摘要:
Provided are a computer program product, system, and method for preemptively allocating extents to a data set in a storage system. A data set is comprised of a plurality of extents configured in at least one volume in the storage system. A first extent is allocated to the data set in a first volume to extend the data set. A determination is made as to whether a second extent can be allocated to the data set in the first volume in response to the allocating of the first extent. The second extent in a second volume is allocated for the data set in response to determining that the second extent cannot be allocated to the data set in the first volume.
摘要:
In one embodiment, a method for handling an error message includes interrogating an error message issued by a computing system to determine that the error message includes more than an alarm message, determining a message identifier relating to the error message, comparing the message identifier to entries in a database to determine an entry in the database that includes the message identifier, and outputting a set of documentation referenced by the entry in the database which includes the message identifier. In another embodiment, the database includes a plurality of searchable entries, each entry including: a message identifier, a product identifier, a set of documentation, and a set of actions. The set of documentation includes documents for the computing system to output and the set of actions includes actions for the computing system to perform. Other methods, systems, and computer program products are also described according to various embodiments.
摘要:
Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or write request, to access the file. A second write request is received while the first request maintains the lock. A temporary file associated with the file for the second write request is created. The second write request is controlled to write to the temporary file while the lock is held by the first request. In response to completing the first request, the lock is granted to the second write request to write the data in the temporary file to the file.
摘要:
A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted.
摘要:
A method for automatically optimizing an allocation amount for a data set includes receiving an extend request, specifying an allocation amount, for a data set in a storage pool. The method increments a counter in response to receiving the extend request. In the event the counter has reached a threshold value, the method automatically increases the allocation amount of the extend request, such as by multiplying the allocation amount by a multiplier. In the event the allocation amount is larger than a largest free extent in the storage pool, the method automatically decreases the allocation amount of the extend request to correspond to the largest available free extent. Such a method reduces or eliminates the chance that an extend request will fail, and reduces overhead associated with extending and consolidating extents. A corresponding apparatus and computer program product are also disclosed herein.
摘要:
A method for reorganizing a catalog to improve I/O performance includes initially placing a shared lock on a source catalog. The method then makes a point-in-time copy of the source catalog to generate a target catalog. Once the target catalog is generated, the method reorganizes the contents of the target catalog. Optionally, while reorganizing the contents of the target catalog, the method temporarily releases the shared lock on the source catalog and mirrors I/O intended for the source catalog to a buffer. The buffered I/O may then be used to update the target catalog to bring it current with the source catalog. When the target catalog is reorganized and up-to-date, the method upgrades the shared lock on the source catalog to an exclusive lock, overwrites the source catalog with the target catalog, and releases the exclusive lock. A corresponding apparatus and computer program product are also disclosed and claimed herein.
摘要:
Method, system, and computer program embodiments for reducing deadlock in multi-system computing environments are provided. A set of default, current wait times is initialized for resource requests of each of a plurality of resources. A plurality of resource holders and resource waiters is monitored within an address space. If one resource holder of the plurality of resource holders of one of the plurality of resources is determined to be one resource waiter on another of the plurality of resources, a current wait time for the one resource holder is incremented and a deadlock indicator for both the one resource holder and the one resource waiter is activated. Following expiration of a predefined interval, the plurality of resource holders and resource waiters are parsed through to determine an original resource holder, indicating a system deadlock. The resource holder associated with the system deadlock having a lowest current wait time is restarted.
摘要:
A method, system and computer-usable medium are disclosed for managing an integrated catalog facility (ICF) catalog. An ICF catalog is monitored by a contention detection module. Information related to a detected catalog resource contention is used by the contention detection module to generate a contention event. Information related to the contention event is then provided to a contention resolution module, which uses the information to perform a contention resolution operation. Once the resolution operation has been performed, contention events and contention resolution operations are reported by a contention reporting module.
摘要:
A technique for operating a storage system includes determining, based on a response (e.g., return and reason codes from catalog services) from a storage operating system, that a desired user catalog is unavailable for storage of a new dataset. A new user catalog is then dynamically created, when the desired user catalog is unavailable. An alias entry in a master catalog is then updated to point to the new user catalog, when the desired user catalog is unavailable.
摘要:
Methods, data structures and systems provide organize a table of contents for a volume (VTOC) stored in a storage system. The volume is divided into a plurality of ranges of tracks, including a first track range. For each track range, an associated sub-VTOC is created containing information about the contents of the track range. A master VTOC is also created containing a plurality of pointers, each pointer pointing to one of the plurality of sub-VTOCs. A first data set stored on one or more tracks within the first track range is updated and the sub-VTOC associated with the first track range is locked, whereby access to other sub-VTOCs is unaffected. The sub-VTOC associated with the first track range may then be accessed, updated and unlocked. Thus, updating data sets stored within different track ranges on the volume may proceed at the same time.