be terminated with a directory delimiter. The following are examples of invalid EXCLUDE.DIR statements, due to a terminating directory delimiter:
exclude.dir exclude.dir exclude.dir exclude.dir /usr/ (UNIX) c:\directory\ (Windows) SYS:\PUBLIC\ (NetWare) Panther:User: (Macintosh)
In the example above, the users indicated that they wanted all files that end with a .o extension to be included in the local options file, but the server sent the client an option to exclude all files that end with a .o extension. The server-provided option prevails.
14
This statement indicates that the /usr/file.o file is excluded from backup processing. The include.compress statement indicates that if a file is a candidate for backup processing and matches the pattern /usr/*.o; then compress the file. The include.compress statement should not be interpreted as backup all files that match the pattern /usr/*.o and compress them. If you want to back up the /usr/file.o file in this example, you must remove the exclude statement.
15
If you want to use an include statement for all files under a specific directory, ensure that the slashes and volume delimiters are correct. If you want to exclude all of the files under a directory called home, or simply all files, see the following examples: Using the backwards slash \ and the volume delimiter : (Windows)
*include everything in the c:\home directory include c:\home\...\* *include everything include *:\...\*
Using either slash (NetWare) but the volume name is required with the volume delimiter :
*include everything in the SYS:\HOME directory include sys:\home\...\* or include sys:/home/.../* *include everything include *:\...\* or include *:/.../*
Further investigation into using the backup-archive client DSMC QUERY INCLEXCL command shows that this statement is coming from the Tivoli Storage Manager server client options set:
tsm> q inclexcl *** FILE INCLUDE/EXCLUDE *** Mode Function Pattern (match from top down) Source File ---- --------- ------------------------------ ----------------Excl All c:\home\*.txt Server
16
Ensure that the system has installed the correct version of the libdevmapper. Perform the following steps to determine the installed version: 1. Issue the # DMSETUP VERSION command. The output will display similar to the following output:
Library version: 1.00.09-ioctl (2004-03-31) Driver version: 4.4.0
The library version must be version 1.01 or above. If you have a lower version, please upgrade the devmapper rpm at the following Web site: http://www.novell.com. 2. Verify the installation after the upgrade.
dumas:/develop/rem/peterman # rpm -Uvh device-mapper-1.01.01-1.6.i586.rpm Preparing... ########################################### [100%] 1:device-mapper ########################################### [100%] dumas:/develop/rem/peterman # rpm -q -a |grep device-mapper device-mapper-1.01.01-1.6
You can also check the /lib directory to see the correct versions installed. A system with the right levels will have the following:
17
# ls -l /lib/libdev* lrwxrwxrwx 1 root root 20 Jul 5 11:42 /lib/libdevmapper.so ->libdevmapper.so.1.01 -rwxr-xr-x 1 root root 24490 May 23 2005 /lib/libdevmapper.so.1.00 -rwxr-xr-x 1 root root 28216 May 23 2005 /lib/libdevmapper.so.1.01
If this command fails with error Snapshot: Required device-mapper target(s) not detected in your kernel, this means that the :dm_snapshot kernel module is not loaded. This command could also fail for other reasons as well, which may result in similar Tivoli Storage Manager behavior. The following is an example of the output generated when an image backup fails with error message ANS1258E, The image snapshot operation failed.
dsmerror.log : 05/31/2006 15:14:36 ANS1259E The image snapshot operation failed. Diagnostic text: tsmStartSnapshot. 05/31/2006 15:14:38 ANS1259E The image snapshot operation failed. Diagnostic text: tsmTerminateSnapshot. 05/31/2006 15:14:38 ANS1228E Sending of object /fs1 failed 05/31/2006 15:14:38 ANS1258E The image snapshot operation failed.
Perform the following steps to load the modules: 1. Verify that the module is not loaded. See the following example:
suzie:/home2/rat # lsmod |grep dm_ dm_mod 112104 6
3. Verify that the previous step is successful. See the following example:
suzie:/home2/rat # lsmod |grep dm_ dm_snapshot 44024 0 dm_mod 112104 6 dm_snapshot suzie:/home2/rat #
4. Create a Snapshot from the shell prompt. See the following example:
suzie:/etc # /sbin/lvcreate -L 16384K -n tsmsnap -s /dev/system/lv01 Logical volume "tsmsnap" created
5. Remove the Snapshot that was created in the previous step. See the following example:
suzie:/etc # lvremove /dev/system/tsmsnap Do you really want to remove active logical volume "tsmsnap"? [y/n]: y Logical volume "tsmsnap" successfully removed suzie:/etc #
18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Resolving errors during AIX JFS2 snapshot-based backup-archive and image backup
During Tivoli Storage Manager termination, the Tivoli Storage Manager client deletes the AIX enhanced journaled file system (JFS2) snapshot that is created during the backup process. However, there are situations in which AIX might fail the snapshot delete request made by Tivoli Storage Manager. The following are situations where a snapshot delete request might fail: v The Control-c keystroke is issued during a Tivoli Storage Manager snapshot backup process. The JFS2 snapshot unmount request might fail with a Device Busy error, due to the Tivoli Storage Manager process being in the middle of accessing the snapshot. v Two Tivoli Storage Manager snapshot backup requests are invoked concurrently for the same file system. For example, if the dsmc backup image /fs1 backup request is submitted from one console, and at the same time a dsmc backup image /fs1 backup request is issued from another console. If the process from the first console creates the first snapshot for /fs1 and the second process from the second console creates the second snapshot for /fs1, and if the second process finishes first and tries to delete the snapshot, AIX fails the delete request. v Two Tivoli Storage Manager snapshot backup requests are invoked concurrently for two virtual mount points whose source file system is the same. For example, issuing dsmc incr /fs1/level1/dir1 from one console and dsmc incr /fs1/level2/level3/dir3 from a second console, concurrently. AIX expects snapshot delete requests to be issued in a certain order with the oldest snapshot deletion requested first, and the next oldest snapshot deletion requested next, and so on. If Tivoli Storage Manager cannot honor the sequence due to concurrent processes creating snapshots for the same file system, AIX fails the delete requests. In the previous examples, Tivoli Storage Manager logs a warning message asking the user to delete the snapshots manually. Issue the following commands, in order, to perform a manual snapshot deletion: 1. SNAPSHOT -Q -C <SRCFS> 2. DF -K 3. UNMOUNT -F /TSM* 4. RMDIR /TSM* 5. SNAPSHOT -D /DEV/TSM* If the snapshot delete process fails with Device Busy or some other error message, issue the - UNMOUNT -F <SRCFS> command to unmount the source file system. Retry snapshot delete. 6. LS -L /DEV/TSM* If any /DEV/TSM* logical volumes remain, issue the - RMLV -F TSM* command. 7. If you have an unmounted source file system, issue the - MOUNT <SRCFS> command to mount it. If any snapshots are not deleted during a previous Tivoli Storage Manager process, Tivoli Storage Manager tries to delete the snapshots during its next invocation. The reason for this is that while older snapshots remain, AIX fails deletion requests for newer snapshots for a given file system. The following are some cases where Tivoli Storage Manager does not try to delete older snapshots: v If the snapshot was not created by Tivoli Storage Manager. Tivoli Storage Manager names its snapshots with a tsm prefix to distinguish them from other snapshots created for the same file system. If the snapshot was not created by
Chapter 1. Resolving client problems
19
| | | | | | | | | | | | | | | | | | | | |
Tivoli Storage Manager, Tivoli Storage Manager produces an error message that asks the user to delete the older snapshot and retry the operation. v If the snapshot is created by Tivoli Storage Manager but is still mounted, the snapshot is being used by some other Tivoli Storage Manager process. v If the snapshot is created by Tivoli Storage Manager, is not mounted, but is newly created, the snapshot may have just been created by some other Tivoli Storage Manager process. In all such cases, you might have to perform a manual deletion. If any unused older snapshots are existing, this causes subsequent Tivoli Storage Manager backups to fail to delete snapshots. Note: There are AIX defect fixes related to JFS2 snapshots in AIX 5.3.0.70 or later and AIX 6.1 or later. If the fixes are not applied, an AIX system crash can occur or Tivoli Storage Manager might hang during snapshot deletion and snapshot query processes. It may also cause data corruption during used block image backup. Therefore, Tivoli Storage Manager will not perform snapshot monitoring, will not perform the snapshot deletion feature described above, and will not perform used block image backup unless AIX is at the AIX 5.3.0.70 or later and AIX 6.1 or later levels. In order to exploit these features, ensure that your operating system level is at AIX 5.3.0.70 or later and AIX 6.1 or later.
20
v What is the exact level of the Tivoli Storage Manager storage agent (if LAN-free environment)? v What is the Tivoli Storage Manager Storage Agent platform and operating system level (if LAN-free environment)? v List all applications running on the system. v List the steps required to recreate the problem (if the problem can be recreated). v If you cannot recreate the problem, list the steps that caused the problem.
21
SERVERNAME srvr1.cmpron COMPRESSION YES ERRORNEOUS_OPTION 12345 TCPSERVERADDRESS machine.company.com SERVERNAME srvr1.pwdfl PASSWORDACCESS GENERATE PASSWORDDIR .
TCPSERVERADDRESS machine.company.com 2. Verify that the API detects this error. You can use the sample API program dapismp for this purpose.
# dapismp ... Enter selection ==>0 Node name:node1 Owner name: Password: API Config file: Session options: User Name: User pswd: Are the above responses correct (y/n/q)? Doing signon for node node1, owner, with password *** Init failed: ANS0220E (RC400) An invalid option was found during option parsing.
The wrong options file was updated if no error is reported. 3. Check the environment variable values that were previously mentioned or repeat Steps 1 on page 21 and step 2 with a different options file/server stanza. 4. Remove the option inserted in Step 1 on page 21. Tivoli Storage Manager API error log file. The default API error log is dsierror.log. Any trace files created for the API (the recommended trace flags are api, api_detail, or verbdetail). Output from any failed command or operation. This may be either the console output redirected to a file or an actual screen image of the failure. The output from the Tivoli Storage Manager server QUERY SYSTEM command. Tivoli Storage Manager server activity log. The IBM Tivoli Storage Manager administrator can view this log for you if you do not have a Tivoli Storage Manager administrator user ID and password. If the API client is configured for LAN-free data movement, collect the options file for the Tivoli Storage Manager storage agent. The default name for this options file is dsmsta.opt. A short program or sections of the application source code invoking the Tivoli Storage Manager API function calls that are suspected to cause the problem.
v v v v v
Determining if data is sent to the IBM Tivoli Storage Manager storage agent rather than the server
You need to know if your data is being sent to the Tivoli Storage Manager storage agent, rather than a server. Perform the following steps to verify that the data is being sent to the Tivoli Storage Manager storage agent, rather than the server:
22
1. Add the following trace options to the client options file prior to backing up or archiving objects: v TRACEFILE <trace file name> v TRACEFLAGS api api_detail verbdetail 2. Examine the trace file after the operation and locate a statement that looks similar to the following statement:
dsmSendObj ENTRY:... objNameP: <the file name>
The trace statement indicates whether the object totalLFBytesSent was sent to the Tivoli Storage Manager storage agent. If totalLFBytesSent is 0 0, the data was sent directly to the Tivoli Storage Manager server. Alternatively, your application itself can determine whether the data was sent through a LAN-free path by using the dsmEndSendObjEx function call and the dsmEndSendObjExOut_t data structure.
/*-------------------------------------------------------------------------+ | Type definition for dsmEndSendObjExOut_t +-------------------------------------------------------------------------*/ typedef struct dsmEndSendObjExOut_t { dsUint16_t stVersion; /* structure version */ dsStruct64_t totalBytesSent; /* total bytes read from app */ dsmBool_t objCompressed; /* was object compressed */ dsStruct64_t totalCompressSize; /* total size after compress */ dsStruct64_t totalLFBytesSent; /* total bytes sent LAN Free */ dsUint8_t encryptionType; /* type of encryption used */ }dsmEndSendObjExOut_t; totalLFBytesSent - The total LAN-free bytes that were sent. For example: ... rc = dsmEndSendObjEx(&endSendObjExIn, &endSendObjExOut); if (rc) { printf("*** dsmEndSendObjEx failed: "); rcApiOut(dsmHandle, rc); } else { dI64toCh(&endSendObjExOut.totalLFBytesSent,t,10); format_number(t,t2); printf("LAN-free bytes sent: %s\n", t2); } ...
See API Function Calls in Using the Application Programming Interface for more details.
23
(406). For example, the following options file is not readable by a non-root user, therefore the files permissions need to be updated:
$ ls -l $DSMI_CONFIG -rwx-----1 root sys 86 Oct 7 13:07 /testfsapi/callmt_nr/dsm.opt $ su root Password: # chmod a+r /testfsapi/callmt_nr/dsm.opt # exit $ ls -l $DSMI_CONFIG -rwxr--r-1 root sys 86 Oct 7 13:07 /testfsapi/callmt_nr/dsm.opt
2. Set the DSMI_DIR environment variable to the API installation directory. Verify that the non-root user has read permission for the system options file specified by $DSMI_DIR/dsm.sys.
$ export DSMI_DIR=/opt/tivoli/tsm/client/api/bin64 $ ls -l $DSMI_DIR/dsm.sys -rw-r--r-1 root sys 4712 Oct 19 18:07 /opt/tivoli/tsm/client/api/bin64/dsm.sys
3. Set the DSMI_LOG environment variable. Verify that the non-root user has write permission for this directory. For example, the following DSMI_LOG directory is owned by a non-root user:
$ ls -ld $DSMI_LOG drwxr-xr-x 2 apitest users 96 Oct 19 17:56 /testfsapi/callmt_nr/logs
If PASSWORDACCESS GENERATE is set in system options file dsm.sys, perform steps 4 and 5, otherwise go to step 6. 4. Check the ownership and permissions of the Trusted Communication Agent (TCA). This information is in the directory indicated by the DSMI_DIR environment variable. For example, the following TCA has the correct ownership and permissions:
$ ls -l $DSMI_DIR/dsmtca -rwsr-xr-x 1 root bin 5021160 Oct 14 09:48 /opt/tivoli/tsm/client/api/bin64/dsmtca
Wrong permissions or ownership will result in a DSM_RC_AUTH_FAILURE (137) returned from dsmInit. Additionally, it is imperative that you use the same version of the API library and dsmtca. Mixed versions will result in errors.
Error : calling program and dsmtca are not compatible calling program build date : Mon Oct 18 21:15:59 2004 Mon Oct 18 21:15:59 2004 TCA build date : Wed Oct 13 16:48:03 2004 Wed Oct 13 16:48:03 2004 *** Init failed: ANS0282E (RC168) Password file is not available.
5. The root user must generate the TSM.PWD password file using either the IBM Tivoli Storage Manager backup-archive client or the dapismp sample API application. Location of the password file is determined by the PASSWORDDIR option in the dsm.sys system options file. In the following example, the sample API application generates the TSM.PWD password file for a node whose password is oddesy.
24
# dapismp ************************************************************************* * Welcome to the sample application for the Tivoli Storage Manager API. * * API Library Version = 5.3.0.0 * ************************************************************************* Choose one of the following actions to test: 0. Signon 1. Backup 2. Restore 3. Archive 4. Retrieve 5. Queries 6. Change Password 7. Utilities : Deletes, Updates, Logevent, SetAccess, RetentionEvent 8. Set preferences, envSetUp 9. Exit to system 10. Restore/Retrieve Without Offset Prompt 11. Extended Signon Enter selection ==>0 Node name: Owner name: Password:oddesy API Config file: Session options: User Name: User pswd: Are the above responses correct (y/n/q)? Doing signon for node, owner, with password oddesy Handle on return = 1 Choose one of the following actions to test: 0. Signon 1. Backup 2. Restore 3. Archive 4. Retrieve 5. Queries 6. Change Password 7. Utilities : Deletes, Updates, Logevent, SetAccess, RetentionEvent 8. Set preferences, envSetUp 9. Exit to system 10. Restore/Retrieve Without Offset Prompt 11. Extended Signon Enter selection ==>9 # ls -l TSM.PWD -rw------- 1 root sys 121 Oct 19 18:28 TSM.PWD Function call dsmInit returns DSM_RC_NO_PASS_FILE (168), if the password file is not present in the directory specified by the PASSWORDDIR option.
6. If tracing is enabled, verify that the non-root user has write permission for the file indicated by issuing the TRACEFILE option.
25
v The journal for the file system being backed up must be in the valid state. v The Tivoli Storage Manager node and server that the backup is using must match the node and server for which the journal is valid. The journal daemon journalizes a file system after you list the file system in the tsmjbbd.ini configuration file. See the following configuration information:
[JournaledFileSystemSettings] ; ; List of journalized file systems JournaledFileSystems=c:
If a journal is to be valid, you must perform a full incremental backup on the corresponding file system while the file system is actively being journalized. This full incremental backup must set the Last Backup Completed date on the Tivoli Storage Manager server file space in order for the journal to be set to valid. You can view the Last Backup Completed date by issuing the QUERY FILESPACE server command. After the journal is set to the valid state, subsequent backups by the same node to the same Tivoli Storage Manager server will be journal-based. If a backup uses a different node and/or server, the backup will be non-journal-based but the journal will remain valid for the original node and server, and backups to the original node and server will be journal-based. The following message is an example of what is written to the Windows Application Event Log when a journal is initially set to valid:
Journal set to valid for fs H: and will be used for backup by node GSHLAGER3 to server GSHLAGER2_SERVER1.
The Journal Database Viewing Utility may also be used to determine the current state of a journal. If a valid journal is restarted, backups will be non-journal based until the journal is re-validated. The following message is written to the Windows Application Eventlog when a journal is restarted:
Journal database c:\tsmjournal\tsmH__.jdb for fs H: has been deleted and reset to the invalid state.
Specific messages detailing the specific cause of the journal restart are also written to both the eventlog and the journal errorlog (jbberror.log). The following are reasons for restarting a valid journal: v Error conditions in the journal daemon buffer overflow errors caused by excessive change activity on the journal file system being monitored for changes journal database access errors (disk full errors, etc.) v Request by a backup client v Clients will issue a journal restart request when it is determined that a journal file system lacks integrity for one of the following reasons: The server filespace no longer exists The server filespace was deleted after the last backup The node policy set was updated after the last backup The Last Backup Completed or Last Backup Started dates are not valid (not set)
26
The Journal Daemon may be started from a Windows command prompt as follows: tsmjbbd.exe i
27
Valid for Node GSHLAGER3 Number of DB Entries 22 Enter request on a single line, in the following format: Req-Type [Entry-key] Req-type may be one of the following: Del Delete a row from the database. The fully-qualified case sensitive file name is required. Find Find the entry whose key is the argument. List Print all the entries to stdout. No arguments are required. Quit Please enter your request: find H:\dbview.example\Dir3Depth1\F2.txt Located Journal Database Record: ----------------------------------------Object Name : H:\dbview.example\Dir3Depth1\F2.txt Action : Modify Object Type : File Inserted : Fri Dec 01 10:15:28 2006 Object Time : Fri Dec 01 14:15:28 2006 Hit Count : -2110169276 ----------------------------------------Please enter your request: quit
Using open file support and the logical volume snapshot agent
There are several methods in determining problems with the open file support (OFS) and logical volume snapshot agent (LVSA).
Ensure that you direct the trace file to a location with many GB of free space. 4. Run the dbgview.exe executable prior to running the Tivoli Storage Manager client. 5. Configure dbgview.exe to log the output to a file through the File Log to File option.
28
Forcing a dump for a system hang when a logical volume snapshot agent problem is suspected
If you have ensured proper configuration and a dump is not taken, a dump may need to be forced when the system hangs. There are two methods you might employ: 1. If you have the opportunity to restart and recreate the hang, see Microsoft Knowledge Base article 244138 Windows feature allows a Memory.dmp file to be generated with the keyboard. This method requires a registry change and reboot to enable an on-demand dump when the right CTRL key is held and SCROLL LOCK key is pressed twice. This method may also be required if the BANG! Tool mentioned below is unable to cause a bug check and memory dump. 2. If the system is hung and you cannot afford a reboot and recreate: a. Download and install BANG! from the Windows Driver Developers website. Follow instructions provided in the BANG! package/website. b. Run BANG! and press the Crash Now button. The system should get a blue screen and generate a full memory dump.
29
Note: IBM does not support the BANG! utility. Any questions or problems regarding the BANG! utility should be reported to the Windows Driver Developers website.
30
SETVSSDELAY Specifies the number of seconds to wait between retries of the VSS backup process, should a transient error occur. The default value is 60 seconds. Option file example:
retry 10 times at 300 second intervals TESTFLAG SETVSSMAXRETRY:10 TESTFLAG SETVSSDELAY:300
31
Examine the application and system event logs focusing on the error events created by the VolSnap and VSS sources at the time of failure. You might want to extract the germane events from the log to isolate the problem and have a more productive interaction with MS support. Perform the following steps to perform a VSS trace: 1. Create a tracing.reg file using the contents shown below and change the TraceFile entry to point to a volume that is not going to have a shadow copy created. Note the double-backslash delimiter usage; you must enter \\ as the delimiter for each backslash in the path you wish to specify. 2. Double-click the file from within Windows Explorer to install tracing.reg. 3. Reproduce the problem. 4. Turn off tracing by deleting the HKEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\Services\VSS\Debug\Tracing key. The following are the contents of the tracefile.reg registry file:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\Debug\Tracing] "TraceFile"="c:\\trace.txt" "TraceLevel"=dword:ffffffff "TraceEnterExit"=dword:00000001 "TraceToFile"=dword:00000001 "TraceToDebugger"=dword:00000000 "TraceFileLineInfo"=dword:00000001 "TraceForceFlush"=dword:00000000
32
| |
Issue the VSSADMIN LIST command to query the VSS writer state to ensure that VSS is in a stable/ready state.
CACHE
Description
Displays information about the subfile cache.
Recommendation
For Microsoft Windows clients configured to use subfile backup, this is useful for displaying information about the configured subfile cache.
CLUSTER
Description
Displays information about the disk mappings in a Microsoft Cluster.
Recommendation
Useful for displaying information about the disk mapping (configuration) in a Microsoft Cluster environment.
DOMAIN
Description
Displays information about the configured domains to use for incremental backup processing.
Recommendation
Useful for displaying and summarizing the DOMAIN, DOMAIN.IMAGE, and DOMAIN.NAS client options.
OPTIONS
Description
Displays the client options.
33
Recommendation
Useful to determine the settings of client options.
OPTTABLE
Description
Displays information about options that are administered by the server versus those that are managed by the client option file.
Recommendation
The client may receive its option settings from either the client option file or from the server. To receive the option from the server, a client option set must be defined using the DEFINECLOPTSET command. This command helps you to determine whether the client is using an option configured from the option file or an option configured from a client option set defined on the server.
PLUGINS
Description
Displays information about installed plug-ins for this client.
Recommendation
The client uses plug-ins to provide additional capabilities, such as image backup. This SHOW command displays the plug-ins that are installed for this client as well as attributes of the various plug-ins, such as their version, type, and location.
SESSION
Description
Displays the capabilities that this client is able to have for this connection to the server.
Recommendation
The client and server report and negotiate the capabilities that each has when a session is started by a client to a server. This SHOW command reports the capabilities available by this server and client.
SYSTEMOBJECT
Description
For Windows 2000 and XP clients, displays the SYSTEM OBJECT data that is available on this client.
Recommendation
It is helpful in determining which SYSTEM OBJECT files are installed on this Windows client and those that could be backed up.
34
SYSTEMSERVICES
Description
For Windows 2003 clients, displays the SYSTEM SERVICES data that is available on this client.
Recommendation
It is helpful in determining which SYSTEM SERVICES files are installed on this Windows client and those that could be backed up. Note: SYSTEMSERVICES is valid for Tivoli Storage Manager version 5.4.
SYSTEMSTATE
Description
For Windows 2003 and Windows Vista clients, displays the SYSTEM STATE data that is available on this client.
Recommendation
It is helpful in determining which SYSTEM STATE files are installed on this Windows machine and those that could be backed up.
TRACEFLAGS
Description
Displays information about trace classes and aggregate trace classes for this client.
Recommendation
It is helpful in determining which trace classes and aggregate trace classes could be used for this client.
VERSION
Description
Displays the version and build date for this client.
Recommendation
It is helpful in determining which client is running and when it was built.
35
36
Checking HELP for Tivoli Storage Manager messages issued for the problem
Tivoli Storage Manager messages provide additional information beyond just the message itself. The Explanation, System Action, or User Response sections of the message may provide additional information about the problem. Often, this supplemental information about the message may provide the necessary steps to resolve the problem.
37
38
To get more information on the failure, begin tracing the UNICODE trace class and repeat the action that caused the error message to occur. Check the server README file for any platform-specific requirements for language installation. Ensure that the locales indicated by the problem code pages are installed and any requirements listed in the README file are installed.
where XXXNNN is an identifier assigned to the assertion failure. Examples of this identifier are DBREC106, BUF011, or TBUNDO096. Other server messages that are indicative of a crash are ANR7836S and ANR7838S. Whether the server terminated as a result of an assert or the system trap handler, the following information should be collected and reported to IBM service for the situation to be diagnosed: v Server error file (dsmserv.err) When the server crashes, it appends information to the dsmserv.err file which is located in the same directory as the server. For the Windows platform, if the server is running as a service, then the file will be named dsmsvc.err. For the z/OS platform, there is no separate error file. The information will be in the JES joblog and in the system log. For z/OS they are generally written by WTO with routecode=11. For HP-UX, it is possible to use the following script to get basic thread information from the core on the customer system without sending it to IBM. The procedure is as follows: 1. Make sure gdb is installed on the customer system. 2. Copy the gt shell script to the server bin directory (where the server executable and core file are located). 3. Make sure the script is an executable (chmod a+x gt). 4. Invoke the script with the paths/names of the executable (default is ./dsmserv) and the core (default is ./dsmcore). Output will be in file dsm_gdb.info (which should be sent to IBM). For Linux and AIX, version 5.3 and later, the trap handler is disabled. This prevents the function traceback from printing on the console and in dsmserv.err. This change is required in order to ensure that we will get a more complete core file. As part of disabling the trap handler, a new script, getcoreinfo, is in the Linux packages. The getcoreinfo script gets the function
Chapter 2. Resolving server problems
39
traceback for the failing thread and registers values and function traceback for all other threads. The amount of information available in the core for other threads is still incomplete on some Linux platforms/distributions. See the getcoreinfo script (in the server bin directory) for more details. v System image (core file) Typically, a core file or other system image of the memory is in use by the Tivoli Storage Manager at the time of the failure. In each case, this file should be renamed to prevent it from being overwritten by a later crash. For example a file should be renamed to core.Aug29 instead of just core. The type and name of the core file varies depending upon the platform: For UNIX systems, such as AIX, HP-UX, Sun Solaris, PASE and Linux, there is typically a file created called core. Be sure there is enough space in the server directory to accommodate a dump operation. It is common to have a dump file as large as 2 GB for the 32-bit Tivoli Storage Manager server. Additionally, make sure the ulimit for core files is set to unlimited to prevent the dump file from being truncated. For Windows systems before 5.2, a drwtsn.dmp file is created if the system is configured to do so. From a DOS prompt, issue drwtsn32 -i to enable dumps. Beginning with 5.2, the dump is performed automatically through a system API call. If the server is running as a service, the dump file is called dsmsvc.dmp. Otherwise, the dump is called dsmserv.dmp. For a z/OS server, a dump should have been created based upon what was specified in the SYSMDUMP DD statement for the JCL used to start the server. A SYSMDUMP should be used instead of a SYSABEND or SYSUDUMP dump, because a SYSMDUMP contains more useful debugging information. Ensure that the dump options for SYSMDUMP include RGN, LSQA, TRT, CSA, SUM, SWA, and NUC on systems where a Tivoli Storage Manager address space will run. To display the current options, issue the z/OS command DISPLAY DUMP,OPTIONS. You can issue the CHNGDUMP command to alter the SYSMDUMP options. Note that this will only change the parameters until the next IPL is performed. If the system was not configured to capture a core file or the system did not have sufficient space to create a complete core file, it may be of limited use in determining the cause of the problem. v Libraries and other files For the UNIX platforms, core files are specific to the application, libraries, and other system resources in use by the application on the system where it was running. To accurately read the core file on our system, we may need all of the below files (located in the directory where the server is installed): dsmserv dsmlicense ndmpspi dsmcored dsmaio centera The needed library files vary between all the platforms: For AIX/PASE systems collect the following files: - /usr/ccs/lib/libpthreads.a - /usr/ccs/lib/libc.a - Collect any other loaded libraries such as message exits. To see what libraries are loaded, invoke dbx by issuing the DBX DSMSERV CORE_FILE
40
command. Then, from the dbx prompt, issue the MAP command. This will show all of the libraries that are loaded and needed for core analysis. For HP-UX, issue the CHATR DSMSERV command. Send in all the dynamic shared libraries. For example: - /usr/lib/libpthread.1 - /usr/lib/libm.2 - /usr/lib/libstd.2 - /usr/lib/libstream.2 - /usr/lib/libCsup.2 - /usr/lib/libcl.2 - /usr/lib/libc.2 - /usr/lib/libdld.2 For Linux, issue the LDD DSMSERV command. Send in all the dynamic shared libraries. For example: - libm.so.6 =>/lib64/libm.so.6 - libnsl.so.1 =>/lib64/libnsl.so.1 - libpthread.so.0 =>/lib64/libpthread.so.0 - libdl.so.2 =>/lib64/libdl.so.2 - libc.so.6 =>/lib64/libc.so.6 - /lib64/ld64.so.1 =>/lib64/ld64.so.1 For Solaris, issue the following commands to collect the needed libraries: - sh - cd /usr - (find . -name ld.so -print ; \ - find . -name ld.so.? -print ; \ - find . -name libm.so.? -print ; \ - find . -name libsocket.so.? -print ; \ - find . -name libnsl.so.? -print ; \ - find . -name libthread.so.? -print ; \ - find . -name libthread_db.so.? -print ; \ - find . -name libdl.so.? -print ; \ - find . -name libw.so.? -print ; \ - find . -name libgen.so.? -print ; \ - find . -name libCrun.so.? -print ; \ - find . -name libc.so.? -print ; \ - find . -name libmp.so.? -print ; \ - find . -name libc_psr.so.? -print ; \ - find . -name librtld_db.so.? -print) > runliblist - tar cfh runliblist.tar -I runliblist v System logs For the AIX platform redirect the output from the command errpt -a into a file: errpt -a >errpt.txt. For the HP-UX platform, copy the /var/adm/syslog/syslog.log file. For the Linux platform, copy the /var/log/messages file. For the Solaris platform, copy the /var/adm/messages file.
41
For the Windows platform, save a copy of the Event Logs, as seen from the Event Viewer. For the z/OS platform, gather a copy of the System Log. v Activity log: Collect the activity log at least two hours prior to the crash and 30 minutes after the crash using the QUERY ACTLOG command. See the Tivoli Storage Manager Administrators Reference for more details. v Package all the data (files) collected and contact IBM service to report this problem. For all files from z/OS, make sure to use xmit to create a fixed-blocked file because it will be moved by ftp to an open systems machine, which will cause the loss of DCB attributes for the file. For the open systems platforms, package the files in a zip or tar file.
Maximum reduction value does not increase as the percentage utilized decreases
Issue the QUERY DB command over a period of time when the Pct. Util decreases.
42
The server allocates database space from the beginning of the database, which is the lowest allocated page, to the end of the database, which is the highest allocated page. Because allocation is ascending, it is possible for database space to be freed and become available for use between the lowest and highest allocated pages. The Maximum Reduction reported by QUERY DATABASE cannot reduce the database below the highest allocated page, even though free space may exist. The server uses the free space between the lowest and highest allocated page as necessary. It is possible to reorganize the server database. Reorganizing the database will typically reduce the pages used, which results in reduced percentage utilization. Similarly, reorganizing the server database may increase the maximum reduction value after it completes. Database reorganization is done by issuing DSMSERV UNLOADDB, DSMSERV LOADFORMAT, and then a DSMSERV LOADDB. The database reorganization requires the server to be offline or not available for client use. Review these commands and this procedure in the Tivoli Storage Manager Administrators Reference and Tivoli Storage ManagerAdministrators Guide in the Tivoli Storage Manager publications for your platform.
43
44
45
v If the server crashes because it is out of recovery log space and fails to start, you might do an emergency extend of the recovery log. Do this by issuing the DSMSERV EXTEND LOG volumeName amount command, where volumeName is a formatted recovery log volume and amount is the amount (in megabytes) to extend the recovery log. The recovery log has a maximum size of 13 GB. The recovery log might only be defined or extended to 12 GB so that there is 1GB in reserve if an emergency extend needs to be performed. In the event that an emergency extend is performed, reduce the recovery log after restarting the server to preserve the 1 GB reserve amount. The recovery log might appear to be out of space, when in fact it is being pinned by an operation or combination of operations on the server. A pinned recovery log is where space in the recovery log cannot be reclaimed and used by current transactions because an existing transaction is processing slowly or is hung. To determine if the recovery log is pinned, repeatedly issue the SHOW LOGPINNED command over many minutes. If this reports the same client session or server processes as pinning the recovery log, you might take action to cancel or terminate that operation in order to keep the recovery log from running out of space. To cancel or terminate a session or process that is pinning the recovery log, issue the SHOW LOGPINNED CANCEL command. Server version 5.1.7.0 and later have additional support for the recovery log to automatically recognize that the recovery log is running out of space and, where possible, to detect and resolve a pinned recovery log using the SHOW LOGPINNED processing.
Defining processes
A server process is a task performed on the server. This task is assigned to perform a specific operation, such as migrating data from a storage pool to the NEXT storage pool in the hierarchy. Or it may be the process for backing up the server database to a sequential media device for the purpose of safeguarding it. A process has the following general characteristics: Process name The name of the process as it appears in the process related messages. Means of initiation Server processes can be initiated in several ways. Typically, they are either
46
an automated process on the server that may or may not be influenced by a server options or other setting, or they are started by a command. Can run in foreground? Many server processes can be run in the FOREGROUND or synchronously. Processes that run in the FOREGROUND can be initiated by a command using the WAIT=YES parameter. Commands that start server processes that do not allow the WAIT=YES parameter or those specified with WAIT=NO are run in the BACKGROUND or asynchronously. Can run as multiple processes Some server processes can initiate multiple processes simultaneously to accomplish the task. Description A description of what this task does.
AUDIT VOLUME
Description
Audit the contents of a volume to validate that the data can still be read and that the server database definitions describing the data are correct.
Recommendation
The audit is initiated by issuing the AUDIT VOLUME command.
BACKUP DB
Description
Back up the server database (FULL or INCREMENTAL).
Recommendation
The backup is initiated by issuing the BACKUP DB command. The backup may also be automatically triggered if the server is in ROLLFORWARD mode for recovery log processing and a DBBACKUPTRIGGER is defined.
Other
The BACKUP DB can run as a synchronous process by specifying WAIT=YES.
BACKUP STGPOOL
Description
Backup a primary server storage pool to a copy storage pool for the purpose of making duplicate copies of the data and potentially taking duplicate copies to an off-site location.
Recommendation
The backup is initiated by issuing the BACKUP STGPOOL command.
47
Other
The BACKUP STGPOOL can run as a synchronous process by specifying WAIT=YES. BACKUP STGPOOL may be run using multiple concurrent processes. This is controlled by the MAXPROCESS parameter specified on the BACKUP STGPOOL command.
CHECKIN LIBVOLUME
Description
Check a tape volume into a tape library.
Recommendation
The check-in is initiated by issuing the CHECKIN LIBVOLUME command.
CHECKOUT LIBVOLUME
Description
Check a tape volume out from a tape library.
Recommendation
The check-out is initiated by issuing the CHECKOUT LIBVOLUME command.
EXPIRATION
Description
Expire (delete) client backup and archive files from the server, based on the policies defined to manage those files.
Recommendation
You can run expiration automatically by specifying EXPINTERVAL=n in the server options file, where n is any number other than zero. Expiration can also be initiated by issuing the EXPIRE INVENTORY command. Please note that it is not possible to have more than one expiration process running at a time.
Other
The EXPIRATION command can run as a synchronous process by specifying WAIT=YES.
IMPORT
Description
Import data from sequential media volumes or directly from another server using TCP/IP communication connections between the servers.
Recommendation
Import processing can be started by any of the following commands: IMPORT ADMIN, IMPORT NODE, IMPORT POLICY, and IMPORT SERVER.
48
LABEL LIBVOLUME
Description
Label one or more library volumes in a library.
Recommendation
Labeling is initiated by issuing the LABEL LIBVOLUME command.
MIGRATION
Description
Migrate data from one storage pool to the next in the storage hierarchy.
Recommendation
Migration starts and stops, based on the HighMig and LowMig thresholds defined for the storage pool. Whenever UPDATE STGPOOL is issued, these values are reexamined and, if appropriate, MIGRATION is started. Otherwise, the server monitors the percentage utilization for non-migrated data in a storage pool, and as needed, it starts migration processing for that storage pool when the HighMig threshold is exceeded. You can also issue the MIGRATE STGPOOL command to manually start migration processing.
Other
Migration may be configured to run multiple concurrent processes. This is controlled by the MIGPROCESS attribute of the storage pool and may be updated by issuing the UPDATE STGPOOL command.
MOVE DATA
Description
Move data from one volume to other volumes in the same storage pool or to a different storage pool.
Recommendation
The move is initiated by issuing the MOVE DATA command.
Other
The MOVE DATA command can run as a synchronous process by specifying WAIT=YES.
MOVE DRMEDIA
Description
Manage the disaster recovery media by moving onsite volumes offsite, or by bringing offsite volumes back onsite. Disaster recovery media is the database backup and storage pool backup volumes necessary to protect and recover the server.
49
Recommendation
The move is initiated by issuing the MOVE DRMEDIA command.
Other
The MOVE DRMEDIA command can run as a synchronous process by specifying WAIT=YES.
MOVE MEDIA
Description
Move volumes from a tape library to the overflow location to prevent a library from becoming full.
Recommendation
The move is initiated by issuing the MOVE MEDIA command.
MOVE NODEDATA
Description
Move all the data for the node or nodes specified to other volumes in the same storage pool or to a different storage pool.
Recommendation
The move is initiated by issuing the MOVE NODEDATA command.
Other
The MOVE NODEDATA command can run as a synchronous process by specifying WAIT=YES.
PREPARE
Description
Create a recovery plan file.
Recommendation
The recovery plan file is initiated by issuing the PREPARE command.
Other
The PREPARE command can run as a synchronous process by specifying WAIT=YES.
RECLAMATION
Description
Reclaim space from tape volumes by moving active data to other volumes and returning the volume back to empty and private, or else back to scratch.
50
Recommendation
The server monitors the RECLAMATION THRESHOLD defined for a storage pool. It starts a reclamation process for that storage pool to reclaim any eligible volumes if it determines that one or more eligible volumes exist.
RESTORE STGPOOL
Description
Restore all files for a given storage pool from a copy storage pool.
Recommendation
The restore is initiated by issuing the RESTORE STGPOOL command.
Other
The RESTORE STGPOOL can run as a synchronous process by specifying WAIT=YES. RESTORE STGPOOL may be run using multiple concurrent processes. This is controlled by the MAXPROCESS parameter specified on the RESTORE STGPOOL command.
RESTORE VOLUME
Description
Restore all files for a given volume from a copy storage pool.
Recommendation
The restore is initiated by issuing the RESTORE VOLUME command.
Other
The RESTORE VOLUME command can run as a synchronous process by specifying WAIT=YES. RESTORE VOLUME may be run using multiple concurrent processes. This is controlled by the MAXPROCESS parameter specified on the RESTORE VOLUME command.
Process started
The server might run tasks as processes. Processes are assigned an identification message and report that they have started by issuing the following message:
Chapter 2. Resolving server problems
51
ANR0984I Process process_id for process_name started in the process_state at time The following are definitions for the variables in the previous message: process_id Numeric process identifier. process_name The name of the process. process_state FOREGROUND or BACKGROUND. If the process is running in the FOREGROUND, the command was issued with the WAIT=YES parameter. FOREGROUND processing causes the administrative session that issued the command to wait until the processing completes. A process running in the BACKGROUND returns immediately to the administrative session that issued the command, indicating that a process was started while the process still runs. Processes running in the BACKGROUND may be monitored with the QUERY PROCESS command. time The time the process was started.
Process ended
When a process completes and it does not have bytes or number of files to report, the following message is issued: ANR0985I Process process_id for process_name running in the process_state completed with the completion_state at time The following are definitions for the variables in the previous message: process_id Numeric process identifier. process_name The name of the process. process_state FOREGROUND or BACKGROUND. If the process is running in the FOREGROUND, the command was issued with the WAIT=YES parameter. FOREGROUND processing causes the administrative session that issued the command to wait until the processing completes. A process running in the BACKGROUND returns immediately to the administrative session that issued the command, indicating that a process was started while the process still runs. Processes running in the BACKGROUND may be monitored with the QUERY PROCESS command. completion_state SUCCESS or FAILURE time The time the process was started.
