background image

check every bitfile descriptor in the 6.2 system. The -f and -l options check only the first and last 
number of bitfile descriptors provided with these options.  To invoke this utility, see the usage below:

db_convert_address_check

   -g <SFS Global Config File> 

   -db <DB Names Text File>

   -ss <SSId Text File> 

   -s <Subsystem Id>

   [-a] (check all files)

   [-f <Number>] (check first <Number> files)

 

  [-l <Number>] (check last <Number> files)

6.3.14.5. Terminate Scripting Session

Terminate the scripting session.  This ends the process for converting HPSS 4.5 specific metadata. 
Proceed to Section 6.3.17:

 Perform the DCE Export:  hpss_dce_export

 on page 215 to continue the 

conversion to HPSS 6.2.

% exit

6.3.15. Upgrade from HPSS 5.1 to HPSS 6.2  

Only follow procedures in this section if upgrading a system from HPSS 5.1 to HPSS 6.2.

To upgrade HPSS from version 5.1,  run the hpss_md_convert_51 utility.  The hpss_md_convert_51 
program is a menu driven program that converts the 5.1 HPSS metadata to HPSS 6.2 metadata.  It 
does not modify HPSS 5.1 metadata so that it is possible to revert to the HPSS 5.1 system during any 
point in the conversion process. The metadata changes are performed by renaming the 5.1 HPSS table 
by pre-pending the original table name with “PRE62_” and creating a new HPSS 6.2 table. The 
conversion then reads information from the HPSS 5.1 tables, makes the necessary metadata 
modifications in memory, and inserts the new metadata into the HPSS 6.2 table.  In cases where a 
function is no longer supported, the pre-6.2 table is renamed pre-pending the original table name with 
"PRE62_", but the new table in HPSS 6.2 is not populated with metadata.  All steps must be followed 
in order to successfully convert the metadata from HPSS 5.1 to HPSS 6.2.  

To begin the metadata conversion, run the conversion program hpss_md_convert_51:

% hpss_md_convert_51

HPSS 5.1 - 6.2 Metadata Conversion

1) Rename old tables

2) Create new tables

3) Convert Gatekeeper config table

4) Convert Location Server policy table

5) Convert Server Generic config table

6) Convert DMG config table

7) Convert Mover Device table

enter number or RET to exit: 

 

If errors occur, see Section 6.4: 

Metadata Conversion Troubleshooting Procedures

 on page 227 of 

this document before contacting your HPSS customer support representative.

Successful output for each option follows:

HPSS Installation Guide

July 2008

Release 6.2 (Revision 2.0)

213

Summary of Contents for High Performance Storage System HPSS

Page 1: ...HPSS Installation Guide High Performance Storage System Release 6 2 July 2008 Revision 2 0 HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 1...

Page 2: ...employees makes any warranty express or implied or assumes any liability or responsibility for the accuracy completeness or usefulness of any information apparatus product or process disclosed or repr...

Page 3: ...ntation Organization Changes 18 1 4 2 Metadata Changes 18 1 4 3 DMAP Gateway Changes 19 1 4 3 1 Creating an XDSM Fileset 19 1 4 3 2 Viewing DMAP Gateway XDSM Fileset Information 20 1 4 3 3 Viewing Cor...

Page 4: ...ess 57 3 2 8 High Availability Option 58 3 3 Prerequisite Software Considerations 58 3 3 1 Prerequisite Software Overview 58 3 3 1 1 DB2 58 3 3 1 2 Kerberos 58 3 3 1 3 LDAP and IBM Kerberos 59 3 3 1 4...

Page 5: ...5 3 12 db2 mirror backup cfg 73 3 5 3 13 db2 mirror backup subsys1 subsysX 73 3 5 3 14 SUBSYS1 Database Allocation 73 3 5 4 HPSS Metadata Space 74 3 5 4 1 SMS versus DMS Space 74 3 5 4 2 CFG Database...

Page 6: ...tual Volume Block Size Selection disk 103 3 10 1 3 Virtual Volume Block Size Selection tape 103 3 10 1 4 Stripe Width Selection 103 3 10 1 5 Blocks Between Tape Marks Selection tape only 104 3 10 1 6...

Page 7: ...Filesystem 120 4 2 2 HPSS Filesystem 121 4 3 Setup Tape Libraries 121 4 3 1 Special LTO Considerations 121 4 3 2 IBM 3584 121 4 3 3 3494 122 4 3 4 STK 123 4 3 5 AML 123 4 4 Verify Tape Drives 124 4 4...

Page 8: ...DB2 Permanent License 162 5 3 2 4 Install Configuration Bundle 163 5 3 2 5 Configure HPSS Security Services 164 5 3 2 6 Configure DB2 Services 165 5 3 2 7 Configure Other Services 167 5 3 3 Install an...

Page 9: ...1 6 3 4 Install or Upgrade DB2 193 6 3 5 Upgrade AIX 194 6 3 6 Install or Upgrade Java 194 6 3 7 Save Current HPSS Code and Configuration Files 194 6 3 8 Prepare HPSS 6 2 Code 194 6 3 8 1 Install HPSS...

Page 10: ...Prior Release 225 6 3 24 1 Revert the HPSS 6 2 System to Version 4 5 225 6 3 24 2 Revert the HPSS 6 2 System to Version 5 1 226 6 4 Metadata Conversion Troubleshooting Procedures 227 6 4 1 HPSS 4 5 to...

Page 11: ...D 6 Transfer Agent Stanza 287 D 7 Stanzas Reserved for Future Use 291 Appendix E hpss_env_defs h 293 Appendix F var hpss files 309 HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 11...

Page 12: ...e 3 HPSS Components 40 Figure 4 HPSS Generic Configuration 52 Figure 5 Basic HPSS Metadata Filesystem Allocation 70 Figure 6 The Relationship of Various Server Data Structures 82 Figure 7 Relationship...

Page 13: ...twork Options 131 Table 9 Installation Package Sizes and Disk Requirements 136 Table 10 Runing Times for Long Running Metadata Conversion Utilities 185 Table 11 6 2 Default Server Configuration Parame...

Page 14: ...w of HPSS technology Chapters 3 5 guide administrators of new HPSS systems through planning system preparation HPSS software installation and configuration of the HPSS infrastructure Chapter 6 guides...

Page 15: ...Linux 1 1 3 Security The HPSS Security implementation which was based on DCE security has been replaced with Unix or MIT Kerberos authentication and with Unix or LDAP authorization Refer to Chapter 2...

Page 16: ...for import export delete resources and cartridge move operations This is an alternative to the previous capability of building the list on the screen with the Fill Count Fill Increment and Volume Labe...

Page 17: ...two separate disk systems The disk systems must also be protected using RAID1 or RAID5 configurations This mkhpss enhancement can only be used for new HPSS installations For existing sites please cons...

Page 18: ...e Policy are not supported in 6 2 Mirrored Filesets are no longer supported The terminology of Non DCE Movers is no longer being used It is now referred to as the Mover The terminology of Non DCE Clie...

Page 19: ...cation mechanism information has been added along with new index definitions Added the SERVERINTERFACES table This table is populated by the metadata converter programs with newly created server inter...

Page 20: ...ortion of an XDSM Fileset independently from the core server is no longer supported Fileset information and associated statistics are now shown on a single window The Requests via TRPC HPSS Interface...

Page 21: ...ger required In 4 5 these files were the java policy ds and the java policy hpssadm n n n The hpssadm jar and mobjects jar files are no longer used All classes are now in a single jar file hpss jar n...

Page 22: ...valid If JAVA_BIN java is not defined then the script will use java which will use the client s PATH n n Effective with HPSS 5 1 1 the hpssgui script supports customizing the user s background color...

