摘要:
In one embodiment, a method for handling an error message includes interrogating an error message issued by a computing system to determine that the error message includes more than an alarm message, determining a message identifier relating to the error message, comparing the message identifier to entries in a database to determine an entry in the database that includes the message identifier, and outputting a set of documentation referenced by the entry in the database which includes the message identifier. In another embodiment, the database includes a plurality of searchable entries, each entry including: a message identifier, a product identifier, a set of documentation, and a set of actions. The set of documentation includes documents for the computing system to output and the set of actions includes actions for the computing system to perform. Other methods, systems, and computer program products are also described according to various embodiments.
摘要:
Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or write request, to access the file. A second write request is received while the first request maintains the lock. A temporary file associated with the file for the second write request is created. The second write request is controlled to write to the temporary file while the lock is held by the first request. In response to completing the first request, the lock is granted to the second write request to write the data in the temporary file to the file.
摘要:
A method for automatically optimizing an allocation amount for a data set includes receiving an extend request, specifying an allocation amount, for a data set in a storage pool. The method increments a counter in response to receiving the extend request. In the event the counter has reached a threshold value, the method automatically increases the allocation amount of the extend request, such as by multiplying the allocation amount by a multiplier. In the event the allocation amount is larger than a largest free extent in the storage pool, the method automatically decreases the allocation amount of the extend request to correspond to the largest available free extent. Such a method reduces or eliminates the chance that an extend request will fail, and reduces overhead associated with extending and consolidating extents. A corresponding apparatus and computer program product are also disclosed herein.
摘要:
A method for reorganizing a catalog to improve I/O performance includes initially placing a shared lock on a source catalog. The method then makes a point-in-time copy of the source catalog to generate a target catalog. Once the target catalog is generated, the method reorganizes the contents of the target catalog. Optionally, while reorganizing the contents of the target catalog, the method temporarily releases the shared lock on the source catalog and mirrors I/O intended for the source catalog to a buffer. The buffered I/O may then be used to update the target catalog to bring it current with the source catalog. When the target catalog is reorganized and up-to-date, the method upgrades the shared lock on the source catalog to an exclusive lock, overwrites the source catalog with the target catalog, and releases the exclusive lock. A corresponding apparatus and computer program product are also disclosed and claimed herein.
摘要:
Method, system, and computer program embodiments for reducing deadlock in multi-system computing environments are provided. A set of default, current wait times is initialized for resource requests of each of a plurality of resources. A plurality of resource holders and resource waiters is monitored within an address space. If one resource holder of the plurality of resource holders of one of the plurality of resources is determined to be one resource waiter on another of the plurality of resources, a current wait time for the one resource holder is incremented and a deadlock indicator for both the one resource holder and the one resource waiter is activated. Following expiration of a predefined interval, the plurality of resource holders and resource waiters are parsed through to determine an original resource holder, indicating a system deadlock. The resource holder associated with the system deadlock having a lowest current wait time is restarted.
摘要:
A method, system and computer-usable medium are disclosed for managing an integrated catalog facility (ICF) catalog. An ICF catalog is monitored by a contention detection module. Information related to a detected catalog resource contention is used by the contention detection module to generate a contention event. Information related to the contention event is then provided to a contention resolution module, which uses the information to perform a contention resolution operation. Once the resolution operation has been performed, contention events and contention resolution operations are reported by a contention reporting module.
摘要:
A technique for operating a storage system includes determining, based on a response (e.g., return and reason codes from catalog services) from a storage operating system, that a desired user catalog is unavailable for storage of a new dataset. A new user catalog is then dynamically created, when the desired user catalog is unavailable. An alias entry in a master catalog is then updated to point to the new user catalog, when the desired user catalog is unavailable.
摘要:
Methods, data structures and systems provide organize a table of contents for a volume (VTOC) stored in a storage system. The volume is divided into a plurality of ranges of tracks, including a first track range. For each track range, an associated sub-VTOC is created containing information about the contents of the track range. A master VTOC is also created containing a plurality of pointers, each pointer pointing to one of the plurality of sub-VTOCs. A first data set stored on one or more tracks within the first track range is updated and the sub-VTOC associated with the first track range is locked, whereby access to other sub-VTOCs is unaffected. The sub-VTOC associated with the first track range may then be accessed, updated and unlocked. Thus, updating data sets stored within different track ranges on the volume may proceed at the same time.
摘要:
A method is provided for isolating errors which occur when code supplied by independent software vendors (ISV code) interacts with code supplied by a primary vendor (host code). Code suspected of containing ISV code with host code is executed. If the results are in error, the code is scanned and then compared with a master host code. Any differences are stored in a delta file, including locations in the host code where ISV code hooks into the host code. The code is then modified to by-pass the hooks to ISV code to generate a side-executable code and both codes are executed and the results are compared. A lack of substantial difference in the results is indicative that the ISV code adversely affects the host code while a difference between the results is indicative of an error in the modified code.
摘要:
Providing a computer program product, system, and method for logging updates to monitored data sets in a storage. A request is received to monitor changes to a monitored data set comprising one of the data sets in the storage. A determination is made of tracks in the storage in which the data set is stored. The determined tracks are indicated in monitored tracks. Updates to the storage are received and a determination is made as to whether the updates are for the monitored tracks. The updates are logged in response to determining that updates are for the monitored tracks. A determination is made of new tracks added to the monitored data set and the determined new tracks are indicated in the monitored tracks.