52
ANR0986I Process process_id for process_name running in the process_state processed number_of_items items for a total of bytes_processed bytes with a completion state completion_state at time The following are definitions for the variables in the previous message: process_id Numeric process identifier. process_name The name of the process. process_state FOREGROUND or BACKGROUND. If the process is running in the FOREGROUND, the command was issued with the WAIT=YES parameter. FOREGROUND processing causes the administrative session that issued the command to wait until the processing completes. A process running in the BACKGROUND returns immediately to the administrative session that issued the command, indicating that a process was started while the process still runs. Processes running in the BACKGROUND may be monitored with the QUERY PROCESS command. number_of_items The number of items processed. bytes_processed The number of bytes processed. completion_state SUCCESS or FAILURE time The time the process was started.
53
completion_state SUCCESS or FAILURE time The time the process was started.
ANR1221E COMMAND: Process processID terminated insufficient space in target copy storage pool
Issue the QUERY STGPOOL stgpoolName F=D command. Issue the following SQL select statement from an administrative client to this server: select stgpool_name,devclass_name,count(*) as VOLUMES from volumes group by stgpool_name,devclass_name. Compare the number of volumes reported by the select statement to the maximum scratch volumes allowed (as reported by the QUERY STGPOOL command). If the number of volumes reported by the select is equal to or exceeds the Maximum Scratch Volumes Allowed, update the storage pool and allow more scratch volumes by issuing the UPDATE STGPOOL stgpoolName MAXSCR=nn command,
54
where stgpoolName is the name of the storage pool to update and nn is the increased number of scratch volumes to make available to this copy storage pool. Note: The tape library should have this additional number of scratch volumes available, or you need to add scratch volumes to the library prior to issuing this command and retrying the BACKUP STGPOOL operation.
ANR2317W Audit Volume found damaged file on volume volumeName: Node nodeName, Type fileType, File space fileSpaceName, fsId fileSpaceID, File name fileName is number version of totalVersions versions
Issue the QUERY VOLUME volumeName F=D command. Issue the following SQL select statement from an administrative client to this server: select* from VOLHISTORY where VOLUME_NAME=volume_name AND TYPE=STGNEW. The results of the QUERY VOLUME command indicate when this volume was last written. The information from the select operation reports when this volume was added to the storage pool. Often, AUDIT VOLUME may report files as damaged because, at the time that the data was written, the hardware was malfunctioning and did not write the data correctly, even though it reported to the Tivoli Storage Manager server that the operation was successful. As a result of this device malfunction, many files on many different volumes may be affected. You can take the following steps to resolve this: v Evaluate the system error logs or other information about this drive to determine if it still reports an error. If errors are still reported, they must first be resolved. To resolve a hardware issue, work with the hardware vendor to correct the problem. v If this is a copy of a storage pool volume, simply delete this volume using the DELETE VOLUME volumeName DISCARDDATA=YES command. The next time a storage pool backup is run for the primary storage pool or storage pools where this damaged data resides, it will be backed up again to this copy storage pool and no further action is necessary. v If this is a primary storage pool volume and the data was written directly to this volume when the client stored the data, then it is likely that there are no undamaged copies of the data on the server. If possible, back up the files again from the client. v If this is a primary storage pool volume but the data was put on this volume by MIGRATION, MOVE DATA, or MOVE NODEDATA, there might be an undamaged copy of the file on the server. If the primary storage pool that contained this file was backed up to a copy storage pool prior to the MIGRATION, MOVE DATA, or MOVE NODEDATA then an undamaged file may exist. If this is the case, issue the UPDATE VOLUME volumeName ACCESS=DESTROYED command and then issue RESTORE VOLUME volumeName command to recover the damaged files for this volume from the copy storage pool.
Files are not expired after reducing the number of versions that need to be kept
The server policies were updated to reduce the number of versions of a file to retain. Issue the QUERY COPYGROUP domainName policySetName copyGroupName F=D command. If either the Versions Data Exists or Versions Data Deleted parameters were changed for a TYPE=BACKUP copy group, it might affect expiration.
Chapter 2. Resolving server problems
55
If the Versions Data Exists or Versions Data Deleted values for a TYPE=BACKUP copy group were reduced, the server expiration process may not immediately recognize this and expires these files. The server only applies the Versions Data Exists and Versions Data Deleted values to files at the time they are backed up to the server. When a file is backed up, the server will count the number of versions of that file and if that exceeds the number of versions that should be kept, the server will mark the oldest versions that exceed this value to be expired.
56
Storage pool experiences high volume usage after increasing MAXSCRATCH value
For collocated sequential storage pools, increasing the MAXSCRATCH value may cause the server to use more volumes. The server uses more storage pool volumes in this case because of the collocation processing. Collocation groups user data for a client node onto the same tape. During a client backup or archive operation, if no tapes currently have data for this client node, the server selects a scratch volume to store the data. Then, for other client nodes storing data, it makes the same decision when selecting a volume and again selects a scratch volume. The reason this does not occur prior to changing the MAXSCRATCH setting is that if there is no scratch volume available and no preferred volume already assigned for this client node, the volume selection processing on the server ignores the collocation request and stores the data on an available volume.
Storage pool has Collocate?=Yes but volumes still contain data for many nodes
The following are the two possible reasons for this message: 1. Data was stored on volumes in this storage pool prior to setting Collocate=Yes.
Chapter 2. Resolving server problems
57
2. The storage pool ran out of scratch tapes and stored data on the best possible volume, even though it ignored the request to collocate. If data for multiple nodes ends up on the same volume for a storage pool with Collocate=Yes, this can be corrected by one of the following actions: v Issue the MOVE DATA command for the volume or volumes affected. If scratch volumes are available or volumes with sufficient space are assigned to this client node for collocating their data, the process reads the data from the specified volume and moves it to a different volume or volumes in the same storage pool. v Allow migration to move all the data from that storage pool by setting the HIGHMIG and LOWMIG thresholds to accomplish this outcome. By allowing migration to migrate all data to the NEXT storage pool, the collocation requirements are honored, provided that the NEXT storage pool is set to Collocate=Yes, it has sufficient scratch volumes, and it is assigned volumes to satisfy the collocation requirements. v Issue MOVE NODEDATA for the client nodes whose data resides in that storage pool. If scratch volumes are available or volumes with sufficient space are assigned to this client node for collocating their data, the MOVE NODEDATA process reads the data from the volumes that this node has data on and move it to a different volume or volumes in the same storage pool. The key to getting the data collocated is to have sufficient space in the target storage pool for the collocation processing to select an appropriate volume. This is significantly influenced by the number of scratch volumes in a storage pool. Another alternative is to explicitly define more volumes to the storage pool by issuing the DEFINE VOLUME command. Again, the key is to have candidate empty volumes for collocation to use rather than using a volume that already has data on it for a different node.
Unable to store data in an active data pool by using simultaneous write or by issuing the COPY ACTIVEDATA command
You may experience difficulty in storing data in an active data pool, due to policy issues. Before data can be stored in an active data pool, you must establish a policy to allow the data into the pool. The node that owns the data must be assigned to a domain whose active data pool is listed in the domain ACTIVEDESTINATION field. Issue the following command to determine if the node is assigned to a domain that authorizes storing into the active data pool: QUERY NODE node_name F=D The Policy Domain Name field lists the domain to which the node is assigned. Issue the following command to determine if the active data pool is listed in the domain ACTIVEDESTINATION field: QUERY DOMAIN domain_name F=D If the active data pool is not listed, issue the following command to add the active data pool to the list: UPDATE DOMAIN domain_name ACTIVEDESTINATION=activedata_pool_name Note: After you issue the UPDATE DOMAIN domain_name ACTIVEDESTINATION=active-data_pool_name command, all nodes assigned to the domain are authorized to store data in the active data pool. If this is not acceptable, you must create a new domain for those nodes whose data
58
you want stored in the active data pool and assign those nodes to the newly created domain. See the Tivoli Storage Manager Administrators Guide to learn how to establish a new policy domain.
59
60
61
v If multiple servers are using the same TCP/IP address, ensure that the TCPPORT and TCPADMINPORT for each server are unique. For example, there are two servers at the same TCP/IP address. The first server has a TCPPORT of 1500 and a TCPADMINPORT of 1500. The second server has a TCPPORT of 1501 and a TCPADMINPORT of 1500. The first server to grab port 1500 locks out the other server from port 1500 and clients can no longer access the first server. Administrative clients always connect to the second server. A better choice of ports for each server would be 1500 and 1501 for TCPPORT; 1510 and 1511 for TCPADMINPORT. v Check that the server is enabled for sessions. Issue the QUERY STATUS command and verify that Availability: Enabled is set. If this reports Availability: Disabled, issue the ENABLE SESSIONS command. v If specific clients are unable to connect to the server, check the communication settings for those clients. For TCP/IP, check the TCPSERVERADDRESS and TCPSERVERPORT options in the client options file. v If only a specific node is rejected by the server, verify that the node is not locked on the server. Issue the QUERY NODE nodeName command, where nodeName is the name of the node to check. If this reports Locked?: Yes, then evaluate why this node is locked. Nodes can only be locked by using the LOCK NODE administrative command. If it is appropriate to unlock this node, issue the UNLOCK NODE nodeName command, where nodeName is the name of the node to unlock. v Work with the local network administrator to determine if there were network changes that account for the failing nodes not connecting to the server. v If the computer that the server is running on is having memory or resource allocation problems, it may not be possible to start new connections to the server. This may be cleared up temporarily by either halting and restarting the server or by halting and rebooting the computer itself. This is a temporary solution, and diagnosis should be continued for either the operating system or the Tivoli Storage Manager server because this may indicate an error in either. | | | | | | | | | | | | | | | | | |
62
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
information about the failure. The client error log may also contain information about specific GSKit failure. ANS1592E Failed to initialize SSL protocol This general error occurs on the client and indicates that the SSL connection could not be established. See the client error log for more information on the failure. One of the most common situations that lead to this error message is when the server does not accept SSL sessions on the port to which the client is trying to connect. Determine if the client points to the correct server port (TCPPort), which in most cases is a different port than the default 1500. ANR8583E and GSKit return code 406 This might indicate that a non-SSL enabled client is trying to contact an SSL port. When a client contacts a Tivoli Storage Manager server at a port defined by SSLTCPPORT or SSLTCPADMINPORT, the server establishes a session and initiates an SSL handshake. If the client is not SSL-enabled, it cannot complete the SSL handshake process. The session then appears to hang but will timeout through the server IDLEWAIT option, or end when the server administrator issues the CANCEL SESSION command to manually cancel it. The following is an example of a session in this state, from the server:
TSM:SERVER1>query session ANR2017I Administrator SERVER_CONSOLE issued command: QUERY SESSION Sess Number -----1 Comm. Method -----SSL Sess Wait Bytes Bytes Sess Platform Client Name State Time Sent Recvd Type ------ ------ ------- ------- ----- -------- ------------IdleW 17 S 0 0 Node
Note: Because the computing environment could cause a valid handshake process to take some time, do not assume that the above output always indicates a non-SSL client. ANR8583E and GSKit return code 420, and ANR8581E with GSKit return code 406 occur for the same Tivoli Storage Manager client session When Tivoli Storage Manager server messages ANR8583E with GSKit return code 420 and ANR8581E with GSKit return code 406 occur for the same client session, it is likely that the client has generated an ANS1595E message while attempting to establish a session with the server. If this is the case, follow the guidance in the Tivoli Storage Manager message manual for ANS1595E to eliminate these errors. Attention: For specific GSKit failure information, see Appendix C, IBM Global Security Kit return codes, on page 285.
63
64
Establishing a connection between the Administration Center and a Tivoli Storage Manager server
If you have a problem establishing a connection to a Tivoli Storage Manager server, use the Administration Center to review the steps in this document to try to isolate or resolve the problem. Perform the following steps to establish a connection between the Administration Center and a Tivoli Storage Manager server: 1. Determine if the machine is accessible over the network. Issue the PING command in a command prompt or shell or try connecting using telnet or ftp. If the machine is not accessible over the network, the machine is down or there is a network communication error. Use the same TCP/IP address entered in the Administration Center. 2. Determine if the Tivoli Storage Manager server is running. If the server is not running, the Administration Center will not be able to establish a connection to it. 3. Try connecting to the Tivoli Storage Manager server by using the administrative client. Use the same connection settings as in the administration Center (TCP/IP address, TCP/IP port, admin id, admin password). This is the quickest way to determine if the problem is on the Tivoli Storage Manager server machine or on the machine running the Administration Center. If both the Tivoli Storage Manager server and the Administration Center are running on the same machine, skip this step and go to the directory where the administrative client is installed. Issue DSMADMC with parameters matching those in the connection settings for the Administration Center.
dsmadmc-id=<admin id> -pass=<admin password> -tcpport=<TCP/IP port> -tcps=<TCP/IP address>
4. Determine what port the Tivoli Storage Manager server is using. You can issue the QUERY OPT TCPPORT command on the server to determine the server port. Make sure the port used in the Administration Center is the same port on which the server is running. Go to the directory where the administrative client is installed. Issue DSMADMC with parameters matching those in the connection settings for the Administration Center. This command can also be issued from the server console.
dsmadmc -id=<admin id> -pass=<admin password> -tcpport=<TCP/IP port> -tcps=<TCP/IP address> tsm:SERVER1>QUERY OPT TCPPORT Server Option Option Setting -----------------------------------TCPPort 1500 tsm: SERVER1>
65
5. Determine if the machine you are attempting to access is behind a firewall. If the machine running the Tivoli Storage Manager server is behind a firewall, then the machine running the Administration Center must be authenticated to the firewall. Try using the machine running the Administration Center to connect to the machine running the Tivoli Storage Manager server. Use ping, telnet, or ftp. If this does not work, try connecting to another machine under the same firewall as the server machine. 6. Determine if the TCP/IP address for the Tivoli Storage Manager server is entered correctly in the Administration Center. Select Modify Server Connection from the drop-down list to view the current connection settings for the Tivoli Storage Manager server connection. Verify that the server connection address is correct. a. Issue the PING command in a command prompt or shell. Verify that the machine indicated by the address is accessible. b. Issue the QUERY OPT TCPPORT command in a server console to determine on which port the Tivoli Storage Manager server is running. To determine which port the Tivoli Storage Manager server is using, go to the directory where the administrative client is installed. Issue DSMADMC with parameters matching those in the connection settings for the Administration Center. This command can also be issued from the server console. Verify that the server connection port is correct.
dsmadmc -id=<admin id> -pass=<admin password> -tcpport=<TCP/IP port> -tcps=<TCP/IP address> tsm: SERVER1>QUERY OPT TCPPORT Server Option ----------------TCPPort tsm: SERVER1> Option Setting -------------------1500
7. Determine if the administrator ID for the Tivoli Storage Manager server is entered correctly in the Administration Center. Select Modify Server Connection from the drop-down list to view the current connection settings for the Tivoli Storage Manager server connection. Verify that the administrative ID is correct. 8. Determine if the administrator password for the Tivoli Storage Manager server is entered correctly in the Administration Center. Select Modify Server Connection from the drop-down list to view the current connection settings for the Tivoli Storage Manager server connection. Enter the correct administrative password to connect to the Tivoli Storage Manager server. Retry the operation to see if changing the password resolved the problem. 9. Determine if any messages are issued on the server when you try to connect using the Administration Center. The activity log contains useful information if you happen to experience any trouble connecting to the server. You can see sessions starting and stopping when the Administration Center successfully communicates with the server. If the network is down or the TCP/IP address or port is incorrect, no information shows up in the activity log when you make connection attempts. To check the server activity log, go to the directory where the administrative client is installed. Then issue the DSMADMC command with parameters matching those in the connection settings for the Administration Center. This command can also be issued from the server console.
66
dsmadmc -id=<admin id> -pass=<admin password> -tcpport=<TCP/IP port> -tcps=<TCP/IP address> tsm: SERVER1>QUERY ACTLOG
10. Check the servers database file for corruption. The servers database file is located in the ISC install directory under PortalServer\shared\app\dsm\ tsmservers.xml. If this file is corrupted, problems may occur when you try to connect to the servers. You will, however, typically see other error messages indicating that this file is corrupt. Open this file in an editor (preferably an XML editor), and verify that the end tag has a closing end tag.
v Your operating system is on the supported list. If it is not, a message similar to the following might be found in the ac_install.log file:
[February 22, 2007 7:59:24 AM MST] CWLAA9008: The operating system Linux 2.4.20-8 is not supported.
v You have enough memory allocated to the system. If you do not, a message similar to the following might be found in the ISCArchiveUpdatePortalPorts.log file:
Chapter 4. Administration Center
67
BUILD FAILED file:../config/actions/process.xml:162: Execute failed: java.io.IOException: Cannot allocate memory Total time: 45 seconds
v There is enough disk space on the system. To install the ISC requires the following approximate space allocations: New installation with no previous ISC installation Ensure that there is a total of 975 MB free space in the installation directory and a total of 300 MB free space in the temporary directory (75 MB for the Java virtual machine [JVM]). Migrated installation from Tivoli Storage Manager 5.3 and above Ensure that there is a total of 400 MB free space in the installation directory and a total of 225 MB (150 for the installation and another 75 MB for the JVM) free space in the temporary directory. If you do not have sufficient free disk space, the following message might be found in the updatelog.txt file located in a subdirectory of <ISC_ROOT>/ AppServer/logs/update:
There is insufficient free disk space on the system: /opt/IBM/ISC601/AppServer: Required: 400 MB Available: 609 MB /tmp/: Required: 150 MB Available: 102 MB
v Java must be installed on the system and in the path of the process that is running the installation. Note: Do not install the 64-bit Java Runtime Environment (even for 64-bit kernel). Use the 32-bit 1.4.2 or higher version of the IBM Java Runtime Environment or Sun Java Runtime Environment. See the log files located in <lSC_HOME>/updates with the file name of <date>_<time>_IUI_install.log. Issue the JAVA -VERSION command to test your Java installation. Verify that the response indicates that Java Runtime Environment 1.4.2 or later is installed. The following log information might be found for UNIX or Linux users:
Executing install task: isc-test-parms-ptf Setting WAS_HOME=/opt/IBM/ISC601/AppServer Ant Task Executed: java -cp /opt/IBM/ISC601/PortalServer/migration/ant154/lib/ant. jar org.apache.tools.ant.Main -buildfile "/tmp/fixpack/fix/ISC_PTF_6011_Config.xml" PARMS_HIDDEN isc-test-parms-ptf ========================================================= /usr/bin/sh: java: not found. ========================================================= isc-test-parms-ptf failed to execute
68
========================================================= java is not recognized as an internal or external command, operable program or batch file. ========================================================= isc-test-parms-ptf failed to execute
Note: For Linux Enterprise systems, problems were reported regarding the GNU Java that is natively installed which causes the installation to stop at 90% completion. Instead, install IBM Java Runtime Environment or Sun Java Runtime Environment version 1.4.2 (or later). Ensure that the correct version is installed by issuing the JAVA -VERSION command.
69
portlet applications. Administrator is the highest level of authority for a resource. Users and groups that have Administrator authority can perform all of the permitted actions. Perform the following steps to create an ISC user that has access to the Tivoli Storage Manager Administration Center: 1. Log into the ISC console. 2. Select the Settings Tab. 3. Select User and Group Management. a. Search for the User Groups phrase. b. Search for the All Available phrase. c. Click the Search button. The table should now include the TSM_AdminCenter group. d. Click on TSM_AdminCenter. e. Click on the New User button. f. Fill in the form and click the OK button. If an ISC user does not have access to the Administration Center, the following is a list of items that should be verified: v Ensure that the group to which the user belongs has the necessary permissions to the resource. Ideally, the group is TSM_AdminCenter, but that is not a requirement. Select the Settings Tab. Select User and Group Permissions. Select User Groups. - Search for the phrase: All Available. - Click the Search button. - The table should now include the User Group of the given user. - Click on the Select Resource Type button of that group. - Select Portlet Applications and verify the permissions of the user. - Select Portlets and verify the permissions of the user. - Select Pages and verify the permissions of the user. v Ensure that the TSM_AdminCenter group does exist. v Ensure that TSM_AdminCenter group still has the necessary permissions to all the concrete portlet applications of the Administration Center. v Ensure that the user has access to all the portlets and pages of the Administration Center. Select the Settings Tab. Select User and Group Permissions. Select Users. - Search for keyword: uid. - Search for keyword: user_id. - Click the Search button. The table should now include the specified user. - Click on Select Resource Type. - Select Portlet Applications and verify the permissions of the user. - Select Portlets and verify the permissions of the user. - Select Pages and verify the permissions of the user.
70
71
a. If this system is a Linux or UNIX-based platform, verify that the path contains the following: v /bin v /sbin v /usr/bin v /usr/sbin b. If this system is a Windows platform, include regedit in the path. The collector tool is located in the isc_root/AppServer/bin directory. 5. Create a work directory where you can start the collector program. 6. Make the work directory, the current directory. The collector program writes its output JAR file to the current directory and also creates and deletes a number of temporary files in the current directory. By creating a work directory to run the collector program, the collector program avoids naming collisions and makes cleanup easier. You cannot run the collector tool in a directory under the ISC installation directory. 7. Run the collector program by issuing the COLLECTOR command from the command line. For example: c:\work>collector Issuing the COLLECTOR command with no additional parameters gathers one copy of the node data and data from each server in the node, and stores them in a single JAR output file. To gather data from a specific server in the node, issue the COLLECTOR servername command, where servername is the name of the problem server. The name of the ISC server is ISC_Portal. The collector program creates a log file, Collector.log, and an output JAR file in the current directory. The name of the JAR file is based on the hostname and package of the Websphere server in the following format: hostname-ND-WASenv.jar or hostname-BaseWASenv.jar. For example, if you run the collector tool on the server ws-laceweb within a Network Deployment cell, the filename is ws-laceweb-ND-WASenv.jar. The Collector.log file is one of the files collected in the hostname-ND-WASenv.jar or hostname-Base-WASenv.jar file. Note: Contact Websphere Support for assistance in deciphering the output of the collector tool.
72
The Websphere server creates the service or activity log file from the activity of the various WebSphere server components. The Log Analyzer is used to view the service or activity log file and can merge service or activity log files into one log file. The service or activity log file (activity.log), is a binary file in the logs directory of the install_root. You cannot view the service or activity log with a text editor. The Log Analyzer tool lets you view the file. Using the Log Analyzer The Websphere server on which ISC runs does not include the Java administrative console, so there is no graphical interface available for viewing a service or activity log file. The alternate viewing tool, showlog, must be used to view the service or activity log file: 1. Change to the directory your_isc_root/AppServer/bin where your_isc_root is the root directory for your ISC installation. 2. Run the showlog tool with no parameters to display usage instructions: v On Windows systems, run showlog.bat v On UNIX systems, run showlog.sh To direct the service or activity log (activity.log) contents to stdout, issue the showlog activity.log command. To dump the service or activity log to a text file for viewing with a text editor, issue the SHOWLOG ACTIVITY.LOG TEXTFILENAME command. Note: Contact Websphere Support for assistance in deciphering the output of the collector tool.
73
This file can be found in the /Tivoli/dsm/logs directory. The table below describes the files that are created when installing and uninstalling, and recommends when and where to check the file for information that might assist you in troubleshooting problems:
Table 1. File Name ISCRuntimeInstall.log Description Contains messages for the Integrated Solutions Console Runtime Installation. Symptoms Check this log if the Integrated Solutions Console Runtime installation failed. Location This log is located in the OS temporary directory. For Windows, this is the value of the %TEMP% system variable. For all other systems, this is the /tmp directory. This log is located in the OS temporary directory. For Windows, this is the value of the %TEMP% system variable. For all other systems, this is the /tmp directory. This log is located in the OS temporary directory. For Windows, this is the value of the %TEMP% system variable. For all other systems, this is the /tmp directory. This log is located in the isc_runtime_root/ Tivoli/dsm/logs directory.
ISCRuntimeUninstall.log
Check this log if the runtime uninstall failed. Look for messages that indicate that a command failed.
EWASE.rsp
Contains the settings specified for the Integrated Solutions Console Runtime installation.
Check this log and verify that the settings are correct if the installation was not successful.
ac_install.log
Contains output from the Integrated Solutions Console Runtime installation and Administration Center installation. Contains error messages for the ISMP installation wizards for both the Integrated Solutions Console and the Administration Center.
Check this log if the Administration Center installation failed or when the ISCRuntimeInstall.log does not exist.
log.txt
Check this file to determine the value of the exception thrown. The exception error thrown helps determine where the install failed.
74
where your.server.name is the fully-qualified host name for the Administration Center system. 5. Save the hosts file.
75
76
Conclusion
If you were unable to identify the problem through any of the previous actions, collect the following information before calling support: v View the source of the help pop-up window. On most browsers, a right-mouse click will provide a menu with a View Source option. A window appears with the HTML source code for that window. Write down the title of that window, which will be the URL or the name of the file the help system is attempting to display. v Turn on tracing for the SNAPIN trace class and try running the tutorial again. Stop tracing and run the collection option of the service tool.
How do I size the number of Tivoli Storage Manager Administration Center installations?
While there are a number of variables that can influence this sizing, most variables can be safely ignored if the Administration Center installation meets the recommended installation minimums and the following guidelines: v The Administration Center is being installed on a system dedicated to this function and no other applications will be installed on this system that require significant processing or memory resources. v The Administration Center is being installed on a system that is based on recent hardware (not more than 18 months has elapsed since general availability of the specific hardware models). If these conditions are met, it is likely that the system has sufficient processing capacity. Uni-processor systems or dual-processor systems are expected to be sufficient to meet the processing needs for a single Administration Center installation. More processors are not expected to be beneficial, as the major resource demand will be for memory. The Administration Center disk I/O and network I/O requirements are not particularly demanding and there is no need for sustained high I/O throughput. However, application response time suffers if network delays or disk I/O delays occur. A low-latency network provides the best administrator response time. The Integrated Solutions Console and Administration Center should be installed close to the administrators, rather than close to the Tivoli Storage Manager servers, because more of the network traffic during administration activities will occur between the ISC system and the administrators browser than between the ISC system and a Tivoli Storage Manager server.
77
where: MWorkingSet is the Administration Center process working set memory in MB. MJavaHeapSize is the Administration Center Java heap size memory in MB. This working set memory must remain less than 2 GB, which is the maximum supported process virtual memory for many 32-bit operating systems. This is not likely to be a problem, since the maximum Java heap size allowed is 1536 MB. The required working set memory must be available in real memory (RAM) or significant response time degradation may occur as the result of system memory paging. Thus, the process working set memory requirement is effectively determined by the amount of Java heap memory required. The system memory sizing must include memory for the operating system and any other applications running on the system. Most operating systems require 256 MB, so this much memory should be added to the process working set memory requirement to obtain the system memory requirement. See the Administration Center Support Utility section in this guide for more tuning suggestions.
<isc_home> The root directory in which the ISC was installed (default for Windows: C:\Program Files\IBM\ISC Default for UNIX: /opt/IBM/ISC) <userID> The user ID used to install the ISC (default is iscadmin). <password> The password used to install the ISC.
78
localhost:8421 The host name or IP address of where the ISC was installed and the port that was used (8421 is default). <fully qualified path> This is the fully-qualified path to the AdminCenter.war file that should be located where the Admin Center package was un-zipped or un-tared.
79
Console server and your_isc_root/PortalServer/ console help server bin/startISC.sh ISC_Portal Console server only
your_isc_root/AppServer/bin/ your_isc_root/AppServer/bin/ startServer.sh ISC_Portal stopServer.sh ISC_Portal -username -username administrator-password password administrator-password password your_isc_root/PortalServer/ ISCEclipse/StartEclipse.sh your_isc_root/PortalServer/ISCEclipse/ StopEclipse.sh
Note: In the commands, the variables have the following meanings: your_isc_root The root directory for your Integrated Solutions Console installation.
80
administrator The administrator user ID for Integrated Solutions Console if the installation uses the WebSphere Application Server embedded in the console runtime. If the installation uses a separate WebSphere Application Server installation, administrator is the administrator user ID for the WebSphere Application Server installation. password The password for the administrator.
The table below lists the commands for starting and stopping the servers on a Windows system.
Servers Console server and console help server Console server only Start command (on a single line) Stop command (on a single line) your_isc_root\PortalServer\bin\ startISC.bat ISC_Portal your_isc_root\AppServer\bin\ startServer.bat ISC_Portal -username administrator-password password your_isc_root\PortalServer\ ISCEclipse\StartEclipse.bat your_isc_root\PortalServer\bin\ stopISC.bat ISC_Portal administrator password your_isc_root\AppServer\bin\ stopServer.bat ISC_Portal -username administrator-password password your_isc_root\PortalServer\ ISCEclipse\StopEclipse.bat
Note: In the commands, the variables have the following meanings: your_isc_root The root directory for your Integrated Solutions Console installation. administrator The administrator user ID for Integrated Solutions Console if the installation uses the WebSphere Application Server embedded in the console runtime. If the installation uses a separate WebSphere Application Server installation, administrator is the administrator user ID for the WebSphere Application Server installation. password The password for the administrator.
Health Monitor
A health monitor presents a view of the overall status of multiple servers and their storage devices. From the health monitor, you can link to details for a server, including a summary of the results of client schedules, and a summary of the availability of storage devices.
81
administrator check box, the ID becomes unlocked to allow the health monitor to contact the server for status. If for some reason the ADMIN_CENTER does not exist, the health monitor registers the id on the server. The initial password is the same as the ID. Change the password through the Configure Health Monitor action from the Health Monitor Server table. The password and the time interval set are saved in the health monitor configuration file (dsmhealthmon.properties). This file is located in the {ISCROOT}/PortalServer/shared/app/config/services directory. The health monitor uses this ID and password to contact each server that was added to the Administration Center. When it completes contacting each server, the health monitor sleeps for the duration specified in the refresh interval. Only unique instances of servers are contacted. For instance, if two administrators each have WIN64SRV at address 9.11.232.90 on port 1500 configured, that server is only contacted once. The length of time it takes for the health monitor to complete contacting each server in the list may vary widely if servers are down. This is because the health monitor must wait for each connection to time-out before proceeding to the next server in the list. The refresh interval countdown displayed on the health monitor work page is not intended to match the actual cycle that the health monitor is using to contact servers. Instead, this is when the work page is refreshed. For example, there are 177 servers connections added to the Administration Center. Of these 177 servers, over half are test servers and are not active. It takes the health monitor approximately 10 minutes to work through the list of 177 servers to complete the check. If the refresh interval for the health monitor is 15 minutes and it takes 10 minutes to cycle through the servers, the servers are contacted about once every 25 minutes (10 minutes for the completion of the contact cycle and 15 minutes of sleep). In the meantime, the administrator left the screen on the health monitor work page and the screen refreshes every 15 minutes, whether a new status is available or not. The refresh rate can be changed in the Administration Center. Click Health Monitor and then select the Configure Health Monitor action from the drop-down list. From there you can change the refresh rate. When server connections are added, the health monitor cycles through its list of servers rather than waiting for the refresh interval. Avoid unnecessarily adding or removing server connections. An update of the configuration settings of the health monitor causes the health monitor to wake up and contact the list of servers. Avoid unnecessarily updating configuration settings. Note: The health monitor must be configured only one time, regardless of how many administrators and servers you defined. That configuration applies to all servers.
82
v The ADMIN_CENTER password for that server does not match the password for the health monitor. All servers must use the ADMIN_CENTER ID and the same password. If the password that the health monitor uses to contact the server is invalid, the health monitor cannot obtain status. v The ADMIN_CENTER ID is locked. The ID must be unlocked or the health monitor is unable to obtain status. Use the Administrator tab of the server properties notebook to update the ID. When adding additional server connections, if you select the Unlock ADMIN_CENTER ID check box, this unlocks the ID. v The health monitor worker is no longer running. Tracing is the only way to determine if the worker thread is running. Follow the Administration Center tracing instruction to activate tracing for the HEALTH trace class. Search the PortalServer/logs/trace.log file for strings like Time for a nap or Back to work. If you find those messages in the trace file, it indicates that the health monitor is running. You might need to wait some time before seeing those messages, depending on if the health monitor worker is sleeping for the given interval. When you do not see any activity for a period of time longer than the refresh interval, try restarting the Integrated Solutions Console. This restarts the health monitor worker.
83
2. Determine the percentage of paths that are offline for each drive in a given library. 3. Find the average of the numbers in the above step, which represents the score for the drive path status. 4. Determine the percentage of library paths that are offline for the given library. The score for the library is the maximum of the three scores. The number should be somewhere in the range from zero and ten. 5. Repeat the above steps for every library on the server. The overall health of the storage hardware is the average of the sum of all library scores. This is the overall health of the storage hardware on a scale of from zero to ten. A score of four or less represents Normal status. A score greater than four but less than eight represents Warning status. A score greater than seven represents a Critical status. If you take offline all of the drives in the library, this makes the status Critical for the library. If you take offline all of the paths for all of the drives in a single library, this causes the status to be Critical. If you take offline the only path to the library, this makes the library status Critical. Depending on the number of libraries on the server, the Critical status for a single library is diluted by other healthy libraries. For example, if the status of one library is Critical and two libraries are Normal, then the storage status is Warning. To view the individual status of the library, use the Storage Devices work item.
84
85
ANRW0089E
The following command generates a confirmation request from the server: <command>. The program cannot process this request. See Chapter 4, Administration Center, on page 65 for more information.
Description
This error message indicates that a command was issued that was expecting a reply. Some commands require a confirmation. This can be seen on the administrative client as commands that prompt for additional responses such as Are you sure you want to delete this? The API that the Administration Center uses does not have a mechanism to process confirmation requests.
Resolve
Try issuing the same command using the command line.
ANRW0090E
The following command is unknown to the server: <command>. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error message indicates that an unknown command was issued to the server. This could be caused by a variety of reasons. The command may not exist on the version of server the command is being issued on. It may be an unsupported command on the platform the server is running on. The command may not have been constructed correctly.
Resolve
Visually inspect the command that was attempted. If the command is run together such as, QUERYNODE instead of QUERY NODE, this indicates the command was not constructed correctly. Attempt to reconstruct the command and issue it using the command line.
ANRW0126E
The administrative API encountered an internal error while processing the request. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error message indicates that the administrative API that the Administration Center uses had an unrecoverable error while attempting to issue a command to the server.
Resolve
Try issuing the same command using the command line.
86
ANRW0127E
The administrative API is unable to process the command document sent from the server. See the Administration Center section of the Problem Determination Guide for more information.
Description
The Administration Center transfers a command document file from the server. This XML file indicates all the valid commands and their syntax for each version and platform of the server. This file is only transferred once during the first connection with a server of a particular version and platform. The error reports that the file could not be processed and may be corrupt. The file is located in the ISC install directory under PortalServer\shared\app\dsm\CmdFileCache. The name of the file depends on the version and platform. For example a 5.3.0 server for AIX would have the name aix_5_3_0.xml. Since the Administration Center is having trouble reading this file, it may be corrupt. Navigate to the CmdFileCache directory.
Resolve
Since all the files in this directory are only cached files, it is safe to delete them. Delete the file in question, or delete all of the files in the cache directory. This will force the Administration Center to pull the file from each server. Also check the permissions for this directory and make sure that the Administration Center can read and write files in this directory.
ANRW0128E
The administrative API is unable to process the command because it cannot be found in the command document. See the Administration Center section of the Problem Determination Guide for more information.
Description
The Administration Center transfers a command document file from the server. This XML file indicates all the valid commands and their syntax for each version and platform of the server. This file is only transferred once during the first connection with a server of a particular version and platform. The error reports that the command in question could not be found in the command file. This indicates the command file may be corrupt or out of date (wrong version). The file is located in the ISC install directory under PortalServer\shared\app\dsm\ CmdFileCache. The name of the file depends on the version and platform. For example a 5.3.0 server for AIX would have the name aix_5_3_0.xml.
Resolve
Since the Administration Center is are having trouble reading this file, it may be corrupt. Navigate to the CmdFileCache directory. Since all the files in this directory are only cached files, it is safe to delete them. Delete the file in question, or delete all of the files in the cache directory. This will force the Administration Center to pull the file from each server. Also check the permissions for this directory and make sure that the Administration Center can read and write files in this directory.
87
ANRW0129E
The following command contains one or more invalid parameters: <command>. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error message indicates that the Administration Center was attempting to run a command on a server but the call to the API contains one or more invalid parameters. This type of error should typically be caught during validation before the command is submitted to the API to run.
Resolve
Check the parameters in the command. If you are filling out text entry fields on a page, you may be able to find the error in the parameters and correct it. Viewing the activity log in the servers properties notebook may also help determine the problem.
ANRW0130E
The administrative API encountered invalid parameters while processing the request. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error message indicates that a command was being run through the administrative API but one of the parameters to an API method was invalid.
Resolve
Although this is typically an internal error, it may be caused by unusual parameters while constructing the command. Check the parameters in the command. If you are filling out text entry fields on a page, you may be able to find the error in the parameters and correct it. If you are entering a value with unusual characters such as <.> &, this may be the source of the problem. Viewing the activity log in the servers properties notebook may also help determine the problem.
ANRW0131E
The administrators authority level on this server cannot be determined. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error message indicates that the authority level for the administrator used for connecting to this server cannot be determined.
Resolve
Try using a different administrator ID. Viewing the activity log in the servers properties notebook may also help determine the problem. To use a different
88
administrator ID, use the Modify Server Connection table action. Then specify a different administrator ID.
ANRW0132E
The administrative API cannot locate the command document. See the Administration Center section of the Problem Determination Guide for more information.
Description
The Administration Center transfers a command document file from the server. This XML file indicates all the valid commands and their syntax for each version and platform of the server. This file is only transferred once during the first connection with a server of a particular version and platform. The error reports that this file could not be located. The file is located in the ISC install directory under PortalServer\shared\app\dsm\CmdFileCache. The name of the file depends on the version and platform. For example a 5.3.0 server for AIX would have the name aix_5_3_0.xml. Check the directory permissions for the CmdFileCache directory.
Resolve
Administration Center must have permission to read and write to this directory.
ANRW0209E
An unknown failure occurred while the health monitor was evaluating the server. See the Administration Center section of the Problem Determination Guide for more information.
Description
The health monitor encountered an error that it could not recover from.
Resolve
Not much can be done in this case except to verify the health monitor is set up correctly. You also may want to try to stop and restart ISC. The only way the health monitor thread can come back is by restarting ISC in some cases.
ANRW0212E
The health monitor cannot evaluate the health of the server. Correcting problems that are indicated in the Detailed Server Health information might solve the problem. See the Administration Center section of the Problem Determination Guide for more information. The health monitor encountered an error while running reports on the servers.
Description
This error can occur if file specifying how to run the health monitor reports is modified or corrupted.
89
Resolve
Verify the health monitor reports file is not modified. This file is located in the ISC install directory under PortalServer\shared\app\dsm\reports\dsmhealthmon.xml. If this file has been modified or corrupted, replace this file with a valid version of the file. This can be done by installing the Administration Center again.
ANRW0213E
The health monitor is unable to locate information about the health of the server. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error can occur when a server has recently been removed from the Administration Center, but the health monitor still thinks the server is there. This can happen if the health monitor and the rest of the Administration Center become out of sync on which servers are defined. It can also occur if the report files generated by the health monitor cannot be found.
Resolve
If the health monitor and the rest of the Administration Center become out of sync then restarting ISC will help. Verify the health monitor report directory exists and has read and write privileges. This directory is located in the ISC install directory under PortalServer\shared\app\dsm\reports. You may also want to try to run the new resync health monitor password (action from the Health Monitor table of servers entry screen). This password tries to resolve any credential issues with the system.
ANRW0221E
The health monitor reports an internal error. See the Administration Center section of the Problem Determination Guide for more information.
Description
The health monitor encountered an internal error that it could not recover from.
Resolve
Not much can be done in this case except to verify the health monitor is set up correctly. You may also want to try to restart ISC when the health monitor setup is correct.
ANRW0257E
The status information that is displayed is not valid because the health monitor service is unavailable. See the Administration Center section of the Problem Determination Guide for more information.
Description
This error occurs when the health monitor service cannot be found. This can happen when the health monitor service is not set up correctly.
90
Resolve
Verify the health monitor service is set up correctly.
91
92
For example: ANRW0022I The operation completed successfully. ANRW0023E An internal error occurred during validation. Informational messages, for example ANRW0022I, provide some general information or identify limitations or requirements for the task being performed. Error messages, for example ANRW0023E, identify that there is a problem completing the requested task. The message can prompt the user to perform additional setup (such as server-to-server-communication), identify that the requested action is invalid in the current work item or task, or report an internal error. Resolving an internal error, such as ANRW0023E, generally requires assistance from customer support. You will typically be asked to provide tracing information, as well as information about the sequence of actions performed before the failure occurred. Messages issued by the Administration Center are displayed in the language selected for the Web browser, or its closest default. Administration Center message numbers are not server dependent, unlike Tivoli Storage Manager server messages. Administration Center messages are generally based on the return code specified when a Tivoli Storage Manager server command was performed. In some cases the server return code that is the basis for the Administration Center message will be shown, along with the server message. In rare cases, the return code and message displayed will be inconsistent. If you use tracing to capture information for a server command implementation problem, the return codes identified with the server messages can help customer support diagnose the issue. Some Tivoli Storage Manager server messages are dependent on the server operating system. When the Administration Center displays a Tivoli Storage Manager server message, the message number can be associated with different messages for servers running on different operating systems. A single message number might have different variations for different platforms. Tivoli Storage Manager messages use different message prefixes, typically ANR or ANE. The following is a sample message that occurs if a DEFINE LIBRARY command fails on a z/OS server: ANR2022E DEFINE LIBRARY: One or more parameters are missing. Use the command line in the Administration Center or on the server machine where the failure occurred to obtain further information about the server message. To request help for the specific Tivoli Storage Manager server message number, issue the HELP ANR2022E command: As an alternative, use the Messages Manual and identify the message by its message number. If the message is platform specific, locate the message for the server platform of interest. For z/OS, for example, you should consider the version of the message showing (S/390) right after the message number. For the sample server message above, locate message number ANR2022E in the Message Manual.