Page 23: ...The basic and specific server config structures along with the server s log policy have been combined in 5 1 into a single structure n n SSM now represents the three basic Core Server volume structure...

Page 24: ...em on the menu bar n The View menu of the Health and Status screen allows some portions of the screen to be hidden or redisplayed n The PVR Cartridge Threshold is included in the HPSS Status section o...

Page 25: ...st user updates to fields on information windows are no longer sent to the server immediately or automatically The Update button on the window must be clicked to submit the update to the server Fields...

Page 26: ...and Retired fields structure on the storage map in the disk or tape volume structure This is a core server design change The fields of the map structure may be modified with the update command The upd...

Page 27: ...r n Java is no longer used in the server side of SSM the new consolidated SSM System Manager n SSL is no longer supported with SSM This means it is no longer necessary to create an SSL certificate the...

Page 28: ...directory for these files unless they are specified on the command line C and k options n n It is no longer necessary to add a security provider entry to the java system java security file n n The pa...

Page 29: ...ver volume structures the physical volume virtual volume and storage map as a single combined Core Server volume structure n n Access to the delog utility via the SSM GUI deferred in 5 1 has now been...

Page 30: ...XFS is not supported Since the two SSM Servers Data Server and System Manager were merged into the single System Manager all references to the Data Server in the Operations Shutdown menu were removed...

Page 31: ...eference files will be created automatically for the user when he first logs in The user will be required to reset any preference settings i e preferences will not be converted n The System Manager co...

Page 32: ...migration operations on all the selected storage classes Likewise the Force Purge has been replaced with a Purge Controls drop down allowing the Administrator to perform purge operations on all the se...

Page 33: ...ince 5 1 Server GUI ADM A new subcommand update has been added to the hpssadm device command for updating the mover device and pvl drive objects n HPSS Installation Guide July 2008 Release 6 2 Revisio...

Page 34: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 34...

Page 35: ...are then moved to the appropriate storage hierarchy and to appropriate levels in the storage hierarchy 2 2 HPSS Capabilities A primary goal of HPSS is to move large files between storage devices and p...

Page 36: ...nologies over time As new disks or tapes are added new classes of service can be set up HPSS files reside in a particular class of service which users select based on parameters such as file size and...

Page 37: ...ocesses that control the logic of the system and control movement of the data The HPSS infrastructure provides the services that are used by all the servers for operations such as sending messages and...

Page 38: ...is the job of the HPSS Core Server discussed in Section 2 3 2 to map a human readable name to a bitfile s ID Filesets A fileset is a logical collection of files that can be managed as a single admini...

Page 39: ...rage segment is associated with a storage class defined below and has a certain measure of location transparency The Core Server discussed in Section 2 3 2 uses both disk and tape storage segments as...

Page 40: ...wn along with the basic control communications paths thin arrowed lines Infrastructure items those components that glue together the distributed servers are shown at the top of the cube These infrastr...

Page 41: ...n made purge or moves data between volumes at the same level lateral move Based on the hierarchy configuration MPS can be directed to create duplicate copies of data when it is being migrated from dis...

Page 42: ...may perform no authorization default authorization or site customized authorization depending on how the Accounting Policy is set up and whether or not a site has written site specific account validat...

Page 43: ...s of a given customer site Monitoring capabilities include the ability to query the values of important management attributes of storage system resources and the ability to receive notifications of al...

Page 44: ...lobal if a class of service is disabled within a storage subsystem then the Core Server in that subsystem never selects that class of service Since the Migration Purge Server MPS is contained within t...

Page 45: ...ule Authentication is responsible for guaranteeing that a principal a customer identity is the entity that is claimed and that information received from an entity is from that entity Authorization is...

Page 46: ...shed between the PFTP client and the HPSS Movers This provides the potential for using multiple client nodes as well as multiple server nodes PFTP supports transfers via TCP IP The PFTP client establi...

Page 47: ...rovided with a large number of parameters that may be used to implement local policy Under the second approach HPSS communicates information through a well defined interface to a policy software modul...

Page 48: ...n that is not overridden by the site policy module Location Policy The location policy defines how Location Servers at a given site will perform especially in regards to how often server location info...

Page 49: ...t Tested Silicon Graphics IRIX 32 bit X X Compaq Tru64 X Not Tested Linux Intel X X X X Linux Power PC X X 2 4 3 Mover Platforms Movers are used to control the logical network attachment of storage de...

Page 50: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 50...

Page 51: ...ape resources and their relationship to HPSS server nodes Mover nodes internal and external networks and SAN interconnections Specifics of this architecture for a given site are developed during the p...

Page 52: ...ed to optimize the transfer of large files at the expense of some small file transfer performance If at all possible try to reduce the number of small files that are introduced into your HPSS system F...

Page 53: ...nfigured and how resources will be allocated among them Refer to Section 3 8 Storage Subsystem Considerations on page 94 for more discussion on subsystems Identify the HPSS servers to be configured an...

Page 54: ...y policy for the HPSS system Refer to Section 3 9 4 Security Policy on page 98 for more information on the Security Policy for HPSS 11 Determine if a Gatekeeper will be required It is required if a si...

Page 55: ...or load balancing will be required If so define and write the site policy code for gatekeeping Refer to Section 3 9 7 Gatekeeping on page 99 for more information on gatekeeping and refer to the HPSS...

Page 56: ...termine the required or expected throughput for the various types of data transfers that users will perform Some users want quick access to small amounts of data Other users have huge amounts of data...

Page 57: ...lly this is only given to the Kerberos principal associated with the HPSS system administrative component Additional Kerberos principals can be allowed or denied access by setting permissions appropri...

Page 58: ...ibm com systems p software hacmp html 3 3 Prerequisite Software Considerations This section defines the prerequisite requirements for HPSS Some products must be obtained separately from HPSS and insta...

Page 59: ...bm com developerworks java jdk aix index html The Java product required for the Linux and Windows platform can be downloaded from Sun Microsystems download webpage http java sun com j2se 1 4 2 downloa...

Page 60: ...es the mover administrative process that runs on the server node and the remote mover process that handles the HPSS devices and data transfers To maximize performance the remote mover should not be pl...

Page 61: ...requirements Supported platforms AIX Linux Windows J2RE or J2SE 1 4 2 for the appropriate platforms 3 3 2 3 2 Client API Requirements The client node where HPSS Client API applications run must meet...

Page 62: ...ents via a shared memory segment Along with shared memory HPSS also supports a Local File Transfer data path for client transfers that involve HPSS Movers that have access to the client s file system...

Page 63: ...h the STK L40 STK SL500 and STK SL8500 3 4 2 4 STK The STK PVR must be able to communicate with STK s ACSLS server HPSS requires ACSLS version 7 0 0 For the PVR to communicate with the ACSLS server it...

Page 64: ...and using the first drive type from the list that it finds configured in the system For example referring to Table 2 it can be seen that a single length 3590E tape will mount on a double length 3590E...

Page 65: ...PSS will mount a 3580 LTO Gen2 cartridge into a 3580 LTO Gen4 drive only if 3580 LTO Gen2 drives are not defined in HPSS and 3580 LTO Gen3 drives are either busy or not defined In this case it is up t...

Page 66: ...h 3590 Double Length 3590E Double Length 3590H Single Length 3590E Single Length 3590E Double Length 3590E Double Length 3590H Double Length 3590E Double Length 3590E Double Length 3590H Single Length...

Page 67: ...840D STK 9840D STK 9840D STK 9940A STK 9940A STK 9940B STK 9940B STK 9940B STK T10000A STK T10000A STK T10000B STK T10000B STK T10000B Note that the PVL s choices are made at startup time and are not...

Page 68: ...hese resources are interconnected to the overall system is just as important as the amount of disk and or number of tape drives cartridges allocated For instance if there are terabytes of disk storage...

