摘要:
A method, system and computer-usable medium are disclosed for managing an integrated catalog facility (ICF) catalog. An ICF catalog is monitored by a contention detection module. Information related to a detected catalog resource contention is used by the contention detection module to generate a contention event. Information related to the contention event is then provided to a contention resolution module, which uses the information to perform a contention resolution operation. Once the resolution operation has been performed, contention events and contention resolution operations are reported by a contention reporting module.
摘要:
A technique for operating a storage system includes determining, based on a response (e.g., return and reason codes from catalog services) from a storage operating system, that a desired user catalog is unavailable for storage of a new dataset. A new user catalog is then dynamically created, when the desired user catalog is unavailable. An alias entry in a master catalog is then updated to point to the new user catalog, when the desired user catalog is unavailable.
摘要:
Methods, data structures and systems provide organize a table of contents for a volume (VTOC) stored in a storage system. The volume is divided into a plurality of ranges of tracks, including a first track range. For each track range, an associated sub-VTOC is created containing information about the contents of the track range. A master VTOC is also created containing a plurality of pointers, each pointer pointing to one of the plurality of sub-VTOCs. A first data set stored on one or more tracks within the first track range is updated and the sub-VTOC associated with the first track range is locked, whereby access to other sub-VTOCs is unaffected. The sub-VTOC associated with the first track range may then be accessed, updated and unlocked. Thus, updating data sets stored within different track ranges on the volume may proceed at the same time.
摘要:
A method is provided for isolating errors which occur when code supplied by independent software vendors (ISV code) interacts with code supplied by a primary vendor (host code). Code suspected of containing ISV code with host code is executed. If the results are in error, the code is scanned and then compared with a master host code. Any differences are stored in a delta file, including locations in the host code where ISV code hooks into the host code. The code is then modified to by-pass the hooks to ISV code to generate a side-executable code and both codes are executed and the results are compared. A lack of substantial difference in the results is indicative that the ISV code adversely affects the host code while a difference between the results is indicative of an error in the modified code.
摘要:
Provided are a computer program product, system, and method for modifying memory space allocation for inactive tasks. Information is maintained on computational resources consumed by tasks running in the computer system allocated memory space in the memory. The information on the computational resources consumed by the tasks is used to determine inactive tasks of the tasks. The allocation of the memory space allocated to at least one of the determined inactive tasks is modified.
摘要:
Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or write request, to access the file. A second write request is received while the first request maintains the lock. A temporary file associated with the file for the second write request is created. The second write request is controlled to write to the temporary file while the lock is held by the first request. In response to completing the first request, the lock is granted to the second write request to write the data in the temporary file to the file.
摘要:
Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.
摘要:
Providing a computer program product, system, and method for logging updates to monitored data sets in a storage. A request is received to monitor changes to a monitored data set comprising one of the data sets in the storage. A determination is made of tracks in the storage in which the data set is stored. The determined tracks are indicated in monitored tracks. Updates to the storage are received and a determination is made as to whether the updates are for the monitored tracks. The updates are logged in response to determining that updates are for the monitored tracks. A determination is made of new tracks added to the monitored data set and the determined new tracks are indicated in the monitored tracks.
摘要:
According to one embodiment, a test system includes a data collection module adapted for collecting data from a test system, a storage module adapted for storing the collected data in an organized format, the data including problem data, associated configuration information, associated performance information, and activity data, an analysis module adapted for analyzing the collected data to define at least two activity zones by correlating the problem data, the associated configuration information, the associated performance information, and the activity data, the at least two activity zones including a safe zone where the test system operates normally and a danger zone where the test system is susceptible to operational problems, and an adjustment module adapted for adjusting available resources and/or workload of the test system to cause the test system to operate in the danger zone thereby increasing a likelihood of fault occurrence for testing purposes.
摘要:
In one embodiment, a system includes a critical partitioned dataset extended (PDSE) stored to memory of the system; logic adapted for protecting the critical PDSE by creating a copy of the critical PDSE, referred to as a PDSE copy; logic adapted for providing a critical dataset redundancy (CDR) task with exclusive access to the PDSE copy; logic adapted for providing a replacement critical PDSE by redirecting corralled connections to the PDSE copy; logic adapted for protecting the replacement critical PDSE by creating a copy of the replacement critical PDSE, referred to as a replacement PDSE copy; and logic adapted for providing the CDR task with exclusive access to the replacement PDSE copy.