93
Message format
The following example displays the Tivoli Storage Manager message format:
94
Message Prefix Message Number Message Type* ANR 0992 I Message text
Server installation complete. Explanation: The server installation procedure has completed successfully. The server is now available for normal operation. System Action: Server completes installation processing. User response: None. * I = Information E = Error S = Severe Warning W = Warning K = Kernel message that originates from the hierarchical storage management (HSM) client
Explanation
System Action
User Response
Message variables in the message text appear in italics. The server and client messages fall into the following categories: v Common messages that pertain to all Tivoli Storage Manager server platforms v Platform-specific messages that pertain to each operating environment for the server and the client v Messages that pertain to application clients
95
Message Prefix Message Number Message Type ANS NNNN T TSM:SERVER 1> q event standard dddd ANR2034I: QUERY EVENT: No match found for this query. ANS5I02I: Return code 11 Command issued Descriptive message (This value is explained in the descriptive message.)
Message Prefix Message Number Message Type ANS NNNN T TSM:SERVER 1> def vol cstg05 primary ANRxxxxx: DEFINE VOLUME: Storage pool CSTG05 is not defined. ANS5I02I: Return code 11 Command issued Descriptive message (This value is explained in the descriptive message.)
Problems with the Tivoli Storage Manager server command definition file
The Administration Center uses command definition files which specify the commands supported for each server operating system. There is a different command definition file for each server operating system. If this file was corrupted on the Integrated Solutions Console system or on the server system, parts of the interface might not be able to validate creation of new objects and might be unable to correctly construct server commands. Administration Center messages that identify server command syntax errors or validation errors (for text entry or the selection of interface controls) can sometimes be caused by problems with the command definition files. The Administration Center acquires a command definition file the first time it establishes a connection with a server. The next time the Administration Center contacts a server running on the same operating system, it uses the command file that was previously obtained for that operating system. If the command file is not available in the appropriate location (due to renaming or deletion) then any request following the disappearance of the file triggers another transfer of the command file for that specific operating system.
96
Do not attempt to update the command definition file. If problems occur that could be related to the command definition file, verify that the appropriate command definition file is available to the Administration Center for the servers operating system. If this file does not exist, verify that the Tivoli Storage Manager server can communicate with the Administration Center API and that it has the platform-specific command file and dsmcmd.xml available in the server directory hierarchy. Though it is not recommended, there is nothing to prevent the command definition file from being modified or deleted on the Integrated Solutions Console system, or the Tivoli Storage Manager server system. Verify that the appropriate platform-specific command file is available to the Administration Center for the platform of the server of interest. If not, verify that the Tivoli Storage Manager server can communicate with the Administration Center API and it has the platform-specific command file and dsmcmd.xml available and valid in the server directory hierarchy. To verify that a connection with the server can be established, see Using data storage diagnostic tips on page 267. One scenario is, for example, when a failure occurs as a task is being performed on an AIX 5.3.0 server. When a connection is established to that server or a command needs to be generated or verified, the Administration Center looks for the command definition file. The platform-specific command file is copied from the server to the following location in the Integrated Solutions Console Portal Server hierarchy: PortalServer\shared\app\dsm\CmdFileCache\aix_5_3_0_0.xml. Other platforms will have similar file name construction and are located in the same Portal Server directory. Any changes made to the command definition file can corrupt the XML defined objects in the file, which can cause Administration Center tasks to fail. If you identify a corrupted command definition file and cannot recover the original command definition file, you can use a connection to another server running the same operating system to obtain a valid command definition file, after renaming the original corrupted file. If other Administration Center .xml or .xsd files in the WEB-INF directory are corrupted, similar issues can occur. For example, the Administration Center might not be able to construct tables or launch portlets.
This portlet is unavailable. If the problem persists, please contact the portal administrator.
This error message is typically displayed when the Java Server Page (JSP) has code initializing a table model or a list model. If there is a connection problem with the Tivoli Storage Manager server, it is possible that the bean that holds all the initial values for the fields on this page was not properly initialized. For example, the reference to a table model in the bean for the Client Nodes Notebook is not initialized and has a null value. This causes an exception when the page is rendered. The message is displayed by the portal server and not the Tivoli Storage Manager Administration Center. Refer to tracing instructions for the
97
Administration Center to turn on the trace and look for any exceptions in the trace. The following message is an example of what you might see:
[12/7/04 13:43:37:859 PST] 1a33b798 snapin e com.tivoli.dsm.snapin.DsmLaunchedPortlet doView ERROR: view class call failed [12/7/04 13:43:37:859 PST] 1a33b798 snapin e com.tivoli.dsm.snapin.DsmLaunchedPortlet doView The following exception was logged com.ibm.wps.pe.pc.legacy.impl.TransferPortletException: Cannot set a null Table Model at com.ibm.wps.pe.pc.legacy.impl.PortletContextImpl.include (PortletContextImpl.java:270) at com.tivoli.dsm.snapin.views.PolicyDomainsView.performView (PolicyDomainsView.java:184) at com.tivoli.dsm.snapin.DsmLaunchedPortlet.doView (DsmLaunchedPortlet.java:727) at org.apache.jetspeed.portlet.PortletAdapter.service (PortletAdapter.java:154) ... ... ... ... Nested Exception is java.lang.IllegalArgumentException: Cannot set a null Table Model at com.ibm.psw.wcl.components.table.WTable.setModel (WTable.java:2376) at com.ibm.psw.wcl.components.table.WTable.setModel (WTable.java:2362) at org.apache.jsp._node_5F_prop_5F_notebook._jspService (_node_5F_prop_5F_notebook.java:2098) at com.ibm.ws.webcontainer.jsp.runtime.HttpJspBase.service (HttpJspBase.java:89)
In the case above, check that you can connect to the Tivoli Storage Manager server. Close the portlet and retry the same action. Another cause might be a compile error of the JSP, which should not have happened unless the page was modified. Look for any exceptions in the trace. You may see messages similar to the following:
[10/31/04 23:11:32:484 PST] 4c5b22a4 snapin e com.tivoli.dsm.snapin.DsmMainPortlet doView The following exception was logged com.ibm.wps.pe.pc.legacy.impl.TransferPortletException: /jsp/console/tpvw_tbl_libraries.jsp(155,4) Unable to load class com.tivoli.dsm.taglib.DsmRefreshTag at com.ibm.wps.pe.pc.legacy.impl.PortletContextImpl.include (PortletContextImpl.java(Compiled Code)) at com.tivoli.dsm.snapin.views.TpvwView.performView(TpvwView.java:348) ... ... ... Nested Exception is org.apache.jasper.compiler.CompileException: /jsp/console/tpvw_tbl_libraries.jsp(155,4) Unable to load class com.tivoli.dsm.taglib.DsmRefreshTag at com.ibm.ws.webcontainer.jsp.compiler.BasicTagBeginGenerator.init (BasicTagBeginGenerator.java:81) at org.apache.jasper.compiler.JspParseEventListener$GeneratorWrapper.init (JspParseEventListener.java(Compiled Code)) at org.apache.jasper.compiler.JspParseEventListener.addGenerator (JspParseEventListener.java(Compiled Code))
The error above cannot be recovered unless the JSP is fixed. Make sure the JSP was not modified. If the problem persists, consider reinstalling the IBM Tivoli Storage Manager Administration Center.
98
There has been an application error! Please contact to your system administrator to report this error.
Typically, this error message is caused by the user clicking a button or link more than once before the action is completed. For example, pressing the Cancel button on a notebook. If the request is not completed, and the Cancel button is pressed again, the application might fail and issue this error message. Close the application and log on to ISC again.
99
100
trace file name The name of the file to which the trace data is written. Note that on UNIX environments, the domdsmc executable is launched by Domino startup script. This script changes the current working directory to the Domino Data directory; therefore, if a full path name is not specified, the trace-file-name is created in the Domino Data directory. trace flags The list of trace flags to enable. Trace flags are separated by a comma. For example, issue the following for the command line client:
DOMDSMC SELECTIVE database.nsf /TRACEFILE=trace.log /TRACEFLAG=SERVICE,API
101
You can significantly assist in determining the problem by collecting all the necessary information about the environment. Gather as much of the following information as possible before contacting IBM Support. v The exact level of the operating system, including all patches that have been applied. v The exact level of the Domino server. v v v v v v v v v | | | | | v The exact level of Data Protection for Domino. The exact level of the Tivoli Storage Manager API. The exact level of the Tivoli Storage Manager server. The exact level of the Tivoli Storage Manager backup-archive client. The exact level of the Tivoli Storage Manager storage agent (if LAN-free environment). The Tivoli Storage Manager server platform and operating system level. The output from the Tivoli Storage Manager server QUERY SYSTEM command. The output from the Data Protection for Domino DOMDSMC QUERY ADSM command. The output from the Data Protection for Domino DOMDSMC QUERY DOMINO command. The output from the DB2 BACKUP DB <dominodatabase> USE TSM command where dominodatabase is the name of the Domino DB2 database when encountering problems backing up DB2-enabled Lotus Notes databases. The value of the DSMI_CONFIG, DSMI_DIR, and DSMI_LOG environment variables (Domino DB2). Permissions and name of the user ID being used to run backup and restore operations.
v v
v A list of the steps needed to recreate the problem (if the problem can be recreated). v If the problem cannot be recreated, list the steps that caused the problem. v Is the problem occurring on other Domino servers?
102
v Tivoli Storage Manager Server activity log. The Data Protection client sends information to the server activity log. A server administrator can view this log for you if you do not have a Tivoli Storage Manager administrator user ID and password. v If the Data Protection client is configured for LAN-free data movement, also collect the options file for the Tivoli Storage Manager storage agent. The default name for this file is dsmsta.opt. v Any command files and scripts used to run Data Protection for Domino. v If the Tivoli Storage Manager client scheduler is being used, also collect the client schedule log.
103
The following UNIX command lists all files in the directory /etc that were modified within the last 5 days:
find /etc -type f -ctime 5 -print
Also, the system might have caused changes. The following are examples of such changes: v Disks are getting full (check with UNIX command df) v Networks are slower (check for causes such as additional hosts, additional applications, defects in software or hardware) v The IBM Tivoli Storage Manager server is slower (check to see if clients and/or operations were added and look at the IBM Tivoli Storage Manager servers activity log) If changes were made to the system, back them out one-at-a-time and try to reproduce the problem. In most cases you will find the one change or set of changes that caused the problem to occur. You can then decide if you need those changes or can fix the symptoms. Otherwise, if you need to implement those changes and cannot prevent their symptoms, contact support for the affected components. If a problem seems to occur randomly for an operation that was normally successful on previous occasions, try to find out what is different when the problem occurs. Compare the logs of the application in question to determine the differences between successful and unsuccessful runs. The following logs are available for comparison: v tdpdb2.<SID>.<nodename>.log (DB2) v v v v db2diag.log (DB2) tdphdwdb2_<p/b>_<function>_<timestamp>/.log/.trace (DB2) splitint_<p/b>_<function>_<timestamp>.log/.trace IBM Tivoli Storage Manager activity log
(where <p/b> indicates either _p_ for the production system or _b_ for the backup system). The following questions can be asked to try to find a pattern for the occurrence of the problem: v Does it always occur at the same time? v Does it always occur after you run some other operation or the same operation? v Does it always occur if some other application or process is running in parallel? If the problem always occurs at the same time, check if there are any scheduled processes (such as virus checker, automatic updates, batch jobs). The logs mentioned above may help you with this. Troubleshooting a FlashCopy backup (DB2) The following table has descriptions of troubleshooting tips for a FlashCopy backup in a DB2 environment, with ESS or DS storage systems as an example. Problem descriptions citing messages denoted as EExnnnn apply to both DB2 (EEPnnnn) and Oracle (EEOnnnn) environments. A more detailed description, with actual output examples and also troubleshooting information specific to an N Series environment, is shown in the Users Guide.
104
Initialization In the Initialization phase, tdphdwdb2 is called on the backup system with the backup or flashcopy function. The Initialization phase includes the following steps: v Check the profile parameter. v Check the DB2 instance on backup system. v Check the Data Protection for SAP version. v Check the DB2 client connection to the production database. v Get a list of database files from the production database. v Check the connection to the production system through the FlashCopy backup Library (formerly the rexec mechanism). v Check connection to the ESS/DS CIM Agent.
Get Resources
In the Get Resources phase, splitint is started on the production system with the getresources function. The Get Resources phase includes the following steps: v Check the connection to the ESS Copy Services server. v Check the connection to the ESS/DS CIM Agent. v Get the status and other properties of the source and target volumes through the ESS/DS CIM Agent. v Determine the FlashCopy source volumes (from a list of database files). v Search for a matching target volume for each of the source volumes. v Check LVM mirroring configurations for VGs and LVs.
Flashcopy
In the Flashcopy phase, splitint/tdphdwdb2 runs on the production system with the flashcopy function. TRhe FlashCopy phase includes the following steps: v Suspend the production base v Flush the filesystems on the production system v Initiate the Flashcopy with the ESS/DS CIM Agent v Resume the production database write activities
Set Resources
In the Set Resources phase, tdphdwdb2/splitint is running on the backup system after the Get Resources and FlashCopy phases. The Set Resources phase has the following steps: v Clean up by removing the target volumes from the AIX ODM. v Configure all disk devices in the AIX ODM. v Clean up by removing all volumes with duplicate PVIDs from the AIX ODM. v Import/recreate the volume groups. v Mount the filesystems.
In the IBM Tivoli Storage Manager backup phase, tdphdwdb2 calls DB2 on the backup system to start a backup of the FlashCopy-processed database to the IBM Tivoli Storage Manager.
INITIALIZATION PHASE
105
The following are the most common problems that can occur in the Initialization phase of a FlashCopy backup: v AUTHORIZATION PROBLEMS A typical problem that can occur on a regular basis is one involving the authentication of the db2<sid> user on the backup and/or production system. Passwords must be changed on a regular basis, and if this password change is not made known to Data Protection for Snapshot Devices, the next FlashCopy backup will fail.
Problem User name and/or password invalid Description This error occurs if an incorrect db2<sid> user name is specified in the profile parameter LOGON_HOST_PROD or if the password specified with the tdphdwdb2 configure function is incorrect. Solution Perform the following steps to verify: Check if the db2<sid> user specified in the profile parameter LOGON_HOST_PROD is the same as the database user on the production system. If the users are identical, the password of the db2<sid> user is no longer correct. To resolve this problem, correct the profile parameter LOGON_HOST_PROD. Change the password stored in the IDS_CONTROL_FILE (.fcp) by issuing the following command: tdphdwdb2 -f configure -p <profile> Password expired This error can occur on a To resolve this problem, change the regular basis if the password of expired password on the production the db2<sid> user on the and/or backup system with the passwd production system or on the AIX command. backup system is changed. Change the password stored in the IDS_CONTROL_FILE (.fcp) by issuing the following command: tdphdwdb2 -f configure -p <profile>
106
Problem
Description
Solution Perform the following steps to verify: On the production system: db2 get dbm cfg | grep AUTHENTICATION Database manager authentication (AUTHENTICATION) = SERVER_ENCRYPT On the backup system: db2 list db directory Database 2 entry: Database alias = R_E01 Database name = E01 Node name = REME01 Database release level = a.00 Comment = the production database Directory entry type = Remote Authentication = SERVER Catalog database partition number = -1 To resolve this problem, proceed as follows: 1. On the backup system, remove the database directory entries R_<SID> and R_<SID>_<NNNN> (where <NNNN> must be replaced by all DB2 partition numbers). 2. Set the Data Protection for Snapshot Devices profile (.fcs) parameter DB2_AUTHENTICATION to SERVER_ENCRYPT in the DB2 section of the profile and start a new FlashCopy backup run. This will create new catalog entries R_<SID> and R_<SID>_<NNNN> with the correct authentication method used on the production system.
Unsupported This error is the result of a function mismatch of the DB2 authentication method between the production and backup database instances. For example, on the production database instance the authentication is set to SERVER_ENCRYPT (DB2 database manager parameter AUTHENTICATION), but on the backup server the database directory entry R_<sid> is configured with authentication SERVER.
107
Problem
Description
Solution Eliminate the cause for the state of the tablespaces, or wait until the backup is finished and restart the FlashCopy backup.
Tablespace not If a FlashCopy backup is in normal started when one or more state tablespaces are not in a normal state on the production system, Data Protection for Snapshot Devices for mySAP will fail with message IDS2517E. The most common states are backup in progress and Offline and not accessible.
These 3 configuration failures result in the same error message: Cannot connect to...
If the CIM Agent is not running, start it by issuing the following command: /opt/IBM/cimom/startcimom If the CIM Agent is running, check the TCP/IP port on which it is running. This can be verified in the log file of the CIM Agent (cimom.log), which is normally located in /opt/IBM/cimom. Correct the Data Protection for Snapshot Devices profile parameter COPYSERVICES_SERVERPORT as necessary. If the CIM Agent is running and the TCP/IP port of the CIM Agent is correct, modify the CIM Agent address in the parameter PRIMARY_COPYSERVICES_SERVERNAME if necessary.
To verify the current Incorrect CIM problem, first check that Agent server the ESS/DS CIM Agent (CIMOM) daemon is address installed and started by specified entering the following command: # ps -ef | grep CIMOM
108
Table 4. Typical problems that can occur in the Get Resources phase of a FlashCopy backup (continued) Problem No target volume found for source volume Description Error message EEx2060W is typically displayed if a source volume does not have a matching target volume in the target volumes file (init<SID>.fct). Solution Add a new target volume to the target volumes file with the same size as the source volume. The new target volume(s) must be added in the correct target set (in the case that multiple target sets are used, e.g. for AIX LVM mirroring environments). To identify which target set needs to be adapted, check the target data container number in the error message. This number must match the volumes_set_<number>. Add the parameter HARDWARE_ID_LVM_MIRROR in the target volumes file in the correct volumes_set_<number> section. Specify the serial number of the mirrored hardware unit as the value for this parameter.
LVM mirrored Message IDS1133E indicates a setup but not specified problem with AIX LVM mirroring. in .fct It reports that the production database is placed on source volumes that are LVM-mirrored to another storage hardware unit but that the target volumes file does not reflect this with the HARDWARE_ID_LVM_MIRROR profile parameter. This parameter configures Data Protection for Snapshot Devices for environments where the production source volumes are LVM-mirrored to another hardware unit. Not LVM mirrored but specified in .fct Error message IDS1138E indicates a setup problem with AIX LVM mirroring. It indicates that the production database is implemented on source volumes that are not LVM-mirrored to another hardware unit but that in the target volumes file the HARDWARE_ID_LVM_MIRROR profile parameter is set. This parameter configures Data Protection for Snapshot Devices for environments where the production source volumes are LVM-mirrored to another hardware unit. In this case, however, the production system is not LVM mirrored.
Remove the parameter HARDWARE_ID_LVM_MIRROR from the target volumes file in the correct volumes_set_<number> section.
LVs must have 2 Error message EEx0166E indicates a LVM copies setup problem with AIX LVM mirroring. For example, the production database is placed on source volumes that are LVM-mirrored across two hardware units, but some logical volumes have one LVM mirror copy only.
Create a second copy for each of the affected logical volumes. Check the output to determine on which unit the second mirror copy must be created.
109
Table 4. Typical problems that can occur in the Get Resources phase of a FlashCopy backup (continued) Problem LVs must not have stale PPs Description Error message EEx0170W indicates a setup problem with AIX LVM mirroring. For example, the production database resides on source volumes that are LVM-mirrored across two hardware units, but the logical volumes have stale physical partitions on one of the LVM mirror copies. Depending on the target volumes set specified in the command line with -n <TargetSet> or automatically selected by Data Protection for Snapshot Devices, one of the two volumes causes the FlashCopy backup run to fail with error message EEx0176E. Error message EEx0174E indicates a setup problem with AIX LVM mirroring. For example, the production database resides on source volumes that are LVM-mirrored across two units, but at least one logical volume is not mirrored correctly. Solution Synchronize both logical volumes. To allow for high availability failovers, stale PPs should be avoided in any case.
Remove one copy of the first logical volume and create a new second copy of this logical volume on the other unit.
Error message EEx0168E indicates a Change the LVM mirroring setup problem with AIX LVM scheduling policy to one of the mirroring. For example, the valid values. production database resides on source volumes that are LVM-mirrored across two units, but the LVM mirroring scheduling policy (sequential) selected for the first volume group is not supported by Data Protection for Snapshot Devices. Valid values for scheduling policy are: parallel, parallel/parallel or striped. Error message EEx0172E indicates a Turn the LVM mirroring write setup problem with AIX LVM consistency on for the specified mirroring. For example, the volume group. production database resides on source volumes that are LVM-mirrored across two units, but the LVM mirroring write consistency (off) selected for one volume group is not supported by Data Protection for Snapshot Devices.
110
Table 4. Typical problems that can occur in the Get Resources phase of a FlashCopy backup (continued) Problem Quorum of VGs must be off Description Solution
Error message EEx0164E indicates a Turn the quorum off for the setup problem with AIX LVM specified volume group. mirroring. For example, the production database resides on source volumes that are LVM-mirrored across two units, but the quorum for one volume group is not supported by Data Protection for Snapshot Devices. Error message EEx0648E is displayed if the user and/or password specified for the ESS/DS CIM Agent is incorrect. The ESS/DS CIM Agent user is specified with the Data Protection for Snapshot Devices profile parameter COPYSERVICES_USERNAME. Check this parameter first. To check if the password is correctly known, enter the following command: # <dest-path>/setuser -u <CIM-user> -p <password> The password can be changed with the chuser command, but for that an admin user password of the CIM Agent is needed. After changing the password or verifying that the password is correct, Data Protection for Snapshot Devices must be updated with the correct password information. To do this, the following command must be started as the DB2 instance user: cd /db2/SIM/dbs ./splitint f password p <profile>
where <dest-path> is the destination This command calls the function directory where the CIM agent is password of Data Protection for installed. Snapshot Devices, which asks for If the password is correct, the the passwords of the DB2 instance following prompt is displayed: owner and the CIM Agent. After the passwords are updated Application setuser started successfully with Data Protection in interactive mode To terminate the application for Snapshot Devices, the enter: exit authentication problem should be To get a help message enter: resolved. help >>> If the password is incorrect, an output similar to the following is shown: E CMMOM0002E CIM_ERR_ACCESS_DENIED followed by traceback information.
111
Table 4. Typical problems that can occur in the Get Resources phase of a FlashCopy backup (continued) Problem CIM Agent query failed -default timeout 6 minutes Description Error message EEx0648E is displayed if the ESS/DS does not respond in a defined period of time (by default, 6 minutes). The error message can be found in the trace file of the failed FlashCopy backup (splitint_p_getresources_ <timestamp>.trace) Several lines above this error message, the time difference of 6 minutes can be noted between the following messages: DsHWInterface::HwGetFCS(): Entering..... DsHWInterface::HwGetFCS(): Exiting with error: ... It may happen that a query to the ESS/DS takes more than 6 minutes to respond if a very large number of volumes are used in a FlashCopy backup or restore operation. Solution Increase the timeout (specified with the Data Protection for Snapshot Devices profile parameter COPYSERVICES_TIMEOUT) to a value that is sufficient.
112
Table 4. Typical problems that can occur in the Get Resources phase of a FlashCopy backup (continued) Problem CIM Agent query failed -error in ESS/DS volume list Description Error messages EEx0648E and IDS1401E are displayed if incorrect ESS/DS volumes are specified in the FlashCopy target volumes file (.fct). There is something wrong with one of the target sets in the target volumes file. For example, when looking at the trace file of the FlashCopy backup run (splitint_p_getresources_ <timestamp>.trace) and searching for the error message EEx0648E, the reason for the error message can be found several lines above: Cant find System for LUN <1C824376> The list of known ESS/DS storage subsystems is shown in previous output lines. When comparing the list of ESS/DS with the LUN 1C824376, there is a clear mismatch between the LUN ID and the ESS/DS serial number. There is no ESS/DS with serial number 24376. For this reason, a typographical error in the .fct file must be assumed as the reason for the failed FlashCopy backup. Solution Edit the target volumes file (.fct) and correct the ESS/DS serial number.
SET RESOURCES PHASE The following describes the most typical problems that can occur in the Set Resources phase of a FlashCopy backup.
113
Description The error message hdwmap.sh not found is issued for one of the following reasons: v The symbolic link hdwmap.sh does not exist in /db2/<SID>/dbs v The symbolic link hdwmap.sh does not point to /usr/tivoli/tsm/tdpessr3/db2/ <release_level>/hdwmap.sh v Data Protection for Snapshot Devices script hdwmap.sh does not exist in /usr/tivoli/tsm/ tdpessr3/db2/ <release_level> v the $PATH variable of the DB2 instance owner does not include . (the local directory)
Solution For the first 3 reasons: Check the symbolic link pointing to /usr/tivoli/tsm/tdpessr3/db2/< release_level>/hdwmap.sh and check for the existence of hdwmap.sh in /usr/tivoli/tsm/tdpessr3/db2/ <release_level> For reason 4: Check the $PATH variable of the DB2 instance owner and add . if necessary. Verify that all target volumes used as FlashCopy targets are attached to the backup system. In addition, as user root, run the following command: /db2/<SID>/dbs/hdwmap.sh vpath0 11E23376 hdisk2 hdisk56 hdisk110 vpath1 11F23376 hdisk3 hdisk57 hdisk111 vpath2 12023376 hdisk4 hdisk58 hdisk112 vpath35 31C23376 hdisk37 hdisk91 hdisk145 ... If not all target volumes can be found in the output of the command listed above, you need to attach the missing volumes with the ESS Specialist or the ESS CLI.
Error message EEx0402I appears when not all target volumes are attached to the backup system. The result may be that some volume groups cannot be imported.
114
Description Error message EEx0402I appears when target volumes attached to the backup system cannot be accessed. The result may be that some volume groups cannot be imported. This error message is potentially the result of corruption in the AIX ODM. For example, the physical volume vpath79 is one of the target volumes specified in the target volumes file (.fct). This volume is attached to the backup system and is visible for AIX. Data Protection for Snapshot Devices for mySAP detects this target volume and tries to import a volume group from this volume. However, the low-level AIX command within the importvg command fails to access the volume.
Solution The reason for this cannot be determined exactly. Normally a manual cleanup of the AIX ODM would fix this problem: 1. Unmount all filesystems belonging to volume groups residing on ESS/DS volumes (take care that rootvg is not touched). 2. Vary off all volume groups residing on ESS/DS volumes (take care that rootvg is not touched). 3. Remove all multi path devices (vpath<NN> in case of SDD) (take care that rootvg is not touched). 4. Remove all hdisks of type IBM FC 2105 and IBM FC 2107. Be careful not to remove the disks of rootvg or local volume groups. 5. Afterward, you should have a clean set of hdisks in the AIX ODM (a check with lspv should show only disks of rootvg and local volume groups). 6. Run the cfgmgr command. 7. All hdisks and vpath devices should now be visible again. 8. Vary on all volume groups that were varied off previously. 9. If this step fails, the manual cleanup did not fix the AIX ODM problem, or the problem resides elsewhere in AIX, possibly the AIX kernel. In this case, a reboot of the backup system is needed to clean up the system. After the reboot, everything should work properly. 10. If the above procedure does not resolve the problem, restart the backup system (if this was not already done).
115
Description Error message EEx0402I can be shown in different error scenarios. The following two scenarios show typical configuration problems that will result in an error indicating that a file system cannot be found. v The first configuration problem results in a volume group in which a logical volume does not have a mount point in the output but the logical volume itself exists in the volume group. The reason for this can be a configuration problem on the production system or a problem with some FlashCopy target volumes.
Solution On the production system add the missing LABEL to the logical volume with the following command: chlv L <mount point> <LV name> In the above example the command would look like: chlv L /db2/E01/sapdata1 lvE01sapdata1 A new FlashCopy backup will then run correctly.
The second configuration problem results in a volume group that was imported (with warnings but no v Looking at the volume group on errors), but the detailed view of the physical volumes in the volume the production system and comparing two logical volumes groups shows that one of the target of this volume group, the output volumes is missing on the backup shows a difference. One of them system. does not have a LABEL defined. Verify that all target volumes used When copying a volume group as FlashCopy targets are attached with such an unlabeled logical volume, the importvg command to the backup system. In addition, as user root, run the following on the backup system cannot completely import the filesystem command: from this logical volume. The label is needed in order to import this filesystem correctly. /db2/<SID>/dbs/hdwmap.sh vpath0 11E23376 hdisk2 hdisk56 hdisk110 vpath1 11F23376 hdisk3 hdisk57 hdisk111 vpath2 12023376 hdisk4 hdisk58 hdisk112 vpath35 31C23376 hdisk37 hdisk91 hdisk145 If not all target volumes can be found in the output of the command listed above, you need to attach the missing volumes with the ESS Specialist or the ESS CLI.
IBM Tivoli Storage Manager BACKUP PHASE Refer to the troubleshooting information for Data Protection for SAP on page 132 as well as other relevant sections of the Problem Determination Guide.
116
To enable tracing, specify the following options in the user setup file (init<SID>.fcs) when you invoke the Data Protection for Snapshot Devices for mySAP command-line executables: v LOG_TRACE_DIR complete path where complete path is the directory where all of the run logs and trace files are placed. v TRACE YES Activate the trace for production and backup. Both parameters are also described with more details in the Data Protection for Snapshot Devices for mySAP Installation and Users Guide. You can find the logs and traces in the directories specified in the LOG_TRACE_DIR parameter of the Data Protection for Snapshot Devices profile. If no parameter is specified, the logs and traces are placed in the directory as specified in the WORK_DIR parameter of the Data Protection for Snapshot Devices profile. The file-naming convention for logs and traces is as follows: v splitint_b_<splitint function>_<date time stamp>.log v splitint_p_<splitint function>_<date time stamp>.log v splitint_b_<splitint function>_<date time stamp>.trace v splitint_p_<splitint function>_<date time stamp>.trace where v _b_ indicates that the function is running on the backup system v _p_ indicates that the function is running on the production system For more information, see also Summary of Log and Trace Files in the Data Protection for Snapshot Devices for mySAP Installation and Users Guide. COLLECTING DATA FROM THE DS OPEN API COM AGENT WHEN AN ERROR IS ENCOUNTERED Starting with IBM Tivoli Storage Manager Version 5.3, the communication between Data Protection for Snapshot Devices and the storage subsystem (except N Series) is handled via the CIM agent. The installation and configuration information for the CIM agent is contained in Data Storage Open Application Programming Interface Reference (GC35-0493-03). Perform the following steps to collect the log data: 1. Go to the CIM agent directory. The default directory is /opt/IBM/cimagent 2. Issue the collectLogs target directory command to compress all *.log files that are in the CIM agent directory and all sub-directories. These will be collected in the collectedLogs.zip file in the target directory. If a target directory is not specified, the default is the cimagent directory. If the specified target directory does not exist, it will be created. The logging settings are controlled by the logger.properties file in the cimagent directory. Any changes to this file require a restart of cimom to become effective. Default values: message.file.maxFiles = 20 This setting indicates the maximum number of 1MB cimom.log files to be kept. Adjust according to the level of activity and your available disk space.
117
message.logger.level = DEBUG_MAX This allows all debugging messages to be logged and could slow performance. This can be reduced to DEBUG_MIN when the system stabilizes. trace.file.maxFiles = 40 This setting indicates the maximum number of 1MB providerTrace.log files to be kept. Adjust this according to the level of activity and your available disk space. trace.logger.level = DEBUG_MAX This setting allows all debugging traces to be logged and could slow performance. This can be reduced to DEBUG_MID when the system stabilizes. indication.file.maxFiles=3 This setting indicates the maximum number of 1MB indication.log files to be kept. Adjust according to the level of activity and your available disk space. indication.logger.level=DEBUG_MAX This setting allows all debugging traces to be logged and could slow performance. This can be reduced to DEBUG_MID when the system stabilizes.
Locating solutions for Data Protection for Snapshot Devices for mySAP
Several resources are available for you to learn about or to diagnose Data Protection for Snapshot Devices for mySAP. The first reference to consider is the Data Protection for Snapshot Devices for mySAP Installation and Users Guide for the applicable DBMS. This is available from the Tivoli Information Center under Storage Manager for Advanced Copy Services. For the latest news, the IBM Support Solutions database contains a knowledge base of articles and information on issues related to backup and restore problems. Refer to the IBM support site for Tivoli Storage Manager for Advanced Copy Services (new product designation) for more information. Additional information can be found at the following Web sites: v For SAP, more information can be found at the SAP Service Marketplace. v For Oracle, search the Oracle Technology Network or visit the Oracle Web site. v For DB2, search the DB2 Web site.
Gathering information before calling IBM (DP for Snapshot Devices for mySAP)
Data Protection for Snapshot Devices for mySAP depends on the operating system as well as the Oracle or DB2 application. If you collect all the necessary information about the environment, this can significantly help to determine the problem. Gather as much of the following information as possible before contacting IBM Support:
118
v The exact level of the operating system, including the bit width (32/64) and all the maintenance levels and patches that were applied. v Are you running in an HACMP environment? If so, determine the exact level of the HACMP software, including all the maintenance levels and patches that were applied. v The exact level of the Oracle or DB2 server, including the bit width and all of the maintenance levels and patches that were applied. v Are you running in a single server or an OPS or RAC environment? If so, how many hosts are participating in this clustered environment? v The exact level of the ESS Server and ESS Copy Services CLI, if using an ESS storage device. Is your ESS FlashCopy feature enabled? v Are you using SDD? If so, the exact level of the SDD software. v v v v v v Is your database server attached to ESS using SCSI or Fibre Channel? The exact level of Data Protection for SAP. The exact level of the IBM Tivoli Storage Manager API. The exact level of the IBM Tivoli Storage Manager server. The exact level of the IBM Tivoli Storage Manager backup-archive client. The exact level of the IBM Tivoli Storage Manager storage agent (if LAN-free environment).
v The IBM Tivoli Storage Manager server platform and operating system level. v Output from the IBM Tivoli Storage Manager server query system command. v Output from the failing Data Protection for Snapshot Devices commands on the production and backup systems. v A list of the steps needed to recreate the problem. Note that if the problem cannot be easily reproduced, then list the steps that caused the instance of the problem that was encountered. v Does the problem occur on other database servers? v The type of file system (JFS, JFS2). v The layout of the file system of the SAP server in relation to the layout of the storage device (file systems, logical volumes, volume groups, LUNs, LSSs). v Does the problem occur on other SAP database servers?
Files to gather before calling IBM (DP for Snapshot Devices for mySAP)
Several log files and other data may be collected by Data Protection for Snapshot Devices for mySAP. Gather as many of the following files as possible before contacting IBM Support: v The error log files that DSM_LOG and DSMI_LOG point to on the production and backup systems. The Data Protection for Snapshot Devices error log file (default: tdpess.log) indicates the date and time of the commands and any error messages or completion codes. This file should be monitored daily. v The log files for SAP BR*Tools. v The trace files on the production system and the backup system. v The Data Protection for Snapshot Devices profile. This file ends in .fcs. v The Data Protection for Snapshot Devices target volumes file as specified by the VOLUMES_FILE parameter. This file ends in .fct. v The options files that are identified by DSM_DIR, DSMI_DIR, DSM_CONFIG, DSMI_CONFIG on both the production and backup systems.
Chapter 5. Data Protection
119
v The IBM Tivoli Storage Manager Server activity log. Data Protection for Snapshot Devices for m<SAP logs information to the server activity log. An IBM Tivoli Storage Manager administrator can view this log for you if you do not have a IBM Tivoli Storage Manager administrator ID and password. v If Data Protection for SAP is configured for LAN-free data movement, also collect the options file for the IBM Tivoli Storage Manager storage agent. The default name for this file is dsmsta.opt. v Any command files and scripts used to run Data Protection for Snapshot Devices commands. v Any operating system error information (run the command: errpt -a). v If theIBM Tivoli Storage Manager client scheduler is used, collect the client schedule.
tdpo_trace_file= The name of the file to which the trace data is written. | | | tdpo_trace_flags= The list of trace flags to enable. Trace flags are separated by a space. The trace flags specific to Data Protection for Oracle are orclevel0, orclevel1, orclevel2, all, and orcbuff. For example:
tdpo_trace_file /home/dpOracle/log/trace.out tdpo_trace_flags orclevel0 orclevel1 orclevel2
120
121
v The output from failed command or operation. This may be either the console output redirected to a file or an actual screen image of the failure. v Any .trc files in Oracles user_dump_destination directory. v Sbtio.log, which should be in the $ORACLE_HOME/rdbms/log or user_dump_destination. v The Tivoli Storage Manager Server activity log. The data protection client logs information to the server activity log. A Tivoli Storage Manager administrator can view this log for you if you do not have a Tivoli Storage Manager administrator user ID and password. v If the data protection client is configured for LAN-free data movement, collect the options file for the Tivoli Storage Manager storage agent. The default name for this file is: dsmsta.opt. v Any command files and scripts used to run Data Protection for Oracle. v If the Tivoli Storage Manager client scheduler is being used, collect the client schedule log.
Determining if the problem is a Data Protection for Exchange issue or an Exchange issue
The Data Protection client interacts closely with Microsoft Exchange. Because of this close interaction, it is necessary to first determine if the problem is with Microsoft Exchange or with the Data Protection client. Perform the following steps to try to isolate the source of the error: 1. Try recreating the problem with the Microsoft NTBACKUP utility. This utility uses a call sequence similar to Data Protection for Exchange to run an online
122
| | | | | | |
backup. If the problem can be recreated with NTBACKUP, then the problem most likely exists within the Exchange server. 2. Try recreating the problem with the Microsoft BACKREST (Exchange 2000 Server, Exchange Server 2003, Exchange Server 2007) application. This application can run backups using the Microsoft Exchange APIs. If the problem can be recreated with BACKREST, then the problem most likely exists within the Exchange server. Microsoft ships BACKREST with the Exchange Software Developers Kit (SDK). IBM Service can provide a copy of BACKREST if you encounter problems obtaining or building this application. 3. If the error message "ACN5350E An unknown Exchange API error has occurred" is displayed, the Exchange server encountered an unexpected situation. Microsoft assistance may be needed if the problem continues. 4. Data Protection for Exchange error messages occasionally contain an HRESULT code. Use this code to search Microsoft documentation and the Microsoft Knowledge Base for resolution information. Some Exchange SDK files contain these messages ESEBKMSG.H (Exchange 2000 Server, Exchange Server 2003, Exchange Server 2007).
where trace file name= The name of the file to which the trace data is written. trace flags= The list of trace flags to enable. Trace flags are separated by a comma. Use the SERVICE and API trace classes to turn on a subset of trace flags that the service group normally requires. The following examples show you how to enable tracing, depending on your environment: Command line client:
TDPEXCC BACKUP SG1 FULL /TRACEFILE=trace.log /TRACEFLAG=SERVICE,API
GUI client:
TDPEXC /TRACEFILE=trace.log /TRACEFLAG=SERVICE,API
123
The Microsoft Knowledge Base contains articles related to backup-restore problems. To review the Microsoft Knowledge Base, visit Microsoft Support.
124
v v v
v v v
monitored daily. This log file is commonly renamed in scheduled backup scripts by the /LOGFILE parameter specified with the TDPEXCC BACKUP command. The Data Protection for Exchange Tivoli Storage Manager API options file. The default options file is dsm.opt. The Tivoli Storage Manager API error log file. The default error log file is dsierror.log. The Windows Event Log for Application and System. The Exchange Server logs information to the Windows Event Log. Exchange server error information can be obtained by viewing the Windows Event Log. The Tivoli Storage Manager registry hive export. The Exchange Server registry hive export. The Tivoli Storage Manager Server activity log. The Data Protection client logs information to the server activity log. A Tivoli Storage Manager administrator can view this log for you if you do not have a Tivoli Storage Manager administrator user ID and password. If the Data Protection client is configured for LAN-free data movement, also collect the options file for the Tivoli Storage Manager storage agent. The default name for this file is dsmsta.opt. If the Tivoli Storage Manager client scheduler is being used, also collect the client schedule log.