Page 69: ...ge Class has reached a threshold level In a hierarchy where data is being migrated from one hierarchy level to a lower one management of space in the Storage Class provided is done via the migration a...

Page 70: ...ly by the system Once defined these LUNs are assigned to the core server host via the LVM AIX into a Volume Group or by the operating system Linux into a hard drive identifier The last step is to allo...

Page 71: ...daemon ftpd where the ftp pids hpss_class file will be placed The var hpss tmp is the default directory where the Startup Daemon creates a lock file for each of the HPSS servers it brought up in the n...

Page 72: ...instance configuration information and CFG database tables Specifics on its size are described in the CFG Database Allocation section below The recommended minimum filesystem size is 1GB 3 5 3 5 var h...

Page 73: ...db2 mirror log cfg This filesystem is similar to that of db2 log cfg but the storage resources for the DB2 log must be separate from the resource of the primary copy DB2 is configured so that it write...

Page 74: ...hod DB2 manages raw disk space directly bypassing the operating system s buffers and filesystem interface We recommend the use of SMS for storing short or seldom used tables and DMS for storing large...

Page 75: ...disk devices The 6 2 Sizing Spreadsheet input tab is shown below Based on the input the resulting output is show below HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 75...

Page 76: ...nt table Under normal conditions one bitfile tape segment row is expected for each tape on which the file is stored It is safe to assume for each bitfile stored on tape two bitfile segment records are...

Page 77: ...r of log files and size of the files is controlled by several database configuration parameters LOGFILSIZ determines the size of each log file and LOGPRIMARY LOGSECOND determine the total number of lo...

Page 78: ...sages and requested output lists managed objects configuration structures etc issued during the session in its log Old session log files should be removed periodically to avoid filling the file system...

Page 79: ...consists of a set of calls that are comparable to the file input output interfaces defined by the POSIX standard specifically ISO IEC 9945 1 1990 or IEEE Standard 1003 1 1990 as well as extensions pr...

Page 80: ...d through TCP IP Support is also provided for performing partial file transfers The FTP protocol is supported by the HPSS FTP Daemon Refer to Section 13 2 FTP Daemon Configuration of the HPSS Manageme...

Page 81: ...the fileset global metadata table Name Space The HPSS Core Server maintains the HPSS name space in system metadata Refer to Section 3 5 HPSS Sizing Considerations on page 68 for details on sizing the...

Page 82: ...esigned to scale up its ability to manage disks as the number of disks increase As long as sufficient memory and CPU capacity exist threads can be added to the server to increase its throughput Additi...

Page 83: ...y or may not be enabled within a given subsystem a hierarchy is enabled within a subsystem by configuring the subsystem to enable one or more classes of service which reference that hierarchy Note tha...

Page 84: ...file name prefix Once reporting is enabled a new report file is started every 24 hours The names of the report files are made up of the UNIX file name prefix from the server specific configuration pl...

Page 85: ...at storage subsystem will not attempt to connect to any Gatekeeper If a Gatekeeper is configured for the storage subsystem that the Core Server is configured for then the Core Server will query the Ga...

Page 86: ...e consider increasing the automatic restart count for failed servers in SSM Since the Location Server s requests are short lived and each client contacts it through a cache performance alone is not us...

Page 87: ...workstation s initialization scripts every time the workstation is booted The SSI requires that the system environment variables CSI_HOSTNAME and ACSAPI_PACKET_VERSION be correctly set Note that due t...

Page 88: ...is designed to work with ADIC Distributed Automated Media Library Server DAS software version 1 3 and the ABBA Management Unit AMU version 2 4 0 DAS is the ADIC software which consists of the Automat...

Page 89: ...read and write HPSS user data must be set to handle variable block sizes to allow for the ANSI standard 80 byte volume label and file section headers This section describes the procedure for setting...

Page 90: ...HPSS device 3 7 7 3 Disk Devices All locally attached magnetic disk devices e g SCSI SSA should be configured using the pathname of the raw device i e character special file For Linux systems this ma...

Page 91: ...d their corresponding Mover can be allocated to other nodes In general the connectivity between the nodes on which the Movers will run and the nodes on which the clients will run should have an impact...

Page 92: ...SS components requiring monitoring or control 2 GUI hpssgui Provides the HPSS administrator or operator the ability to configure or monitor the HPSS System through a set of windows 3 Command Line Inte...

Page 93: ...used when the server interface thread pool is completely full The queue is used to hold RPC requests from servers until a thread is available to process the request Note that if the request queue has...

Page 94: ...9 1 Migration Policy The migration policy provides the capability for HPSS to copy migrate data from one level in a hierarchy to one or more lower levels The migration policy defines the amount of dat...

Page 95: ...The reclaim utility program resets the state of the empty tape volumes so that they can be reused The reclaim utility can be run from SSM but it should generally be set up to run on a periodic basis...

Page 96: ...be based on the time the file was created or the time the file was last accessed Files may be purged in an unpredictable order if this parameter is changed while there are existing purge records alre...

Page 97: ...he Require Default Account field is enabled when using Site style accounting and Account Validation users are required to have valid default account indexes before performing almost any client API act...

Page 98: ...n security features for end users depend on the interface and are discussed in the following subsections 3 9 4 1 Client API The Client API interface uses either UNIX username password or Kerberos auth...

Page 99: ...This will improve performance and potentially eliminate clutter from the HPSS Alarms and Events window Message types to disable first would be Trace messages followed by Debug and Request messages On...

Page 100: ...ient s connection uuid Y Y Y RealmId The HPSS realm identifier for the user Y Y Y GroupId The user s group identifier Y Y Y HostAddr Socket information for originating host Y Y Y OpenInfo Open file st...

Page 101: ...conds a call will delay because of HPSS_ERETRY status codes returned from the Gatekeeper See Section 13 1 Client API Configuration of the HPSS Management Guide for more information Refer to HPSS Progr...

Page 102: ...straction of storage system characteristics that allows HPSS users to select a particular type of service based on performance space and functionality requirements Each COS describes a desired service...

Page 103: ...ation Assume files are being written via standard FTP directly into a tape Storage Class Also assume FTP is set up to use a 4 MB buffer size to write the data This means that writes are done to the ta...

Page 104: ...mitted is small all of this latency could cause performance to be worse than if no striping were used at all As an example of how to determine stripe width based on file size and drive performance ima...

Page 105: ...qual to the tape stripe length If the storage segment size is smaller than the tape stripe length the tape stripe length should be an integer multiple of the storage segment size and it should be not...

Page 106: ...e in selecting tapes for writing but regards it as an estimate only Regardless of its value the tape will be filled before another tape is chosen for writing Rule 1 For disk the PV Size value must be...

Page 107: ...larly be satisfied by the media type The performance of smaller accesses will be seriously degraded A value of zero indicates that the media is suitable for supporting all data accesses Minimum Virtua...

Page 108: ...12 20 40 GB IBM 3590H 256 KB 512 60 120 GB IBM 3592 J 256 KB 1024 60 GB JJ Short 300 GB JA Standard IBM 3592 E05 256 KB 2560 100 GB E05 Short 500 GB E05 Standard 660 GB E05 XL IBM 3592 E06 256 KB 2560...

Page 109: ...t of user data written to a tape volume by the Core Server The server fills each tape Virtual Volume such that the amount of data written to the tape varies with the compressibility of the data 3 10 2...

Page 110: ...e Max File Size option is selected an attempt to perform an operation on a file that would cause this value to be exceeded will be rejected The underlying storage hierarchy should be set up so that th...

Page 111: ...archy must first be configured for multiple copies Explanation When a stage from the primary copy fails and a secondary copy of the file is available HPSS will usually reissue the stage operation from...

Page 112: ...e assigned to the family associated with the file If no tape VV is available for writing in the family a blank tape is reassigned from family zero to the file s family The family affiliation is preser...

