摘要:
According to one embodiment, a system includes logic adapted to: receive a request to open an existing data set indicating a write operation, receive new data to write to the existing data set, determine that the existing data set is stored on a lower tier of a tiered data storage system, determine that the existing data set is capable of being updated by appending the new data to an end of the existing data set, create a temporary data set on a higher tier of the tiered data storage system comprising the new data, associate the temporary data set on the higher tier of the tiered data storage system with the existing data set on the lower tier of the tiered data storage system, and create a write indicator associated with the new data set indicating that the new data set belongs at the end of the existing data set.
摘要:
A documentation inventory manager which assigns a protection key to each piece of documentation that is received. More specifically, when providing information to a receiving company, a client provides their files to a common FTP server. As a support team of the receiving company accesses the files and stores some or all of the files to a local storage system, the files are modified to include an imbedded header record. In certain embodiments, the imbedded header record includes information regarding an original file name sent by the client, a key value that is assigned to that version of the downloaded file, permissions such as whether the file can be copied, and the inventory manager location. Each time a version of the file is downloaded to a different location within the receiving company, that file name, location, and new unique key is updated in the documentation inventory manager.
摘要:
An approach to providing auto recovery of data sets in volumes. When an error condition results from an attempt to access an unintentionally deleted data set, an event is generated and sent to other systems with access to the volume in which the data set existed. The volume is also locked to prevent corruption during the recovery process. A system that has the unintentionally deleted data set open retrieves location information for the data set from control blocks in the system's memory. This location information is used to build a new entry for the data set in the VTOC for the volume. When the data set is thus recovered, the data set is validated, the lock removed, and the data set is made available to the systems sharing the volume.
摘要:
A detection module selects logically adjacent first and second control areas of a cluster. The detection module further determines that the first and second control areas satisfy a migration test wherein the first control area has free space exceeding a free threshold, the free space is at least equal to a space requirement for each second control area control interval, and the second control area has fewer control intervals than a control interval threshold. In addition, a copy module copies each second control area control interval to the first control area in response to determining that the first and second control areas satisfy the migration test.
摘要:
A method for addressing an out-of-space condition for a VSAM Volume Data Set (VVDS) includes detecting an out-of-space condition in a VVDS on a volume. The method creates, in response to the out-of-space condition, a new VVDS on the volume without adding a record to the old VVDS (e.g., by bypassing “catalog services”). The new VVDS is assigned a temporary name. The method then copies records from the old VVDS to the new VVDS. The method may then rename the old VVDS to a temporary name and rename the new VVDS to the original name of the old VVDS. The old VVDS may then be deleted. Alternatively, instead of renaming the old VVDS to a temporary name, the old VVDS may be deleted. The new VVDS may then be renamed to the original name of the old VVDS. A corresponding apparatus and computer program product are also described.
摘要:
Provided are a computer program product, system, and method for a data set connection manager having a plurality of data sets to represent one data set. A request is processed to open a connection to a data set having members, wherein the connection is used to perform read and write requests to the members in the data set. In response to establishing the connection, establishing for the connection a primary data set having all the members; a secondary data set to which updated members in the primary data set are written; and a pending delete data set to pending delete members comprising members that are updated.
摘要:
In one embodiment, a method for handling an error message includes interrogating an error message issued by a computing system to determine that the error message includes more than an alarm message, determining a message identifier relating to the error message, comparing the message identifier to entries in a database to determine an entry in the database that includes the message identifier, and outputting a set of documentation referenced by the entry in the database which includes the message identifier. In another embodiment, the database includes a plurality of searchable entries, each entry including: a message identifier, a product identifier, a set of documentation, and a set of actions. The set of documentation includes documents for the computing system to output and the set of actions includes actions for the computing system to perform. Other methods, systems, and computer program products are also described according to various embodiments.
摘要:
A method for identifying records of variable length within a data block containing corrupted data is disclosed herein. In certain embodiments, such a method may include scanning backward from an end of a data block containing variable-length records. The backward scan may proceed, one record at a time, to identify a first span of good (i.e., non-corrupt) records. The method may further include scanning forward from a front of the data block, also proceeding one record at a time, to identify a second span of good records. The method may include identifying a problem region by identifying data that resides between the first span and the second span. The method may also include creating a new record between the first span and the second span that contains the problem region. A corresponding computer program product, apparatus, and system are also disclosed.
摘要:
An apparatus, method, and computer program product to dynamically optimize a backup window for a data store is disclosed herein. In one embodiment, an apparatus may include tracking module, a determination module, a window module, and a backup module. The tracking module may track usage of a data store over a period of time. A determination module may determine a period of minimal usage associated with the data store. The determination module may also determine an expected backup duration for the data store. Once the expected backup duration and period of minimal usage are known, a window module may calculate an optimal backup window for the data store. A backup module may then backup the data store during the backup window.
摘要:
A technique for operating a storage system includes determining utilization of multiple storage volumes over a time period. One or more application datasets are then reassigned to a different one of the multiple storage volumes based on the utilization of the multiple storage volumes over the time period and a requested performance level for an associated application.