What to gather if the silent install fails (Data Protection for Exchange)
The silent install may not report information about the cause of the failure. To isolate or diagnose a failed silent installation, additional steps must be taken. Gather the following information to assist Customer Support when evaluating your situation: v Operating system level. v List of service packs or other fixes applied for the operating system. v A description of the hardware configuration. v Installation package (CD-ROM or electronic download) and level. v Any Windows event log relevant to the failed installation. v Windows services active during the failed installation (for example, antivirus software). v Whether or not you are logged on to the local machine console (not through terminal server). v Whether or not you are logged on as a local administrator, not a domain administrator. The Tivoli Storage Manager does not support cross-domain installations. v You can create a detailed log file (setup.log) of the failed installation. Run the setup program (setup.exe) in the following manner:
setup /v"l*v setup.log"
125
If you encounter a problem during Data Protection for Exchange processing using VSS for Backup and Restore, follow the steps below as your first attempt to resolve the problem: 1. Retry the operation that failed. 2. If the problem still exists, close other applications, especially those applications that interact with Exchange (antivirus applications, for example). Retry the operation that failed. 3. If the problem still exists: a. Shut down the Exchange server. b. Restart the Exchange server. c. Run the operation that failed. 4. If the problem still exists: a. Shut down the entire machine. b. Restart the machine. c. Run the operation that failed. 5. If the problem still exists, determine if it is occurring on other Exchange servers.
Determining if the problem is a Data Protection for Exchange issue or a general VSS issue
The Data Protection client interacts closely with the backup-archive client (DSMAGENT), which performs all of the Virtual Shadow Copy Service (VSS) operations. Determine first if the problem is with Microsofts VSS service or with the Tivoli Storage Manager. Perform the following steps to try to isolate the source of the error: 1. Test the connectivity between the Data Protection client and the Tivoli Storage Manager dsmagent. Issue the TDPEXCC QUERY EXCHANGE command on the machine where the Exchange server is installed to verify that your installation and configuration is correct. This command returns information on the following: v Exchange Server status v Storage groups v Circular logging v VSS components The following is an example of the output generated by the TDPEXCC QUERY EXCHANGE command:
Volume Shadow Copy Service (VSS) Information -------------------------------------------Writer Name : Microsoft Exchange Writer Local DSMAgent Node : SERVERA Remote DSMAgent Node : SERVERX Writer Status : Online Selectable Components : 4
If the TDPEXCC QUERY EXCHANGE command does not return all of this information, you might have a proxy configuration problem. Refer to your Users manual for instructions on setting up proxy configurations. If all of the information returned to you seems correct, proceed to the next step. 2. Use the vssadmin or vshadow utility to recreate the VSS operation without the Tivoli Storage Manager intervening. When VSS operations are failing, use these
126
programs to recreate the error to determine if this is a general VSS problem or a problem within the Tivoli Storage Manager code. vssadmin A utility that is pre-installed with your operating system. It can display current volume shadow copy backups and all installed shadow copy writers and providers in the command window. The following are example VSSADMIN commands:
VSSADMIN LIST WRITERS VSSADMIN LIST PROVIDERS VSSADMIN LIST SHADOWS
vshadow A utility included with Microsofts Volume Shadow Copy Services SDK that can be used to exercise most of the VSS infrastructure, such as creating/querying/deleting shadow copies. You can also use vshadow to create both persistent and non-persistent shadow copies, transportable snapshots, as well as assign a drive letter or mount point to a shadow copy. v The following can be determined by using the vssadmin or vshadow utility: Verify VSS Provider configurations and setup Rule out any possible VSS problems before running the Tivoli Storage Manager VSS functions That you might have a VSS configuration problem or a real hardware problem if an operation does not work with vshadow/vssadmin That you might have a Tivoli Storage Manager problem if an operation works with vshadow/vssadmin but not with the Tivoli Storage Manager v Perform the following tests to ensure that VSS is working correctly: Test non-persistent shadow copy creation and deletion a. Run VSHADOW k: l: where k: and l: are the Exchange Server database and log volumes. b. Repeat the step above four times. c. Inspect the Windows Event Log to ensure that things look appropriate. Test persistent shadow copy creation and deletion a. Run VSHADOW -p k: l: (where k: and l: are the Exchange Server database and log volumes. You may have to run VSHADOW -da to remove this if you do not have enough space. b. Repeat the previous step four times. c. Inspect the Windows Event Log to ensure that things look appropriate. Test non-persistent transportable shadow copy creation and deletion (VSS Hardware Provider environments only) a. Run VSHADOW -p -t=export.xml k: l: where k: and l: are the Exchange Server database and log volumes. b. Copy the resultant export.xml file from machine 1 to machine 2 before performing the next step. c. On the machine you have set aside for offload, run VSHADOW -i=export.xml d. Inspect the Windows Event Log to ensure that things look appropriate. If any of these tests fail repeatedly, there is hardware configuration problem or a real VSS Problem. Consult your hardware documentation for known problems or search Microsoft Knowledge Database for any information. If all tests pass, continue to Step 3 on page 128.
Chapter 5. Data Protection
127
3. Recreate your specific problem by using vshadow. If you can only recreate your problem through a series of steps (for example: a backup fails only when you perform two consecutive local backups), try to perform those same tests by using vshadow. v Exchange VSS backups to Local are simulated by running a vshadow persistent snapshot. v Exchange VSS backups to the Tivoli Storage Manager are simulated by running a vshadow non-persistent snapshot. v Exchange VSS backups to Local and to the Tivoli Storage Manager are simulated by running a vshadow persistent snapshot. v Offloaded Exchange VSS backups to the Tivoli Storage Manager are simulated by running a vshadow non-persistent, transportable snapshot. Refer to the VSHADOW documentation for the specific commands for performing backups. If you can recreate the problem, it most likely is a general VSS issue. Refer to Microsoft Knowledge Database for information. If your operation passes successfully with vshadow, it most likely is a Tivoli Storage Manager/Data Protection for Exchange client problem.
v Tivoli Storage Manager API trace Enable tracing with the DP/Exchange DSM.OPT file and the TRACEFILE and TRACEFLAGS keywords. The following is an example of the entry in the DP/Exchange DSM.OPT file:
TRACEFILE APITRACE.TXT TRACEFLAG SERVICE
v DSMAGENT trace Enable tracing with the DSMAGENT DSM.OPT file and the TRACEFILE and TRACEFLAGS keywords. The following is an example of the entry in the DSMAGENT DSM.OPT file:
TRACEFILE AGTTRACE.TXT TRACEFLAG ALL_VSS
The trace flag, in this instance, is ALL_VSS (you might need different traceflags, depending on the circumstance).
128
Gather as much of the following information as possible before contacting IBM Support: v The exact level of the Windows operating system, including all service packs and hotfixes that were applied. v The exact level of the Exchange Server, including all service packs and hotfixes that were applied. v The exact level of Data Protection for Exchange with Virtual Shadow Copy Service (VSS) Backup/Restore support. v The exact level of the Tivoli Storage Manager API. v The exact level of the Tivoli Storage Manager server. v The exact level of the Tivoli Storage Manager backup-archive client. v The exact level of the Tivoli Storage Manager storage agent (if LAN-free environment). v The Tivoli Storage Manager server platform and operating system level. v The output from the Tivoli Storage Manager server QUERY SYSTEM command. v The output from the Data Protection for Exchange TDPEXCC QUERY EXCHANGE command. v The device type (and connectivity path) of the Exchange databases and logs. v The specific hardware that is being used (for example: HBA, driver levels, microcode levels, SAN Volume Controller levels, DS6000, DS8000 hardware details). v Permissions and the name of the user ID being used to run backup and restore operations. v The name and version of antivirus software. v The IBM VSS hardware provider level. The IBM CIM agent level for DS6000/DS8000 or the SAN Volume Controller. A list of third-party Exchange applications running on the system. A list of other applications running on the system. A list of the steps needed to recreate the problem (if the problem can be recreated). v If the problem can not be recreated, list the steps that caused the problem. v Is Data Protection for Exchange running in a Microsoft Cluster Server (MSCS) environment? v Is the problem occurring on other Exchange servers? v v v v Some operating system information that is listed above can be gathered by using the MPS Reports Tool. This is a Microsoft Reporting tool which lets you gather levels of operating system, software installed, driver versions, and other data. You can download the MPS Reports Tool at Microsoft.com.
129
v The Exchange Server registry hive export. v The Tivoli Storage Manager Server activity log. The Data Protection client logs information to the server activity log. A Tivoli Storage Manager administrator can view this log for you if you do not have a Tivoli Storage Manager administrator user ID and password. v If the Data Protection client is configured for LAN-free data movement, also collect the options file for the Tivoli Storage Manager storage agent. The default name for this file is dsmsta.opt. v Any screen shots or command-line output of failures or problems. Log files can indicate the date and time of a backup, the data that is backed up, and any error messages or completion codes that could help to determine your problem. The following are the Tivoli Storage Manager log files to gather: v The Data Protection for Exchange log file. The default location of this file is C:\Program Files\Tivoli\TSM\TDPExchange\tdpexc.log v The Tivoli Storage Manager API Error log file. The default location of this file is C:\Program Files\Tivoli\TSM\TDPExchange\dsierror.log v The DSMAGENT error log file. The default location of this file is C:\Program Files\Tivoli\TSM\baclient\dsmerror.log The Windows event log receives information from the Exchange Server and many different components involved during a Virtual Shadow Copy Service (VSS) operation. Microsoft provides a tool in the system32 directory on Windows XP and Windows 2003, called eventquery.vbs (it is a VBS script, not a binary executable) to retrieve event log data. You might use the tool as an alternative method of getting Windows event log data. To invoke the utility, issue the following CSCRIPT command:
cscript c:\windows\system32\eventquery.vbs parameters> outfilename
The utility, by default, produces a tabular listing of all event log records in three sections (one section per event log type). To get all log data in default format, issue the following command:
cscript c:\windows\system32\eventquery.vbs >eq.out
Specify the type of event log you require by using one of the following /L parameters: /L Application /L Security /L System The following example generates output only for the application and system event logs:
cscript c:\windows\system32\eventquery.vbs /L Application >eq_app.out cscript c:\windows\system32\eventquery.vbs /L System >eq_sys.out
You can utilize the /FO parameter to specify tabular, list, or comma-separated (CSV) output. The following are the different methods of specifying the output: /FO TABLE /FO LIST /FO CSV
130
The default format is TABLE. The LIST output puts each column of the record on a separate line, similar to how the Tivoli Storage Manager adminitrators command-line interface (CLI) displays output when it is too wide for tabular display. The CSV output can be loaded into a spreadsheet or database tool for easier viewing. The following example generates a detailed CSV file of the application log:
cscript c:\windows\system32\eventquery.vbs /L Application /FO CSV /V >eq_app.out
You can get additional help information for the tool by using the following example:
cscript c:\windows\system32\eventquery.vbs /?
The following VSS provider log files can also be helpful, if applicable: v System Provider - (Windows Event Log) v IBM System Storage SAN Volume Controller, DS6000, DS8000 - D:\Program Files\IBM\Hardware Provider for VSS\IBMVss.log v NetApp - D:Program Files\SnapDrive\*.log
Troubleshooting Data Protection for Exchange VSS and SAN Volume Controller
The troubleshooting tips included here are designed to help you accelerate your problem determination task. Note: If you plan to perform Data Protection for Exchange Virtual Shadow Copy Service (VSS) Instant Restore operations using SAN Volume Controller or DS6000/DS8000 disk subsystems, you must use non-SSL communications with the CIMOM. By default, the CIMOM is configured to use SSL communications. The Tivoli Storage Manager only supports non-SSL communications with the CIMOM. See the Data Protection for Exchange Users Guide for information on enabling non-SSL communications. The following are some areas which you can troubleshoot when you are having VSS and SAN Volume Controller or DS6000/DS8000 problems: v CIMOM (Common Information Model Object Manager) Connectivity issues To verify connectivity to the CIMOM, perform the following steps: 1. Refer to your SAN Volume Controller documentation. 2. Run the IBMVCFG LIST command. The default location is D:\Program Files\IBM\Hardware Provider for VSS-VDS. 3. Issue the IBMVCFG SHOWCFG command to view the provider configuration information. 4. Check that the CIMOM is properly configured. Run verifyconfig.bat -u username -p password on the SAN Volume Controller Master Console. 5. Check the username and password. If there is a problem with the truststore, follow the procedure in the documentation to generate a new truststore. 6. Set up the CIMOM properties file in non-SSL mode if you are using the SAN Volume Controller or DS6000/DS8000 and you plan to use Instant Restore. v CIMOM operational issues If your backup or restore fails, check the IBMVSS.log file. If the failure is due to a CIMOM failure, the log displays output similar to the following:
Wed Wed Wed Wed Jan Jan Jan Jan 11 11 11 11 17:34:34.793 17:34:35.702 17:34:35.702 17:34:35.718 Calling AttachReplicas AttachReplicas: 909ms returnValue: 34561 AttachReplicas returned: 34561
Chapter 5. Data Protection
131
java.util.MissingResourceException: Cant find resource for bundle java.util.PropertyResourceBundle, key 1793 at java.util.ResourceBundle.getObject(ResourceBundle.java:329) at java.util.ResourceBundle.getString(ResourceBundle.java:289) at com.ibm.cim.CIMException.<init>(CIMException.java:472) at ESSService.executeFlashCopy(ESSService.java:3168) Wed Jan 11 17:34:35.779 - IBMVSS: AbortSnapshots
A return value of 0 means that it was successful. To determine why it failed, look at the log files generated by the CLI or graphical user interface (GUI), depending on how you run your operation. These may provide more information on the failure. v Host configuration issues If the failure seems to be for a different reason than a CIMOM failure, verify your configuration. Run the latest support levels of the software for the SAN Volume Controller or DS6000/DS8000. Check the IBM Storage web site for details. v Collecting logs in this environment If you are unable to resolve these problems, provide the following information to IBM Support: Information Listed in Collection TSM diagnostic information section HBA type, firmware and driver levels SDD version SAN Volume Controller microcode version (if applicable) DS6000/DS8000 microcode version (if applicable) SAN Volume Controller Master Console version (if applicable) For DS6000/DS8000, the CIM Agent version (if applicable) IBMVSS.log Application Event Log System Event Log If the problem appears related to CIMOM, you also need the CIMOM logs. Run CollectLogs.bat and send the file that is created (CollectedLogs.zip) to IBM Support. The default location for the SAN Volume Controller is C:\Program Files\IBM\svcconsole\support, and the default location for the DS6000/DS8000 is C:\Program Files\IBM\cimagent.
132
In general, problems related to Data Protection for SAP can be categorized as one of the following: v Setup and configuration problems v Defects in the product or in interfacing products v Performance degradation The first step when encountering an error is to check the description of the respective error message in the applicable Data Protection for SAP Installation and Users Guide (Oracle or DB2) and perform the recommended action. Error messages can appear both on the screen and in log files. If a problem seems to occur repeatedly without apparent reason and can be reproduced readily when the system performed successfully on numerous previous occasions, ask yourself the following questions: v What changed in the setup of Data Protection for SAP? v What changed in the setup of related IBM Tivoli Storage Manager components such as Data Protection for Snapshot Devices? v What changed in the setup of the other components such as DB2 or Oracle, SAP, IBM Tivoli Storage Manager, operating system, network, or hardware? v Was the production database expanded by implementing new data files, filesystems, logical volumes, or volume groups, for example? v Were patches or updates applied to any components in the system? If you are sure that nothing was changed, ask the same questions of your coworkers and system administrators (DBAs, storage administrator, network administrator, IBM Tivoli Storage Manager administrator, etc.). If this does not resolve the problem, it might prove helpful to check when the configuration files (for example vendor.env, init<SID>.utl, init<SID>.sap, dsm.sys, dsm.opt, /etc/services, /etc/inittab) were last changed. The following UNIX command lists all files in the directory /etc that were modified within the last 5 days:
find /etc -type f -ctime 5 -print
Also, there might have been changes that were caused by the system. Examples of such changes are: v Disks are getting full (check with UNIX command df) v Networks are slower (check for causes such as additional hosts, additional applications, defects in software or hardware). Compare runs in the Performance Monitor history view in the Administration Assistant or check the Data Protection for SAP log files. v The IBM Tivoli Storage Manager server is slower (o see if clients and/or operations were added, and look at the IBM Tivoli Storage Manager servers activity log) If you discover that changes were made to the system, back them out, one-at-a-time, and try to reproduce the problem. In most cases you will find the one change or set of changes that caused the problem to occur. You can then decide if you need those changes or can fix the symptoms. Otherwise, if you need to implement those changes and cannot prevent their symptoms, you can contact support for the affected components. On the other hand, if a problem seems to occur randomly for an operation that was normally successful on previous occasions, you should try to find out what is different when the problem occurs.
Chapter 5. Data Protection
133
Compare the logs of the application component in question to determine the differences between successful and unsuccessful runs, such as v back<SID>.log, rest<SID>.log, arch<SID>.log (Oracle) v tdpdb2.<SID>.<nodename>.log (DB2) v v v v v backom.log (DB2) db2diag.log (DB2) alert_<SID>.log (Oracle) sbtio.log (Oracle RMAN) IBM Tivoli Storage Manager activity log
Try to find a pattern for the occurrence of the problem: v Does it always occur at the same time? v Does it always occur after you run some other operation or the same operation? v Does it always occur if some other application or process is running in parallel? If it always occurs at the same time, check if there are any scheduled processes (such as virus checker, automatic updates, batch jobs). The logs mentioned above may help you with this.
where trace flags= The list of trace flags to enable. Trace flags are separated by a space. The Data Protection for SAP trace flags are: ALL FILEIO FILEIO_MAX COMPR COMPR_MAX SYSCALL SYSCALL_MAX MUX MUX_MAX TSM TSM_MAX ASYNC ASYNC_MAX APPLICATION APPLICATION_MAX COMM COMM_MAX DEADLOCK DEADLOCK_MAX PROFILE PROFILE_MAX BLAPI BLAPI_MAX. If an error occurs early within an operation, it is suggested to set the ALL flag. Note: Setting this flag to trace a complete backup can result in a large trace file. The trace file in this case may be hundreds of megabytes. backint_%BID.trace= The value of this parameter specifies a directory and file where all the run logs and trace file are placed. This should be a fully qualified directory. The characters %BID are replaced during execution by the current backup ID. Both parameters are also described with more details in the Data Protection for SAP Installation and Users Guide. An example:
134
tracefile /home/tdpess/log/trace.out traceflags tdph tdph_detail api api_detail appl verbinfo timestamp
Be sure to remove the corresponding tracefile and traceflags options from the files that the DSM_CONFIG and DSMI_CONFIG environment variables identify.
135
When using DB2: v Is Data Protection for SAP running in a DB2 (EEE or DPF) or ESE environment?
where
136
trace file name= The name of the file to which the trace data is written. trace flags= The list of trace flags to enable. Trace flags are separated by a comma. Use the SERVICE and API trace classes to turn on a subset of trace flags that the service group normally requires. See the following examples: Command line client:
TDPSQLC BACKUP pubs FULL /TRACEFILE=trace.log /TRACEFLAG=SERVICE,API
GUI client:
TDPSQL /TRACEFILE=trace.log /TRACEFLAG=SERVICE,API
137
v A list of third-party SQL applications running on the system. v A list of other applications running on the system. v A list of the steps needed to recreate the problem (if the problem can be recreated). v If the problem cannot be recreated, list the steps that caused the problem. v Is Data Protection for SQL running in a Microsoft Cluster Server (MSCS) environment? v Is the problem occurring on other SQL servers?
Gathering items if the silent install fails (Data Protection for SQL)
The silent install may not report information about the cause of the failure. To isolate or diagnose a failed silent installation, gather the following information to assist Customer Support when they evaluate your situation: v The operating system level. v A list of service packs or other fixes applied to the operating system. v A description of the hardware configuration. v The installation package (CD-ROM or electronic download) and level.
138
v Any Windows event log relevant to the failed installation. v The Windows services that were active during the failed installation (for example, antivirus software). v Whether or not you are logged on to the local machine console (not through terminal server). v Whether or not you are logged on as a local administrator, not a domain administrator. Tivoli Storage Manager does not support cross-domain installations. v You can create a detailed log file (setup.log) of the failed installation. Run the setup program (setup.exe) by issuing the SETUP /VL*V SETUP.LOG command. | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Determining if the problem is a Data Protection for SQL issue or a general VSS issue
The Data Protection client interacts closely with the backup-archive client (DSMAGENT), which performs all of the Virtual Shadow Copy Service (VSS) operations. Determine first if the problem is with Microsofts VSS service or with the Tivoli Storage Manager. Perform the following steps to try to isolate the source of the error: 1. Test the connectivity between the Data Protection client and the Tivoli Storage Manager dsmagent. Issue the TDPSQLC QUERY SQL command on the machine where the SQL server is installed to verify that your installation and configuration is correct. This command returns information on the following: v SQL Server status v VSS components
Chapter 5. Data Protection
139
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
The following is an example of the output generated by the TDPSQLC QUERY SQL command:
Volume Shadow Copy Service (VSS) Information -------------------------------------------Writer Name : SqlServerWriter Local DSMAgent Node : SERVERA Remote DSMAgent Node : SERVERX Writer Status : Online Selectable Components : 10
If the TDPSQLC QUERY SQL command does not return all of this information, you might have a proxy configuration problem. Refer to your Users manual for instructions on setting up proxy configurations. If all of the information returned to you seems correct, proceed to the next step. 2. Use the vssadmin or vshadow utility to recreate the VSS operation without the Tivoli Storage Manager intervening. When VSS operations are failing, use these programs to recreate the error to determine if this is a general VSS problem or a problem within the Tivoli Storage Manager code. vssadmin A utility that is pre-installed with your operating system. It can display current volume shadow copy backups and all installed shadow copy writers and providers in the command window. The following are example VSSADMIN commands:
VSSADMIN LIST WRITERS VSSADMIN LIST PROVIDERS VSSADMIN LIST SHADOWS
vshadow A utility included with Microsofts Volume Shadow Copy Services SDK that can be used to exercise most of the VSS infrastructure, such as creating/querying/deleting shadow copies. You can also use vshadow to create both persistent and non-persistent shadow copies, transportable snapshots, as well as assign a drive letter or mount point to a shadow copy. v The following can be determined by using the vssadmin or vshadow utility: Verify VSS Provider configurations and setup Rule out any possible VSS problems before running the Tivoli Storage Manager VSS functions That you might have a VSS configuration problem or a real hardware problem if an operation does not work with vshadow/vssadmin That you might have a Tivoli Storage Manager problem if an operation works with vshadow/vssadmin but not with the Tivoli Storage Manager v Perform the following tests to ensure that VSS is working correctly: Test non-persistent shadow copy creation and deletion a. Run VSHADOW k: l: where k: and l: are the SQL Server database and log volumes. b. Repeat the step above four times. c. Inspect the Windows Event Log to ensure that things look appropriate. Test persistent shadow copy creation and deletion a. Run VSHADOW -p k: l: (where k: and l: are the SQL Server database and log volumes. You may have to run VSHADOW -da to remove this if you do not have enough space. b. Repeat the previous step four times.
140
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
c. Inspect the Windows Event Log to ensure that things look appropriate. Test non-persistent transportable shadow copy creation and deletion (VSS Hardware Provider environments only) a. Run VSHADOW -p -t=export.xml k: l: where k: and l: are the SQL Server database and log volumes. b. Copy the resultant export.xml file from machine 1 to machine 2 before performing the next step. c. On the machine you have set aside for offload, run VSHADOW -i=export.xml d. Inspect the Windows Event Log to ensure that things look appropriate. If any of these tests fail repeatedly, there is hardware configuration problem or a real VSS Problem. Consult your hardware documentation for known problems or search Microsoft Knowledge Database for any information. If all tests pass, continue to Step 3. 3. Recreate your specific problem by using vshadow. If you can only recreate your problem through a series of steps (for example: a backup fails only when you perform two consecutive local backups), try to perform those same tests by using vshadow. v SQL VSS backups to Local are simulated by running a vshadow persistent snapshot. v SQL VSS backups to the Tivoli Storage Manager are simulated by running a vshadow non-persistent snapshot. v SQL VSS backups to Local and to the Tivoli Storage Manager are simulated by running a vshadow persistent snapshot. v Offloaded SQL VSS backups to the Tivoli Storage Manager are simulated by running a vshadow non-persistent, transportable snapshot. Refer to the VSHADOW documentation for the specific commands for performing backups. If you can recreate the problem, it most likely is a general VSS issue. Refer to Microsoft Knowledge Database for information. If your operation passes successfully with vshadow, it most likely is a Tivoli Storage Manager/Data Protection for SQL client problem.
Tracing the Data Protection client when using VSS technology (SQL)
You must gather traces for Data Protection for SQL, the TSM API, and the DSMAGENT processes to ensure proper diagnosis of the Virtual Shadow Copy Service (VSS) operation. The following are the different traces to gather when you diagnose Data Protection for SQL VSS operational problems: v Data Protection for SQL trace To create the trace flag, issue the /TRACEFILE and /TRACEFLAGS command-line options with the following example command:
TDPSQLC BACKUP DATABASE1 FULL /TRACEFILE=DPTRACE.TXT /TRACEFLAG=SERVICE TDPSQL /TRACEFILE=DPTRACE.TXT /TRACEFLAG=SERVICE
v Tivoli Storage Manager API trace Enable tracing with the DP/SQL DSM.OPT file and the TRACEFILE and TRACEFLAGS keywords. The following is an example of the entry in the DP/SQL DSM.OPT file:
Chapter 5. Data Protection
141
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
v DSMAGENT trace Enable tracing with the DSMAGENT DSM.OPT file and the TRACEFILE and TRACEFLAGS keywords. The following is an example of the entry in the DSMAGENT DSM.OPT file:
TRACEFILE AGTTRACE.TXT TRACEFLAG ALL_VSS
The trace flag, in this instance, is ALL_VSS (you might need different traceflags, depending on the circumstance).
142
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Some operating system information that is listed above can be gathered by using the MPS Reports Tool. This is a Microsoft Reporting tool which lets you gather levels of operating system, software installed, driver versions, and other data. You can download the MPS Reports Tool at Microsoft.com.
The utility, by default, produces a tabular listing of all event log records in three sections (one section per event log type). To get all log data in default format, issue the following command:
cscript c:\windows\system32\eventquery.vbs >eq.out
Specify the type of event log you require by using one of the following /L parameters: /L Application /L Security
Chapter 5. Data Protection
143
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
/L System The following example generates output only for the application and system event logs:
cscript c:\windows\system32\eventquery.vbs /L Application >eq_app.out cscript c:\windows\system32\eventquery.vbs /L System >eq_sys.out
You can utilize the /FO parameter to specify tabular, list, or comma-separated (CSV) output. The following are the different methods of specifying the output: /FO TABLE /FO LIST /FO CSV The default format is TABLE. The LIST output puts each column of the record on a separate line, similar to how the Tivoli Storage Manager administrators command-line interface (CLI) displays output when it is too wide for tabular display. The CSV output can be loaded into a spreadsheet or database tool for easier viewing. The following example generates a detailed CSV file of the application log:
cscript c:\windows\system32\eventquery.vbs /L Application /FO CSV /V >eq_app.out
You can get additional help information for the tool by using the following example:
cscript c:\windows\system32\eventquery.vbs /?
The following VSS provider log files can also be helpful, if applicable: v System Provider - (Windows Event Log) v IBM System Storage SAN Volume Controller, DS6000, DS8000 - D:\Program Files\IBM\Hardware Provider for VSS\IBMVss.log v NetApp - D:Program Files\SnapDrive\*.log
Troubleshooting Data Protection for SQL VSS and SAN Volume Controller
The troubleshooting tips included here are designed to help you accelerate your problem determination task. Note: If you plan to perform Data Protection for SQL Virtual Shadow Copy Service (VSS) Instant Restore operations using SAN Volume Controller or DS6000/DS8000 disk subsystems, you must use non-SSL communications with the CIMOM. By default, the CIMOM is configured to use SSL communications. The Tivoli Storage Manager only supports non-SSL communications with the CIMOM. See the Data Protection for SQL Users Guide for information on enabling non-SSL communications. The following are some areas which you can troubleshoot when you are having VSS and SAN Volume Controller or DS6000/DS8000 problems: v CIMOM (Common Information Model Object Manager) Connectivity issues To verify connectivity to the CIMOM, perform the following steps: 1. Refer to your SAN Volume Controller documentation.
144
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
2. Run the IBMVCFG LIST command. The default location is D:\Program Files\IBM\Hardware Provider for VSS-VDS. 3. Issue the IBMVCFG SHOWCFG command to view the provider configuration information. 4. Check that the CIMOM is properly configured. Run verifyconfig.bat -u username -p password on the SAN Volume Controller Master Console. 5. Check the username and password. If there is a problem with the truststore, follow the procedure in the documentation to generate a new truststore. 6. Set up the CIMOM properties file in non-SSL mode if you are using the SAN Volume Controller or DS6000/DS8000 and you plan to use Instant Restore. v CIMOM operational issues If your backup or restore fails, check the IBMVSS.log file. If the failure is due to a CIMOM failure, the log displays output similar to the following:
Wed Jan 11 17:34:34.793 - Calling AttachReplicas Wed Jan 11 17:34:35.702 - AttachReplicas: 909ms Wed Jan 11 17:34:35.702 - returnValue: 34561 Wed Jan 11 17:34:35.718 - AttachReplicas returned: 34561 java.util.MissingResourceException: Cant find resource for bundle java.util.PropertyResourceBundle, key 1793 at java.util.ResourceBundle.getObject(ResourceBundle.java:329) at java.util.ResourceBundle.getString(ResourceBundle.java:289) at com.ibm.cim.CIMException.<init>(CIMException.java:472) at ESSService.executeFlashCopy(ESSService.java:3168) Wed Jan 11 17:34:35.779 - IBMVSS: AbortSnapshots
A return value of 0 means that it was successful. To determine why it failed, look at the log files generated by the command line interface (CLI) or graphical user interface (GUI), depending on how you run your operation. These may provide more information on the failure. v Host configuration issues If the failure seems to be for a different reason than a CIMOM failure, verify your configuration. Run the latest support levels of the software for the SAN Volume Controller or DS6000/DS8000. Check the IBM Storage web site for details. v Collecting logs in this environment If you are unable to resolve these problems, provide the following information to IBM Support: Information Listed in Collection TSM diagnostic information section HBA type, firmware and driver levels SDD version SAN Volume Controller microcode version (if applicable) DS6000/DS8000 microcode version (if applicable) SAN Volume Controller Master Console version (if applicable) For DS6000/DS8000, the CIM Agent version (if applicable) IBMVSS.log Application Event Log System Event Log If the problem appears related to CIMOM, you also need the CIMOM logs. Run CollectLogs.bat and send the file that is created (CollectedLogs.zip) to IBM Support. The default location for the SAN Volume Controller is C:\Program Files\IBM\svcconsole\support, and the default location for the DS6000/DS8000 is C:\Program Files\IBM\cimagent.
Chapter 5. Data Protection
145
146
This problem was reported to DB2 but DB2 recommended that we ALWAYS run a minor transaction on the database after backup. DB2 did not consider the problem serious enough to fix because most production databases will have plenty of transactions before a possible restore. Perform the following steps to run a DB2 transaction: 1. Issue the following command to connect to the database:
db2 connect to <database name>
3. Issue the following command to pick a table and find its columns:
db2 describe table <tablename>
147
148
Chapter 7. Trace
You can determine the problem you are having with the Tivoli Storage Manager through trace.
3. Perform the operation that is causing the problem. This causes a trace of the problem to be written to the trace file. The trace file is located in the Integrated Solutions Console installation directory under PortalServer\log\trace.log. 4. Disable tracing. Leaving tracing enabled may cause performance problems. 5. Run Collect trace files, logs and system information to send to support. This packages up the trace information collected and log files into a single file called AdminCenterSupport.zip. This file can then be sent to support.
149
The trace classes documented here are those that are most typically requested or used for diagnosing problems. Those trace classes that are included does not entail all possible trace classes that are available. The trace class name should be used when activating tracing using the Administration Center Support Utility.
ACTIONS
Description
Displays processing information for the action classes.
Recommendation
Useful for problems related to action objects. Use this trace class to debug problems that occur as an action, before displaying a page.
ALL
Description
Displays all processing information for the Administration Center. An aggregate that includes all of the trace classes listed in the bulleted list above.
Recommendation
Useful in most cases. Generally recommended when the nature of the problem is unknown. If the ALL trace flag is used, it is not necessary to specify any other trace flags because it already includes all of the trace classes.
API
Description
Displays information in the processing of the API interface. The API interface is used for communications between the Administration Center and the Tivoli Storage Manager server.
Recommendation
Use this trace class for problems related to command implementation on the Tivoli Storage Manager server.
CONTROL
Description
Displays processing information for the connection manager, the portlet factory and other key control components.
Recommendation
Useful for problems related to control objects. Use this trace class to debug problems that occur when you perform actions that use internal control objects, such as the connection manager.
150
HEALTH
Description
Displays all information about the health monitor.
Recommendation
Use this trace class for problems related to the Health Monitor.
PS
Description
Displays general information in the processing of Presentation Services object extensions. This traces all listener, validator, and JavaServer Page (JSP) bean classes.
Recommendation
Use this trace class for problems related to graphical user interface objects, such as tables and buttons.
SNAPIN
Description
Displays processing information for the snapin portlet classes. An aggregate that includes most of the Administration Center trace classes documented here.
Recommendation
Useful in many cases. Generally recommended for diagnosing problems with the Administration Center when the Health Monitor and XML files are working fine.
Other
Aggregate of all trace classes except HEALTH, XMLVAL, and TAGLIB.
TAGLIB
Description
Displays all information related to the JSP tag library extensions.
Recommendation
Use this trace class for problems related to JSP pages.
UTIL
Description
Displays processing information for the utility classes.
Recommendation
Useful for problems related to utility objects. Use this trace class to debug problems that occur in various internal utility routines.
Chapter 7. Trace
151
VIEWS
Description
Displays processing information for the view classes.
Recommendation
Useful for problems related to view objects. Use this trace class to debug problems that occur while you are displaying a page.
XMLVAL
Description
Displays all information in the processing of XML files.
Recommendation
Use this trace class for problems related to the file controlling the servers that the Administration Center knows about (tsmservers.xml) and the command file cache.
152
Additional trace classes can also be disabled by issuing TRACE DISABLE. For example, if you wanted to remove the PVR trace class in addition to those that were already disabled, issue: TRACE DISABLE PVR. By issuing TRACE DISABLE without specifying any trace classes, all currently enabled trace classes will be disabled. 4. Tracing can occur to the console or to a file. Perform the following to begin tracing: v For tracing to the console, issue: TRACE BEGIN v For tracing to a file with no size limitation, issue: TRACE BEGIN <fileName> v For tracing to a file with a size limitation, issue: TRACE BEGIN <fileName> MAXSIZE=<maximum size in megabytes> Note: The fileName can be a fully-qualified path such as /opt/tmp or c:\temp. If a full path is not given, the trace file will be located in the same directory as the running executable. 5. Perform the operation that is causing the problem. 6. Issue the TRACE END command to stop trace messages from being issued. If tracing was being done to a file, ending the trace will write any remaining trace messages to the file and then close the file. It is best to trace to a file. Typically, the tracing for the server or storage agent will generate a large amount of output. It is possible to enable tracing and begin it using the server or storage agent options file. The commands and syntax discussed above are the exact same for the server or storage agent options file, and they are generally used to trace startup and initialization of the server. For example, if the following lines were added to the servers option file, tracing would be started for the DB, TM, and LOG trace classes, and the trace messages written to the file MYTRACE.OUT.
TRACE ENABLE DB TM LOGTRACE BEGIN MYTRACE.OUT
If the tracing is no longer needed after startup, the tracing is ended by issuing the TRACE END command from the console or from an administrative client.
Enabling trace for specific messages for the server or storage agent
A stack trace reveals information about an application that can help IBM Support help you to diagnose your problems faster. Note: Stack trace can be extremely robust and may flood the activity log, depending on the frequency of the failure. You may not be able to view the activity log, therefore you may want to disable stack trace. IBM Support may find it helpful to enable stack trace on specific messages issued by the server or storage agent. The following are types of messages on which a stack trace can be enabled: v Server console v Storage agent console v Administrative client connected to either the server or storage agent
Chapter 7. Trace
153
To get a stack trace when a specific message is issued by the server or storage agent, enable the message for stack trace. Issue the MSGSTACKTRACE ENABLE <messageNumber> command to enable one or more messages for stack trace. Note: <messageNumber> may be a space-delimited list of message numbers. This could be entered as MS ENABLE 2017. The MSGSTACKTRACE ENABLE command is cumulative, such that extra messages are enabled by issuing the MSGSTACKTRACE ENABLE command additional times. If you want to add message 985, in addition to those that are already enabled, issue MS ENABLE 985. Notice that only the number part of the message is allowed in the MSGSTACKTRACE command. To stop getting stack trace for messages issued by the server or storage agent, the stack trace for those messages needs to be disabled. Issue the MSGSTACKTRACE DISABLE <messageNumber> command to disable one or more messages. Note that <messageNumber> may be a space-delimited list of message numbers. For example, this could be entered as MSGSTACKTRACE DISABLE 2017 985. Additional messages can also be disabled by issuing MS DISABLE. For example, if you wanted to remove message number 7837 in addition to those that are already disabled, issue MSGSTACKTRACE DISABLE 7837. The following messages are enabled for stack trace by default:
435 784 884 5021 9602 437 785 1032 5093 9604 486 786 1078 5099 9605 661 790 1092 5100 9606 685 793 1117 5267 9607 727 794 1156 6753 9608 728 860 1227 7823 9999 780 881 5010 7837 781 882 5015 9600 782 883 5019 9601
154
Table 5. List of trace classes for server or storage agent v ACCNT v ADDMSG on page 157 v ADMCMD on page 158 v ADMNODE v ADMPROC v ADMRES v AS on page 158 v AFCOPY v AFCREATE on page 158 v AFLOCK v AFMOVE on page 158 v AFTXN v ARCH v ARCHD v ARCHUTIL v AS on page 158 v ASALLOC on page 159 v ASDEALLOC on page 159 v ASMOUNT on page 159 v ASRTRV on page 159 v ASTXN on page 160 v ASVOL on page 160 v ASSD on page 160 v AUDIT v BACK v BACKD v BF on page 160 v HT v IC v ICBACK v ICBITS v ICDISK v ICHDRPG v ICLOCK v ICLOG v ICREST v ICSTREAM v ICTRIGGER v ICVOLHST on page 166 v ID v IMDEL v IMEXP v IMFS on page 167 v IMLOCK v IMSORT v INSTR v INTERACTION v LANFREE on page 167 v LANG v LM v LNFDATA v LNFENTRY v LNFMEM v LNFVERB
Chapter 7. Trace
155
Table 5. List of trace classes for server or storage agent (continued) v BFAGGR on page 161 v BFCREATE on page 161 v BFLOCK v BFREMOTE on page 161 v BFRTRV on page 161 v BFSALVAGE v BFTRG v BITVECTOR v BKSET/OBJSET on page 162 v BLKDISK on page 162 v BRNODE on page 162 v CA v CAACOMAX v CAACOMIN v CAENG v CAMEM v CASCSI v CC v CCLOCK v CENTERA v COLLOCATE on page 162 v COLLOCATEDETAIL v CRC on page 163 v CRCDATA on page 163 v CRCPROTO on page 163 v CRCVAL on page 163 v CRYPTO on page 164 v DB v DBALLOC v DBBACKUP v DBBUF v DBBUFPF v DBBUFWR v DBCKPT v DBDISPCOLS v DBDUMP v DBLOG v DBNETDB on page 164 v DBNETENCODE v DBSERVER v LOCK v LOG v LOGCOMP v LOGPARTW v LOGREC v LOGRESIZE v LOGSEG v LVM v MMS on page 167 v MPCOUNT v NA on page 167 v NACONFIG v NADISK v NAHBAAPI v NALOCK v NAMOVER v NAPATH v NQR v NQRDETAIL v NQRSEARCH v BKSET/OBJSET on page 162 v ORM v ORMCMD v ORMDELETE v ORMUPDATE v PERFSTAT v PM v PMCACHE v PMCG v PMLOCK v PMMC v PROXYNODE on page 168 v PVR on page 168 v REDIRECT v RETPROT on page 168 v SCHED on page 169 v SCHEDWAIT v SESSION on page 169 v SESSIOND v SESSREMOTE on page 169
156
Table 5. List of trace classes for server or storage agent (continued) v DBTXN v DEADLOCK v DELTA on page 164 v DF on page 164 v DFCOPY v DFCREATE on page 165 v DFLOCK v DFMOVE on page 165 v DFRTRV on page 165 v DFTXN v DRM v DRMAPPEND v DRMLICCOMP v DRMMACH v DRMMACHCHAR v DRMPR v DRMPRDBBACK v DRMPRDEVCLASS v DRMPRLOGDBVOL v DRMPRMDRM v DRMPRREQPOOL v DRMPRST v DRMPRSTGPOOL v DRMRECOVINST v DRMRECOVMEDIA v DRMSETGA v DS on page 165 v DSALLOC on page 166 v DSDEALLOC on page 166 v DSRTRV on page 166 v DSVOL on page 166 v EXTERNAL v FORMAT v DELTA on page 164 v HSMPFR v SETOBJRANGE v SFACO v SFPERF v SHRED on page 170 v SPI/SPID on page 170 v SS v SSBUFQ v SSCLASS v SSFRAME v SSLDATA on page 170 v SSLINFO on page 171 v SSLOCK v SSPOOL v SSSESS v SSSWINIT v SSSWTHR v SSTRANS v SSVOL v SW v STATXN v TAPE on page 171 v TBPREFETCH v TCP on page 171 v TCPDATA on page 171 v TCPINFO on page 172 v TEC on page 172 v TOC on page 172 v TOCBUILD on page 172 v TOCLOAD on page 173 v TOCREAD on page 173 v TOCUTIL on page 173 v TXN v UNDERSIZE v UNICODE on page 173 v UNICODEDETAIL v XIDETAIL
ADDMSG
Description
Issues console messages (ANR, ANE, and so on) to the trace file.