Page 113: ...he limiting factor in a transfer between HPSS and a client application the disks can be reconfigured in a striped Storage Class to allow parallel transfers at higher transfer rates If after forming th...

Page 114: ...erformance considerations as standard FTP clients Parallel transfers move the data between the Mover and the end client processes bypassing the HPSS FTPD Users should be educated to use the parallel f...

Page 115: ...r alarms listed in the HPSS Error Manual To get a better view of an alarm in its context view the Location Server s statistics screen If the Location Server consistently reports a heavy load condition...

Page 116: ...create open and or stage requests being monitored by that Gatekeeper when that Gatekeeper is down For example if storage subsystem 2 is configured to use Gatekeeper 2 and Gatekeeper 2 is monitoring o...

Page 117: ...s infrequently 2 Ideally several physical disks should be available for DB2 tablespaces namespace data can be on one bitfile data on another etc 3 If the backup software employed involves some sort of...

Page 118: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 118...

Page 119: ...hange without an administrator s knowledge networks can mysteriously degrade for a variety of reasons This is especially true for client access to the HPSS system 4 1 General Setup Each HPSS administr...

Page 120: ...ase in DB2 has its own log We recommend that these logs be placed on a filesystem reserved exclusively for this purpose This should be a fast but more importantly stable disk preferably a RAID device...

Page 121: ...tape placement Storing HPSS and non HPSS tapes within the same logical library is not recommended If a non HPSS application moves tapes around within the library it can confuse the HPSS PVR about the...

Page 122: ...figuring the tape drives within HPSS To identify robot specific device ids for each Mover tape device in an LTO robot tapeutil f smc device filename inventory Look for addresses of drive devices in th...

Page 123: ...4 3 4 STK For an STK tape library If using an STK tape library configure the ACSLS and SSI software properly and verify that it is working correctly To test the ability to mount and dismount a tape i...

Page 124: ...enabled the following should return a value of zero 0 lsattr E l tapeDevice a block_size F value To change the device to use variable block size root chdev l tapeDevice a block_size 0 If using STK dr...

Page 125: ...the raw read and write I O performance of all HPSS tape drives are at the expected levels Create one or more tables documenting the results To conduct the read and write tests on dev rmt 0 mount a scr...

Page 126: ...pe will be overwritten by iocheck so be sure to mount the correct tape cartridge To measure uncompressed write performance Note that specifying tps2d6nr will cause the tape not to rewind iocheck w t 2...

Page 127: ...bable bottlenecks and then selecting individual disks in a virtual volume to alleviate bottlenecks in the port loop or adapter as desired For SSA disks on an AIX SP node use maymap to identify which l...

Page 128: ...o be accessed by HPSS To list all current device mappings raw a q dev raw raw1 bound to major 8 minor 1 dev raw raw2 bound to major 8 minor 2 Block devices can be mapped to raw devices at boot time by...

Page 129: ...network interface AIX for x in lsdev C S a c if F name do ifconfig x lsattr El x done For non AIX platforms use the Name column from netstat i in the ifconfig commands Note the IP address follows the...

Page 130: ...l The transfer rates for networks differ greatly depending upon the individual technology and network settings used It is important to gather performance data using a variety of settings to determine...

Page 131: ...r the systems on which the various HPSS servers and clients will run can have a significant impact on overall system performance AIX provides a utility program to display and modify a number of networ...

Page 132: ...al network interface that may affect network performance For example the network interface for the IBM SP TB3 switch provides settings for the size of the send and receive pool buffer size which have...

Page 133: ...e buffer pool size for outgoing data If these values are too small then buffer overruns may occur The current values of these variables can be interrogated with the lsattr command e g lsattr E l css0...

Page 134: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 134...

Page 135: ...Documentation Manual Page Setup Section 5 5 Define HPSS Environmental Variables Section 5 6 Tune DB2 Section 5 7 Install and Build HPSS Source Code Section 5 8 5 1 Prepare for Installation The followi...

Page 136: ...D values defined by the hpss include hpss_env_def h file If alternate IDs are required this include file should be updated prior to re building mkhpss or the hpss account group should be created befor...

Page 137: ...his is to enable the hpssgui application to run directly on the client machine to maximize hpssgui performance and to eliminate the X traffic on the HPSS server machine See Section 3 3 1 4 Java on pag...

Page 138: ...e use of MIT Kerberos the LIBPATH must also contain the path to the lib directory of the MIT Kerberos installation For example if etc environment already contains a setting LIBPATH usr lib and MIT Ker...

Page 139: ...be performed on each machine 5 3 1 Install and Configure HPSS Root Subsystem Machine Perform the following steps on the root subsystem machine Pre installation Configuration Install HPSS documentatio...

Page 140: ...anel mkhpss will display the following screen 6 Verify that the default values are correct for the given installation and modify if necessary Click the Configure button to perform the pre installation...

Page 141: ...s the procedure to install HPSS documentation and DB2 software on the root subsystem machine From the Root Subsystem Machine submenu in the left panel click on the Install Software option The right pa...

Page 142: ...hpssgui runs The hpssuser utility may be used to package the HTML files for delivery to each hpssgui machine or to a common shared file system Installation of the HPSS documentation elsewhere is optio...

Page 143: ...zation mechanisms which can be configured to enable HPSS to provide the desired security services The following authentication and authorization combinations are supported Authentication Mechanism Aut...

Page 144: ...3 Using the scrollbar move the right panel display until the Authorization Service information is seen It should look like the following HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 144...

Page 145: ...lm Name The value is usually set to the Local Site Name all capitalized Local Realm ID The field is set to a unique ID number for each site Ask your support representative for your site s value 6 By d...

Page 146: ...ee the following message in the command output window run command exited with status 0 Click the Done button on the Command Output window to close the window 5 3 1 4 2 Configure Kerberos Authenticatio...

Page 147: ...e The Password option requires a password to be supplied each time an HPSS server or utility is invoked Password The password used to authenticate the caller when the HPSS server or utility is invoked...

Page 148: ...sentative for an appropriate value 7 By default the system s configuration files etc passwd etc group and etc shadow are used to administer the authentication and authorization services As an option t...

Page 149: ...Authorization LDAP Authorization is supported only on AIX From the Root Subsystem Machine submenu in the left panel click on the Configuration icon and then the Security Services icon Perform the foll...

Page 150: ...r kerberos KDC Directory The pathname of the KDC directory This directory should be set to var hpss krb5kdc Master Password The Kerberos administration password Be sure to remember this password to be...

Page 151: ...pdate remove entries in LDAP Administrator Password The password used by the administrator to manage entries in LDAP Verify Password Repeat of the LDAP administrator password entered to verify it was...

Page 152: ...wing message in the command output window run command exited with status 0 Click the Done button on the Command Output window to close the window 5 3 1 5 Configure DB2 Services To configure DB2 databa...

Page 153: ...Authentication Type Currently there is only one authentication type allowed User Name The UNIX userid to be used for DB2 authentication Password and Verify Password Enter and verify the UNIX password...

Page 154: ...nged to db2 mirror log cfg for the CFG database and db2 mirror log subsys1 for the SUBSYS1 database To change the location of the log files enter the full pathname in the text box Tablespace Config Th...

Page 155: ...ect the directory you would like to allocate as the containers for this tablespace This empty directory must be created before running this configuration option The Add button will show the following...

Page 156: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 156...

Page 157: ...n to perform the DB2 configuration 5 If the configuration was a success you should see the following message in the command output window run command exited with status 0 Click the Done button on the...

Page 158: ...lt all boxes are selected If some items have already been configured un select the appropriate box to by pass the re configuration of that task When satisfied with your selections select the Configure...

Page 159: ...defined configured by the administrator to include the EndPoint information in the ep conf file Otherwise the configuration bundle will not contain the endpoint information and the file will need to...

