Abstract:
Aspects of the disclosure are direct towards managing data overlay in a direct access storage device (DASD) using metadata of data stored within the DASD. The DASD receives user input. The user input includes a value indicating activation of overlay tracking for a track of the DASD. The DASD updates the metadata to indicate overlay tracking activation. The DASD detects a write request from an application to overlay data on the track. In response to overlay tracking being activated for the track, the DASD determines the access method used to transmit the write request. The DASD determines an identifier for the application. The DASD determines the identifier using the protocol of the access method. The DASD records data regarding the write request within the metadata. In response to recording the data regarding the write request, the DASD overlays the track per the write request.
Abstract:
According to embodiments of the invention a method for servicing a problem management record are provided. The method may include creating a problem management record profile from information provided in a problem management record, wherein the information includes characteristics of a client computer system and symptoms of a problem. The method may also include comparing the profile to profiles of previously resolved problem management records to find a profile having at least one matching. The method may also include contrasting information used to obtain a solution to a problem of the previously resolved problem management record to the information provided in the problem management record, wherein information used to obtain a solution which is not provided in the information provided in the problem management record is classified as additional information. The method may also include collecting the additional information, wherein collecting includes searching documentation of the client computer system.
Abstract:
Provided are a computer program product, system, and method for migrating high activity volumes in a mirror copy relationship to lower activity volume groups. A determination is made of usage rates of multiple volume groups, wherein each volume group is comprised of source volumes at a primary site whose data is copied to volumes at a secondary site. A first selected volume group and a second selected volume group are selected based on the determined usage rates of the volume groups. A first volume in the first selected volume group is migrated to a second volume in the second selected volume group. Updates to the first volume, received while migrating the first volume to the second volume, are copied to a mirror first volume mirroring the first volume at the secondary site.
Abstract:
Aspects of the disclosure are direct towards managing data overlay in a direct access storage device (DASD) using metadata of data stored within the DASD. The DASD receives user input. The user input includes a value indicating activation of overlay tracking for a track of the DASD. The DASD updates the metadata to indicate overlay tracking activation. The DASD detects a write request from an application to overlay data on the track. In response to overlay tracking being activated for the track, the DASD determines the access method used to transmit the write request. The DASD determines an identifier for the application. The DASD determines the identifier using the protocol of the access method. The DASD records data regarding the write request within the metadata. In response to recording the data regarding the write request, the DASD overlays the track per the write request.
Abstract:
Provided are a computer program product, system, and method for using an alias volume name for a volume to allocate space to a data set. An assignment of a plurality of volumes to a data set is maintained, wherein the volumes are configured in a storage system. A request is received to extend the data set. An alias volume name is assigned to the data set for a previously assigned volume to the data to extend the data set in response to one of the previously assigned volumes having available space to extend the data set. A base volume name is assigned to the data set for a volume not assigned to the data set in response to one of the previously assigned volumes to the data set not having available space to extend the data set.
Abstract:
Provided are a computer program product, system, and method for determining an ordering to use to open and close programs that call other programs. A dependency file indicates for each calling program at least one called program called by the calling program, wherein a called program that calls another program also comprises a calling program. The dependency file is processed to determine an order in which the called programs are called by the calling programs. A determination is made from the order the called programs called by an invoked calling program. The determined called programs are invoked according to the order. The calling program is invoked in response to invoking the determined called programs. The order indicates the order in which the calling programs and the called programs are invoked so the called programs are invoked before invoking the calling programs that invoke the called programs.
Abstract:
A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. To identify the padded data, the method, system, and computer program product include comparing at least a portion of the first record of the first data set with a second record of a second data set. Next, the method, system, and computer program product include removing, from the first record of the first data set, the padded data.
Abstract:
Resource utilization data for a set of system components of a computing system is collected. The resource utilization data includes performance records for a set of jobs. By analyzing the collected resource utilization data for the set of system components, a resource allocation is identified for a particular job of the set of jobs. A first execution time for the particular job is determined based on the resource allocation for the particular job and the resource utilization data for the set of system components. A location at which to execute the particular job is determined based on how the particular job has been executed at the location previously. The first execution time may be a time when the computer system achieves a resource availability threshold with respect to the resource allocation. Aspects are also directed toward performing the particular job at the first execution time.
Abstract:
For replicating a source storage system, a scan module generates a source storage server description for each source storage server of the source storage system from a scan of the source storage system. The source storage server description includes a replication type and a source volume record for each source logical volume of the source storage server. A provision module determines a number of replicated instances of each source logical volume for a target storage system from the replication type. In addition the provision module generates a target storage server description for each target storage server of the target storage system from each source storage server description in response to the target storage system satisfying a target storage requirement.
Abstract:
Disclosed aspects include managing access to a particular storage unit in a storage facility. The particular storage unit is coupled, in the storage facility, with both a particular storage unit identifier for the particular storage unit and an access management parameter for managing access to data on the particular storage unit. A device is used to identify the particular storage unit for write protection based on the particular storage unit identifier. In embodiments, the device includes an indicator to visually indicate a proper configuration and the particular storage unit identifier can be a world wide name. Aspects of the disclosure include managing the device for connection with the storage facility and access management for the storage facility.