Recommendation
This trace class is valuable for correlating server messages to trace messages and for preserving the timing for when each was issued.
Chapter 7. Trace
157
Other
Available in V5.2 or V5.1.7.0 and later.
ADMCMD
Description
Traces related to command processing.
Recommendation
Use this trace class to debug the command interpreter, including the PARALLEL and SERIAL command handling.
AF
Description
Displays information about user data stored on sequential media devices.
Recommendation
Use this trace class to diagnose problems reading or writing user files to sequential media volumes.
Other
This is an aggregate trace class that enables AFCREATE, AFMOVE, AFLOCK, AFTXN, and AFCOPY. Typically recommended to issue TRACE DISABLE AFLOCK, unless the locking information is explicitly requested or needed.
AFCREATE
Description
Displays information about storing user data on sequential media volumes.
Recommendation
Use this trace class to diagnose writing user data on sequential media volumes.
AFMOVE
Description
Displays operations that move user data using sequential media volumes. Move operations are performed by MIGRATION, RECLAMATION, MOVE DATA, and MOVE NODEDATA server processes.
Recommendation
Use this trace class to diagnose problems with the data movement server processes.
AS
Description
Displays information volume selection and assignment, coordination of drives (mount points), and management of data placement on volumes.
158
Recommendation
Use this trace class to diagnose many different problems relating to volumes, mount points, or data read and write operations.
Other
This is an aggregate trace class that enables ASALLOC, ASRTRV, ASDEALLOC, ASMOUNT, ASVOL, ASTXN, and ASSD. Typically recommended to issue TRACE DISABLE ASTXN, unless the locking information is explicitly requested or needed.
ASALLOC
Description
Displays information about reserving and allocating space on sequential media volumes for the purpose of storing data. This may be for storing data on behalf of a client session or for server data movement operations such as MIGRATION, RECLAMATION, MOVE DATA, or MOVE NODEDATA
Recommendation
Use this trace class to diagnose problems where the server or storage agent report no space available but there should be space available in the storage hierarchy.
ASDEALLOC
Description
Displays information about releasing and de-allocating space on sequential media volumes for the purpose of storing data. Typical de-allocation operations on the server are EXPIRATION, MIGRATION, RECLAMATION, MOVE DATA, MOVE NODEDATA, AUDIT VOLUME, DELETE VOLUME, and DELETE FILESPACE.
Recommendation
Use this trace class to diagnose during the deletion of data.
ASMOUNT
Description
Displays information about drive (mount point) selection and assignment for sequential media devices.
Recommendation
Use this trace class to diagnose situations where sessions or processes are waiting for mount points or cases where an operation fails because no mount point is available. Also useful in cases where a mount point is preempted.
ASRTRV
Description
Displays information about reading data from sequential media volumes.
Chapter 7. Trace
159
Recommendation
Use this trace class to diagnose problems reading data such as RESTORE or RETRIEVE client by the client, or MIGRATION, RECLAMATION, STORAGE POOL BACKUP, AUDIT VOLUME, GENERATE BACKUPSET, EXPORT, MOVE DATA, or MOVE NODEDATA by the server.
ASTXN
Description
Displays information about transactions used to make database updates relating to information for sequential media volumes, storage pools, device classes, and other attributes.
Recommendation
Use this trace class to diagnose hangs, database operations, failures reported for sequential media operations, or general data storage problems.
ASVOL
Description
Displays information about volume selection and assignment for sequential media volumes.
Recommendation
Use this trace class to diagnose situations where sessions or processes are waiting for volumes, or cases where an operation fails because no volume is available. Also useful in cases where volume access is preempted.
ASSD
Description
Displays information about sequential stream data operations. These are operations that use sequential media device classes, volumes, or mount points but do not store data in the storage hierarchy. Server processes that perform sequential stream data operations are BACKUP DB, EXPORT/IMPORT, and GENERATE BACKUPSET.
Recommendation
Use this trace class to diagnose server processes that perform sequential stream data operations.
BF
Description
Information about user data (files) stored in the storage hierarchy.
Recommendation
Use this trace class to diagnose general data read or write problems for client operations and server processes.
160
Other
This is an aggregate trace class that enables BFCREATE, BFRTRV, BFSALVAGE, BFLOCK, BFAGGR, BFREMOTE, and BFTRG.
BFAGGR
Description
Displays information about server aggregation of user data. The server will aggregate many smaller user files into a larger file in the storage hierarchy to optimize performance for data movement operations such as MIGRATION, MOVE DATA, and MOVE NODEDATA.
Recommendation
Use this trace class to diagnose general data read or write problems for client operations and server processes, or both.
BFCREATE
Description
Displays information about client operations that store data in the storage hierarchy. Typically, these are BACKUP, ARCHIVE, or SPACE MANAGE operations by the client.
Recommendation
Use this trace class to diagnose failures or other problems while a client is storing data.
BFREMOTE
Description
Traces the first stage of NDMP backup and restore processes.
Recommendation
This trace class is used to identify NDMP-related backup or restore operations. These trace classes are specific to the functions which implement the NDMP protocol. The SPID trace class provides more detailed tracing, including tracing all NDMP file history records sent by the NDMP file server.
Other
The BFREMOTE trace class is available in Tivoli Storage Manager Version 5.2 and later.
BFRTRV
Description
Displays information about client operations that read data from the storage hierarchy.
Chapter 7. Trace
161
Recommendation
Use this trace class to diagnose failures or other problems while a client is reading data.
BKSET/OBJSET
Description
Trace class for backupset functions.
Recommendation
Use this trace class to debug problems in the GENERATE BACKUPSET command or during a client restore from a backupset.
Other
The BKSET and OBJSET trace classes are synonymous.
BLKDISK
Description
Trace class for viewing disk I/O activity to storage pool, database, and log volumes.
Recommendation
Use this trace class to view I/O activity to disk to diagnose performance and disk I/O errors.
BRNODE
Description
Trace class for the BACKUP and RESTORE NODE commands, used during NDMP operations.
Recommendation
Use this trace class to debug problems in the BACKUP and RESTORE NODE commands.
Other
Only available in Tivoli Storage Manager 4.2.1.0 and later.
COLLOCATE
Description
Displays information about collocation processing on storage pools.
Recommendation
Use this trace class to diagnose problems with collocation processing.
162
Other
COLLOCATEDETAIL trace class can also be used to get more detailed information about the collocation processing, such as files being processed for a collocation group. This can cause a large amount of output trace statements.
CRC
Description
Displays information about generating and managing CRCs on the server or storage agent.
Recommendation
Use this trace class to diagnose data corruption issues where CRC processing did not report data corruption.
Other
This is an aggregate trace class that enables CRCDATA, CRCPROTO, and CRCVAL.
CRCDATA
Description
Displays information about generating and managing CRCs for data stored in storage pools with CRCDATA=YES set.
Recommendation
Use this trace class to diagnose data corruption issues where CRC processing did not report data corruption.
CRCPROTO
Description
Displays information about generating and managing CRCs for data exchanged between the client and either the server or storage agent where this node is configured with VALIDATEPROTOCOL=ALL or VALIDATEPROTOCOL=DATAOnly on the server.
Recommendation
Use this trace class to diagnose data corruption issues where CRC processing did not report data corruption.
CRCVAL
Description
Displays information about generating and comparing CRC values.
Recommendation
Informational for displaying CRC values during processing.
Chapter 7. Trace
163
CRYPTO
Description
Displays information about AES encryption operations and some general encryption settings.
Recommendation
Use this trace class to isolate and identify encryption related problems.
DBNETDB
Description
Displays information about LAN-free operations and the negotiation and management of information between the server and storage agent.
Recommendation
Use this trace class to diagnose problems with LAN-free data movement.
Other
Typically applies to server and storage agent prior to Tivoli Storage Manager Version 5.2. After Tivoli Storage Manager Version 5.2, this still displays information but was superseded by the LANFREE trace class. Typically best to enable this trace class on both the server and storage agent.
DELTA
Description
Trace class for logical group functions.
Recommendation
Use this trace class to debug problems with logical groups, whether delta-base groups (subfile backup) or peer groups (Windows SYSTEM OBJECT or image backups). Group processing is relevant during just about any operation that references backup objects, including client backup and restore, expiration, deletion (DELETE FILESPACE, DELETE VOLUME), export/import, backupset generation and restore, no-query restore, db audit, etc.
Other
The DELTA and GROUP trace classes are synonymous.
DF
Description
Displays information about user data stored on DISK volumes.
Recommendation
Use this trace class to diagnose problems reading or writing user files to DISK volumes.
164
Other
This is an aggregate trace class that enables DFCREATE, DFRTRV, DFMOVE, DFLOCK, DFTXN, and DFCOPY. It is recommended to issue the TRACE DISABLE DFLOCK command unless the locking information is explicitly requested or needed.
DFCREATE
Description
Displays information about storing user data on DISK volumes.
Recommendation
Use this trace class to diagnose writing user data on DISK volumes.
DFMOVE
Description
Displays operations that move user data by using DISK volumes. Move operations are performed by the MIGRATION, MOVE DATA, and MOVE NODEDATA server processes.
Recommendation
Use this trace class to diagnose problems with the data movement server processes.
DFRTRV
Description
Displays information about reading user data from DISK volumes.
Recommendation
Use this trace class to diagnose reading user data from DISK volumes.
DS
Description
Displays information about volume selection, space reservation, assignment, and management of data placement on DISK volumes.
Recommendation
Use this trace class to diagnose many different problems relating to DISK volume data read and write operations.
Other
This is an aggregate trace class that enables DSALLOC DSRTRV DSDEALLOC DSVOL. It is recommended to issue TRACE DISABLE DSTXN unless the locking information is explicitly requested or needed.
Chapter 7. Trace
165
DSALLOC
Description
Displays information about reserving and allocating space on DISK volumes for the purpose of storing data. This may be storing data on behalf of a client session or for server data movement operations such as MIGRATION, MOVE DATA, or MOVE NODEDATA.
Recommendation
Use this trace class to diagnose problems where the server or storage agent report that no space is available, but there should be space available in the storage hierarchy.
DSDEALLOC
Description
Displays information about releasing and de-allocating space on DISK volumes. Typical de-allocation operations on the server are EXPIRATION, MIGRATION, MOVE DATA, MOVE NODEDATA, AUDIT VOLUME, DELETE VOLUME, and DELETE FILESPACE.
Recommendation
Use this trace class to diagnose during the deletion of data.
DSRTRV
Description
Displays information about reading data from DISK volumes.
Recommendation
Use this trace class to diagnose problems reading data such as RESTORE or RETRIEVE client by the client, or MIGRATION, STORAGE POOL BACKUP, AUDIT VOLUME, GENERATE BACKUPSET, EXPORT, MOVE DATA, or MOVE NODEDATA by the server.
DSVOL
Description
Displays information about volume selection and assignment for DISK volumes.
Recommendation
Use this trace class to diagnose situations where sessions or processes are waiting for volumes or cases where an operation fails because no volume is available.
ICVOLHST
Description
Trace class for volume history functions.
166
Recommendation
Use this trace class to debug problems with creating volume history entries (for example: during EXPORT, BACKUP DB, or GENERATE BACKUPSET) or deleting volume history entries (for example: during DELETE VOLHISTORY).
IMFS
Description
Trace class for filespace functions.
Recommendation
Use this trace class to debug problems related to inventory filespaces (e.g. during DELETE FILESPACE).
LANFREE
Description
Displays general information about LAN-free operations on either the server or storage agent. Also displays error information for LAN-free-related operations.
Recommendation
Any LAN-free failure.
Other
This trace class is available only in Tivoli Storage Manager Version 5.2 or later and is best if traced on both the server and storage agent concurrently. This is an aggregate trace class that enables LNFVERB, LNFMEM, LNFENTRY, and LNFDATA.
MMS
Description
Displays information about tape libraries and the server or storage agent use of these.
Recommendation
Used to diagnose problems with tape libraries, library volume inventories, or other general library issues.
Other
This trace class is not Available for z/OS . This is an aggregate trace class that enables MMSBASE, MMSTXN, MMSLIB, MMSDRIVE, MMSOP, MMSMAN, MMSSCSI, MMSFLAG, MMSACSLS, and MMSSHARE. Include NA and PVR trace classes when tracing MMS (suggested).
NA
Description
Displays information about path information for the server or storage agent. This relates to the DEFINE PATH, UPDATE PATH, DELETE PATH, and QUERY PATH
Chapter 7. Trace
167
commands. This trace class is also useful for identifying issues related to operations involving NDMP file servers, for example, DEFINE DATAMOVER, UPDATE DATAMOVER, BACKUP NODE, and RESTORE NODE commands.
Recommendation
Use this trace class to diagnose problems with paths to devices.
Other
This is an aggregate trace class that enables NALOCK, NAPATH, NAMOVER, NADISK, and NACONFIG. It might be best to include MMS and PVR trace classes when tracing NA.
PROXYNODE
Description
Displays information about proxynode sessions and the commands related to proxynode associations (GRANT, REVOKE, QUERY PROXYNODE).
Recommendation
Use this trace class to diagnose problems with proxynode sessions and related commands.
Other
It might be best to include SESSION trace when analyzing proxynode session problems.
PVR
Description
Displays information about sequential media devices and the server or storage agent use of these devices.
Recommendation
Use this trace class to diagnose problems with tape drives, failures reading or writing tape volumes, or other tape-volume-related issues.
Other
This is an aggregate trace class that enables PVRVOL, PVRCLASS, PVRMP, and PVRREMOTE. Additionally, this aggregate enables the following classes for open platforms only: PVR8MMBASE, PVR4MMBASE, PVRQICBASE, PVRDLTBASE, PVRECARTBASE, PVRDTFBASE, PVRTAPIBASE, PVRGTS, PVRFILE, PVRTAPE, PVRODSK, PVRNTP, PVRSHARE, and PVRNAS. It is often useful to include MMS and NA trace classes on open platforms and TAPE on z/OS when tracing PVR.
RETPROT
Description
Trace class for the archive retention protection functions.
168
Recommendation
Use this trace class to debug problems using the RETINIT and RETMIN parameters in the archive copy group. You can also use this trace class for problems caused by using the VB_SignalObject verb (only supported via the client API) to signal an objects event or to hold or release an object, or problems during expiration or deletion of retention protected objects.
Other
This trace class is only available in Tivoli Storage Manager 5.2.2.0 and later.
SCHED
Description
Trace class for the central scheduler functions.
Recommendation
Use this trace class to debug problems related to schedule commands like DEFINE/UPDATE/QUERY SCHEDULE or DEFINE ASSOCIATION. Also use this trace class to debug problems related to the central scheduler background processes, such as the schedule manager and schedule prompter.
Other
This trace class applies to classic and enhanced schedules equally.
SESSION
Description
Displays information about sessions connected to the server, including all verbs sent and received by the server.
Recommendation
This trace class is useful in many cases. It is generally recommended for protocol violations, transaction processing errors, or in cases where the client is hung and not responding.
SESSREMOTE
Description
Traces communication between the Tivoli Storage Manager server and the Tivoli Storage Manager client during NDMP backup and restore operations.
Recommendation
This trace class is used to identify NDMP-related backup or restore operations that are initiated using the Tivoli Storage Manager Web or command line client.
Other
Available in Tivoli Storage Manager Version 5.2 and later.
Chapter 7. Trace
169
SHRED
Description
Displays information related to data-shredding operations on the server.
Recommendation
This trace class is used to diagnose problems with data shredding. Data shredding is only applicable if one or more storage pools on the server has a non-zero value for the SHRED attribute. Activity that is related to data shredding occurs primarily during the EXPIRE INVENTORY, DELETE FILESPACE, DELETE VOLUME, MOVE DATA, MIGRATE, and SHRED DATA commands. Other trace classes that report activity related to data shredding are BFDESTROY, DFDESTROY, DSALLOC, DSDEALLOC, and CRCDATA.
Other
The SHRED command is available in Tivoli Storage Manager, Version 5.4.
SPI/SPID
Description
Traces the Servers NDMP protocol interface.
Recommendation
The SPI and SPID trace classes are used to identify issues related to NDMP backup or restore operations of NAS file servers. These trace classes are specific to the functions that implement the NDMP protocol and communicate with a NAS file server. The SPID trace class provides more detailed tracing, including tracing all NDMP file history records sent by the NAS file server.
Other
Available in Tivoli Storage Manager Version 5.2 and later. | | | | | | | | | | |
SSLDATA
Description
Detailed secure socket layer (SSL) trace used to display byte-level information about data that is sent or received between the backup-archive client and the server.
Recommendation
Use the SSLDATA trace class to debug the session data corruption issues that may be caused by SSL that is running through the SSLTCP or SSLTCPADMIN server options. Because this is a byte-level trace, it can collect a large amount of data.
Other
Available in Tivoli Storage Manager Version 5.5 and later.
170
| | | | | | | | | | |
SSLINFO
Description
General secure socket layer (SSL) trace used to display setup and characteristics of SSL sessions between the backup-archive client and the server.
Recommendation
Use the SSLINFO trace class to debug session connection and handshake errors that may be caused by the SSL that is running through the SSLTCP or SSLTCPADMIN server options. This can be used in tandem with the TCPINFO and SESSION trace classes.
Other
Available in Tivoli Storage Manager Version 5.5 and later.
TAPE
Description
Displays information about sequential media devices and the server or storage agent use of these devices.
Recommendation
Used to diagnose problems with tape drives, failures reading or writing tape volumes, or other tape-volume-related issues.
Other
This trace class is only available on z/OS. This is an aggregate trace class that enables CART, CARTDATA, CARTINFO, REEL, REELDATA, FLAT, and FLATDATA. It is often useful to include the PVR trace class when tracing TAPE.
TCP
Description
Collects information regarding TCP/IP used between the client and either server or storage agent.
Recommendation
Use this trace class to debug session connection errors or data corruption issues that may be caused by the network.
Other
This is an aggregate trace class. It enables TCPINFO and TCPERROR.
TCPDATA
Description
Detailed TCP/IP trace used to display byte-level information about data that is sent or received.
Chapter 7. Trace
171
Recommendation
Use this trace class to debug session data corruption issues that may be caused by the network.
TCPINFO
Description
General TCP/IP trace used to display setup and characteristics of TCP/IP on the server or storage agent.
Recommendation
Use this trace class to debug session data corruption issues that may be caused by the network.
TEC
Description
Provides information regarding events sent to a TEC server. Corresponds to the tivoli event receiver.
Recommendation
To debug connection issues encountered with TEC event logging.
TOC
Description
General trace class for the Table Of Contents (TOC) component, used during file-level NDMP operations.
Recommendation
Use this trace class to debug problems during file-level NDMP operations, such as an NDMP backup with the TOC=YES parameter, or an NDMP restore with the FILELIST parameter.
Other
This trace class is only available in Tivoli Storage Manager 5.2.0.0 and later. This is an aggregate trace class that enables TOCBUILD, TOCLOAD, TOCREAD, and TOCUTIL.
TOCBUILD
Description
Table Of Contents (TOC) build functions.
Recommendation
Use this trace class to debug problems during an NDMP backup with the TOC=YES parameter.
172
Other
Only available in Tivoli Storage Manager 5.2.0.0 and up.
TOCLOAD
Description
Table Of Contents (TOC) load functions.
Recommendation
Use this trace class to debug problems while displaying files and directories on the client GUI.
Other
This trace class is only available in Tivoli Storage Manager 5.2.0.0 and later.
TOCREAD
Description
Table Of Contents (TOC) read functions.
Recommendation
Use this trace class to debug problems during a QUERY TOC command or while trying to load a TOC for displaying files and directories on the client GUI.
Other
This trace class is only available in Tivoli Storage Manager 5.2.0.0 and later.
TOCUTIL
Description
Table Of Contents (TOC) utility functions.
Recommendation
Use this trace class to debug problems related to TOC component initialization or TOC retention.
Other
This trace class is only available in Tivoli Storage Manager 5.2.0.0 and later.
UNICODE
Description
Displays information about code page conversions and Unicode filespace operations.
Recommendation
Use this trace class to debug problems related to code page conversion problems or unicode filespace problems.
Chapter 7. Trace
173
XI
Description
Displays general information for the IMPORT and EXPORT commands.
Recommendation
Use this trace class to debug problems related to IMPORT and EXPORT commands.
174
storage agents paths, verify that the settings are correct. In particular, verify that the device listed matches the system device name. If the path information is not correct, update the path information with the UPDATE PATH command.
Chapter 7. Trace
175
v v v v
v v
query copy-group information for archive files, issue the QUERY COPYGROUP domainName policySetName mgmtclassName TYPE=ARCHIVE F=D command. Issue the QUERY STGPOOL stgpoolName command, where stgpoolName is the destination reported from the previous QUERY COPYGROUP queries. Issue the QUERY DEVCLASS deviceClassName command for the device class used by the destination storage pool. Issue the QUERY LIBRARY libraryName command for the library reported for the device class used by the destination storage pool. Issue the QUERY DRIVE libraryName F=D command for the library specified for the device class used by the destination storage pool. If no drives are defined to this library, review the library and drive configuration for this server and use the DEFINE DRIVE command to define the needed drives. If one or more of the drives report ONLINE=No, evaluate why the drive is offline and, if possible, update it to online by issuing the UPDATE DRIVE libraryName driveName ONLINE=YES command. Issue the QUERY SERVER command to determine the name of the storage agent as defined to this server. Issue the QUERY PATH stgAgentName command, where stgAgentName is the name of the storage agent defined to this server and reported in the QUERY SERVER command. Review this output and verify that one or more paths are defined for drives defined for the device class used by the destination storage pool. If no paths are defined for this storage pool, use DEFINE PATH to define the needed paths. Also, review this output and verify that the path is online. If paths are defined but no paths are online, update the path to online by issuing the UPDATE PATH srcName destName SRCTYPE=SERVER DESTTYPE=DRIVE ONLINE=YES command.
The storage pool is configured for simultaneous write but will not work LAN-free
The server disqualifies a storage pool as being a LAN-free-enabled storage pool if it was configured for simultaneous write. In this case, data from the client is sent directly to the server which will not be using a LAN-free storage pool. Issue the QUERY STGPOOL stgpoolName F=D command for the destination storage pool for this client. If the storage pool is set for simultaneous write operations, the Copy Storage Pool(s): value references one or more other storage pool names. If this is the case, Tivoli Storage Manager interprets the simultaneous write operation to be a higher priority than the LAN-free data transfer. Because simultaneous write is considered a higher priority operation, this storage pool is not reported as LAN-free enabled and as such, the client will send the data directly to the server. The storage agent does not support simultaneous write operations.
176
SHOW LAN-free and VALIDATE LAN-free - Validating LAN-free definitions on the server
It can be difficult to determine if all the appropriate definitions are defined on the server to allow a given client node to perform LAN-free operations with a storage agent. Similarly, if the configuration changes, it may be difficult to determine if the definitions on the server for a previously configured LAN-free client are still appropriate. Version 5.2.2 of the Tivoli Storage Manager server offers the SHOW LANFREE command. Version 5.3.0 of the Tivoli Storage Manager server offers the equivalent VALIDATE LANFREE command. These commands evaluate the destination storage pools for the domain to which this client node is assigned. The policy destinations are evaluated for BACKUP, ARCHIVE, and SPACEMANAGED operations for this node. For a given destination and operation, SHOW LANFREE and VALIDATE LANFREE report whether or not it is LAN-free capable. If it is not LAN-free capable, these commands give an explanation about why this destination cannot be used. The SHOW LANFREE and VALIDATE LANFREE commands are available from the server. The following shows the syntax for these command:
SHOW LANFREE nodeName stgAgentName VALIDATE LANFREE nodeName stgAgentName
The following are the definitions for the variables in the previous commands: nodeName A client node registered to the server. stgAgentName A storage agent defined to the server. The following is an example of the output from this command:
tsm: SRV1>q lanfree fred sta1 ANR0391I Evaluating node FRED using storage agent STA1 for LAN-free data movement. ANR0387W Node FRED has data path restrictions. Node Storage Operation Name Agent NODE1 STA1 NODE1 STA1 NODE1 STA1 NODE1 STA1 NODE1 STA1 NODE1 STA1 BACKUP BACKUP BACKUP ARCHIVE ARCHIVE ARCHIVE Mgmt Class Name NOLF LF NOLF_SW NOLF LF NOLF_SW Destination LAN-Free Name capable? OUTPOOL LFPOOL PRIMARY OUTPOOL LFPOOL PRIMARY NO YES NO NO YES NO Explanation No available online paths Destination storage pool is configured for simultaneous write No available online paths
Destination storage pool is configured for simultaneous write ANR1706I Ping for server STA1 was able to establish a connection. ANR0392I Node FRED using storage agent STA1 has 2 storage pools capable of LAN-free data movement and 4 storage pools not capable of LAN-free data movement.
Chapter 7. Trace
177
Because of this failover capability, it may not be apparent that data is being transferred over the LAN when it was intended to be transferred LAN-free. It is possible to set the LAN-free environment to limit data transfer to only LAN-free. To test a LAN-free configuration, issue the UPDATE NODE nodeName DATAWRITEPATH=LAN-FREE command for the client node whose LAN-free configuration you want to test. Next, try a data store operation such as backup or restore. If the client and storage agent attempt to send the data directly to the server using the LAN, the following error message is received: ANR0416W Session sessionNumber for node nodeName not allowed to operation using path data transfer path The operation reported indicates either READ or WRITE, depending upon the operation attempted. The path is reported as LAN-free. If this message is received when trying a LAN-free operation, evaluate and verify the LAN-free settings. Generally, if data is not sent LAN-free when the client is configured to use LAN-free, the storage pool destination for the policy assigned to this node is not a LAN-free enabled storage pool, or the paths are not defined correctly.
AGGREGATE
Description
Displays information about an aggregate object in the server storage hierarchy.
Recommendation
The AGGREGATE command is used to determine the existence and logical files stored in an aggregate object in the servers storage hierarchy. The offset, length, and active state of backup files is displayed for files within the aggregate. You might use this command if you are having trouble restoring or retrieving files, expiring or moving data, backing up primary storage pools, copying active data to active data pools, or auditing volumes.
Other
The syntax is SHOW AGGRegate aggrID-high aggrID-low. aggrID-high and aggrID-low are the high-order and low-order 32-bit words of the 64-bit aggregate id of the aggregate that is being queried.
178
ASQUEUED
Description
Displays the mount point queue.
Recommendation
In order to use a drive, a client session or server process must first obtain a mount point. The mount point management on the server allows for queuing waiters for mount points if more mount points are needed than are available. The ASQUEUED command is useful for determining the state of a mount point request, especially if a session or process appears to be hung waiting for a mount point.
Other
The syntax is SHOW ASQueued.
ASVOL
Description
Displays assigned volumes.
Recommendation
As sequential media volumes are assigned for use by a session or a process, they are tracked in an in-memory list. You can view this list to determine the state of in-use volumes, as well as hang or deadlock situations where a session or process appears to be stuck waiting for a volume or holding a volume and waiting for something else.
Other
The syntax is SHOW ASVol.
BFOBJECT
Description
Displays information about a bitfile object in the server storage hierarchy.
Recommendation
The BFOBJECT command helps you determine the existence and attributes of a bitfile object in the servers storage hierarchy. You might use this command if you are having trouble restoring, retrieving, expiring, or auditing the object.
Other
The syntax is SHOW BFObject objID-high objID-low. objID-high and objID-low are the high-order and low-order 32-bit words of the 64-bit object id of the object being queried. The high-order word is optional; if not specified, a value of zero is assumed. The object can be a backup object, an archive object, a space-managed object, and so on.
Chapter 7. Trace
179
BUFSTATS
Description
Displays usage statistics for the database buffer pool. The BUFSTATS command shows the cache hit percentage of the buffer pool, which is suggested to be above 98%.
Recommendation
Use the BUFSTATS command to determine if the configured database buffer pool size is large enough. See the Tivoli Storage Manager Performance Tuning Guide for more details on setting the database buffer pool to an appropriate size.
Other
The syntax is SHOW BUFStats.
BUFVARS
Description
Displays database buffer pool global attributes.
Recommendation
Use the BUFVARS command to determine if the configured database buffer pool size is large enough. This may also be useful for diagnosing cases where the server is hung or when the server runs out of recovery log space. The database buffer pool performance and characteristics can influence the servers running out of recovery log space because the ability to write (flush) the changed pages to the database volumes can impact the ability of the recovery log to manage its space.
Other
The syntax is SHOW BUFVars. Note: Ensure that the IMEXP trace class is active.
CONFIGURATION
Description
The CONFIGURATION command is a summary SHOW command that actually issues many different show commands and queries.
Recommendation
Use the CONFIGURATION command to provide a general configuration and other information about the server to IBM service.
Other
The syntax is SHOW CONFIGuration.
180
DBTXNTABLE
Description
Displays information about transactions which are performing database operations.
Recommendation
For transactions performing database operations, the DBTXNTABLE command displays the following information: v Database tables that are open (in-use) v Recovery log usage information such as the number of log records written and the recovery log space used v The first, last, and next recovery log records written v Whether or not a transaction is valid or being aborted (rolled back)
Other
The syntax is SHOW DBTXNTable.
DBVARS
Description
Displays database global attributes.
Recommendation
Use the DBVARS command to view the current state and attributes of the server database.
Other
The syntax is SHOW DBVars.
DEVCLASS
Description
Displays information about device classes.
Recommendation
Use the DEVCLASS command to display the states of allocated drives, device class attributes, and other information. This command is often used to diagnose problems with devices or hangs waiting for a drive, library, or volume. The command SHOW LIBRARY also gives good complementary information about drives and libraries.
Other
The syntax for this command is SHOW DEVCLass.
GROUPLEADERS
Description
Displays all backup group leaders for an object in the servers inventory.
Chapter 7. Trace
181
Recommendation
Use the GROUPLEADERS command to determine the backup group relationships of an object in the servers inventory. You might use this command if you are having trouble restoring, retrieving, expiring, or auditing the object.
Other
The syntax is SHOW GROUPLeaders objID-high objID-low. objID-high and objID-low are the high-order and low-order 32-bit words of the 64-bit object id of the object being queried. The high-order word is optional; if not specified, a value of zero is assumed. The object must be a backup object. Note: Only available in Tivoli Storage Manager 5.2.3.0 and later.
GROUPMEMBERS
Description
Displays all backup group members for an object in the servers inventory.
Recommendation
Use the GROUPMEMBERS command to determine the backup group relationships of an object in the servers inventory. You might use this command if you are having trouble restoring, retrieving, expiring, or auditing the object.
Other
The syntax is SHOW GROUPMembers objID-high objID-low . objID-high and objID-low are the high-order and low-order 32-bit words of the 64-bit object id of the object being queried. The high-order word is optional; if not specified, a value of zero is assumed. The object must be a backup object. Note: Only available in Tivoli Storage Manager 5.2.0.0 and later.
INVOBJECT
Description
Displays information about an inventory object in the server.
Recommendation
Use the INVOBJECT command to determine the existence and attributes of an object in the servers inventory. You might use this command if you are having trouble restoring, retrieving, expiring, or auditing the object. As of Tivoli Storage Manager 5.2.2.0, this command reports the following: v New information for archive retention protected objects. v If the archive object is in deletion hold. v If the object uses event-based retention. v If the: Expiring.Objects row does not exist, then the objects event has not been signaled. Basedate in the Expiring.Objects row is later than the insert date, then this is the date the objects event was signaled.
182
Other
The syntax is SHOW INVObject objID-high objID-low. objID-high and objID-low are the high-order and low-order 32-bit words of the 64-bit object ID of the object being queried. The high-order word is optional; if not specified, a value of zero is assumed. The object can be a backup object, an archive object, a space-managed object, and so on.
LANFREE
Description
Several definitions must be on the server in order for a given client to perform LAN-free data movement operations. In cases where these definitions are not present or are incorrect, it may be difficult to determine if the LAN-free environment is configured correctly.
Recommendation
The LANFREE command evaluates all possible destination storage pools for this client node and reports whether or not the storage pool is capable of LAN-free data movement operations.
Other
The syntax is SHOW LANFREE nodeName storageAgent. Note: The VALIDATE LANFREE command replaces the SHOW LANFREE command for the Tivoli Storage Manager Version 5.3 and later. SHOW LANFREE was introduced in the Tivoli Storage Manager Version 5.2.2, and is only available for Tivoli Storage Manager Version 5.2.0.0.
LIBINVENTORY
Description
Displays the current state of the library inventory for the library specified.
Recommendation
Use the LIBINVENTORY command if there is a problem with the library inventory information. The command will display current in-memory properties of the library inventory.
Other
The syntax is SHOW LIBINVentory libraryName where libraryName is optional, and if left out, the command will return the inventory information for all libraries.
LIBRARY
Description
Use the LIBRARY command to display the current state of the specified library and all of its drives.
Chapter 7. Trace
183
Recommendation
This command is useful to gather a quick view of all in-memory information about a library and its drives. This output can be gathered for any problem related to libraries or drives (e.g. mounting problems).
Other
The syntax is SHOW LIBRary libraryName where libraryName is optional. If left out, the command will return information for all the libraries.
LOCK
Description
Displays lock holders and waiters.
Recommendation
The server and storage agent use locks as a mechanism to serialize access and updates to information and other constructs. This information is used to diagnose hangs or other resource contention issues.
Other
The syntax is SHOW LOCK.
LOGPINNED
Description
Evaluates and determines whether or not the server recovery log is pinned. A pinned recovery log may cause the recovery log to run out of space and possibly cause the server to crash.
Recommendation
The LOGPINNED SHOW command interrogates a number of server control structures and correlates the data to determine if a session, transaction, or process is pinning the recovery log. If it determines that something is pinning the recovery log, it reports this information.
Other
The syntax is SHOW LOGPInned. To recover from a pinned recovery log, issue SHOW LOGPInned Cancel to cause the server to cancel or terminate the session, transaction, or process. Under some conditions, the pinning session or transaction may not terminate after issuing the CANCEL parameter. Note: Only available in Tivoli Storage Manager Version 5.1.7.0 and later.
LOGVARS
Description
Displays recovery log global attributes.
184
Recommendation
Use the LOGVARS command to determine the state of the recovery log.
Other
The syntax is SHOW LOGVars.
MEMTREND
Description
The MEMTREND command reports the memory used by the server, in megabytes, recorded at hourly intervals for the last 50 hours (this is a constant in the server code and is not user-configurable). The command also displays a histogram to help visualize the usage trend.
Recommendation
Use the MEMTREND command to determine if the server has a memory leak. If the memory usage is constantly increasing, this might indicate a leak. Note that for the measurements to be valid, the measurement period (the last 50 hours) should represent normal, steadystate server activity. The reported usage represents the amount of memory that internal server routines request from the pseudo-kernel memory routines. It does NOT represent the total amount of memory that the server is using. Nevertheless, it is still useful in determining the servers memory usage trend.
Other
The syntax is SHOW MEMTREnd. Note: Only available in Tivoli Storage Manager Version 5.3.0.0 and later.
MP
Description
Displays mount points.
Recommendation
Use the MP command to determine which volume is in-use by a given mount point and other attributes for the assigned mount points. SHOW LIBRARY and SHOW DEVCLASS have useful complimentary information with this command to display the current state of drives and current devclass mount point counts.
Other
The syntax is SHOW MP.
NASDEV
Description
Displays the SCSI devices attached to a NAS file server associated with a NAS datamover definition.
Chapter 7. Trace
185
Recommendation
Create an NDMP connection to the specified NAS file server and display the attached SCSI devices on the file server. This command only requires a NAS node and datamover definition.
Other
The syntax is SHOW NASDev.
NASFS
Description
Displays the filesystems on a NAS file server associated with a NAS datamover definition.
Recommendation
Create an NDMP connection to the specified NAS file server and display the file systems defined on the file server. Any filesystems displayed by this command may be backed up by the Tivoli Storage Manager. The NASFS command requires only a NAS node and datamover definition.
Other
The syntax is SHOW NASFs.
NASINFORMATION
Description
Displays configuration information about the NAS file server associated with a NAS datamover definition.
Recommendation
Create an NDMP connection to the specified NAS file server and display general configuration information retrieved from the file server. This command is useful for identifying basic communication problems with NAS file servers such as authentication errors. This command only requires a NAS node and datamover definition.
Other
The syntax is SHOW NASInformation.
NASWORKLOAD
Description
Displays the workload of NAS filers that are used for all Tivoli Storage Manager operations.
Recommendation
Use the NASWORKLOAD command to determine the workload of back-end data movement, as well as backup and restore operations.
186
Other
The syntax is SHOW NASWorkload.
RESQUEUE
Description
Displays the resource queue.
Recommendation
Use the resource queue to monitor common resources on the server. If a resource appears to be hung or holding a resource for an unreasonable amount of time, the resource monitoring algorithms for the server will take action and cancel or terminate the resource user. Typically, this is used to display information about transactions, locks, and other resources used by a storage agent on the database server that it is configured to use.
Other
The syntax is SHOW RESQueue.
SESSIONS
Description
Displays information about sessions connected to the server or storage agent.
Recommendation
Use the SESSIONS command to diagnose hangs or other general session problems while a session is still connected to the server. This is also useful in cases where a session is canceled or terminated and still appears in QUERY SESSION.
Other
The syntax is SHOW SESSions.
SLOTS
Description
Displays the current state of the specified librarys slot information (for example: which volumes are in the library and in which slots).
Recommendation
The information displayed is what is saved directly from the library hardware to in-memory values, and can be used to determine if this information is out-of-sync, incorrect, or to determine if the values returned from the library hardware itself are invalid. Alternatively, use this command to determine the drive element numbers for a SCSI library if QUERY SAN is unavailable for a particular library (for example: 3570 library).
Chapter 7. Trace
187
Other
The syntax is SHOW SLOTS libraryName.
SSPOOL
Description
Displays information storage pools.
Recommendation
Use the SSPOOL command to display the states and attributes of defined storage pools.
Other
The syntax is SHOW SSPool.
THREADS
Description
Displays information about all threads known to the server.
Recommendation
The server displays information about each thread, typically including the Tivoli Storage Manager thread ID, the system thread id, the thread name, mutexes it holds (if any), and mutex or condition it is awaiting (if any). This command is platform-specific, so each platform may have slightly different information. You might want to use this command if the server or a particular server process appears to be hung in order to see if there are threads waiting for resources held by another thread.
Other
The syntax is SHOW THReads. Note: On some platforms (as an example: HP), the information reported is obtained without serialization. On a busy system (one that is not hung), the information may be inconsistent, multiple threads may report holding the same mutex, or a thread may report that it is waiting on a mutex held by another thread that does not claim to hold it. On a Tivoli Storage Manager Server Version 5.3 for AIX, SHOW THReads displays a stack trace of each thread. A stack trace reveals information about the server, which can help developers and service personnel diagnose problems. See the examples below:
Stack trace: 0x09000000000b9a5c select 0x000000010000d06c pkDelayThread 0x00000001007d8290 CsCmdSchedulerThread 0x000000010000a494 StartThread 0x090000000032f2ac _pthread_body Thread 33: SmAdminCommandThread tid=8513, ktid=3686529, ptid=21, det=0, zomb=0, join=0, result=0, sess=0 Holding mutex THRV->mutex (0x11173b9f8), acquired at 10000b5c8 (PkShowThreads)
188
Stack trace: 0x000000010000ba0c PkShowThreads 0x00000001009df84c ShowCommand 0x00000001009df2f0 psCommand 0x0000000100a064a0 AdmShow 0x00000001006f091c AdmCommandLocal 0x00000001006f2758 admCommand 0x000000010087d8d4 SmAdminCommandThread 0x000000010000a494 StartThread 0x090000000032f2ac _pthread_body
TOCSETS
Description
Displays all Table Of Contents (TOC) sets known to the server.
Recommendation
A TOC set is used during file-level NDMP operations. During an NDMP backup with the TOC=YES parameter, a TOC is built in the server db. During a restore, one or more TOCs may be loaded into the server database in order to provide file and directory names to the client GUI. This command displays the status of the TOC set (e.g. building or loading) and how much temporary DB space is in use for each TOC set. You might use this command if you are having trouble doing an NDMP backup with the TOC=YES parameter, or having trouble restoring files from an NDMP backup, or if TOC sets are being retained in the server database too long or not long enough.
Other
The syntax is SHOW TOCSets DELETE=setNum TOUCH=setNum. The DELETE parameter causes the specified TOC set number to be deleted. The TOUCH parameter updates the last used date of the specified TOC set number. A TOC set is retained for the TOC retention period following the last used date (see SET TOCRETENTION command). Only available in the Tivoli Storage Manager Version 5.2.0.0 and later.
TOCVARS
Description
Displays information about the Table Of Contents (TOC) component of the server.