Page 160: ...eed to perform the following steps to setup the appropriate configuration directories and files on the machine where the secondary subsystem servers will run 1 Install the HPSS software on the subsyst...

Page 161: ...ith status 0 Click the Done button on the Command Output window to close the window 5 3 2 2 Install HPSS Documentation and DB2 Software on a subsystem This section describes the procedure to install H...

Page 162: ...Installing from CD will be an option starting in 6 2 1 To provide the SSM Help facility the HTML files from the HPSS documentation must be accessible from the node where the hpssgui program runs The f...

Page 163: ...2 4 Install Configuration Bundle To install the configuration bundle perform the following steps 1 Copy the configuration bundle from the root subsystem machine and place it into a directory with ade...

Page 164: ...st that is running the Kerberos server Kerberos Admin Principal The name of the administration principal that is used to manage the Kerberos server Authentication Type There are two supported options...

Page 165: ...as a success you should see the following message in the command output window run command exited with status 0 Click the Done button on the Command Output window to close the window 5 3 2 6 Configure...

Page 166: ...ance of another machine only for this local node Instance Owner Group The UNIX group assigned to the HPSS database files Should use the default of hpssdb in most cases Instance Owner Home Directory Th...

Page 167: ...on of the log files enter the full pathname in the text box Tablespace Config Define the DB2 tablespace and containers for the subsysX database See the Tablespace Config options discussed in the Root...

Page 168: ...o close the window 5 3 3 Install and Configure HPSS Mover Client Machine For the Mover Client machine the following configuration steps must be performed Install Mover Client source code Install confi...

Page 169: ...4 Modify Kerberos Configuration File If Necessary Either copy the etc krb5 conf file from the root machine or modify the Mover Client s etc krb5 conf file so that it is using the root machine is liste...

Page 170: ...et Up DB2 Permanent License on page 142 for more information on how to set up the DB2 license for an HPSS system 5 5 HPSS Documentation Manual Page Setup This section describes the HPSS documentation...

Page 171: ...ect your environment The HPSS environment variables and their default values are defined in opt hpss include hpss_env_defs h file See Appendix E hpss_env_defs h which lists the default values of all H...

Page 172: ...PVR proprietary code If you plan to use the STK PVR contact your HPSS Support Representative for information on how to obtain the STK PVR proprietary code 5 8 1 1 Construct the HPSS Source Tree To con...

Page 173: ...LDAP_INSTALL_PATH usr ldap KRB5PATH usr local GSIPATH usr gt2 4 Log on as hpss 5 Issue the make clobber command 6 Issue the make command 5 8 1 3 Generate and Bind the DB2 Helper Program When filesets...

Page 174: ...constructed is completely empty 5 Issue the following command make BUILD_ROOT target directory tree build mvr build clnt build ftp build fs 6 tar up the target directory tree On the machine where the...

Page 175: ...opt hpss directory 4 Untar the tar file for the Mover Client source into the opt hpss directory 5 8 3 2 Build the HPSS HDM Source Tree To compile the HPSS HDM sources the following steps must be perf...

Page 176: ...hed using the db2 interactive utility Here s a sample session showing the commands to use You ll need to be logged in to Unix as user hpss to have the needed permissions on the database db2 c Copyrigh...

Page 177: ...db2 select num_auth_mechs authn_mechs1_mechanism authn_mechs1_auth_type_key from server where desc_name SSM System Manager NUM_AUTH_MECHS AUTHN_MECHS1_MECHANISM AUTHN_MECHS1_AUTH_TYPE_KEY 2 2 1 1 reco...

Page 178: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 178...

Page 179: ...l and configure authentication and authorization if applicable Convert the metadata Convert authorization and authentication mechanisms Tune DB2 Port prior release data such as configuration file info...

Page 180: ...a for the Bitfile Server Storage Server and Name Server servers are now merged into the Core Server specific metadata Cartridge metadata is now consolidated from multiple SFS files into one DB2 table...

Page 181: ...been added The metadata is converted by the hpss_51_62_dmg conversion program Modification of DMGFILESET table In support of new HPSS RPC library elimination of TCP port and TCP hostname and addition...

Page 182: ...for the duration of the upgrade For 4 5 upgrades only SFS and DB2 must be able to run simultaneously Both databases must run on the same production server node as it is being upgraded Therefore SFS d...

Page 183: ...ryption is performed using Unix encrypt function HPSS servers processes utilize Unix keytab file Can use LDAP or Unix as authorization mechanism The hpss_dce_export and hpss_unix_import utilities are...

Page 184: ...e familiar with the conversion process Contact your HPSS customer support representative for more information on setting up a test system using the production metadata Sites may also practice the meta...

Page 185: ...stem on which the conversion is being run The time estimates given above were determined on a relatively inactive system 44P 270 with about 3 million HPSS files For example a system in which DB2 share...

Page 186: ...ilities in your specific environment Refer to Section 6 2 5 Testing the Metadata Conversion on page 184 After running a metadata conversion and prior to placing the HPSS 6 2 system and DB2 databases i...

Page 187: ...provide a secondary location where DB2 can store a second copy of database logs When doing this be sure to provide a filesystem on a separate physical device from the NEWLOGPATH or LOGPATH previously...

Page 188: ...6 5 HPSS 4 5 Conversion Utilities Output on page 232 for examples of each utility s output If the conversion program fails it will exit with an error To correct the error and continue with the conver...

Page 189: ...SFS Name Server metadata against the new Core Server metadata db_convert_address_check The db_convert_address_check utility is provided to take HPSS bitfile descriptors and resolve them to media volu...

Page 190: ...2 HPSS 5 1 to 6 2 Verification Utilities There are no verification utilities for the HPSS 5 1 to 6 2 conversion 6 3 HPSS 6 2 Upgrade Procedures This section provides the step by step procedures to up...

Page 191: ...ning Configuration of Kerberos will not be covered in this document as converting principals and groups from DCE into Kerberos is handled outside of the conversion process If Kerberos authentication i...

Page 192: ...scfgsuf I ldap instance name s realm name e g opt IBM ldap V6 0 sbin idscfgsuf I idsldap s cn hpss acme com 10 Create the database user For example create ldapdb2 user for database set password to lda...

Page 193: ...r the mkhpss script These instructions should only be followed for a site upgrading from HPSS 4 5 that does not already have DB2 installed or configured on their system A site should follow the instru...

Page 194: ...Perform this step for the root subsystem only 6 3 7 Save Current HPSS Code and Configuration Files This step should not be performed while the HPSS 4 5 or 5 1 system is running After the prerequisite...

Page 195: ...section applies to sites that are upgrading from both HPSS 4 5 and HPSS 5 1 Install the HPSS 6 2 distribution images Edit Makefile macros and the Makefile macros for the specific platform being used...

Page 196: ...be reverted Remove all execution permissions for the following binaries in the opt hpss bin directory to prevent accidental invocations until the HPSS 6 2 system has been completely verified Perform...

Page 197: ...S and will not affect other services on this system Without performing this option the HPSS RPC mechanisms will fail Note that an error may occur about not finding the SSM server configuration and thi...

Page 198: ...ly convert the system DB2INSTANCE the Unix User ID of the DB2 HPSS instance e g hpssdb The rc db2 script sets this environment variable HPSS_GLOBAL_DB_NAME the database name for the HPSS global config...

Page 199: ...r the Log Client and Log Daemon e g hpsslog HPSS_PRINCIPAL_LS the 6 2 principal for the Location Server e g hpssls HPSS_PRINCIPAL_MOUNTD the 6 2 principal for the Mount Daemon e g hpssmntd HPSS_PRINCI...

