摘要:
Computer systems and computer program products for automating tasks in a computing environment are provided. In one such embodiment, by way of example only, if an instant task is not found in one of list of included tasks and a list of excluded tasks, at least one of the following is performed: the instant task is compared the with previous instances of the task, if any; the instant task is analyzed, including an input/output (I/O) sequence for the instant task, to determine if the instant task is similar to an existing task; and the instant task is considered as a possible candidate for automation. If the instant task is determined to be an automation candidate, the instant task is added to the list of included tasks, otherwise the instant task is added to the list of excluded tasks.
摘要:
For managing a data set volume table of contents, a management module creates a data set volume table of contents (DSVTOC) for a data set residing on a volume. The DSVTOC resides in a virtual storage access method (VSAM) system and includes a DSVTOC index, DSVTOC cluster data, and DSVTOC data for the data set. A copy module maintains a copy of the DSVTOC on the volume.
摘要:
An approach to providing auto recovery of data sets in volumes. When an error condition results from an attempt to access an unintentionally deleted data set, an event is generated and sent to other systems with access to the volume in which the data set existed. The volume is also locked to prevent corruption during the recovery process. A system that has the unintentionally deleted data set open retrieves location information for the data set from control blocks in the system's memory. This location information is used to build a new entry for the data set in the VTOC for the volume. When the data set is thus recovered, the data set is validated, the lock removed, and the data set is made available to the systems sharing the volume.
摘要:
A method, system and computer readable medium that identify orphan storage and release the orphaned storage before application or system outages can result. More specifically, in certain embodiments, a method, system and computer readable medium periodically scan through common memory storage and identifies those areas that are no longer associated with a running task or have been allocated for longer than a running task with a matching task address. These areas are then identified as potentially orphaned storage locations.
摘要:
An approach to improving performance of a target system is disclosed. The approach may involve determining how similar a target system being considered is to other systems in use by other clients. For each of these other separate systems, the approach may involve determining the differences between the performance of the target system and the performance of the separate system, accounting for the level of similarity. A report can be generated that identifies performance values of the target system that are outside an acceptable range, which is based on the performance of the other separate systems. Based on this report, the administrator of the target system can consider configuration changes and upgrades to improve performance of the target system.
摘要:
Provided are a computer program product, system, and method for preemptively allocating extents to a data set in a storage system. A data set is comprised of a plurality of extents configured in at least one volume in the storage system. A first extent is allocated to the data set in a first volume to extend the data set. A determination is made as to whether a second extent can be allocated to the data set in the first volume in response to the allocating of the first extent. The second extent in a second volume is allocated for the data set in response to determining that the second extent cannot be allocated to the data set in the first volume.
摘要:
Provided are a computer program product, system, and method for selecting pages implementing leaf nodes and internal nodes of a data set index for reuse in memory. Pages in the memory are allocated to internal nodes and leaf nodes of a tree data structure representing all or a portion of a data set index for the data set, wherein the leaf nodes include information on members of the data set. The internal nodes include one or more keys used to traverse the tree data structure to reach the leaf nodes to access the members of the data set. At least one page allocated to the leaf nodes and the internal nodes is selected based on durations during which the allocated pages have not been used. Pages allocated to the leaf nodes are selected for reuse at a higher rate than the pages allocated to the internal nodes.
摘要:
A method, system and computer readable medium that identify orphan storage and release the orphaned storage before application or system outages can result. More specifically, in certain embodiments, a method, system and computer readable medium periodically scan through common memory storage and identifies those areas that are no longer associated with a running task or have been allocated for longer than a running task with a matching task address. These areas are then identified as potentially orphaned storage locations.
摘要:
Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.
摘要:
An approach that allows for replicating data sets that have different attributes. A logical copy operation may not be possible from a source data set to a target data set due to differences between their respective attributes. The source data set may have obsolete attributes that prevent a logical copy to a target data set with supported attributes. The presented solution may involve allocating an intermediate data set with the same attributes as the source data set. The intermediate data set may be allocated with the same obsolete attributes as the source data set. The approach may also involve executing a logical copy operation from the source data set to the intermediate data set. A standard copy operation that reformats the data may be executed on the intermediate data set to the target data set.