Recommendation
Use the TOCVARS command to determine the status of the TOC component. You might use this command if you are having trouble doing an NDMP backup with the TOC=YES parameter, or having trouble restoring files from an NDMP backup.
Other
The syntax is SHOW TOCVars. Note: Only available in the Tivoli Storage Manager Version 5.2.0.0 and later.
Chapter 7. Trace
189
TXNTABLE
Description
Displays information about transactions that are on the in-use list on the server.
Recommendation
Transactions are used by server processes, sessions, or other operations to read information from the database, make updates to the database (such as insert, update, or delete information), or to manage locks. This information is useful for diagnosing hangs or other transaction related failures while the transaction is still open on the server.
Other
The syntax is SHOW TXNTable.
VALIDATE LANFREE
Description
Several definitions must be on the server in order for a given client to perform LAN-free data movement operations. In cases where these definitions are not present or are incorrect, it may be difficult to determine if the LAN-free environment is configured correctly.
Recommendation
The VALIDATE LANFREE command evaluates all possible destination storage pools for this client node and reports whether or not the storage pool is capable of LAN-free data movement operations.
Other
The syntax is VALIDATE LANFREE nodeName storageAgent. Note: The VALIDATE LANFREE command replaces the unsupported SHOW LANFREE command for the Tivoli Storage Manager Version 5.3 and later.
VERIFYEXPTABLE
Description
Performs verification of the Expiring.Objects table of the server.
Recommendation
Use the VERIFYEXPTABLE command to find and clean up orphaned entries in the Expiring.Objects table (as an example: entries that do not have corresponding entries in the Backup.Objects or Archive.Objects tables). You might use this command if you are having trouble with inventory expiration. Note: The VERIFYEXPTABLE command was changed to CLEANUP EXPTABLE in the following Tivoli Storage Manager releases: v 5.2.4.2 v 5.2.6 v 5.3.0.1
190
v 5.3.1
Other
The syntax is SHOW VERIFYEXPtable.
VOLINUSE
Description
Displays whether or not the volume specified is currently in the servers in-use list. The VOLINUSE command displays additional information that may be helpful including whether the volume is currently pending removal from the in-use list.
Recommendation
Use the VOLINUSE command to determine whether or not a volume is currently on the in-use list and, if necessary, to remove it from that list. Note that operations associated with this volume might fail if the volume is removed from the in-use list.
Other
The syntax is SHOW VOLINUSE volumeName. If the volume needs to be removed from the in-use list, the following additional parameter can be specified to remove the volume from the list: SHOW VOLINUSE volumeName REMOVE=YES.
Chapter 7. Trace
191
START Turns on tracing. This writes the trace to a memory buffer based on the default or specified FLAGS option. GET END Writes the memory buffer to the same file that was specified with the server TRACE BEGIN command. Stops writing trace to the memory buffer. This does not wipe out the contents of the buffer, so you may run END before running GET.
LIBRARYDD Traces the device driver that controls library-autochangers. TAPEDD Traces the device driver that controls tape drives. OPTICALDD Traces the device driver that controls optical drives. For the options listed above, you may specify any one device driver or the library device driver, and one of the other two. These are space delimited. For example: DDTRACE START drives. DDTRACE START optical drives. DDTRACE START DDTRACE START drives. DDTRACE START optical drives. TAPEDD - Starts tracing the device driver that controls tape OPTICALDD Starts tracing the device driver that controls LIBRARYDD Starts tracing the library-autochanger. LIBRARYDD TAPEDD Traces both the library and the tape LIBRARYDD OPTICALDD Traces both the library and the
Whichever of these you use, specify the same ones for all commands in the start-get-end series. The FLAGS parameter is optional and usually not required. The following are the values for the FLAGS parameter: EE FULL Traces all device driver routine entries and exits. Turns on more debug tracing. It provides more detail, but because the memory buffer size is fixed, fewer events are traced. It also does not trace routine entry and exit points.
SYSLOG On some platforms, this directs the trace statements to be written to the system log in addition to the memory buffer. This is most useful in debugging kernel crashes or in circumstances where the trace wraps in the memory buffer. BASE This is the default and cannot be specified with any other flags. It is only used to turn off the EE, FULL, and SYSLOG flags without turning off trace.
Tracing from a command shell (only valid for 5.2.2 and above) - all platforms
A stand-alone utility, ddtrace exactly mimics the DDTRACE server commands.
192
A stand-alone utility, ddtrace is installed in the devices directory, which is the same directory as the mttest, lbtest, and optest utilities. Its syntax and options are identical to the DDTRACE server command. For example: $ ddtrace start librarydd tapedd flags=EE - Start tracing both the library and tape drivers, and get additional entry/exit trace. $ ddtrace get librarydd tapedd - Get the trace from memory and write it to the file ddtrace.out. $ ddtrace end librarydd tapedd - Stop tracing to memory. The main use of this stand-alone utility is primarily for cases when the driver needs to be traced during the Tivoli Storage Manager server initialization. It writes the memory buffer to the ddtrace.out file in the current directory. If the file exists, it appends to the file and does not overwrite it.
VERBINFO
Collect information regarding the client-server protocol used by IBM Tivoli Storage Manager. Detailed information regarding the client-server protocol used by IBM Tivoli Storage Manager . This displays internal memory buffers containing the verbs sent and received by the client.
VERBDETAIL
2. Enable the trace by adding the following to the client options file: traceflag <trace class name>. Note: <trace class name> may be a comma-delimited list of trace classes. For example, this could be entered as traceflag service,verbinfo,verbdetail. 3. Configure trace to begin and issue the trace messages to a file by adding the following to the client options file: tracefile <file name>.
Chapter 7. Trace
193
4. Perform the operation that is causing the problem. Note: Tracing may also be configured and started by invoking the client from a command prompt and specifying the flags above. For example, dsm -traceflags=service -tracefile=file.out.
| | | | |
Journal Daemon specific trace settings: v BTREEDB - low-level BTREE database base class v CACHEDB - disk cache backup and Windows 2003 exclude cache processing v DBPERF - low-level database operation performance v DBSTATS - performance tracking of database query, insert/update, delete, and tree walk operations v FILEOPS - internal database activity v v v v v v v v v JBBCOMM - listening thread JBBDAEMON - process manager JBBFILEMON - file system monitor JBBDBACCESS - database controller thread JBBDBINFO - low-level database access JBBNPCOMM - named pipe communications JBBSERVICE - Windows platform-specific service tracing JBBVERBINFO - detailed verb information ALL_JBB - aggregate traceflag that includes all of the above settings
Trace Settings for the backup-archive client specified in dsm.opt: v JOURNAL - journal based backup tracing
194
To find information about a trace class, click the trace class in the table below or view the full information below. The trace class name should be used with the TRACEFLAG options in DSM.OPT.
ALL_BACK
Description
Displays general backup processing information for the client.
Recommendation
Use this trace class for problems related to selective or incremental backups.
Other
Aggregate of TXN, INCR, POLICY, and PFM trace classes and implicitly included in the SERVICEtrace class.
ALL_FILE
Description
Displays general backup processing information for the client.
Recommendation
Use this trace class for problems related to reading and writing of data and obtaining file attribute information.
Other
Aggregate of DIROPS, FILEOPS, and FIOATTRIBS trace classes and implicitly included in the SERVICE trace class.
ALL_IMAGE
Description
Displays image processing information for the client.
Recommendation
Use this trace class for problems related to all aspects of volume image backup-and-restore operations.
Other
Aggregate of several image-related trace classes and implicitly included in the SERVICE trace class.
ALL_JBB
Description
Displays journal-based backup processing information for the client.
Recommendation
Use this trace class for problems related to all aspects of journal-based backups.
Chapter 7. Trace
195
Other
Aggregate of several journal-based backup-related trace classes and implicitly included in the SERVICE trace class.
ALL_NAS
Description
Displays NDMP processing information for the client.
Recommendation
Use this trace class for problems related to all aspects of NDMP backup-and-restore operations.
Other
Aggregate of several NDMP-related trace classes and implicitly included in the SERVICE trace class.
ALL_SESS
Description
Displays all session and verb information sent between the client and the server.
Recommendation
Use this trace class for problems related to the client and server session, such as communication timeouts, protocol violations, and instances where the client appears to be hung waiting for the server, or vice versa.
Other
Aggregate of SESSION, VERBINFO, SESSVERB, VERBADMIN, and VERBDETAIL trace classes. All of the trace classes in this aggregate are implicitly included in the SERVICEtrace class, except for VERBDETAIL
ALL_SNAPSHOT
Description
Displays information relating to volume snapshot operations.
Recommendation
Use this trace class to determine problems related to volume snapshots that are used in online image backup and open file-support operations.
Other
Aggregate of several volume snapshot-related trace classes and implicitly included in the SERVICE trace class.
ALL_WAS
Description
Displays Web Application Server (WAS) processing information for the client.
196
Recommendation
Use this trace class for problems related to all aspects of WAS backup-and-restore operations.
Other
Aggregate of several WAS related trace classes and implicitly included in the SERVICE trace class.
AUDIT
Description
Displays auditing information for backup-and-restore processing.
Recommendation
Use this trace class to keep record of files processed, committed and restored in a file.
Other
Part of the SERVICE trace aggregate.
CLIENTTYPE
Description
Displays client type on each trace output line.
Recommendation
Use this trace class for tracing situations when more then one client component is involved, such as the client acceptor daemon (CAD) and the file system agent.
Other
None.
COMPRESS
Description
Displays compression information.
Recommendation
Use this trace class to determine how much data is compressed on a per-file basis.
Other
Part of the SERVICE trace aggregate.
DELTA
Description
Displays adaptive subfile backup processing information.
Chapter 7. Trace
197
Recommendation
Use this trace class to determine errors in adaptive subfile backup-and-restore operations.
Other
Part of the SERVICE trace aggregate.
DIROPS
Description
Displays directory read and write operations.
Recommendation
Use this trace class when problems occur in a directory, read or write.
Other
Part of the SERVICE and ALL_FILE trace aggregates.
DOMAIN
Description
Displays incremental domain processing information.
Recommendation
Use this trace class for determining how DOMAIN statements are resolved during backup processing, such as problems in resolving the ALL-LOCAL domain.
Other
Part of the SERVICE trace aggregates.
ENCRYPT
Description
Displays data encryption information.
Recommendation
Use this trace class to determine if a file is included for encryption processing.
Other
Part of the SERVICE trace aggregate.
ERROR
Description
Displays operating system specific error information.
198
Recommendation
Use this trace class to determine error codes generated by the operating system.
Other
Part of the SERVICE trace aggregate.
FILEOPS
Description
Displays file read and write operations.
Recommendation
Use this trace class when problems occur in a file open, read, write, or close operation.
Other
Part of the SERVICE and ALL_FILE trace aggregates.
FIOATTRIBS
Description
Displays comparisons of file attributes between the local client version and the active version on the Tivoli Storage Manager server.
Recommendation
Use this trace class in determining why a file was backed up during an incremental backup.
Other
Part of the SERVICE, ALL_BACK, and ALL_FILE trace aggregates.
INCR
Description
Displays incremental list processing comparisons between the client and server.
Recommendation
Use this trace class for determining if files are candidates for incremental backup, especially in conjunction with the FIOATTRIBS trace class.
Other
Part of the SERVICE and ALL_BACK trace aggregates.
INCLEXCL
Description
Displays include/exclude status for the object being processed. This flag is also used for the Preview function.
Chapter 7. Trace
199
Recommendation
Use this trace class to determine which object (usually file or directory) is included or excluded during backup-archive/preview.
Other
None.
MEMORY
Description
Displays memory allocation and free requests.
Recommendation
Use this trace class to determine memory leaks, memory spikes, and other memory-related problems.
Other
This trace class writes a large amount of information into the trace file and is not included in any aggregate classes.
NETWARE
Description
Displays detailed information relating to the Novell SMS backup API.
Recommendation
Use this trace class for isolating NetWare client problems between the backup application and operating system.
Other
Aggregate of the SMS_DEBUG, SMS_DETAIL, TXN, and TID trace classes.
OPTIONS
Description
Displays current processing options.
Recommendation
Use this trace class to determine which options are in effect for the current session and problems in accepting processing options from server client-options sets.
Other
Part of the SERVICE trace aggregate.
PASSWORD
Description
Displays password file-access information (does not show passwords).
200
Recommendation
Use this trace class to determine problems with reading the Tivoli Storage Manager server passwords from local storage, for example, PASSWORDACCESS=GENERATE errors.
Other
Part of the SERVICE trace aggregate.
PID
Description
Displays process ID on each trace statement.
Recommendation
Use this trace class to diagnose problems that may involve multiple processes.
Other
Part of the SERVICE trace aggregate.
POLICY
Description
Displays policy information available to the backup-archive client.
Recommendation
Use this trace class to see which policies are available during a backup or archive operation.
Other
Part of the SERVICE and ALL_BACK trace aggregates.
SCHEDULER
Description
Displays general processing information for the scheduler. An aggregate that includes most of the client trace classes listed in this table.
Recommendation
Useful in many cases. This trace class is generally recommended for diagnosing scheduler problems when the nature of the problem is unknown. If the SCHEDULER trace flag is used, it will generally not be necessary to specify any other trace flags because it already includes most of the basic trace classes.
Other
Aggregate of all trace classes except MEMORY, THREAD_STATUS, and *DETAIL classes.
Chapter 7. Trace
201
SERVICE
Description
Displays general processing information for the client. An aggregate that includes most of the client trace classes listed in this table.
Recommendation
Useful in many cases. This trace class is generally recommended when the nature of the problem is unknown. If the SERVICE trace flag is used, it will generally not be necessary to specify any other trace flags because it already includes most of the basic trace classes.
Other
Aggregate of all trace classes except MEMORY and *DETAIL classes. The SERVICE trace flag can generate a substantial amount of information. Consider using the TRACEMAX option in conjunction with the SERVICE trace flag.
SESSION
Description
Displays minimal session information between the client and the server.
Recommendation
Use this trace class to give session context to general processing errors, or in conjunction with one of the VERB* trace classes, to determine session problems such as session timeouts and protocol violations.
Other
Part of the SERVICE and ALL_SESS trace aggregates.
SESSVERB
Description
Displays additional session information between the client and the server.
Recommendation
Use this trace class to give session context to general processing errors, or in conjunction with one of the VERB* trace classes, to determine session problems such as session timeouts and protocol violations.
Other
Part of the SERVICE and ALL_SESS trace aggregates.
SMS_DETAIL
Description
Displays detailed information relating to the Novell SMS backup API.
202
Recommendation
Use this trace class to isolate NetWare client problems between the backup application and operating system.
Other
Part of the SERVICE and NETWARE trace aggregates.
SMS_DEBUG
Description
Displays detailed information relating to the Novell SMS backup API.
Recommendation
Use this trace class to isolate NetWare client problems between the backup application and operating system.
Other
Part of the SERVICE and NETWARE trace aggregates.
STATS
Description
Displays final processing statistics in the trace file.
Recommendation
Use this trace class for collecting final processing statistics into a file.
Other
Part of the SERVICE trace aggregate.
THREAD_STATUS
Description
Displays thread status.
Recommendation
Use this trace class when diagnosing problems related to threading.
Other
Part of the SERVICE trace aggregate.
TXN
Description
Displays transaction processing information.
Chapter 7. Trace
203
Recommendation
Use this trace class when diagnosing problems related to transaction processing problems on the server such as transaction aborts and retries.
Other
Part of the SERVICE, ALL_BACK and NETWARE trace aggregates.
VERBDETAIL
Description
Displays detailed verb information pertinent to client-server sessions.
Recommendation
Use this trace class to determine contents of verbs sent between the client and server.
Other
Part of the ALL_SESS trace aggregates.
VERBINFO
Description
Displays verb information pertinent to client-server sessions.
Recommendation
Use this trace class in conjunction with the SESSION traceflag to give session context to general processing errors or to determine session problems like session timeouts and protocol violations.
Other
Part of the SERVICE and ALL_SESS trace aggregates.
WIN2K
Description
Displays Windows system object or system state processing.
Recommendation
Use this trace class to determine errors with backup or restore of the system state information.
Other
Part of the SERVICE trace aggregates. Only valid on the Windows backup-archive client.
204
Client. The second, more recent method, is to enable tracing while the client is running. Choose which method of tracing to enable.
5. You can also set a maximum size for the trace file between 1 and 4,294,967,295 MB by specifying the following in the client options file: tracemax <size in mb> If a maximum value is specified, the client starts writing information from the beginning of the trace file (that is, wrapping) when the trace reaches its maximum size. This can be useful if you are trying to capture an event that happens at the end of a long-running process. For example, to specify a maximum trace file size of 10 MB: tracemax 10 After a tracefile reaches the limit specified with tracemax, Continued at beginning of file is written to the end of the trace file and tracing continues from the top of the file. The end of the tracefile is indicated with END OF DATA. You can locate the end of the trace by searching for this string. If you specify a TRACEMAX size of 1001 or higher and TRACESEGSIZE is not specified, then the trace file is automatically split into multiple segments of 1000 MB per segment (see TRACESEGSIZE discussion immediately below). 6. You can choose to let the client split the trace into smaller segments between 1 and 1,000 MB per segment by specifying the following in the client options file: tracesegsize <trace segment size in MB> This allows you to more easily manage very large amounts of trace data, avoiding the problems associated with zipping very large files and eliminating the need to use a separate file splitter utility. For example, issue the following to specify a trace segment size of 200 MB: tracesegize 200 Trace file segments are named using the name specified with the tracefile option plus an extension indicating the segment number. For example, if you
Chapter 7. Trace
205
specify tracefile tsmtrace.out and tracesegsize 200, then the trace will be segmented into multiple separate files of no more than 200 MB each, with file names tsmtrace.out.1, tsmtrace.out.2, and so on. Note that when specifying the segment size, do not use any comma separators: Correct: tracemax 1000 Incorrect: tracemax 1,000 If you use the tracesegsize option, the trace file segments will be named using the tracefile option with an additional extension using the segment number. For example, trace.out.1 7. Perform the operation that exhibits the problem. Note: Tracing may also be configured and started by invoking the client from a command prompt and specifying the flags above. For example:
dsmc -traceflags=service,verbdetail -tracefile=tsmtrace.out -tracemax=2500 -tracesegsize=200
206
especially useful when you need to trace only the beginning of a long-running client operation, or when you need to start tracing after the client was running for some time. The dsmtrace utility includes the following features: v Identify running processes and their process IDs (PIDs) v Enable client tracing v Disable client tracing v Query client trace status The table below summarizes the availability of this feature:
Client Component Backup-Archive Client (command line) Unix Program Name dsmc Windows Program Name dsmc.exe dsm.exe dsmcad.exe dsmagent.exe dsmcsvc.exe tsmjbbd.exe domdsmc.exe domdsm.exe tdpexcc.exe tdpexc.exe tdpsqlc.exe tdpsql.exe
Backup-Archive Client (GUI) N/A Client Acceptor Daemon Remote Client Agent Scheduler Service Journal Service Data Protection for Domino (command line) Data Protection for Domino (GUI) dsmcad dsmagent N/A N/A domdsmc N/A
Data Protection for Microsoft N/A Exchange (command line) Data Protection for Microsoft N/A Exchange (GUI) Data Protection for Microsoft N/A SQL Server (command line) Data Protection for Microsoft N/A SQL Server (GUI)
Note: v Dynamic tracing is currently unavailable for NetWare clients. v The Unix column above includes Mac OS X. v Tracing for the Data Protection components is for the Tivoli Storage Manager API only. v The Tivoli Storage Manager API tracing is available with any multithreaded application that uses the Tivoli Storage Manager API. The executable name is the name of the application program that loads the API. 1. Identify the process ID (PID) of the client you want to trace (make sure that DSMTRACELISTEN YES is in effect). Issue the following command to show all running instances of the client: dsmtrace query pids Example output:
D:\tsm>dsmtrace query pids IBM Tivoli Storage Manager dsmtrace utility dsmtrace Version 5, Release 3, Level 0.0 dsmtrace date/time: 10/24/2004 21:07:36
Chapter 7. Trace
207
(c) Copyright by IBM Corporation and other(s) 1990, 2004. All Rights Reserved. PROCESS ID PROCESS OWNER DESCRIPTION 4020 andy Backup-Archive Client (CLI) D:\tsm> EXECUTABLE NAME dsmc.exe
Important note for Linux users: the threading model for some versions of Linux is to run each thread as a separate process. This means that when you query process information, you may see several processes for each instance of the client. The process you need to identify is the dsmc parent process. For example:
fvtlinuxppc:/opt/tivoli/tsm/client/ba/bin # dsmtrace q p IBM Tivoli Storage Manager dsmtrace utility dsmtrace Version 5, Release 3, Level 0.0 dsmtrace date/time: 10/24/04 08:07:37 (c) Copyright by IBM Corporation and other(s) 1990, 2004. All Rights Reserved. PROCESS ID PROCESS OWNER DESCRIPTION 28970 root Backup-Archive Client 28969 root Backup-Archive Client 28968 root Backup-Archive Client 28967 root Backup-Archive Client (CLI) (CLI) (CLI) (CLI) EXECUTABLE NAME dsmc dsmc dsmc dsmc
fvtlinuxppc:/opt/tivoli/tsm/client/ba/bin #
In such a situation, use the ps command to identify the parent dsmc process:
linuxppc:~ # ps -ef | grep dsmc root root root root root 28967 28968 28969 28970 24092 1151 28967 28968 28968 24076 0 0 0 0 0 Oct22 pts/16 Oct22 pts/16 Oct22 pts/16 Oct22 pts/16 08:15 pts/93 00:00:00 dsmc 00:00:00 dsmc 00:00:00 dsmc 00:00:00 dsmc 00:00:00 grep dsmc
linuxppc:~ #
Notice that the parent for processes 28969 and 28970 is 28968. The parent for 28968 is 28967. The parent for 28967 is 1151, but the 1151 process does not appear in this display output. Process 1151 is the process that launched dsmc. So, the correct parent process ID is 28967. 2. Issue the following to enable tracing on the client:
dsmtrace enable 4020 -traceflags=service -tracefile=d:\trace.txt
Example output:
C:\program files\tivoli\tsm\baclient>dsmtrace enable 4020 -traceflags=service -tracefile=d:\trace.txt IBM Tivoli Storage Manager dsmtrace utility dsmtrace Version 5, Release 3, Level 0.0 dsmtrace date/time: 10/24/2004 21:45:54 (c) Copyright by IBM Corporation and other(s) 1990, 2004. All Rights Reserved. ANS2805I Tracing has been enabled. C:\program files\tivoli\tsm\baclient> C:\program files\tivoli\tsm\baclient>
Important: When tracing an API application: The -pipenameprefix option must be included.
208
v On Unix, use prefix /tmp/TsmTraceTargetAPI v On Windows systems use prefix \\.\pipe\TsmTraceTargetAPI 3. After sufficient trace data is collected, disable the tracing by issuing the following:
dsmtrace disable 4020
Example output:
C:\program files\tivoli\tsm\baclient>dsmtrace disable 4020 IBM Tivoli Storage Manager dsmtrace utility dsmtrace Version 5, Release 3, Level 0.0 dsmtrace date/time: 10/24/2004 21:47:43 (c) Copyright by IBM Corporation and other(s) 1990, 2004. All Rights Reserved. ANS2802I Tracing has been disabled.
Other Examples Display all running processes whose names are listed in the table in the Background section by issuing the following command:
DSMTRACE QUERY PIDS
Display all running processes whose names begin with dsm by issuing the following command:
dsmtrace query pids -filter=dsm*
Display all running processes whose names are dsm plus one other character by issuing the following command:
dsmtrace query pids -filter=dsm?
Turn on SERVICE tracing for process 2132 by issuing the following command:
dsmtrace enable 2132 -traceflags=service -tracefile=c:\trace.txt
Trace output is written to file c:\trace.txt. Turn off extrc tracing for process 2132 (presumably tracing is already running for this process) by issuing the following command:
dsmtrace enable 2132 -traceflags=-extrc
Turn on FILEOPS tracing for process 4978 by issuing the following command:
dsmtrace enable 4978 -traceflags=fileops -tracefile=/tmp/dsmtrace.out -tracemax=1000 -tracesegsize=200
The trace is written to files /tmp/dsmtrace.out.1, /tmp/dsmtrace.out.2, and so on, with each file being no larger than 200 MB. After 1000 MB are written, tracing wraps back to /tmp/dsmtrace.out.1. Display basic trace information and list trace flags that are turned on for process 4978 by issuing the following command:
dsmtrace query trace 4978 -on
209
Disable tracing for API application process 364 by issuing the following command:
dsmtrace disable 364 -pipenameprefix=/tmp/TsmTraceTargetAPI
In this case, the trace flags were enabled (turned on), but tracing is not actually active until a trace file is specified by using the -TRACEFILE option. v Do not use the dsmtrace enable command to start tracing the API for Data Protection applications if the Data Protection application is run in a manner that does not cause it to connect to the Tivoli Storage Manager server. For example, The Data Protection for Lotus Domino command line interface has several such commands: domdsmc help domdsmc set domdsmc query domino domdsmc query pendingdbs domdsmc query preferences If you use dsmtrace to enable tracing for such commands, this can result in a hang of the dsmtrace process and (Unix only) a residual named pipe in the /tmp directory. v On Windows systems, you must be logged in with a local administrative account in order to use dsmtrace. v On Unix systems, you must be logged in as root to use dsmtrace. v On Unix systems, if a client process crashes or is killed, it may leave a named pipe (Unix FIFO) in the /tmp directory. These FIFOs have names beginning with TsmTrace and they include a process ID (PID) number. If this happens, and then a new client process is started whose PID happens to match that of the old residual FIFO, then the trace listener thread will probably not start. A fix for this is planned for a future release. Any old FIFOs with process numbers that do not match those of running the Tivoli Storage Manager processes can be safely deleted. Do NOT delete the FIFO of a running process. v The threading model for some versions of Linux is to run each thread as a separate process. This means that when you query process information, you may see several processes for each instance of the client. The process you need to identify is the dsmc parent process. For an example, refer to the previous example section. v When multiple instances of the same program are running, you must identify the PID of the instance you want to trace. In such a situation, using other clues, such as process information from the operating system, may be available to narrow down the desired PID. For example, if you want to trace dsmc that is being run by user andy and there are two instances of dsmc (one owned by user andy and the other owned by user kevin), you can use the process owner to identify which process to trace.
210
v If an options file contains an invalid option and the client does not start, you might see some named pipe errors in the dsmerror.log file. These error messages may be safely ignored. A fix for this is planned for a future release.
Trace options
Trace has several options that you can employ.
DSMTRACEListen
DSMTRACEListen No | Yes No Yes The client does not start the trace listener thread and dynamic tracing is not available. This is the default. The client starts the trace listener thread and dynamic tracing is available.
On Windows, this option is specified in the client options file (usually dsm.opt). On Unix, this option is specified in the system options file (dsm.sys) in the stanza that the client uses. This option cannot be specified from the command line.
dsmtrace
dsmtrace enable <pid> <options> Use this command to start or modify tracing for a process. pid The process ID (PID) for the client. Use dsmtrace query pids or your operating system facilities to identify the correct PID.
options The client trace options. dsmtrace disable <pid>[<options>] Use this command to stop tracing for a process. The trace file will close and the trace flags, maximum trace size, maximum trace segment size, and trace file name will all be cleared. <pid> This is the process ID (PID) for the client. Use dsmtrace query pids or your operating system facilities to identify the correct PID.
<options> The client trace options. dsmtrace help This command displays basic syntax for dsmtrace. dsmtrace query pids [-Filter=<spec>] <spec> This is the client process name filter specification. This can include the wildcard characters ? (match exactly one character) or * (match zero or more characters). If no filter is specified, then the default behavior is to display process information for any running instances of the program names listed in the table in the Background section above. Note: When using the FILTER option on Unix, put the * symbol before and after the search text. This is necessary because the executable name often includes the path in front of it, and in some cases, the executable name may have additional characters at the end of it. For example: v /opt/tivoli/tsm/client/ba/bin/dsmc v domdsmc_DominoUserID
Chapter 7. Trace
211
Thus, instead of -filter=dsmc or -filter=domdsmc, use -filter=*dsmc* or -filter=*domdsmc*. dsmtrace query trace <pid> [<options>] [<displayType>] [-ALl | -ON | -OFf | -BASic] <pid> This is the process ID (PID) for the client. Use dsmtrace query pids or your operating system facilities to identify the correct PID.
<options> The client trace options. <displayType> The display type can be one of the following: ALl This displays all trace flags and, for each flag, indicates whether it is turned on or off. The information shown with the -BASIC display type is also included. This displays the names of the trace flags that are turned on. The information shown with the -BASIC display type is also included. This displays the names of the trace flags that are turned off. The information shown with the -BASIC display type is also included.
ON
OFf
BASic This displays the name of the trace file and the maximum trace and trace segment sizes. This display type also indicates whether tracing is enabled or disabled.
-PIPENameprefix
-PIPENameprefix=<pipeNamePrefix> This option must be used when tracing API applications: v On Unix, use prefix /tmp/TsmTraceTargetAPI v On Windows, use prefix \\.\pipe\TsmTraceTargetAPI
-TRACEFIle
-TRACEFIle=<traceFileName> This must specify a valid file name to which the trace is written. If tracing is already running, then this option has no effect.
-TRACEFLags
-TRACEFLags=<traceFlags> Specify one or more trace flags. Typically, the trace flag SERVICE is used. Multiple trace flags are separated with a comma. Trace flags can also be turned off by prefixing the flag name with a minus sign. When combining trace flags that you want to turn on with trace flags that you want to turn off, put the flags that you want to turn off at the end of the list. For example, if you want to turn on SERVICE tracing except for VERBDETAIL, specify -TRACEFLAGS=SERVICE,-VERBDETAIL. If tracing is already running, then this option can be used to turn on additional trace flags or turn off trace flags.
-TRACEMax
-TRACEMax=<maximumTraceSize> This option limits the maximum trace file length to the specified value (by
212
default the trace file will grow indefinitely). When the maximum length is reached, then the trace will wrap back to the beginning of the file. Specify a value in MB between 1 and 4095. If tracing is already running, then this option has no effect.
-TRACESegsize
-TRACESegsize=<maximumTraceSegmentSize> This option is used when you anticipate a large trace file and you want the trace file to be written in smaller, more easily-manageable segments. Each segment will be no larger than the specified size. When this option is used, a segment number will be appended to the trace file name for each segment. Specify a value in MB between 1 and 1000. If tracing is already running, then this option has no effect. Note: v To turn tracing on for a process, you must use the -TRACEFLAGS and -TRACEFILE options (and -PIPENAMEPREFIX when tracing an API application). v To modify trace flags for an existing process, use -TRACEFLAGS (and -PIPENAMEPREFIX when tracing an API application). v If you need to modify the trace file name, maximum trace size, or maximum trace segment size, then you need to first disable tracing altogether (see the dsmtrace disable command).
This output is followed by the following trace message that indicates whether the object is compressed, encrypted, or both compressed and encrypted:
tsmEndSendObjEx: Total bytes send * *, encryptType is *** encryptAlg is *** compress is *, totalCompress is * * totalLFBytesSent * *
+----------------------------------------------------------------------------------+ | encryptType/compress | 0 | 1 | +----------------------------------------------------------------------------------+ | NO | not compressed, not encrypted | compressed, not encrypted | | CLIENTENCRKEY | not compressed, encrypted | compressed, encrypted | | USER | not compressed, encrypted | compressed, encrypted | +----------------------------------------------------------------------------------+
Alternatively, your application itself can determine encryption type/strength and compression of your data by using the dsmEndSendObjEx function call and the dsmEndSendObjExOut_t data structure.
Chapter 7. Trace
213
/*-------------------------------------------------------------------------+ | Type definition for dsmEndSendObjExOut_t +-------------------------------------------------------------------------*/ typedef struct dsmEndSendObjExOut_t { dsUint16_t stVersion; /* structure version */ dsStruct64_t totalBytesSent; /* total bytes read from app */ dsmBool_t objCompressed; /* was object compressed */ dsStruct64_t totalCompressSize; /* total size after compress */ dsStruct64_t totalLFBytesSent; /* total bytes sent LAN Free */ dsUint8_t encryptionType; /* type of encryption used */ }dsmEndSendObjExOut_t; objCompressed - A flag that displays if the object was compressed. encryptionType - A flag that displays the encryption type. For example: ... rc = dsmEndSendObjEx(&endSendObjExIn, &endSendObjExOut); if (rc) { printf("*** dsmEndSendObjEx failed: "); rcApiOut(dsmHandle, rc); } else { printf("Compression: %s\n", endSendObjExOut.objCompressed == bTrue ? "YES" : "NO"); printf("Encryption: %s\n", endSendObjExOut.encryptionType & DSM_ENCRYPT_CLIENTENCRKEY ? "CLIENTENCRKEY" : endSendObjExOut.encryptionType & DSM_ENCRYPT_USER ? "USER" : "NO"); printf("Encryption Strength: %s\n\n", endSendObjExOut.encryptionType & DSM_ENCRYPT_AES_128BIT ? "AES_128BIT" : endSendObjExOut.encryptionType & DSM_ENCRYPT_DES_56BIT ? "DES_56BIT" : "NONE"); } ...
See API Function Calls in Using the Application Programming Interface for more information.
trace file name The name of the file where you want to write the trace data. trace flags The list of trace flags to enable. Separate each trace flag by a space. The following are the trace flags specific to the Tivoli Storage Manager API: api Information about the API function calls
214
You can also specify other Tivoli Storage Manager backup-archive client and Tivoli Storage Manager API trace flags. Refer to the backup-archive client documentation for a list of any available trace classes. For example: v TRACEFILE /log/trace.out v TRACEFLAGS api api_detail verbinfo verbdetail timestamp Note: If you do not have write permission for the file pointed by the TRACEFILE option, dsmSetup or dsmInitEx/dsmInit will fail with return code DSM_RC_CANNOT_OPEN_TRACEFILE (426). To enable tracing for the multi-threaded API after an application has been started, use the dsmtrace utility. The dsmtrace utility allows you to turn on tracing while the problem is occurring, without having trace constantly enabled. Refer to the dsmtrace section.
ODBC tracing
There are two components from which you must collect Tivoli Storage Manager ODBC driver trace data. When collecting trace data, you must collect the following: v ODBC Driver Manager trace v Tivoli Storage Manager ODBC driver trace Perform the following steps to collect trace data: 1. Activate the Tivoli Storage Manager ODBC driver tracing. To do this, start the ODBC Data Source Administrator (odbcad32.exe), select the data source, and click Configure. This opens the Configure a Tivoli Storage Manager Data Source dialog. Select the Enable trace check box and enter a fully-qualified trace file name. For example, C:\TSMODBC.TRC. Then click OK. Leave the ODBC Data Source Administrator running. 2. Activate ODBC Driver Manager tracing by clicking the Tracing tab in the ODBC Data Source Administrator and enter a fully-qualified trace file name in the Log file Path text box. For example, C:\ODBCMGR.TRC. Do not use the same name as in step 1. Click Apply. 3. Click Start Tracing Now (the buttons name will change to Stop Tracing Now). If the button already was labeled Stop Tracing Now, click the button to change it to Start Tracing Now, then click it again to restart the trace (the button will once again read Stop Tracing Now). Click OK. 4. Delete (or rename) any existing Tivoli Storage Manager ODBC driver trace. Using the same name as in step 1, delete or rename C:\TSMODBC.TRC (if it exists). 5. Delete (or rename) any existing ODBC Driver Manager trace. Using the same name as in step 2, delete or rename C:\ODBCMGR.TRC (if it exists). 6. Recreate the problem. 7. After the problem is recreated, rename the two trace files as different names. Using the sample names above, you could rename them as follows: C:\TSMODBC.TRC to C:\TSMODBC.KEEP.TRC C:\ODBCMGR.TRC to C:\ODBCMGR.KEEP.TRC 8. Zip up the renamed trace files (they may become large) and be prepared to send them in to IBM/Tivoli support for analysis.
Chapter 7. Trace
215
9. Deactivate ODBC Driver Manager tracing. Using the ODBC Data Source Administrator, select the Tracing tab and click Stop Tracing Now. Then click OK. 10. Deactivate Tivoli Storage Manager ODBC driver tracing. Using the ODBC Data Source Administrator, select the data source and click Configure. Clear the Enable trace check box, and then click OK.
216
Performing a Tivoli Storage Manager device driver trace from Tivoli Storage Manager 5.2.2
For information on device driver trace from the Tivoli Storage Manager, see Enabling trace for the Tivoli Storage Manager device driver on page 191.
217
state prior to the device failure. If this is not possible, check for device driver updates that may be needed based on this fix level, release, or version of the operating system.
218
If a 32-bit application runs on a 64-bit Linux system and invokes a 64-bit kernel module, the 32-bit application causes a kernel segmentation fault. The same will happen if a 64-bit application invokes a 32-bit kernel module on a 32-bit Linux system. To avoid this kind of problem, ensure that the bit mode of the Linux kernel module and its applications are the same. That means 32-bit applications can only invoke 32-bit kernel modules on 32-bit Linux systems. 64-bit applications can only invoke 64-bit kernel modules on 64-bit Linux systems.
219
v For LILO boot loader: a. Add append=max_scsi_luns=128 to the /ect/lilo.conf file. b. Run lilo. v For GRUB boot loader: a. Add max_scsi_luns=128 after the kernel image list at /etc/grub.conf file for RedHat distribution. b. Add max_scsi_luns=128 after the kernel image list at /boot/grub/menu.1 file for SuSE distribution. 2. Restart the system.
Select one of the following three options: v ddtrace start librarydd tapedd (to trace both library and drive) v ddtrace start librarydd (library trace only) v ddtrace start tapedd (drive trace only) Note: DDTRACE GET and DDTRACE END are not required. The Tivoli Storage Manager passthru device driver trace cannot be enabled through the ddtrace utility.
220
to these SCSI adapters and fibre channel adapters must be unloaded and then reloaded into the Linux kernel. After reloading HBA drivers, run autoconf or tsmscsi to re-configure Tivoli Storage Manager devices on Linux. You might issue the lspci command to find out which SCSI adapter and fibre channel adapter is available on the system. The rmmod command unloads a driver from the kernel and the modprobe command loads a driver to the kernel.
Table 6. HBA adapters and corresponding drivers for all architectures of Linux HBA Adapters Adaptec 7892 Qlogic 22xx Qlogic 23xx Qlogic 2362 Emulex HBA Driver Name aix7xxx qla2200 qla2300 qla2362 lpfcdd Available Architectures IA32, AMD64 IA32, AMD64 IA32, AMD64 EM64T IA32, iSeries, pSeries
Requirements for Adaptec SCSI and Qlogic Fibre Channel HBA BIOS settings on Linux
By default, Adaptec SCSI adapters set the multiple LUN (Logical Unit Number) option tooff in their BIOS. This makes the SCSI adapter driver unable to probe a SCSI unit with multi-LUN properly. This option must be turned on. Perform the following steps to turn on the multiple LUN options: 1. Press the Ctrl and A keys at the same time. 2. Select SCSI Device Configuration in theConfigure/View Host Adapter Setting. 3. Change No to Yes for Bios Multiple LUN support. By default, Qlogic Fibre HBAs set the tape enable option as off in their BIOS. This affects the execution of some SCSI commands on several SCSI tape devices, so this option must be turned on. Perform the following steps to turn on the tape enable option: 1. Press the Alt and Q keys at the same time. 2. Select Advanced Settings. 3. Change Disable to Enable for Fibre Channel Tape Support.
221
some other mechanism. Generally, disk subsystems are outside of the computer to which they are attached and may be located in close proximity or they may be located much farther away. These subsystems may also have some method of caching the I/O requests to the disks. Disk subsystems often have their own configuration and management software. The Tivoli Storage Manager server may define hard disk drives and disk subsystems used by the computer or operating system on the machine where the Tivoli Storage Manager is installed. Typically, a hard disk drive or disk subsystem is defined to the computer where the Tivoli Storage Manager is installed as a drive or file system. After the hard disk drive or disk subsystem is defined to the operating system, Tivoli Storage Manager may use this space by allocating a database, recovery log, or storage pool volume on the device. The Tivoli Storage Manager volume subsequently looks like another file on that drive or file system. Tivoli Storage Manager requires the following conditions for hard disk drives, disk subsystems, third-party file systems, and remote file systems: v When the Tivoli Storage Manager opens database, recovery log, and storage pool volumes, they are opened with the appropriate operating system settings to require data write requests to bypass any cache and be written directly to the device. By bypassing cache during write operations, Tivoli Storage Manager can maintain the integrity of client attributes and data. This is required because if an external event, such as a power failure, causes the Tivoli Storage Manager server or the computer where the server is installed to halt or crash while the server is running, the data in the cache may or may not be written to the disk. If the Tivoli Storage Manager data in the disk cache is not successfully written to the disk, information in the server database or recovery log may not be complete, or data that was supposed to be written to the storage pool volumes may be missing. This is less of an issue for hard disk drives installed in the computer where the Tivoli Storage Manager server is installed and running. In this case, the operating system settings that are used when the Tivoli Storage Manager opens volumes on that hard disk drive generally manage the cache behavior appropriately and honor the request to prevent caching of write operations. Typically, the use and configuration of caching for disk subsystems is a greater issue. The reason for this is that disk subsystems often do not receive information from the operating system about bypassing cache for write operations, or else they ignore this information when a volume opens. Because of this, the caching of data write operations may result in corruption of the Tivoli Storage Manager server database or loss of client data, or both, depending upon which Tivoli Storage Manager volumes are defined on the disk subsystem and the amount of data lost in the cache. Disk subsystems should be configured to not cache write operations when a Tivoli Storage Manager database, recovery log, or storage pool volume is defined on that disk. Another alternative is to use non-volatile cache for the disk subsystem. Non-volatile cache employs a battery backup or some other sort of scheme to allow the contents of the cache to be written to the disk if a failure occurs. v The size and location of the Tivoli Storage Manager database, recovery log, and storage pool volumes (files) can not change after they are defined and used by the server. If the size is changed or the file is moved, internal information that the Tivoli Storage Manager uses to describe the volume may no longer match the actual attributes of the file. If you need to move or change the size of a Tivoli Storage Manager database, recovery log, or storage pool volume, move any existing data to other volumes prior to altering or moving the database.