Page 200: ...complete the remaining fields of the section appropriately Be certain to unselect the Create the KDC subsection if your KDC already exists and you do not want mkhpss to recreate it In the Configure A...

Page 201: ...Using the scrollbar move the right panel scrollbar until the Authorization Service information is seen It should look like the following HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 201...

Page 202: ...d be captured and any problems corrected before continuing See Section 6 2 7 Capturing the Metadata Conversion Output on page 185 for information on capturing and viewing the conversion output See Sec...

Page 203: ...f the long running conversion utilities are run in parallel mode the utilities themselves can be invoked in any order as long as they are run as part of the long running conversion step The original S...

Page 204: ...ect SFS global configuration file CDS pathname as a command line argument For example su root db_config_convert encina sfs hpss globalconfig This script has no restart capability but because it is sho...

Page 205: ...85 and Section 6 4 Metadata Conversion Troubleshooting Procedures on page 227 6 3 13 5 Run the Long Running Utilities The long running utilities include db_convert_bftapeseg db_convert_bitfile db_conv...

Page 206: ...xecuting each of these programs with the nohup command To prevent accidental loss of data each long running conversion program will prompt for execution confirmation when first starting the program as...

Page 207: ...of the subsystem conversion program db_subsys_convert Because these long running programs perform load insert operations consider explicitly deleting the records metadata from the ABSADDR and NSACL ta...

Page 208: ...Number of rows rejected 0 Number of rows deleted 0 Number of rows committed 22000 This output indicates that the program terminated from a CTRL C but the db2 load already placed 22000 storagesegdisk r...

Page 209: ...either be in the REBUILD or LOAD phase The load phase provides information to help understand how to reset the table if the restart fails and the restart attempt is abandoned At this point attempt to...

Page 210: ...other HPSS servers to allow access for the Core Servers db_convert_dce_cds creates the Core Server security ACLs with the permissions listed below and adds the Core Server principal to the Gatekeeper...

Page 211: ...t_ns_check db_convert_address_check Different degrees of verification may be performed based on the amount of time an HPSS site decides to devote to this task Verification is highly recommended immedi...

Page 212: ...d last number of records specified in the nsobject SFS file against the matching records in DB2 The v option serves as both a verbose and force option to this program With the v option the program wil...

Page 213: ...he conversion process The metadata changes are performed by renaming the 5 1 HPSS table by pre pending the original table name with PRE62_ and creating a new HPSS 6 2 table The conversion then reads i...

Page 214: ...RDEVICE add SITE add SERVERINTERFACES add AUTHZACL db subsys1 add DMGFILESET commit quit Option 3 Convert Gatekeeper config table converting PRE62_GATEKEEPER to GATEKEEPER Option 4 Convert Location Se...

Page 215: ...LDAP or Unix registry When the skipFile exists or when the program is executed the second time the program will export principal group and cell information from DCE into the output directory provided...

Page 216: ...The hpss_unix_import program supports the Unix authorization by gathering authorization information UID moniker and home directory for each HPSS user from DCE and importing it into the Unix or HPSS p...

Page 217: ...site entry in LDAP to register endpoints with the RPC group to successfully initialize and start in HPSS 6 2 Use the new LDAP administration tool hpss_ldap_admin to create a new site entry using the c...

Page 218: ...the HPSS 6 2 system var hpss etc HPSS conf Perform this step on the root subsystem only and then place the HPSS conf file on other platforms with appropriate changes 6 3 19 5 Copy the rc hpss Script t...

Page 219: ...There is no utility provided to convert the SSM user Ids from HPSS 4 5 or 5 1 Perform this step on the root subsystem only SSM User Ids under HPSS 4 5 As of HPSS 5 1 SSM only supports the admin and o...

Page 220: ...tion Server Endpoints The endpoint utility hpss_bld_ep creates endpoints and places the information in the file var hpss etc ep conf for the Location Server to use in HPSS 6 2 The utility is located i...

Page 221: ...us sources It will attempt to read the variables if set in the following order Variables which are set in the environment of the shell from which rc hpss is executed var hpss etc env conf Default sett...

Page 222: ...t with the SSM server The rpcinfo command can be used to verify that a server is listening on this port 6 3 20 2 Update HPSS Configurations Perform this step on the root subsystem only Using the SSM G...

Page 223: ...ag should be unset using SSM Additionally the program may also warn when a migration policy is not in use by any storage class In this case the program will designate this migration policy as disk and...

Page 224: ...essary built in checkpoint capabilities will allow it to resume processing Be sure to run the utility to completion and check the utility s output to ensure that it has completely converted all the ne...

Page 225: ...te all files and subdirectories in the var hpss convert 6 2 directory Do not delete this information until all errors or warnings have been resolved 6 3 24 Revert HPSS 6 2 System to Prior Release In c...

Page 226: ...PSS machine e g remote movers cd etc mv rc hpss_45 rc hpss 5 Restore the FTP config assuming that the PFTP Daemon is to run on the root subsystem Restore the etc inetd conf file cd etc mv inetd conf_4...

Page 227: ...oting procedures for errors that occur during a metadata conversion from 4 5 to 6 2 This file does not contain all error messages that a failed conversion might output but does provide some of the mor...

Page 228: ...4 Insufficient privilege for this operation You do not have the proper DCE credentials Resolution Log into DCE with the proper credentials to allow an SFS read and rerun the conversion program Error s...

Page 229: ...xists in the tablespace to free the lock and rerun the conversion program Error Cannot open file var hpss convert 6 2 sample The conversion program cannot access the text file that maps DB Names to Su...

Page 230: ...kely the program was trying to insert data into a table that does not exist But the table could also exist in a locked tablespace i e in a load pending state Resolution Ensure the table exists for the...

Page 231: ...he case as of HPSS version 5 1 Resolution Create a new identical migration policy and set the disk storage class to use one policy and the tape storage class to use the other Rerun the conversion prog...

Page 232: ...onfiguration or subsystem conversion program from the command line Running lr_db_convert_storagesegdisk utility Converting SFS file encina sfs hpss storagesegdisk 1 The output indicates the name of th...

Page 233: ...ns per sec 55 455049 total time Number of rows read 103749 Number of rows skipped 0 Number of rows loaded 103749 Number of rows rejected 0 Number of rows deleted 0 Number of rows committed 103749 Noti...

Page 234: ...l run of db_convert_collect_info the collect information program The system being converted has two subsystems and all the tables needed in DB2 have already created in database global subsys1 and subs...

Page 235: ...ully from encina sfs hpss serverconfig db_convert_server complete inserted 18 records into DB2 server table Running db_convert_core utility Making Core Server for Subsystem 1 Converted BFS NS and SS i...

Page 236: ..._convert_mps utility Converting SFS file encina sfs hpss mps Converted 1 records successfully from encina sfs hpss mps db_convert_mps complete inserted 1 records into DB2 mps table Running db_convert_...

Page 237: ...hy Converted 21 records successfully from encina sfs hpss hierarchy db_convert_hier complete inserted 21 records into DB2 hier table Running db_convert_migpol utility Converting SFS file encina sfs hp...

Page 238: ...d db_convert_sclassthreshold complete inserted 1 records into DB2 sclassthreshold table Running db_convert_logpolicy utility Converting SFS file encina sfs hpss logpolicy Converted 12 records successf...

Page 239: ...cords successfully from encina sfs hpss acctsum db_convert_acctsum complete inserted 242 records into DB2 acctsum table for subsystem 1 Running db_convert_bfcoschange utility Converting SFS file encin...

Page 240: ...db_convert_nsacl utility Converting SFS file encina sfs hpss nsacls 1 Converted 0 records successfully from encina sfs hpss nsacls 1 db_convert_nsacl complete inserted 0 records into DB2 nsacl table...

Page 241: ...rom encina sfs hpss vvdisk 1 db_convert_vvdisk complete inserted 3 records into DB2 vvdisk table for subsystem 1 Running db_convert_vvtape utility Converting SFS file encina sfs hpss vvtape 1 Converte...

Page 242: ...28063 Number of rows skipped 0 Number of rows loaded 28063 Number of rows rejected 0 Number of rows deleted 0 Number of rows committed 28063 Running lr_db_convert_nsobject utility Converting SFS file...

Page 243: ...986 operations per sec 2 001883 total time Number of rows read 1974 Number of rows skipped 0 Number of rows loaded 1974 Number of rows rejected 0 Number of rows deleted 0 Number of rows committed 197...

Page 244: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 244...

Page 245: ...screte piece of information or set of related information within that object attribute change When referring to a managed object an attribute change is the modification of an object attribute This eve...

Page 246: ...isks The smallest amount of disk space that can be allocated from a virtual volume is a cluster The size of the cluster on any given disk volume is determined by the size of the smallest storage segme...

Page 247: ...tem Physical Volume Library It may or may not include an eject which is the removal of the cartridge from its Physical Volume Repository FDDI Fiber Distributed Data Interface file An object than can b...

Page 248: ...A software package used to implement high availability systems halt A forced shutdown of an HPSS server HDM Shorthand for HPSS DMAP hierarchy See Storage Hierarchy HIMF HPSS Interim Metadata Format H...

Page 249: ...central log contains formatted messages from all enabled HPSS servers residing on the same node as the Log Client Location Server An HPSS server that is used to help clients locate the appropriate Cor...

Page 250: ...re library that provides a programming API to interface HPSS servers with the DB2 programming environment mount An operation in which a cartridge is either physically or logically made readable and or...

Page 251: ...hysical volume may contain data from no more than one virtual volume Physical Volume Library An HPSS server that manages mounts and dismounts of HPSS physical volumes Physical Volume Repository An HPS...

Page 252: ...omputer Cycles RMS Removable Media Service RPC Remote Procedure Call SCSI Small Computer Systems Interface security A log record message type used to log security related events e g authorization fail...

Page 253: ...ecific storage class Migration and stage commands result in data being copied between different storage levels in the hierarchy Each Class of Service has an associated hierarchy storage level The rela...

Page 254: ...ey form a single unit of work All data modified as part of the same transaction are guaranteed to maintain a consistent state whether the transaction is aborted or committed Data modified from one tra...

Page 255: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 255...

Page 256: ...4 3 Installation Guide SC23 4112 01 20 IBM SCSI Device Drivers Installation and User s Guide GC35 0154 01 21 IBM Ultrium Device Drivers Installation and User s Guide GA32 0430 00 1 22 IBM Ultrium Devi...

Page 257: ...rtesy of the IEEE Computer Society Press 35 R Grossman X Qin W Xu H Hulen and T Tyler An Architecture for a Scalable High Performance Digital Library from the 1995 IEEE MSS Symposium courtesy of the I...

Page 258: ...ry for their help with initial requirements reviews We also wish to acknowledge Cornell Information Technologies of Cornell University for providing assistance with naming service and transaction mana...

Page 259: ...tering either a semicolon or a pound sign as the first non white character in a line Use of either of these characters other than as the first character will not be interpreted as a comment It will be...

Page 260: ...R_PASS Default GSS IDENT E g Authentication Mechanism GSS Optional SubStanza specifying the preferred Client Authentication mechanism NOTE this should be GSS if Kerberos Credentials are to be used Sub...

Page 261: ...KB Optional SubStanza specifying the size of the data blocks to be used for parallel data transfers SubStanza Transfer Buffer Size value Value Size May be specified as a decimal number or xMB style no...

Page 262: ...n but will cause users to complain The Authentication Mechanism value is used to determine the preferred authentication mechanism for the PFTP Client If the desired mechanism is to use Kerberos Creden...

Page 263: ...PFTP Client child processes and the Mover s The default value for tape was every 512 MB and for disk was the smaller of the size of 64 storage segments or 512 MB With transfers increasing in performan...

Page 264: ...sfers should use the high speed interfaces Table 13 PFTP Client Interfaces Stanza Fields Configuration Type Abbreviated Description Stanza CMPD PFTP Client Interfaces E g PFTP Client Interfaces Option...

Page 265: ...For HPSS all of these interfaces must be able to connect to the Mover s NOTE If and only if a specific COS is specified these interfaces need only provide connection to the Mover s associated with the...

Page 266: ...eezy clearlake ibm com 192 94 47 226 For all other Client Hosts This allows a single HPSS conf file to be available using a common files system This is ONLY useful for cluster systems that specify Com...

Page 267: ...with a matching Sub Section remote_host or remote_host Dot Notation Interface E g his_name or his_name 100 102 103 45 Contains the hostname in either string format or Dot Notation IP Address of the ho...

Page 268: ...Node then enter the Data Node Interface after the otherwise the Control and Data are the same Control and or Data may be dot notation OR string hostnames Water 134 253 14 227 Default Default If the Da...

Page 269: ...t Receive 1MB Optional SubStanza specifying the default network Read socket size if not specified explicitly SubStanza Default Write Size value E g Default Send Size 1MB Optional SubStanza specifying...

Page 270: ...applies SubSection RFC1323 value Values 0 1 E g RFC1323 1 Optional parameter to specify whether the RFC1323 option should be disabled 0 or enabled any other value SubSection SendSpace value Values Si...

Page 271: ...try in the file matches a connection or if zero is entered for the value of this field is that the size of the write request is the size of the data buffer On some networks e g the SP x switch improve...

Page 272: ...host my_host domain Destination IP Address in Dot Notation 100 101 102 103 The netmask to be applied to the Dest IP Address Netmask 255 255 255 0 Use large IP Windows RFC1323 1 Socket Transmission Siz...

Page 273: ...Daemon Stanza Description Configuration Type Abbreviated Description Stanza CMPD PFTP Daemon Optional Reserved Stanza specifier on Client ONLY Machines Required Stanza on all HPSS PFTP Server systems...

Page 274: ...Support Optional SubStanza used to disable the Transfer Agent support for the PFTP Daemon SubStanza Use the KDC Registry E g Use KDC Registry Replaces S option Optional SubStanza specifying use of the...

Page 275: ...operly configured The default behavior is to put the user in the directory Normally this should be active for Security reasons SubStanza Disable Hints E g Disable Hints Replaces hpss_option HINTS off...

Page 276: ...the debugger NOTE leaving this active will cause significant degradation to the PFTP service SubStanza Must Have Credentials E g Must Have Credentials Replaces a option Optional SubStanza mandating a...

Page 277: ...FTPD and the Movers when performing non parallel transfers Sets the HPSS_HOSTNAME environment variable for the Client API HPSS only SubStanza PFTP Debug Port value E g PFTP Debug Port 6666 Replaces p...

Page 278: ...ab File Name etc v5srvtab Replaces K option and hpss_option KTAB string in ftpaccess Optional SubStanza specifying the Path Name of the Kerberos keytab file containing the service principals for the K...

Page 279: ...gistry for authentication bypassing the passwd file and use of the HPSS homedir and HPSS gecos Extended Registry Attributes ERAs for the users home directory and accounting fields if they are filled S...

Page 280: ...COS from the FileSize Options table Default Ignore the COS in the table SubStanza Compound FileSize Options E g FileSize Options Optional SubStanza specifier Must be terminated with a matching See no...

Page 281: ...Kerberos KDC and in the etc v5srvtab for the PFTP Server executing on the machine mymachine ssm com Non HPSS PFTP daemon only SubStanza Use System Password Files value E g Use System Password Files T...

Page 282: ...ented SubStanza Primary Authenticator Type value Values KEYTAB KEYFILE KEY PASSWD E g Primary Authenticator Type KEYTAB Optional Substanza used to specify the default Authenticator Type SubStanza Prim...