222
FILE directory mapping between storage agents and servers for shared files
Tivoli Storage Manager servers and storage agents can access the same data in File device classes by defining a set of directories that should be used within a device class definition. For each storage agent that will be sharing FILE access, the PATHs defined to each DRIVE seen by the storage agent must provide access to the same set of directories. When the PATHs are defined, the directories for each storage agent must match in number and ordering for the directories as listed in the device class definition on the server. If these definitions are out of sync, the storage agent may be unable to access the FILE volumes. This results in successful LAN-restores and mount failures for the LANFREE-restores.
223
Try reverting to the previous (or earlier) version of the device driver to see if the problem was introduced by the newer version of the driver.
224
v ANR9999D cryptog.c(253): ThreadId<0> ICC load failed. To run a Tivoli Storage Manager server from a directory other than the Tivoli Storage Manager server installation directory, the DSMSERV_DIR environment variable must be set to the path of the server installation directory. The Tivoli Storage Manager server uses the installation directory as a reference to locate executables and other files in the Tivoli Storage Manager server installation. Perform the following steps to run a Tivoli Storage Manager server from a directory other than the installation directory: 1. Set the DSMSERV_DIR environment variable to the base installation directory of the Tivoli Storage Manager server (typically: /usr/tivoli/tsm/server/bin). 2. Add the path of the installation directory (/usr/tivoli/tsm/server/bin) to your PATH environment variable. 3. Follow the steps on Running Multiple Servers on a Single Machine in the Tivoli Storage Manager for AIX Installation Guide.
225
Arbitrated loop Arbitrated loop topologies are ring topologies and are limited in terms of the number of devices that are supported on the loop and the number of devices that can be in use at a given time. In an arbitrated loop, only two devices can communicate at the same time. Data being read from a device or written to a device is passed from one device on the loop to another until it reaches the target device. The main limiting factor in an arbitrated loop is that only two devices can be in use at a given time. Switched fabric In a switched fabric SAN, all devices in the fabric will be fibre native devices. This topology has the greatest bandwidth and flexibility because all devices are available to all HBAs through some fibre path.
Device driver HBAs use device drivers to work with the operating system to provide connectivity to the SAN. The vendor will typically provide a device driver for use with their HBA. Similarly, the vendor will provide instructions and any necessary tools or utilities for updating the device driver. Periodically the device driver level should be compared to what is available from the vendor and, if needed, should be updated to pick up the latest fixes and support. Configuration HBAs typically have a number of configurable settings. The settings typically affect how Tivoli Storage Manager functions with a SAN device. See HBA configuration issues.
226
provide a utility and other instructions on how to configure your HBA. The following are settings that typically affect using Tivoli Storage Manager with a SAN: v Storage area network (SAN) topology The HBA should be set appropriately based on the currently-used SAN topology. For example, if your SAN is an arbitrated loop, the HBA should be set for this configuration. If the HBA connects to a switch, this HBA port should be set to point to point and not loop. With Tivoli Storage Manager SAN Device Mapping, you can perform SAN discovery on most of the platforms and the persistent binding of the devices are not required. A Tivoli Storage Manager server can find the device if the device path was changed due to a restart or other reason. Go to IBM Support to verify the platform/HBA vendor/driver level support for Tivoli Storage Manager SAN discovery. v FC link speed In many SAN topologies, the SAN is configured with a maximum speed. For example, if the FC switch maximum speed is 1 GB/sec, the HBA should also be set to this same value. Or the HBA should be set for automatic (AUTO) negotiation if the HBA supports this capability. v Is fibre channel tape support enabled? Tivoli Storage Manager requires that an HBA is configured with tape support. Tivoli Storage Manager typically uses SANs for access to tape drives and libraries. As such, the HBA setting to support tapes must be enabled.
227
The vendor for the data gateway usually provides information about the appropriate settings and configuration based upon the SAN topology being deployed and SCSI devices used. Similarly, the vendor might provide a utility and other instructions on how to configure it. The following settings can be used for the FC port mode on the connected port on a data gateway: Private target Only the SCSI devices attached to the data gateway are visible and usable from this port. For the available SCSI devices, the gateway simply passes the frames to a given target device. Private target port settings are typically used for arbitrated loops. Private target and initiator Only the SCSI devices attached to the data gateway are visible and usable from this port. For the available SCSI devices, the gateway simply passes the frames to a given target device. As an initiator, this data gateway may also initiate and manage data movement operations. Specifically, there are extended SCSI commands that allow for third-party data movement. By setting a given port as an initiator, it is eligible to be used for third-party data movement SCSI requests. Public target All SCSI devices attached to the data gateway, as well as other devices available from the fabric, are visible and usable from this port. Public target and initiator All SCSI devices attached to the data gateway, as well as other devices available from the fabric, are visible and usable from this port. As an initiator, this data gateway may also initiate and manage data movement operations. Specifically, there are extended SCSI commands that allow for third-party data movement. By setting a given port as an initiator, it is eligible to be used for third-party data movement SCSI requests.
228
229
NDMPPORTRANGEHIGH server options. Note that a data port is not needed by the Tivoli Storage Manager server for NAS restores from Tivoli Storage Manager native pools.
SAN devices
You may be experiencing problems with your storage agent SAN devices. For additional error messages related to SAN, see SAN device mapping problems on page 234.
ANR8302E I/O error on drive TSMDRIVE01 (/dev/mt9) (OP=WRITE, Error Number=5, CC=205, KEY=FF, ASC=FF, ASCQ=FF, SENSE=**NONE**, Description=General SCSI failure). Refer to Appendix D in the Messages manual for recommended action
For SAN device errors, this message is issued in many cases. The CC=205 reports that the device driver detects a SCSI adapter error. In the case of a SAN-attached device that encounters a link reset caused by link loss, it will be reported back to the device driver as a SCSI adapter error. The underlying cause of this error is the event that caused the link reset due to the link loss. The path for this device should be updated to ONLINE=NO by issuing the UPDATE PATH command. Do not set the path to ONLINE=YES until the cause for the link reset was isolated and corrected.
ANR8957E: command : Autodetect is OFF and the serial number reported by the library did not match the serial number in the library definition
The Tivoli Storage Manager SAN Device Mapping encountered a path for the library that reports a different serial number than the current Tivoli Storage Manager definition for the library. The AUTODETECT parameter was set to NO for the command which prevented the server from updating the serial number for the library. For the Tivoli Storage Manager 5.2 on Windows with systems using QLogic host bus adapters, reissue the command with AUTODETECT=ON. The newly-discovered serial number is automatically updated for this library. The following informational message is issued:
230
ANR8953I: Library libraryName with serial number serialNumber is updated with the newly-discovered serial number newSerialNumber For other Tivoli Storage Manager servers, determine the new path and issue the UPDATE PATH command to correct this.
ANR8958E: command : Autodetect is OFF and the serial number reported by the drive did not match the serial number in the drive definition
Tivoli Storage Manager SAN Device Mapping encountered a path for a drive that reports a different serial number than the current Tivoli Storage Manager definition for that drive. The AUTODETECT parameter was set to NO for the command, which prevents the server from updating the serial number for this drive. For Tivoli Storage Manager 5.2 on Windows with systems using QLogic host bus adapters, reissue the command with AUTODETECT=ON. The newly-discovered serial number is automatically updated for this drive. The following informational message is issued: ANR8955I: Drive driveName in library libraryName with serial number serialNumber is updated with the newly discovered serial number newSerialNumber. For other Tivoli Storage Manager servers, determine the new path and issue the UPDATE PATH command to correct this.
ANR8963E: Unable to find path to match the serial number defined for drive driveName in library libraryName
For the Tivoli Storage Manager 5.2 Windows servers and storage agents, the server automatically maps SAN devices. This SAN Device Mapping feature allows the server to compare its definitions for SAN devices to the actual definition for these devices. If a discrepancy is detected, the server definition for this device is updated to correct this. The SAN Device Mapping was not able to find a SAN device that was previously defined to the server. The most likely cause for this is that the device itself has been removed or replaced in the SAN. The following are the possible steps to resolve this: v Device Removed If the device was removed from the SAN, simply delete the server definitions that refer to this device. Issue the QUERY PATH F=D command to determine any paths that reference the device. Then issue the DELETE PATH command to remove these paths. v Device Replace A SAN Device was replaced with a new device as a result of maintenance or an upgrade. Perform the following procedures: Try not to delete the drive or drive path definition after you replace the drive. Issue one of the following server commands: - UPDate DRive <libraryName> <driveName> SERIAL=AUTODetect This command will force-record the new serial number into the server database. Because the drive was replaced, the element number stays the same.
231
- UPDate PATH <sourceName> <driveName> SRCT=SERVER DESTT=DRIVE LIBRary=<libraryName> DEVIce=xxxxx AUTODetect=Yes This command will force-record the new serial number into the database. Because the drive was replaced, the element number stays the same. If the drive or drive path was deleted, redefine this new, replaced drive. You must restart the Tivoli Storage Manager server so that the element number/serial number map for the library can be refreshed. This mapping only occurs at initialization. Issue the QUERY PATH F=D command to find any paths defined on the server that reference this device, then issue the following command to update the path information:
UPDATE PATH AUTODetect=Yes
ANR8965W: The server is unable to automatically determine the serial number for the device
For a Tivoli Storage Manager 5.2 non-Windows server or an Tivoli Storage Manager 5.3 server with the SANDISCOVERY option OFF, the Tivoli Storage Manager server does not automatically detect SAN device serial numbers. If the Tivoli Storage Manager server detects that a device serial number was changed, it marks the devices path as offline. Perform the following steps to correct this: 1. Determine the correct serial number for the device. 2. Issue the UPDATE DRIVE or UPDATE LIBRARY command to update the device serial number.
ANR8972E: Unable to find element number for drive driveName in library libraryName
If the ELEMent parameter was set to AUTODetect when defining the drive, the Tivoli Storage Manager tries to get the drives element number automatically. However, if the library does not provide an element number/serial number map, this message is issued. Perform the following steps to correct this: 1. Determine the element number for this tape drive. 2. Issue the UPDATE DRIVE command to update the device element number.
232
World Wide Name (WWN), port, bus, target, and LUN are displayed. This information will help identify all the tape, disk, and Data Mover devices on the SAN. For AIX, the data mover is transparent and is not shown. Tivoli Storage Manager can update the device path automatically when a devices path changes Tivoli Storage Manager does not require persistent binding for the devices it sees via HBA. Instead, the server uses the SNIA HBAAPI to discover and obtain the serial number for all the devices on the SAN. It can also determine each devices path. By comparing a devices serial number recorded in the Tivoli Storage Manager database with the serial number obtained from the device in real time, a change in a devices path is detected. If the path was changed, SAN discovery automatically performed to obtain the new path for the device. The Tivoli Storage Manager database is also updated with the new path information. The HBAAPI wrapper library is the wrapper used by the Tivoli Storage Manager server to communicate with the SNIA HBAAPI. The HBAAPI wrapper library is installed in the same directory as the Tivoli Storage Manager executable (unless the full path is given). The following is a list of the HBA wrapper files shipped with the Tivoli Storage Manager server package (except on AIX): v Windows: hbaapi.dll v AIX: /usr/lib/libhbaapi.a (This is provided by AIX with HBAAPI installation) v 32-bit Linux: libhbaapi32.so v 64-bit Linux: libhbaapi64.so v 32-bit Solaris: libhbaapi32.so v 64-bit Solaris: libhbaapi64.so If any of these files are missing, message ANR1791W HBAAPI wrapper library xxxxxxxxx failed to load or is missing. is displayed.
Platform-specific information
When working on your SAN device mapping, it is important that you know your platform-specific information.
233
AIX
Query SAN command will NOT show any Gateway devices because Gateway devices are transparent to AIX.
Linux There are separate libraries, utilities, and other items for RHEL3U3. To run them you must also install an Emulex ioctl kernel module in addition to the Emulex driver. Make sure to load the Emulex driver before loading the ioctl module. Emulex has provided an Application kit for RHEL3. To find the Emulex application kit, go to the Emulex website and click on Support. Under Choose your supplier from the following list, select vendor IBM. A list of drivers and kits are available for you to download. Note: For a list of supported HBAs and required driver levels by operating system, go to IBM Support and search on keyword TSMHBA.
234
For IBM tape devices, make sure the latest firmware is installed. Firmware prior to 4772 for IBM 3580 tape devices caused problems with Qlogic HBAAPI.
235
v /opt/JNIsnia/Solaris/Jni/64bit/JniHbaLib.so (JNIs Solaris file) RESULT: The Tivoli Storage Manager server is not able to perform SAN discovery.
ANR1793W Tivoli Storage Manager SAN discovery is not supported on this platform or this version of OS
This message is only displayed if the Tivoli Storage Manager attempts a SAN device mapping or device discovery operation on an unsupported operating system. The following platforms are not currently supported by SAN device mapping or device discovery: v HP-UX v 64-bit Windows 2003 v Linux zSeries v AIX versions that are not 52L or 53A. Support for SAN device mapping and device discovery on AIX requires either version 52L (fileset level of 5.2.0.50) or 53A (fileset level of 5.3.0.10) or higher. RESULT: The Tivoli Storage Manager server is not able to perform SAN discovery.
236
237
This error message is only displayed for AIX. The server specified that the file set devices.common.IBM.fc.hba-api is at a level that is incompatible with Tivoli Storage Manager operations. Install the latest maintenance for this file set if you use SAN devices. RESULT: The Tivoli Storage Manager server is not able to perform SAN discovery.
SAN devices are missing from the display of QUERY SAN server command
The possible reasons for the QUERY SAN server command not displaying all the devices can be due to configuration or vendor support issues.
238
information. The special file name for the IBM tape devices (not Tivoli Storage Manager devices) is added or removed. Note: Special file name: /dev/IBMTape0, /dev/IBMChanger0 For the Tivoli Storage Manager devices: Users can issue autoconf, the Tivoli Storage Manager device driver auto configure script. This resides in the /opt/tivoli/tsm/devices/ bin directory to be able to get all the current special file names. Note: Special file name: dev/tsmscsi/mt0, /dev/tsmscsi/lb0 Note: Alternatively, reinstalling the IBM device driver/Tivoli Storage Manager device driver updates all the current special file names. With the Linux pass-thru device driver for the Tivoli Storage Manager devices, the HBA driver and the generic driver must be reloaded to get all the current special file names. You have to run the autoconf script so that the Tivoli Storage Manager device driver can create configuration files (/dev/tsmscsi/lbinfo and /dev/tsmscsi/mtinfo). These files are used by the Tivoli Storage Manager server to create the special file names after each SAN discovery. 32 bits (Linux xSeries) Ensure that the HBAAPI wrapper library libhbaapi32.so is in the same directory as dsmserv.exe or in the /opt/tivoli/tsm/server/ bin directory. 64 bits (Linux pSeries) Ensure that the HBAAPI wrapper library libhbaapi64.so is in the same directory as dsmserv.exe or in the /opt/tivoli/tsm/server/ bin directory. Update the configuration on Solaris: The HBA gets the most up-to-date configuration information as result of the RSCN. Most of the time, the machine must be restarted to pick up the configuration changes. Reinstall the IBM device driver/Tivoli Storage Manager device driver or issue the following commands to have the special file name updated: For IBM devices: The IBM device driver has already done the rem_drv and add_drv and nothing needs to be done. Note: Special file name: /dev/rmt/0st, /dev/rmt/0smc For Tivoli Storage Manager devices: Modify /usr/kernel/drv/mt.conf and /usr/kernel/drv/lb.conf to add the following: mt.conf: (name=mt parent=pseudo instance=16383) lb.conf (name=lb parent=pseudo instance=16383) Issue the following commands: rem_drv lb add_drv lb rem_drv mt add_drv mt add_drv -m * 0666 bin bin mt
Chapter 8. Hints and tips
239
Alternatively, the autoconf command can do the above by itself. Ensure that the virtual device special file is in /devices/pseudo/mt@16383:tsmmtctl and /devices/pseudo/ lb@16383:tsmlbctl Issue the command twice
sync sync
Restart the machine The following files are used by the Tivoli Storage Manager server to create the special filenames after each SAN discovery: v 32 bits (Linux xSeries) Ensure that libhbaapi32.so is in the same directory as dsmserv.exe or in /opt/tivoli/tsm/server/bin v 64 bits (Linux pSeries) Ensure that libhbaapi64.so is in the same directory as dsmserv.exe or in /opt/tivoli/tsm/server/bin
240
241
list of the HBA wrapper files shipped with the Tivoli Storage Manager server package (except on AIX). Error message ANR1791W indicates that the HBAAPI wrapper file is either missing or could not be loaded by the Tivoli Storage Manager. Verify that the wrapper file is in the same directory as the Tivoli Storage Manager executable. The following are the HBAAPI wrapper library files: v Windows : hbaapi.dll v AIX : /usr/lib/libhbaapi.a (This is provided by AIX with HBAAPI installation) v 32-bit Linux: libhbaapi32.so v 64-bit Linux: libhbaapi64.so v 32-bit Solaris: libhbaapi32.so v 64-bit Solaris: libhbaapi64.so The result is that the Tivoli Storage Manager server is not able to perform SAN discovery.
The result is that the Tivoli Storage Manager server is not able to perform SAN discovery.
242
243
v Check the FC cable connection from the HBA to the SAN device (switch, data gateway, or other device). v Check the GBIC. v On the SAN device (switch, data gateway, or other device) try a different target port. Sometimes the SAN devices may have a specific port failure. v Halt the Tivoli Storage Manager server, restart the machine, and restart the server. If there were configuration changes in the SAN, sometimes the operating system, device driver, or HBA requires a machine restart before they can communicate with the SAN. v Recycle the destination port on the SAN device. v Reseat the HBA card. v Replace the HBA.
244
245
v v v v v v v v v v v v
SQLNumParams SQLNumResultCols SQLPrepare SQLPrimaryKeys SQLRowCount SQLSetConnectAttr SQLSetCursorName SQLSetEnvAttr SQLSetStmtAttr SQLSpecialColumns SQLStatistics SQLTables
The ODBC 3.x specification can be found in the Microsoft Developer Network (MSDN) library at the ODBC 3.x specification Web site. Go to Win32 and COM Development Data Access and Storage Microsoft Open Database Connectivity (ODBC) Microsoft Open Database Connectivity (ODBC) ODBC Programmers Reference to navigate to the ODBC specification.
Description
OPTIONAL
246
Control Language
Type REQUIRED
Description Select the language in which ANSxxxxx messages are to be displayed. The available languages are those that were selected at the time that the ODBC driver was installed. Note: Only the ANSxxxxx messages are available in other languages. The ODBC driver dialogs and other non-ANSxxxxx text strings are currently displayed in English only. Specify the Tivoli Storage Manager Administrator ID to use with this DSN. Specify the number of records that the ODBC driver requests from the Tivoli Storage Manager server per fetch request. Larger values may improve performance, especially when fetching a large number of records. This value must be between 1 and 1000000 inclusive. The default value is 50. Specify the TCP/IP address of the Tivoli Storage Manager server to which you are connecting. If you do not know which address to use, see your Tivoli Storage Manager administrator. Specify the TCP/IP port number of the Tivoli Storage Manager server to which you are connecting. If you do not know which port number to use, see your Tivoli Storage Manager administrator. Selecting this check box activates the Tivoli Storage Manager ODBC driver tracing. Clearing this check box deactivates tracing. This check box is normally not selected. Tracing should only be performed at the request of the Tivoli Storage Manager Service or Development. This field is available only when Enable trace is selected. Here you can specify a fully-qualified file name to which trace data is written. Tracing should only be performed at the request of the Tivoli Storage Manager Service or Development.
OPTIONAL REQUIRED
TCP/IP address
REQUIRED
TCP/IP port
REQUIRED
Enable trace
OPTIONAL
Table 7. Keywords to use when creating file DSNs Keyword DRIVER=driverName UID=administratorName TCPADDR=tcpipAddress TCPPORT=tcpipPortNumber Description driverName must be Tivoli Storage Manager ODBC Driver. administratorName is a valid Tivoli Storage Manager Administrator ID. tcpipAddress is the TCP/IP address for your Tivoli Storage Manager server. tcpipPortNumber is the TCP/IP port number used to connect to your Tivoli Storage Manager server. fetchSize is the number of records that the ODBC driver requests from the Tivoli Storage Manager server per fetch request. This value must be between 1 and 1000000 (inclusive). The default value is 50.
FETCHSIZE=fetchSize
For example: if your administrator ID is storman, your Tivoli Storage Manager server address is storman.tucson.ibm.com, and your Tivoli Storage Manager TCP/IP port number is 1500. The file DSN should look like the following entry:
Chapter 9. Tivoli Storage Manager ODBC driver
247
Note: UID, TCPADDR, and TCPPORT are not required; if they are not specified, then you will be prompted for their values. The [ODBC] line is automatically added for you when you use the ODBC Data Source Administrator to create the file DSN. Perform the following steps to create a file DSN using the ODBC Data Source Administrator: 1. Start the ODBC Data Source Administrator from the Control Panel. Alternatively you can run odbcad32.exe. 2. Click the File DSN tab, and then click Add. 3. Select Tivoli Storage Manager ODBC Driver (located in the Name column) and click Next. 4. Enter the name that you want to use for this DSN. For example, Tivoli Storage Manager File DSN. Click Next. The dialog now shows you a summary of the options chosen thus far. 5. Click Finish. 6. You are now presented with the Connect to the Tivoli Storage Manager Server dialog. Fill in the TCP/IP address, TCP/IP port, administrator ID, password, and click Connect. An attempt is made to connect to the Tivoli Storage Manager server using the information that you supplied above. If the connection is successful, you will be returned to the ODBC Data Source Administrator dialog. If there was a problem connecting to the Tivoli Storage Manager server, you will be prompted again to enter the correct information. Note: For security purposes, the password is NOT saved. It is used in this step for the purpose of validating the connection information.
Instead, use single word column names, which do not require quotes:
select node_name as NODENAME from nodes
v When using Microsoft Excel or Microsoft Query (msqry32.exe), statements containing the AS keyword in the column specification do not work at all. This is because Microsoft Query (which is what Microsoft Excel uses to import the data) always puts single quotes around the new column name, even if it does not contain blank spaces. The Tivoli Storage Manager server does not accept single quotes around the column name. Microsoft Knowledge Base article 298955 describes this issue. v If your ODBC application provides the option to select one or more columns as unique identifiers, do not choose any columns. For example, when linking tables in Microsoft Access, you might be presented with a Select Unique Record
248
Identifier dialog. In this case, just click OK without selecting any fields. This feature is usually associated with maintaining integrity for database updates, but since it is not possible to update the Tivoli Storage Manager database with the ODBC driver, there is no need to select any fields. Further, selecting one or more fields might result in erroneous output. One common symptom is seeing #DELETED in the result set, in which case the solution is to link the table again and not select any unique identifiers. v For 64-bit bit Microsoft Windows XP and 2003 users: The ODBC driver is available in a 32-bit version only, and thus is not compatible with 64-bit applications. The ODBC driver can be installed on 64-bit Windows XP and 2003 systems, but must be used with 32-bit applications. Also, the 32-bit version of the ODBC Data Source Administrator must be used to create and configure data source names (DSNs). See Defining ODBC Data Sources. v If the ODBC application is running in a different locale from that of the server, data containing characters that do not map into the ODBC application machines locale may appear unintelligible (garbled). v When opening the Tivoli Storage Manager database tables in Lotus Approach , the Open dialog includes a field labeled Files of type. Select ODBC Data Sources (*) for this field. Do not select the Tivoli Storage Manager ODBC Driver (*) because Approach will not open the tables. v If you use a file DSN to link Tivoli Storage Manager database tables into Microsoft Access, you will not be able to open the linked table after Access is shut down and restarted. This problem is discussed in Microsoft support article Q327268. v The ANSxxxxx messages can now be displayed in languages other than English. Available languages include Chinese (Simplified and Traditional), Czechoslovakian, English, French, German, Hungarian, Italian, Japanese, Korean, Polish, Portuguese (Brazilian), Russian, and Spanish. However, the Tivoli Storage Manager ODBC configuration dialogs and other non-ANSxxxxx text strings are currently displayed in English only. v In order to maintain the database integrity, the Tivoli Storage Manager ODBC Driver supports only SELECT statements. You will not be able to manipulate the database with any other statements. v If there are more than two tables specified in the FROM clause of a SELECT statement, the query results will not be optimized by the Tivoli Storage Manager server. You might see duplicate records in the results. Example: The following SQL statement will generate duplicate records:
SELECT * FROM NODES, FILESPACES, CONTENTS
Note: The SQL statement running time may be much longer due to preparing large amounts of query results. v The columns in the ORDER BY clause must be in the select list. The Tivoli Storage Manager ODBC driver provides the information for the application. Some applications do not retrieve the information before generating the SQL query. Example: The following SQL statement will fail because PWSET_TIME is not in the select list:
SELECT ADMIN_NAME FROM ADMINS ORDER BY PWSET_TIME
v Not all Tivoli Storage Manager database tables have a primary key. When selecting Link Tables using Microsoft Access, Microsoft Access prompts the users for primary key fields if the table does not have a primary key or if the table has a primary key that is comprised of multiple index fields. You can select primary key fields or click Cancel to ignore the prompt.
Chapter 9. Tivoli Storage Manager ODBC driver
249
Follow the prompts to recreate the failure. After the setup program ends, setup.log will contain detailed diagnostic information about the setup.
250
A directory listing of the files in the directory where the Tivoli Storage Manager ODBC driver is installed. For example, if the driver is installed to directory C:\Program Files\Tivoli\TSM\odbc, then open an OS command prompt, change into that directory, and issue the following command:
dir > odbcdir.out
v Obtain a directory listing of the files in the directory where the Tivoli Storage Manager ODBC driver is installed. For example, if the driver is installed to directory C:\Program Files\Tivoli\TSM\odbc, then open an OS command prompt, change into that directory, and issue the following command: dir > odbcdir.out You can then send in the odbcdir.out file. v Trace data.
251
v dscrus.txt - Russian Note: Prior versions of the Tivoli Storage Manager ODBC driver placed its files in the winnt\system32 directory. The following files may be deleted from that directory if they still exist: v dsgameng.txt v odbcadsm.dll v odbcadsm.txt If your machine is running the German version of Windows, then the dscdeu.txt file is installed by default. If your machine is running the German version of Windows and you also select French and Italian language support, then dscdeu.txt, dscfra.txt, and dscita.txt are installed.
252
If your machine is running the English version of Windows and you also select Spanish and Japanese support, then dscesp.txt and dscjpn.txt are installed.
The following subkeys and associated values are pertinent to the Tivoli Storage Manager ODBC driver installation:
Table 8. ComponentsMsi subkey Name ODBC Driver Explanation A REG_SZ value that must be Odbc
Table 9. Odbc subkey Name Path Explanation This is the directory in which you installed the Tivoli Storage Manager ODBC driver. It is the parent directory for the odbc subdirectory which contains the odbcadsm.dll file. For example, if odbcadsm.dll is in directory C:\Program Files\Tivoli\TSM\odbc, then this value should be C:\Program Files\Tivoli\TSM. This is a REG_SZ value. A REG_SZ value indicating the 4-node version number of the Tivoli Storage Manager ODBC driver. For example, if the Tivoli Storage Manager 5.1.5.0 ODBC driver is installed, then this value should be 5.1.5.0 (without the quotation marks).
PtfLevel
Odbc\nls\xx_XX: where xx_XX is a language abbreviation as follows (with the language name shown to the right for your reference): v de_DE - German v v v v v v v v v v v v v en_US es_ES fr_FR it_IT ja_JP ko_KR pt_BR zh_CN zh_TW cs_CZ hu_HU pl_PL ru_RU U.S. English Spanish French Italian Japanese Korean Portuguese (Brazilian) Chinese (Simplified) Chinese (Traditiona Czech Hungarian Polish Russian
253
If you install the Tivoli Storage Manager ODBC driver on a non-English Windows system, then you may also have a subkey that corresponds to the language version of Windows that you are running. For example, if you are running the German language version of Windows, then you may also have the Odbc\nls\de_DE subkey. You may have other subkeys as well if, during the installation, you selected multiple language support.
Table 10. Language support settings Name FileName Explanation A REG_SZ value indicating the name of the Tivoli Storage Manager message repository that corresponds to the subkeys language setting. For example, in subkey Odbc\nls\de_DE, the FileName value should be dscdeu.txt. A REG_SZ value indicating the language of the message repository specified in the FileName value. For example, if FileName is dscdeu.txt, then the Language setting must be German.
Language
Table 11. Language value settings Subkey File name Language German English (US) Spanish French Italian Japanese Korean Portuguese (Brazilian) Chinese (Simplified) Chinese (Traditional) Czech Hungarian Polish Russian
Odbc\nls\de_DE dscdeu.txt Odbc\nls\en_US dscenu.txt Odbc\nls\es_ES Odbc\nls\fr_FR Odbc\nls\it_IT Odbc\nls\ja_JP dscesp.txt dscfra.txt dscita.txt dscjpn.txt
Odbc\nls\ko_KR dsckor.txt Odbc\nls\pt_BR dscptb.txt Odbc\nls\ zh_CN Odbc\nls\ zh_TW dscchs.txt dsccht.txt
Odbc\nls\ru_RU dscrus.txt
Table 12. The Tivoli Storage Manager ODBC driver settings are located in subkeys of the following registry key: System 32-bit Windows 64-bit Windows Registry Key HKEY_LOCAL_MACHINE\SOFTWARE\ ODBC HKEY_LOCAL_MACHINE\SOFTWARE\ Wow6432Node\ODBC
The following subkeys and associated values are pertinent to the Tivoli Storage Manager ODBC driver (these are all located under HKEY_LOCAL_MACHINE\ SOFTWARE\ODBC):
254
Table 13. ODBC.INI\ODBCADSM Name ADSMTrace Explanation A REG_SZ value indicating whether the Tivoli Storage Manager ODBC driver tracing is enabled. Values may be either No or Yes. If tracing is enabled (ADSMTrace is set to Yes), trace output is written to the file specified by the TraceFileName value (see below). Language A REG_SZ value that indicates which language version of the Tivoli Storage Manager message repository is in use. Values may be one of the following: v German v English (US) v Spanish v French v Italian v Japanese v Korean v Portuguese (Brazilian) v Chinese (Simplified) v Chinese (Traditional) v Czech v Hungarian v Polish v Russian TraceFileName A REG_SZ value that indicates the name of the Tivoli Storage Manager ODBC driver trace file.
Tivoli Storage Manager ODBC A REG_SZ value indicating that the Tivoli Storage Manager Driver ODBC driver is installed. This value is always set to Installed. Table 15. ODBCINST.INI\TSM ODBC Driver Name APILevel Explanation A REG_SZ value that is always set to 0 (zero). This indicates that the Tivoli Storage Manager ODBC driver implements ODBC Core-level functions only. A REG_SZ value that is always set to YYN. This string indicates whether the driver implements the SQLConnect(), SQLDriverConnect(), and SQLBrowseConnect() functions, respectively. Y (yes) means that the function is implemented in the driver; N (no) means that the function is not implemented in the driver. Thus, the Tivoli Storage Manager ODBC driver currently implements SQLConnect() and SQLDriverConnect(). The driver does not implement SQLBrowseConnect(). A REG_SZ value that specifies the full path to the Tivoli Storage Manager ODBC driver. If the driver is installed to C:\Program Files\Tivoli\TSM\odbc, the value is: C:\Program Files\Tivoli\TSM\odbc\odbcadsm.dll
Chapter 9. Tivoli Storage Manager ODBC driver
ConnectFunctions
Driver
255
Table 15. ODBCINST.INI\TSM ODBC Driver (continued) Name DriverODBCVer FileUsage Explanation A REG_SZ value that indicates which version of the ODBC specification the driver supports. This value is set to 03.51. A REG_SZ value that indicates how the driver behaves toward files in a data source. Because the Tivoli Storage Manager ODBC driver is not a file-based driver, this value is always 0 (zero). A REG_SZ value that specifies the full path to the drivers Data Source configuration program. The Tivoli Storage Manager ODBC drivers configuration program is in the Tivoli Storage Manager ODBC driver itself, so this value should always match that of the Driver setting (see above). A REG_SZ value that indicates the SQL-92 grammar supported by the driver. Because Tivoli Storage Manager supports a subset of the SQL-92 entry-level grammar, this value is always 0 (zero). A REG_DWORD value that indicates how many components use this driver. Because the driver is used by only one component (the Tivoli Storage Manager ODBC driver itself), this value should be 1.
Setup
SQLLevel
UsageCount
The Tivoli Storage Manager ODBC driver data source settings are located in the following registry key: HKEY_CURRENT_USER\Software\ODBC\ODBC.INI\<data source name> where <data source name> is a user-defined data source name. Note that the Tivoli Storage Manager ODBC driver installation program configures a sample data source called Tivoli Storage Manager ODBC Sample User DSN. Each instance of this subkey contains the following values:
Name CommMethod Explanation A REG_SZ value that indicates the communications method that the Tivoli Storage Manager ODBC driver uses to communicate with the Tivoli Storage Manager server. Because the only supported communications protocol is TCP/IP, this value is always set to TCP/IP. A REG_SZ value that specifies the full path to the Tivoli Storage Manager ODBC driver. Thus if the driver is installed to C:\Program Files\Tivoli\TSM\odbc, the value is: C:\Program Files\Tivoli\TSM\odbc\ odbcadsm.dll Note: This value always matches that of the driver value specified in registry subkey HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBCINST.INI\TSM ODBC Driver. A REG_SZ value containing a user-specified free-form comment (or description) for the data source definition.
Driver
DsnDescription
256
Name FetchSize
Explanation A REG_SZ value indicating the maximum number of rows that the ODBC driver requests (buffers) from the Tivoli Storage Manager server at a time. Note that this is not the same as the SQL_ATTR_ROW_ARRAY_SIZE ODBC statement attribute. The former governs the number of records that the ODBC driver will buffer from the server, while the latter governs the number of records that the application will request from the ODBC driver. The default setting is 50 (50 records). Larger settings may improve performance.
TcpPort
A REG_SZ value indicating the TCP/IP communications port that the Tivoli Storage Manager ODBC driver uses to connect to the Tivoli Storage Manager server. A REG_SZ value indicating the TCP/IP address that the Tivoli Storage Manager ODBC driver uses to connect to the Tivoli Storage Manager server. A REG_SZ value indicating the name of the Tivoli Storage Manager Administrator ID uses to connect to the Tivoli Storage Manager server.
TcpSrvAddr
UID
The operating system logs information from ODBC registry keys in two files located in the x:\winnt directory (x:\windows for Windows XP users): v ODBC.INI v ODBCINST.INI Important: Do NOT rename, delete, or otherwise modify these files or their contents unless it is at the direction of IBM Development or Service.
257
258
In this example, you would enter 67 to view information on the restore command.
Copyright IBM Corp. 1993, 2007
259
To view information for a message, use the d and u keys to navigate the menu until you see entries that appear like the following entries:
The following help topics are available. Enter the number of the desired help topic or q to quit, d to scroll down, u to scroll up. 266 - ANS1820 - ANS1839v 267 - ANS1840 - ANS1859 268 - ANS1860 - ANS1879 269 - ANS1880 - ANS1899 270 - ANS1900 - ANS1919 271 - ANS1920 - ANS1939 272 - ANS1940 - ANS1959 273 - ANS1960 - ANS1979 274 - ANS2000 - ANS2019 275 - ANS2020 - ANS2039 276 - ANS2040 - ANS2059 277 - ANS2600 - ANS2619 278 - ANS2620 - ANS2639 279 - ANS3000 - ANS3019 280 - ANS4000 - ANS4019 281 - ANS4020 - ANS4039 282 - ANS4040 - ANS4059 283 - ANS4900 - ANS4919 284 - ANS4980 - ANS4999
Notice that each topic covers a range of message numbers. For example, to look up help information for message ANS1895I, you would select menu item 269 because ANS1895I is within the range of messages ANS1880 - ANS1899. This will display help information for all messages within that range. Use the navigation keys to move forward and backward through the information until you find the following text for message ANS1895I:
local filesystem. -----------------------------------------------------------------------ANS1895I Highest macro return code was return code value. Explanation: This message is issued after all commands in a client macro have completed. The return code represents the highest return code that was issued during processing of the macro. In order of increasing severity, the return code meanings are: 0 - The command completed successfully 4 - One or more files were skipped 8 - One or more warning messages were issued 12 - One or more error messages (except for skipped files) were issued System Action: None. User Response: For return codes other than 0, the user may wish to verify the results of the client operations and take diagnostic and repair actions, as necessary. u to scroll up, or d to scroll down: <<
260
The full help information will display more comprehensive information within the Windows help utility.
261
In this example, you would enter 67 to view information on the restore command. To view information for a message, use the d and u keys to navigate the menu until you see entries that appear like the following entries:
The following help topics are available. Enter the number of the desired help topic or q to quit, d to scroll down, u to scroll up. The following help topics are available. Enter the number of the desired help topic or q to quit, d to scroll down, u to scroll up. 266 - ANS1820 - ANS1839v 267 - ANS1840 - ANS1859 268 - ANS1860 - ANS1879 269 - ANS1880 - ANS1899 270 - ANS1900 - ANS1919 271 - ANS1920 - ANS1939 272 - ANS1940 - ANS1959 273 - ANS1960 - ANS1979 274 - ANS2000 - ANS2019 275 - ANS2020 - ANS2039 276 - ANS2040 - ANS2059 277 - ANS2600 - ANS2619 278 - ANS2620 - ANS2639 279 - ANS3000 - ANS3019 280 - ANS4000 - ANS4019 281 - ANS4020 - ANS4039 282 - ANS4040 - ANS4059 283 - ANS4900 - ANS4919 284 - ANS4980 - ANS4999
262
Notice that each topic covers a range of message numbers. For example, to look up help information for message ANS1895I, you would select menu item 269 because ANS1895I is within the range of messages ANS1880 - ANS1899. This will display help information for all messages within that range. Use the navigation keys to move forward and backward through the information until you find the following text for message ANS1895I:
local filesystem. -----------------------------------------------------------------------ANS1895I Highest macro return code was return code value. Explanation: This message is issued after all commands in a client macro have completed. The return code represents the highest return code that was issued during processing of the macro. In order of increasing severity, the return code meanings are: 0 - The command completed successfully 4 - One or more files were skipped 8 - One or more warning messages were issued 12 - One or more error messages (except for skipped files) were issued System Action: None. User Response: For return codes other than 0, the user may wish to verify the results of the client operations and take diagnostic and repair actions, as necessary. u to scroll up, or d to scroll down: <<
263
example, if the random port number that the publications CD chooses is 8423 (the port for the help system), then the Integrated Solutions Console help server will fail to start. 4. Try pointing your Web browser to http://<machine name>:8423. For example, http://workgroup.tucson.ibm.com:8423 would show the help system on workgroup.tucson.ibm.com. You should see the Integrated Solutions Console title on the top, left-hand corner of the screen. If you do not see that title, then some other help system or program is running on port 8423. Stop that application and restart the Integrated Solutions Console help server.
264
265
266
267
268
node. For example, it may be assigned to a domain that does not have any TYPE=ARCHIVE copy group destinations. If this node tries to archive data, it will fail.
Resolving a backup or copy problem that occurs only with a specific node
If you cannot backup or copy data to a specific node, you might not have an active data pool listed in your active destinations. These are specified in the nodes policy domain. Issue the QUERY NODE nodeName F=D command to verify that the node that is storing the data is authorized. The QUERY NODE command finds the policy domain name to which the node is assigned. Issue the QUERY DOMAIN domain_name where domain_name is the output gathered from the previous QUERY NODE command. Look in the ACTIVEDESTINATION parameter for the list of active data ports. If the active data pool into which you want to store data is not on the list, issue the UPDATE DOMAIN command to add the active data pool to the list.
Resolving a problem that occurs only when you use a specific drive to read or write to a volume
For sequential media volumes, does the error occur only when using a specific drive? If the error occurs only when using a specific drive, update that drive to be offline by issuing the UPDATE DRIVE libraryName driveName ONLINE=NO command. Then take the appropriate steps to correct the drive error, or else have the vendor for the drive, service the drive. After the drive is corrected, issue the UPDATE DRIVE libraryName driveName ONLINE=YES command to set the drive online again.
269
data using these messages, the problem is typically with the device, the connection to the device, or some other related issue outside of the Tivoli Storage Manager. Using the information reported in Tivoli Storage Manager message ANR8300, ANR8301, ANR8302, ANR8303, ANR8943, or ANR8944, refer to the Appendix C of the Tivoli Storage Manager Messages manual. This appendix documents information about standard errors that may be reported by any SCSI device. You can also use this information with documentation provided by the vendor for the hardware to help determine the cause and resolution for the problem.
ANR0542W Retrieve or restore failed for session sessionNumber for node nodeName - storage media inaccessible
Error message ANR0542W is often related to an issue with the drive or connection to the drive that was selected to read this tape volume. Perform the following steps to verify that the Tivoli Storage Manager can access this volume: v Issue the QUERY LIBVOL libraryName volumeName command. v For a 349X library, issue the mtlib -l /dev/lmcp0 -qV volumeName command. The device is typically /dev/lmcp0, but if it is different, then substitute the correct library manager control point device. The following are the possible steps to resolve this problem: 1. If mtlib does not report this volume, then it appears that this volume is out of the library. In this case, put the volume back into the library. 2. If the volume is not reported by QUERY LIBVOL, then the server does not know about this volume in the library. Issue the CHECKIN LIBVOL command to synchronize the library inventory in the server with the volumes that are actually in the tape library. 3. If both commands successfully report this volume, then the cause is likely a permanent or intermittent hardware error. This may be an error with the drive itself or an error with the connection to the drive. In either case, review the system error logs and contact the vendor of the hardware to resolve the problem.
270
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the users responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106-0032, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Copyright IBM Corp. 1993, 2007
271
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation 2Z4A/101 11400 Burnet Road Austin, TX 78758 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. All statements regarding IBMs future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information is for planning purposes only. The information herein is subject to change before the products described become available. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
272
Each copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows: IBM (2007). Portions of this code are derived from IBM Corp. Sample Programs. Copyright IBM Corp. 1993-2007. All rights reserved. If you are viewing this information softcopy, the photographs and color illustrations may not appear.
Notices
273
274
Glossary
The terms in this glossary are defined as they pertain to the IBM Tivoli Storage Manager library. If you do not find the term you need, refer to the IBM Software Glossary on the Web at this address: http://www.ibm.com/ibm/terminology/. This glossary may include terms and definitions from: v The American National Standard Dictionary for Information Systems, ANSI X3.172-1990, copyright (ANSI). Copies may be purchased from the American National Standards Institute, 11 West 42nd Street, New York 10036. v The Information Technology Vocabulary, developed by Subcommittee 1, Joint Technical Committee 1, of the International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC JTC2/SC1). term definition
275
276
Trademarks
Tivoli Storage Manager, the Tivoli Storage Manager logo and the following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: v AIX v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v AS/400 DB2 DFS DFSMS/MVS DFSMShsm DFSMSrmm DPI Enterprise Storage Server ESCON eServer FICON FlashCopy HACMP Informix iSeries Lotus Lotus 123 Lotus Approach Lotus Domino Lotus Notes Magstar MVS NetView OpenEdition OS/2 OS/390 OS/400 Passport Advantage pSeries RACF Rational Redbooks RS/6000 S/390 SANergy SecureWay
v StorageSmart v SystemView
Copyright IBM Corp. 1993, 2007
277
v v v v v v v
Tivoli Tivoli Enterprise Console Tivoli Management Environment TotalStorage TME VTAM WebSphere
v z/OS v zSeries v Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. v Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. v Microsoft, Windows Windows NT and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. v UNIX is a registered trademark of The Open Group in the United States and other countries. v Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others.
278
279
echo "then type quit, edit this script, and read the comments at the top" gdb -se $exe -c $core -x ./dsm_gdb.cmd >|dsm_gdb.info rm dsm_gdb.cmd # done with this now exit
280
Note: The tsmdiag utility is not installed with the Tivoli Storage Manager device driver, or with the Tivoli Storage Manager Management Console, but if these components are installed on the system where tsmdiag is running, tsmdiag will collect data for these components.
281
Where to find and how to use the Tivoli Storage Manager diagnostic utility
Tivoli Storage Manager V5.3, 5.4, and 5.5 are equipped with the tsmdiag utility, with supported Tivoli Storage Manager components found under the components install directory. The tsmdiag utility can be found in the following locations: v AIX: /usr/tivoli/tsm/server/bin/tsmdiag v Windows: C:\Program Files\Tivoli\TSM\server\tsmdiag v Linux: /opt/tivoli/tsm/server/bin/tsmdiag Usage:
tsmdiag [options]
-tcpserveraddress ipAddress
localhost
Examples:
./tsmdiag ./tsmdiag -v ./tsmdiag -id tsmadmin -pa pwd4u -results /home/tsmdiag/results_oct29
Note: For the Tivoli Storage Manager server environments on Unix, if you are running multiple servers on the same system, you must set the DSMSERV_DIR and DSMSERV_CONFIG environment variables. Failure to do this prevents tsmdiag from finding data for the desired server.
282
Each line in the configuration file consists of five fields, each separated by comma. A line that begins with an asterisk(*) is considered a comment and is ignored by the tsmdiag utility. The first field of a line in the configuration file denotes the operating system where tsmdiag will be run. Valid platforms are Linux, AIX, HP, SUN, and Windows. The second field in the line denotes an action. Valid actions are listed in the table below:
Action Name SYSCOMMAND COPY COMPCOMMAND REGISTRY Action Performed Run a command on the system. Copy a specified file. Run a command on a specified Tivoli Storage Manager component. Get the value for a given registry key. (Windows only.)
The third field denotes the Tivoli Storage Manager component (i.e. component for which tsmdiag will collect data). Valid components are: v v v v v v v SERVER STAGENT BACLIENT (Unix only) MGMTCONSOLE (Windows only) DEVDRIVER SYSTEM CLIENAPI (Unix only)
The fourth field denotes the data that the action will act upon. The data field can be a file name, a system command, a command for a Tivoli Storage Manager component, a registry key, and so on, depending on the action. The last field is optional and denotes the location of where the collected data is to be stored.
283
284
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
CAUTION: You can damage the system registry if you use regedit incorrectly. v For the 64-bit AIX server, issue the following from the command line: gsk7ver_64 See Table 17 for the GSKit SSL return codes. The Tivoli Storage Manager server uses the GSKit Key Management API to automatically create the key management database and Tivoli Storage Manager server private and public keys. Some messages issued for this processing might include GSKit Key Management return codes. See Table 18 on page 289 for the key management return codes.
Table 17. IBM Global Security Kit SSL general return codes Return code (hex) 0x00000000 Return code (decimal) Constant 0 GSK_OK Explanation The task completed successfully. Issued by every function call that completes successfully. The environment or Secure Sockets Layer (SSL) handle is not valid. The specified handle was not the result of a successful open() function call. The dynamic link library (DLL) was unloaded and is not available. (Occurs on Microsoft Windows systems only.) Internal error. Report this error to IBM Software Support. Insufficient memory is available to perform the operation.
0x00000001
GSK_INVALID_HANDLE
0x00000002
GSK_API_NOT_AVAILABLE
0x00000003 0x00000004
3 4
GSK_INTERNAL_ERROR GSK_INSUFFICIENT_STORAGE
285
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 17. IBM Global Security Kit SSL general return codes (continued) Return code (hex) 0x00000005 Return code (decimal) Constant 5 GSK_INVALID_STATE Explanation The handle is in an invalid state for operation, such as performing an init() operation on a handle twice. Specified key label not found in key file. Certificate not received from partner. Certificate validation error. Error processing cryptography. Error validating ASN fields in certificate. Error connecting to user registry. Internal error. Report this error to IBM Software Support. Internal error. Report this error to IBM Software Support. I/O error reading the key file. The key file has an invalid internal format. Recreate key file. The key file has two entries with the same key. The key file has two entries with the same label. The key file password is used as an integrity check. Either the key file has become corrupted or the password ID is incorrect. The default key in the key file has an expired certificate. An error occurred loading one of the GSK dynamic link libraries. Be sure GSK was installed correctly. Indicates that a connection is trying to be made in a GSK environment after the GSK_ENVIRONMENT_ CLOSE_OPTIONS was set to GSK_DELAYED_ ENVIRONMENT_CLOSE and gsk_environment_close() function was called. Neither the password nor the stash-file name was specified, so the key file could not be initialized. Unable to open the key file. Either the path was specified incorrectly or the file permissions did not allow the file to be opened. Unable to generate a temporary key pair. Report this error to IBM Software Support. A User Name object was specified that is not found.
0x00000006 0x00000007 0x00000008 0x00000009 0x0000000a 0x0000000b 0x0000000c 0x00000065 0x00000066 0x00000067 0x00000068 0x00000069 0x0000006a
GSK_KEY_LABEL_NOT_FOUND GSK_CERTIFICATE_NOT_AVAILABLE GSK_ERROR_CERT_VALIDATION GSK_ERROR_CRYPTO GSK_ERROR_ASN GSK_ERROR_LDAP GSK_ERROR_UNKNOWN_ERROR GSK_OPEN_CIPHER_ERROR GSK_KEYFILE_IO_ERROR GSK_KEYFILE_INVALID_FORMAT GSK_KEYFILE_DUPLICATE_KEY GSK_KEYFILE_DUPLICATE_LABEL GSK_BAD_FORMAT_OR_INVALID_PASSWORD
0x0000006b 0x0000006c
107 108
GSK_KEYFILE_CERT_EXPIRED GSK_ERROR_LOAD_GSKLIB
0x0000006d
109
GSK_PENDING_CLOSE_ERROR
0x000000c9
201
GSK_NO_KEYFILE_PASSWORD
0x000000ca
202
GSK_KEYRING_OPEN_ERROR
0x000000cb
203
GSK_RSA_TEMP_KEY_PAIR
0x000000cc
204
GSK_ERROR_LDAP_NO_SUCH_OBJECT
286
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 17. IBM Global Security Kit SSL general return codes (continued) Return code (hex) 0x000000cd 0x000000ce 0x000000cf 0x0000012d Return code (decimal) Constant 205 206 207 301 GSK_ERROR_LDAP_INVALID_CREDENTIALS GSK_ERROR_BAD_INDEX GSK_ERROR_FIPS_NOT_SUPPORTED GSK_CLOSE_FAILED Explanation A Password used for an LDAP query is not correct. An index into the Fail Over list of LDAP servers was not correct This installation of GSKit does not support FIPS mode of operation Indicates that the GSK environment close request was not properly handled. Cause is most likely due to a gsk_secure_socket*() command being attempted after a gsk_close_environment() call. The system date was set to an invalid value. Neither SSLv2 nor SSLv3 is enabled. The required certificate was not received from partner. The received certificate was formatted incorrectly. The received certificate type was not supported. An I/O error occurred on a data read or write operation. The specified label in the key file could not be found. The specified key file password is incorrect. The key file could not be used. The key file also might be corrupt. In a restricted cryptography environment, the key size is too long to be supported. An incorrectly formatted SSL message was received from the partner. The message authentication code (MAC) was not successfully verified. Unsupported SSL protocol or unsupported certificate type. The received certificate contained an incorrect signature. Incorrectly formatted certificate received from partner. Invalid SSL protocol received from partner. Report this error to IBM Software Support. The self-signed certificate is not valid. The read() failed. Report this error to IBM Software Support.
Appendix C. IBM Global Security Kit return codes
0x00000199 0x0000019a 0x0000019b 0x0000019c 0x0000019d 0x0000019e 0x0000019f 0x000001a0 0x000001a1 0x000001a2
409 410 411 412 413 414 415 416 417 418
GSK_ERROR_BAD_KEY_LEN_FOR_EXPORT GSK_ERROR_BAD_MESSAGE GSK_ERROR_BAD_MAC GSK_ERROR_UNSUPPORTED GSK_ERROR_BAD_CERT_SIG GSK_ERROR_BAD_CERT GSK_ERROR_BAD_PEER GSK_ERROR_PERMISSION_DENIED GSK_ERROR_SELF_SIGNED GSK_ERROR_NO_READ_FUNCTION
287
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 17. IBM Global Security Kit SSL general return codes (continued) Return code (hex) 0x000001a3 0x000001a4 0x000001a5 0x000001a6 0x000001a7 0x000001a8 0x000001a9 0x000001aa 0x000001ab 0x000001ac 0x000001ad 0x000001ae 0x000001af 0x000001b0 0x000001b1 0x000001b2 Return code (decimal) Constant 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 GSK_ERROR_NO_WRITE_FUNCTION GSK_ERROR_SOCKET_CLOSED GSK_ERROR_BAD_V2_CIPHER GSK_ERROR_BAD_V3_CIPHER GSK_ERROR_BAD_SEC_TYPE GSK_ERROR_BAD_SEC_TYPE_COMBINATION GSK_ERROR_HANDLE_CREATION_FAILED GSK_ERROR_INITIALIZATION_FAILED GSK_ERROR_LDAP_NOT_AVAILABLE GSK_ERROR_NO_PRIVATE_KEY GSK_ERROR_PKCS11_LIBRARY_NOTLOADED GSK_ERROR_PKCS11_TOKEN_LABELMISMATCH GSK_ERROR_PKCS11_TOKEN_NOTPRESENT GSK_ERROR_PKCS11_TOKEN_BADPASSWORD GSK_ERROR_INVALID_V2_HEADER GSK_CSP_OPEN_ERROR Explanation The write() failed. Report this error to IBM Software Support. The partner closed the socket before the protocol completed. The specified V2 cipher is not valid. The specified V3 cipher is not valid. Report this error to IBM Software Support. Report this error to IBM Software Support. The handle could not be created. Report this error to IBM Software Support. Initialization failed. Report this internal error to service. When validating a certificate, unable to access the specified user registry. The specified key did not contain a private key. A failed attempt was made to load the specified PKCS11 shared library. The PKCS #11 driver failed to find the token specified by the caller. A PKCS #11 token is not present in the slot. The password/pin to access the PKCS #11 token is invalid. The SSL header received was not a properly SSLv2 formatted header. Could not open the hardware-based cryptographic service provider. Either the CSP name is not specified correctly or a failed attempt was made to access the specified CSPs certificate store. Some conflicting attributes for SSL operation were defined. The Microsoft Crypto API is only supported on Microsoft Windows 2000 with Service Pack 2 applied. System is running in IPv6 mode without setting a PEERID. The buffer size is negative or zero. Used with nonblocking I/O. Refer to the nonblocking section for usage. SSLv3 is required for reset_cipher(), and the connection uses SSLv2. An invalid ID was specified for the gsk_secure_soc_misc() function call.
0x000001b3 0x000001b4
435 436
GSK_CSP_OPEN_ERROR GSK_CSP_OPEN_ERROR
288
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 17. IBM Global Security Kit SSL general return codes (continued) Return code (hex) 0x000002bd Return code (decimal) Constant 701 GSK_ATTRIBUTE_INVALID_ID Explanation The function call has an invalid ID. This also might be caused by specifying an environment handle when a handle for a SSL connection should be used. The attribute has a negative length, which is invalid. The enumeration value is invalid for the specified enumeration type. Invalid parameter list for replacing the SID cache routines. When setting a numeric attribute, the specified value is invalid for the specific attribute being set. Conflicting parameters were set for additional certificate validation The AES cryptographic algorithm is not supported. The PEERID does not have the correct length.
0x000002c2 0x000002c3 0x000002c4 0x000005dd 0x000005de 0x00000641 0x00000642 0x00000643 0x00000644 0x00000645
706 707 708 1501 1502 1601 1602 1603 1604 1605
GSK_CONFLICTING_VALIDATION_SETTING GSK_AES_UNSUPPORTED GSK_PEERID_LENGTH_ERROR GSK_SC_OK GSK_SC_CANCEL GSK_TRACE_STARTED GSK_TRACE_STOPPED GSK_TRACE_NOT_STARTED GSK_TRACE_ALREADY_STARTED GSK_TRACE_OPEN_FAILED
The trace started successfully. The trace stopped successfully. No trace file was previously started so it cannot be stopped. Trace file already started so it cannot be started again. Trace file cannot be opened. The first parameter of gsk_start_trace() must be a valid full path file name.
Table 18. IBM Global Security Kit key management return codes Return code (hex) 0x00000000 Return code (decimal) Constant 0 GSK_OK Explanation The task completed successfully. Issued by every function call that completes successfully. The environment or Secure Sockets Layer (SSL) handle is not valid. The specified handle was not the result of a successful open() function call. The dynamic link library (DLL) was unloaded and is not available. (Occurs on Microsoft Windows systems only.) Internal error. Report this error to IBM Software Support.
0x00000001
GSK_INVALID_HANDLE
0x00000002
GSK_API_NOT_AVAILABLE
0x00000003
GSK_INTERNAL_ERROR
289
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 18. IBM Global Security Kit key management return codes (continued) Return code (hex) 0x00000004 0x00000005 Return code (decimal) Constant 4 5 GSK_INSUFFICIENT_STORAGE GSK_INVALID_STATE Explanation Insufficient memory is available to perform the operation. The handle is in an invalid state for operation, such as performing an init() operation on a handle twice. Specified key label not found in key file. Certificate not received from partner. Certificate validation error. Error processing cryptography. Error validating ASN fields in certificate. Error connecting to user registry. Internal error. Report this error to IBM Software Support. Internal error. Report this error to IBM Software Support. I/O error reading the key file. The key file has an invalid internal format. Recreate key file. The key file has two entries with the same key. The key file has two entries with the same label. The key file password is used as an integrity check. Either the key file has become corrupted or the password ID is incorrect. The default key in the key file has an expired certificate. An error occurred loading one of the GSK dynamic link libraries. Be sure GSK was installed correctly. Indicates that a connection is trying to be made in a GSK environment after the GSK_ENVIRONMENT_ CLOSE_OPTIONS was set to GSK_DELAYED_ ENVIRONMENT_CLOSE and gsk_environment_close() function was called. Neither the password nor the stash-file name was specified, so the key file could not be initialized. Unable to open the key file. Either the path was specified incorrectly or the file permissions did not allow the file to be opened.
0x00000006 0x00000007 0x00000008 0x00000009 0x0000000a 0x0000000b 0x0000000c 0x00000065 0x00000066 0x00000067 0x00000068 0x00000069 0x0000006a
GSK_KEY_LABEL_NOT_FOUND GSK_CERTIFICATE_NOT_AVAILABLE GSK_ERROR_CERT_VALIDATION GSK_ERROR_CRYPTO GSK_ERROR_ASN GSK_ERROR_LDAP GSK_ERROR_UNKNOWN_ERROR GSK_OPEN_CIPHER_ERROR GSK_KEYFILE_IO_ERROR GSK_KEYFILE_INVALID_FORMAT GSK_KEYFILE_DUPLICATE_KEY GSK_KEYFILE_DUPLICATE_LABEL GSK_BAD_FORMAT_OR_INVALID_ PASSWORD
0x0000006b 0x0000006c
107 108
GSK_KEYFILE_CERT_EXPIRED GSK_ERROR_LOAD_GSKLIB
0x0000006d
109
GSK_PENDING_CLOSE_ERROR
0x000000c9
201
GSK_NO_KEYFILE_PASSWORD
0x000000ca
202
GSK_KEYRING_OPEN_ERROR
290
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 18. IBM Global Security Kit key management return codes (continued) Return code (hex) 0x000000cb Return code (decimal) Constant 203 GSK_RSA_TEMP_KEY_PAIR Explanation Unable to generate a temporary key pair. Report this error to IBM Software Support. A User Name object was specified that is not found. A Password used for an LDAP query is not correct. An index into the Fail Over list of LDAP servers was not correct This installation of GSKit does not support FIPS mode of operation Indicates that the GSK environment close request was not properly handled. Cause is most likely due to a gsk_secure_socket*() command being attempted after a gsk_close_environment() call. The system date was set to an invalid value. Neither SSLv2 nor SSLv3 is enabled. The required certificate was not received from partner. The received certificate was formatted incorrectly. The received certificate type was not supported. An I/O error occurred on a data read or write operation. The specified label in the key file could not be found.
GSK_ERROR_BAD_KEYFILE_PASSWORD The specified key file password is incorrect. The key file could not be used. The key file also might be corrupt. GSK_ERROR_BAD_KEY_LEN_ FOR_EXPORT GSK_ERROR_BAD_MESSAGE GSK_ERROR_BAD_MAC GSK_ERROR_UNSUPPORTED GSK_ERROR_BAD_CERT_SIG GSK_ERROR_BAD_CERT GSK_ERROR_BAD_PEER In a restricted cryptography environment, the key size is too long to be supported. An incorrectly formatted SSL message was received from the partner. The message authentication code (MAC) was not successfully verified. Unsupported SSL protocol or unsupported certificate type. The received certificate contained an incorrect signature. Incorrectly formatted certificate received from partner. Invalid SSL protocol received from partner.
291
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 18. IBM Global Security Kit key management return codes (continued) Return code (hex) 0x000001a0 0x000001a1 0x000001a2 0x000001a3 0x000001a4 0x000001a5 0x000001a6 0x000001a7 0x000001a8 0x000001a9 0x000001aa 0x000001ab 0x000001ac 0x000001ad 0x000001ae 0x000001af 0x000001b0 0x000001b1 0x000001b2 Return code (decimal) Constant 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 GSK_ERROR_PERMISSION_DENIED GSK_ERROR_SELF_SIGNED GSK_ERROR_NO_READ_FUNCTION GSK_ERROR_NO_WRITE_FUNCTION GSK_ERROR_SOCKET_CLOSED GSK_ERROR_BAD_V2_CIPHER GSK_ERROR_BAD_V3_CIPHER GSK_ERROR_BAD_SEC_TYPE GSK_ERROR_BAD_SEC_TYPE_ COMBINATION GSK_ERROR_HANDLE_CREATION_ FAILED GSK_ERROR_INITIALIZATION_FAILED GSK_ERROR_LDAP_NOT_AVAILABLE GSK_ERROR_NO_PRIVATE_KEY GSK_ERROR_PKCS11_LIBRARY_ NOTLOADED GSK_ERROR_PKCS11_TOKEN_ LABELMISMATH GSK_ERROR_PKCS11_TOKEN_ NOTPRESENT GSK_ERROR_PKCS11_TOKEN_ BADPASSWORD GSK_ERROR_INVALID_V2_HEADER GSK_CSP_OPEN_ERROR Explanation Report this error to IBM Software Support. The self-signed certificate is not valid. The read() failed. Report this error to IBM Software Support. The write() failed. Report this error to IBM Software Support. The partner closed the socket before the protocol completed. The specified V2 cipher is not valid. The specified V3 cipher is not valid. Report this error to IBM Software Support. Report this error to IBM Software Support. The handle could not be created. Report this error to IBM Software Support. Initialization failed. Report this internal error to service. When validating a certificate, unable to access the specified user registry. The specified key did not contain a private key. A failed attempt was made to load the specified PKCS11 shared library. The PKCS #11 driver failed to find the token specified by the caller. A PKCS #11 token is not present in the slot. The password/pin to access the PKCS #11 token is invalid. The SSL header received was not a properly SSLv2 formatted header. Could not open the hardware-based cryptographic service provider. Either the CSP name is not specified correctly or a failed attempt was made to access the specified CSPs certificate store. Some conflicting attributes for SSL operation were defined. The Microsoft Crypto API is only supported on Microsoft Windows 2000 with Service Pack 2 applied. System is running in IPv6 mode without setting a PEERID. The buffer size is negative or zero.
0x000001b3 0x000001b4
435 436
GSK_CSP_OPEN_ERROR GSK_CSP_OPEN_ERROR
0x000001b5 0x000001f5
437 501
GSK_CSP_OPEN_ERROR GSK_INVALID_BUFFER_SIZE
292
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Table 18. IBM Global Security Kit key management return codes (continued) Return code (hex) 0x000001f6 0x00000259 0x0000025a 0x000002bd Return code (decimal) Constant 502 601 602 701 GSK_WOULD_BLOCK GSK_ERROR_NOT_SSLV3 GSK_MISC_INVALID_ID GSK_ATTRIBUTE_INVALID_ID Explanation Used with nonblocking I/O. Refer to the nonblocking section for usage. SSLv3 is required for reset_cipher(), and the connection uses SSLv2. An invalid ID was specified for the gsk_secure_soc_misc() function call. The function call has an invalid ID. This also might be caused by specifying an environment handle when a handle for a SSL connection should be used. The attribute has a negative length, which is invalid. The enumeration value is invalid for the specified enumeration type.
GSK_ATTRIBUTE_INVALID_SID_CACHE Invalid parameter list for replacing the SID cache routines. GSK_ATTRIBUTE_INVALID_ NUMERIC_VALUE GSK_CONFLICTING_VALIDATION_ SETTING GSK_AES_UNSUPPORTED GSK_PEERID_LENGTH_ERROR GSK_SC_OK GSK_SC_CANCEL GSK_TRACE_STARTED GSK_TRACE_STOPPED GSK_TRACE_NOT_STARTED GSK_TRACE_ALREADY_STARTED GSK_TRACE_OPEN_FAILED The trace started successfully. The trace stopped successfully. No trace file was previously started so it cannot be stopped. Trace file already started so it cannot be started again. Trace file cannot be opened. The first parameter of gsk_start_trace() must be a valid full path file name. When setting a numeric attribute, the specified value is invalid for the specific attribute being set. Conflicting parameters were set for additional certificate validation The AES cryptographic algorithm is not supported. The PEERID does not have the correct length.
0x000002c2 0x000002c3 0x000002c4 0x000005dd 0x000005de 0x00000641 0x00000642 0x00000643 0x00000644 0x00000645
706 707 708 1501 1502 1601 1602 1603 1604 1605
293
294
Index A
accessibility features xviii administration center application error 97 blank pages 78 configuring the IP address 75 establishing a connection with the IBM Tivoli Storage Manager server 65 messages ANRW0089E 86 ANRW0090E 86 ANRW0126E 86 ANRW0127E 87 ANRW0128E 87 ANRW0129E 88 ANRW0130E 88 ANRW0131E 88 ANRW0132E 89 ANRW0209E 89 ANRW0212E 89 ANRW0213E 90 ANRW0221E 90 ANRW0257E 90 messages versus IBM Tivoli Storage Manager messages performance tuning suggestions 77 portlet is unavailable 97 problems with tutorials 75 support utility 99 task fails 91 check the server activity log 91 internal errors 92 portlets 91 wizard 91 task fails with message 85 trace 149 unable to access the server from a Web browser 80 advanced copy services DB2 creating DB2UDB transaction after backup 147 AIX JFS2 image backup 19 snapshot-based backup-archive 19 ALL_BACK client trace class 195 ALL_FILE client trace class 195 ALL_IMAGE client trace class 195 ALL_JBB client trace class 195 ALL_NAS client trace class 196 ALL_SESS client trace class 196 ALL_SNAPSHOT client trace class 196 ALL_WAS client trace class 196 ANRW0089E 86 ANRW0090E 86 ANRW0126E 86 Copyright IBM Corp. 1993, 2007 ANRW0127E 87 ANRW0128E 87 ANRW0129E 88 ANRW0130E 88 ANRW0131E 88 ANRW0132E 89 ANRW0209E 89 ANRW0212E 89 ANRW0213E 90 ANRW0221E 90 ANRW0257E 90 application programming interface (API) instrumentation 20 tracing 214 AUDIT client trace class 197
B
backup application files automatically excluded 12 files excluded by EXCLUDE DIR 13 files excluded by include/exclude statements 14 files excluded due to incremental copy frequency 15 include/exclude due to compression, encryption, and subfile backup statements 15 include/exclude statements coded wrong 16 platform-specific include/exclude statements 15 Windows files excluded 13 backup-archive client help 259 SHOW commands 33 CACHE 33 CLUSTER 33 DOMAIN 33 OPTIONS 33 OPTTABLE 34 PLUGINS 34 SESSION 34 SYSTEMSERVICES 34, 35 SYSTEMSTATE 35 TRACEFLAGS 35 VERSION 35 blank pages administration center 78
92
C
client authentication 7 can problem be reproduced 2 diagnostic tips 1 error messages examining 1 generating errors connected to the server 61 identifying when and where problems occur image backup 16 passwords 7 resolving problems 1
295
client (continued) scheduler 9 server activity log examining 1 trace classes 194, 205 ALL_BACK 195 ALL_FILE 195 ALL_IMAGE 195 ALL_JBB 195 ALL_NAS 196 ALL_SESS 196 ALL_SNAPSHOT 196 ALL_WAS 196 AUDIT 197 CLIENTTYPE 197 COMPRESS 197 DELTA 197 DIROPS 198 DOMAIN 198 ENCRYPT 198 ERROR 198 FILEOPS 199 FIOATTRIBS 199 INCLEXCL 199 INCR 199 MEMORY 200 NETWARE 200 OPTIONS 200 PASSWORD 200 PID 201 POLICY 201 SCHEDULER 201 SERVICE 202 SESSION 202 SESSVERB 202 SMS_DEBUG 203 SMS_DETAIL 202 STATS 203 THREAD_STATUS 203 TXN 203 VERBDETAIL 204 VERBINFO 204 WIN2K 204 client option sets 4 CLIENTTYPE client trace class 197 communication errors resolving 61 COMPRESS client trace class 197 compressed data during backup-archive customer support, contacting xvi
213
D
Daemon traceflags client and journal 194 data sent to the IBM Tivoli Storage Manager storage agent or server 22 data protection 101 Domino 101 DP for SAP files to gather before calling IBM 136 DP for Snapshot Devices for mySAP 103 files to gather before calling IBM 119 gathering information before calling IBM 118
data protection (continued) DP for Snapshot Devices for mySAP (continued) locating solutions 118 tracing 116 troubleshooting 103 Exchange 122 determining the problem 122 failing silent install 125 gathering files before calling IBM 124 locating solutions 123 tracing 123 Exchange with VSS backup/restore support 126 determining the issue 126 gathering files before calling IBM 129 gathering information before calling IBM 129 tracing when using VSS 128 troubleshooting 131 Oracle 120 gathering files 121 gathering information 121 locating solutions 120 tracing 120 SAP 132 information to gather before calling IBM 135 locating solutions 135 tracing 134 troubleshooting 132 SQL 136 gathering files before calling IBM 138 information to gather before calling IBM 137 items to gather if silent install fails 138 locating solutions 137 tracing the client 136 SQL with VSS backup/restore support 139 determining the issue 139 gathering files before calling IBM 143 gathering information before calling IBM 142 tracing when using VSS 141 troubleshooting 144 data storage diagnostic tips 267 debug print output obtaining 28 DELTA client trace class 197 device driver 64-bit/32-bit Linux kernel modules 218 Adaptec SCSI requirements 221 error messages in the system error log 218 HBA changes 218 HBA drivers on the Linux 2.6.x kernels 219 Linux server running on x86_64 architecture 219 loose cable connection 218 multiple LUN support on Linux kernels 219 operating system changes 217 performing ddtrace from version 5.3.2 on Linux 220 Qlogic fibre-channel HBA BIOS requirements 221 SCSI adapter changes 218 updating device information 220 device driver trace from a command shell - all platforms 193 from the server console/admin client 191 diagnostic tips client 1 data storage 267 DIROPS client trace class 198
296
documentation to resolve client problems 2 DOMAIN client trace class 198 Domino data protection client files to gather 102 information to gather 102 locating solutions 101 tracing 101 dsmc/dsmadmc/dsmj/ no start 3
E
education see Tivoli technical training xv ENCRYPT client trace class 198 encrypted data during backup-archive 213 ERROR client trace class 198 error messages examining 1 establishing a connection with the IBM Tivoli Storage Manager server 65
help system (continued) starting/stopping 264 Windows NT 263 hints and tips device driver 217 disk subsystems 221 hard disk drives 221 miscellaneous server information 224 NDMP filer-to-Tivoli Storage Manager server operations 229 SAN 225 SAN configuration 225 SAN device mapping 232 tape drives and libraries 223 adapter firmware changes 223 cabling between the computer and device changes device driver changes 223 device firmware changes 223 error messages in system error log 224 loose cable connections 224 operating system changes 223 other hardware changed or fixed 224 replaced adapter 224
223
I
IBM Global Security Kit key management return codes 289 return codes 285 IBM Software Support submitting a problem xvii IBM Support Assistant xv image backup client 16 error 17, 18 INCLEXCL client trace class 199 INCLEXCL option 4 INCR client trace class 199 installation failure IBM Tivoli Storage Manager 67 Integrated Solutions Console 67 Integrated Solutions Console authority problems 69 excessive memory consumption 73 installation failure 67 manually uninstalling 67 server crash 71 collector tool 71 log analyzer tool 72 Internet, search for problem resolution xv Internet, searching for problem resolution xvi IP address configuring 75
F
FILEOPS client trace class 199 FIOATTRIBS client trace class 199 fixes, obtaining xvi
G
GSKit return codes gt script 279 285
H
health monitor 81 how it works 81 re-synchronizing the ADMIN_CENTER administrator ID password 84 warning or critical database status 83 warning or critical storage status 83 help server or storage agent 261 system does not display 263 help facilities 259 help system adding publications to the ISC help server 265 CLI for server or storage agent 261 commands 262 dsmcutil 263 GUI and Web GUI clients 261 installation issues 264 reporting a problem 265 running 263 server or storage agent commands 261 messages 261
J
JBB 25, 27 database viewing utility 27 journal-based backup database viewing utility 27 determining 25 running in foreground 27
Index
297
K
knowledge bases, searching xv
L
LAN-free setup storage agent 175 Linux image backup error 17 Linux Snapshot image backup error 18 log files installation 73 LVSA examining Windows system event log forcing a dump 29 full memory dump 29 problem determination 28
28
PID client trace class 201 POLICY client trace class 201 portlets errors caused by starting or stopping 91 problem determination describing problem for IBM Software Support xvii determining business impact for IBM Software Support xvii submitting a problem to IBM Software xvii publications download xi order xi search xi Tivoli Storage Manager xi
M
MEMORY client trace class 200 message definitions IBM Tivoli Storage Manager 94 Microsoft diagnostic information VSS 31 Microsoft tuning recommendations VSS 31
R
red error messages administration center 97
S
SAN configuration 238 configuration between devices 228 configuration problems 240 devices supported 226 fibre channel switch configuration 227 gateway port settings 228 host bus adapter configuration 226 host bus adapters 226 monitoring fibre-channel link error report 229 vendor support 240 SAN device mapping 234 ANR1745I 234 disabling 233 discovery 240 error detecting version of HBA-API library 244 fileset not at required level 244 HBAAPI library 241 vendor library failed to load or is missing 242 wrapper library failed to load 241 missing from the display of QUERY SAN 238 no match found using this criteria 243 SAN discovery failed 241 SAN discovery is disabled 243 SAN discovery not supported 242 target mapping 241 SAN devices storage agent 230 SCHEDULER client trace class 201 SCSI devices 269 secure sockets layer 62 general return codes 285 sequential media volume tape 270 server database 42 diagnostic tips 37 change server options or the settings create errors 38 checking HELP messages 37 checking the server activity log 37
N
NETWARE client trace class 200 non-root user running applications using API ntbackup.exe 32 23
O
odbc application problems 251 data source configuration 250 registry settings 253 ODBC configuration details 251 data sources 246 driver tracing 215 installation files 252 known problems and limitations troubleshooting 250 ODBC driver 245 supported applications 245 supported functions 245 open file support best practices 30 problem determination 28 OPTIONS client trace class 200
248
P
PASSWORD client trace class 200 performance tuning suggestions administration center 77
298
server (continued) diagnostic tips (continued) failing a scheduled client operation 38 recreating the problem 37 resolving errors from reading or writing to a device 37 resolving failed connections by client or administrators 61 resolving server space issues 38 server error messages indicate code page conversion failure 38 hang or loop errors 44 process 46 process messages 51 processes AUDIT VOLUME 47 BACKUP DB 47 BACKUP STGPOOL 47 CHECKIN LIBVOLUME 48 CHECKOUT LIBVOLUME 48 EXPIRATION 48 IMPORT 48 LABEL LIBVOLUME 49 MIGRATION 49 MOVE DATA 49 MOVE DRMEDIA 49, 50 MOVE NODEDATA 50 PREPARE 50 RECLAMATION 50 RESTORE STGPOOL 51 RESTORE VOLUME 51 recovery log 45 storage pool 57 server activity log checking 91 server command definition file 96 server crash 39 server or storage agent SHOW commands AGGREGATE 178 ASQUEUED 179 ASVOL 179 BFOBJECT 179 BUFSTATS 180 BUFVARS 180 CONFIGURATION 180 DBTXNTABLE 181 DBVARS 181 DEVCLASS 181 GROUPLEADERS 181 GROUPMEMBERS 182 INVOBJECT 182 LANFREE 183 LIBINVENTORY 183 LIBRARY 183 LOCK 184 LOGPINNED 184 LOGVARS 184 MEMTREND 185 MP 185 NASDEV 185 NASFS 186 NASINFORMATION 186 NASWORKLOAD 186 RESQUEUE 187 SESSIONS 187 SLOTS 187 SSPOOL 188
server or storage agent (continued) SHOW commands (continued) THREADS 188, 189 TOCSETS 189 TXNTABLE 190 VALIDATE LANFREE 190 VERIFYEXPTABLE 190 VOLINUSE 191 trace class ACTIONS 150 ADDMSG 157 ADMCMD 158 AF 158 AFCREATE 158 AFMOVE 158 ALL 150 API 150 AS 158 ASALLOC 159 ASDEALLOC 159 ASMOUNT 159 ASRTRV 159 ASSD 160 ASTXN 160 ASVOL 160 BF 160 BFAGGR 161 BFCREATE 161 BFREMOTE 161 BFRTRV 161 BKSET/OBJSET 162 BLKDISK 162 BRNODE 162 COLLOCATE 162 CONTROL 150 CRC 163 CRCDATA 163 CRCPROTO 163 CRCVAL 163 CRYPTO 164 DBNETDB 164 DELTA/GROUP 164 DF 164 DFCREATE 165 DFMOVE 165 DFRTRV 165 DS 165 DSALLOC 166 DSDEALLOC 166 DSRTRV 166 DSVOL 166 HEALTH 151 ICVOLHST 166 IMFS 167 LANFREE 167 MMS 167 NA 167 PROXYNODE 168 PS 151 PVR 168 RETPROT 168 SCHED 169 SESSION 169 SESSREMOTE 169 SHRED 170 SNAPIN 151 SPI/SPID 170 Index
299
server or storage agent (continued) trace class (continued) SSLDATA 170 SSLINFO 171 TAGLIB 151 TAPE 171 TEC 172 TOC 172 TOCBUILD 172 TOCLOAD 173 TOCREAD 173 TOCUTIL 173 TPC 171 TPCDATA 171 TPCINFO 172 UNICODE 173 UTIL 151 VIEWS 152 XIDETAIL 174 XMLVALS 152 trace classes 154 SERVICE client trace class 202 SESSION client trace class 202 SESSVERB client trace class 202 SHOW commands server or storage agent 178 SMS_DEBUG client trace class 203 SMS_DETAIL client trace class 202 Software Support contacting xvi describing problem for IBM Software Support xvii determining business impact for IBM Software Support xvii SSL 62 stack trace server or storage agent 153 STATS client trace class 203 storage agent diagnostic tips 174 check HELP for messages 174 check the server activity log 174 error caused by reading or writing to a device 174 problems caused by changing server options 175 problems from changing storage agent options 175 LAN-free setup 175 data sent directly to server 175 SHOW LAN-free and VALIDATE LAN-free 177 storage pool configured for simultaneous write 176 testing LAN-free configuration 178 z/OS session failed 176 SAN devices 230 support for API 20 before calling IBM files to gather 21 information to gather 20 support information xv
THREAD_STATUS client trace class 203 Tivoli technical training xv trace administration center 149 client 205 device driver 191 enable client trace on command line 205 enable client trace while client is running 206 known problems and limitations 210 options 211 server or storage agent 152 trace classes administration center 150 client 194 server or storage agent 154 trace data is it compressed during backup-archive 213 is it encrypted during backup-archive 213 tracing application programming interface (API) 214 client 193 trademarks 277 training, Tivoli technical xv transient errors VSS 30 tsmdiag utility 281 TXN client trace class 203
V
VERBDETAIL client trace class 204 VERBINFO client trace class 204 Volume Shadow Copy Services Windows 30 vsreq.exe sample program 32 VSS Microsoft diagnostic information 31 Microsoft tuning recommendations 31 ntbackup.exe 32 test flags 30 transient errors 30 vsreq.exe sample program 32 Windows 30 Windows hot fixes 31
W
WIN2K client trace class 204 Windows VSS 30 Windows hot fixes VSS 31 wizards errors caused by starting or stopping
91
T
test flags VSS 30
300
Program Number: 5608-ISM 5608-ISX 5608-ACS 5608-APD 5608-APE 5608-APH 5608-APR 5608-APW 5608-CSS 5608-HSM 5608-SAN 5698-A11 5698-A12 5698-A13
5698-A25 5698-USS
Printed in USA
SC32-0142-01
Spine information:
Version 5.5