Page 283: ...ecify an Site Specific Authentication Mechanism to be used instead Overloaded of the UserName Password mechanism This option requires a specific recompile of the hpss_pftpd with site specific modules...

Page 284: ...r HPSS Only Disable Hints Permit use of the Trusted Hosts File HPSS Only Allow Trusted Hosts Authentication What Principal to use for HPSS FTP HPSS Only HPSS FTP Principal hpssftp Specify the Keytab c...

Page 285: ...used for the PDATA_PUSH Protocol HPSS Only IOR Listen Port 19199 The Port Range to be used for the non HPSS Parallel FTP Daemon which is necessary for Parallel Transfers non HPSS PFTP Daemon Only Port...

Page 286: ...echanisms This mechanism will be used to authenticate the FTP client end user with the FTP Daemon Values GSS GSI USER_PASS IDENT Default USER_PASS Primary Authentication Mechanism Mapfile Specifier sp...

Page 287: ...ed for the PFTP Daemon machine when acquiring creds This is needed when the servername e g host machinename realm is different between the keytab file and the host machinename obtained where the machi...

Page 288: ...bstanzaused to specify the location of the Transfer Agent file containing Shared File Systems SubStanza Agent File value Value Pathname filename E g Agent File var hpss etc PMTA_Agents Optional Substa...

Page 289: ...on E g Allow Uid Mapping on Optional SubStanza specifying whether to allow Tarnsfer Agent Uid Mapping SubStanza Uid Mapfile value Value Pathname filename E g Uid Mapfile var hpss etc PMTA_UidMapfile O...

Page 290: ...etc ta disabled_node conf The Audit Logfile contains an audit trail of all PMTA activity Audit Logfile tmp pmta_Audit log The Debug Logfile contains debugging output It can be overridden by environmen...

Page 291: ...stanza names specifiers are reserved for future implementation in HPSS and should not be used by application developers Transfer Agent Partially Implemented Pipe File Local File Path PSI HPSS Installa...

Page 292: ...HPSS Installation Guide July 2008 Release 6 2 Revision 2 0 292...

Page 293: ...thname for HPSS var directory HPSS_USER HPSS user name HPSS_USERROOT Root user id HPSS_PATH_DB_INSTALL Pathname for DB bin HPSS_ROOT opt hpss NULL HPSS_HOST H NULL HPSS_NODE_TYPE NULL NULL HPSS_PATH_I...

Page 294: ...al HPSS_PRINCIPAL NULL NULL HPSS_PRINCIPAL_CORE hpsscore NULL HPSS_PRINCIPAL_DMG hpssdmg NULL HPSS_PRINCIPAL_FTPD hpssftp NULL HPSS_PRINCIPAL_GK hpssgk NULL HPSS_PRINCIPAL_HDM hpsshdm NULL HPSS_PRINCI...

Page 295: ...SM_UID NULL HPSS Server Executable Names HPSS_EXEC_ACCT executable name for Accounting HPSS_EXEC_CORE executable name for CORE Server HPSS_EXEC_DMG executable name for DMAP Gateway HPSS_EXEC_FTPD exec...

Page 296: ...BIN hpss_mvr NULL HPSS_EXEC_MVR_TCP HPSS_PATH_BIN hpss_mvr_tcp NULL HPSS_EXEC_NFSD HPSS_PATH_BIN hpss_nfs NULL HPSS_EXEC_PVL HPSS_PATH_BIN hpss_pvl NULL HPSS_EXEC_PVR_AMPEX HPSS_PATH_BIN hpss_pvr_ampe...

Page 297: ..._PATH_VAR log NULL HPSS_UNIX_LOCAL_LOG HPSS_PATH_LOG local log NULL Accounting Unix files HPSS_PATH_ACCT unix path name for accounting files HPSS_UNIX_ACCT_CHECKPOINT checkpoint file HPSS_UNIX_ACCT_RE...

Page 298: ...ORT NULL Gatekeeper Unix files HPSS_PATH_GK unix path name for Gatekeeping files HPSS_UNIX_GK_SITE_POLICY site policy file HPSS_PATH_GK HPSS_PATH_VAR gk NULL HPSS_UNIX_GK_SITE_POLICY HPSS_PATH_GK gksi...

Page 299: ...er HPSS_DESC_HPSSD Descriptive name Startup Daemon HPSS_DESC_HPSSD_SHORT Descriptive name Start Dem short HPSS_DESC_LOGC Descriptive name Log Client HPSS_DESC_LOGC_SHORT Descriptive name Log Client sh...

Page 300: ...PVR NULL HPSS_DESC_PVR_SCSI SCSI PVR NULL HPSS_DESC_SSMSM SSM System Manager NULL System Manager Specific HPSS_PATH_SSM unix path name for data server files HPSS_SSM_ALARMS File to store SSM Alarms E...

Page 301: ...e number of failures for that server has reached HPSS_SM_SRV_CONNECT_FAIL_COUNT After the failure count has been reached the SM will only try to reconnect to the server every HPSS_SM_SRV_CONNECT_INTER...

Page 302: ...LL HPSSSSM_UI_ALARM_RATE SSM_UI_ALARM_RATE NULL HPSSGUI_SEC_MECH NULL NULL HPSSADM_SEC_MECH NULL NULL HPSSGUI_USER_CFG_PATH HPSS_PATH_SSM hpss ssm prefs NULL HPSSADM_USER_CFG_PATH HPSS_PATH_SSM hpss s...

Page 303: ...control whether TCP IP connections are to left open as long as an HPSS file is open or are closed after each read or write operation HPSS_API_USE_PORT_RANGE Used to control whether HPSS Movers should...

Page 304: ...HDM_SERVER_ID 1 NULL HPSS_HDM_SHMEM_KEY 3789 NULL HPSS_PATH_HDM HPSS_PATH_VAR hdm hdm1 NULL DMAP Extended Transaction Specific HPSS_DMAP_TRANS_NUM The number of concurrent extended transactions allowe...

Page 305: ...ROL_PORT 4021 NULL HPSS_FTP_RESERVED 1025 NULL HPSS_FTP_BLOCK_SIZE 4 NULL Security Registry Service Location Specific HPSS_SEC_REALM_NAME Default security realm name HPSS_SITE_NAME Default HPSS site n...

Page 306: ...t of whether SSL is used in the connection to the LDAP server You can still have encrypted communication if you use GSSAPI for example NONE no bind is done unauthenticated access SIMPLE simple i e dn...

Page 307: ..._PASSWD var hpss etc passwd NULL HPSS_UNIX_AUTH_SHADOW var hpss etc shadow NULL HPSS_UNIX_AUTH_GROUP var hpss etc group NULL HPSS_UNIX_USE_SYSTEM_COMMANDS TRUE NULL RPC Specific HPSS_RPC_PORT_RANGE Ra...

Page 308: ...ent override file HPSS_PTHREAD_STACK Stack size for HPSS pthreads HPSS_PATH_ADM HPSS_PATH_VAR adm NULL HPSS_PATH_CORE HPSS_PATH_ADM core NULL HPSS_PATH_TMP HPSS_PATH_VAR tmp NULL HPSS_PATH_ETC HPSS_PA...

Page 309: ...tc The default directory where many UNIX configuration files are placed These files include HPSS conf An ftp configuration file See Appendix D HPSS conf Configuration File auth conf Created by mkhpss...

Page 310: ...tory to hold files for XFS configuration hpssdb The directory to hold the DB2 instance configuration information and CFG database tables krb5kdc The directory for Kerberos configuration files These in...

Page 311: ...HPSS may also write diagnostic log files and disk allocation maps in this directory when configured to do so The lock files are very small but the log files and maps can be very large HPSS Installatio...

Reviews: