You don't need to run the dsmcad technically speaking. You can just run a dsmc
sched daemon or service.
> On Dec 18, 2015, at 10:47 AM, Henrik Ahlgren wrote:
>
>> On Fri, Dec 18, 2015 at 12:40:46PM +0300, Efim wrote:
>>
>> CAD opens random port because the option WEBPORT
Do you have DDboost licensed? Could always use the boost plugin and go right
to the DD and skip the TSM server.
On Jul 30, 2015, at 1:00 PM, Rhodes, Richard L. rrho...@firstenergycorp.com
wrote:
We purchased a Teredata database system.
It currently is in test/dev stage with little
Like Paul mentioned, great price point for storage you get out of them. No
drives allowed in the frame though if that's an issue for you, I also believe
it will require the enhanced node cards and ALMS feature to be purchased from
what I recall when we purchases ours. There is the ability to
We utilize a redundant tape SAN at our main data centers with multiple host
site HBA ports. Using the Atape control and data path fail-over options we have
twelve device entries for each physical tape device. Works really well and this
is in an AIX/LPAR/VIO environment, we've virtualized the
shared drives and 120x
LTO1's for each server non-shared in multiple DataDomains. I also have LANFree
clients that do not support redundant fabrics.
Thank you,
Andy Huebner
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Mike
De Gasperis
To go along with Andy's recommendations I've seen in TSM server 6.2.3.0
where a query occupancy and a select from occupancy don't match up. Might
be worthwhile to do a:
select * from occupancy where node_name='DC1' and
filespace='\VMFULL-HWDDMZOCULARX1'
See how they compare
-Original
I've never dealt with the EKM but it looks to be a legacy product that will be
phased out by IBM.
You'll want to look at the TKLM product which does require licensing for the
drives that will be encrypting as well as for the actual TKLM servers
themselves. We ended up setting up four TKLM
Forgot to include this link from IBM regarding their EKM support.
http://www-01.ibm.com/support/docview.wss?uid=ssg1S4000504
- Original Message -
Wanda,
As always, thanks for the detailed explanation. However, it brings up lots
of questions.
With externally-managed encryption, the
Good information Keith, we were really shooting to eliminate any in guest
backups if possible with the exception of any hosts that have physical RDM's.
Licensing wise are you guys capacity based or PVU based? We're utilizing PVU
right now so that was another big reason we wanted to pull the
I posted this up on the adsm.org forum but I'm hoping I get more hits here.
We're getting ready to implement the agent at one of our facilities and I'm
curious to see how everyone else is accomplishing some things we did relatively
easy the old way.
How are you scheduling certain VM's at
I've played around with this select before and I've never been able to get it
perfected.
I'm looking for something that will tell me the information below for the
active policy set and default management class
associations.node_name
client_schedules.schedule_name
client_schedules.startdate
I was wondering what everyone else has done for instance ID's on their AIX or
other UNIX systems for the DB2 instance ID. Are there any issues having the ID
with no password but not being allowed to login via telnet/ssh outside of
su'ing from root?
I was also going to request the file ulimit
Are you sure nothing else was possibly using that raw volume?
Wondering if this is the only instance of TSM on this server? I know in my past
experience with SUN systems that you can mistakenly grab raw volumes like this
that may have been in use by something else.
Do you have a q dbv, q logv,
We had a question come up due to some new systems coming online, is IBM
continuing to support the Novell platform after the 5.5 version of it's
TSM client?
The best I can find on the IBM page says it will be supported with the
5.5 client as long as TSM 6.1 is supported but there's no detailed
I was reading through the upgrade guides on IBM's site and I came accross a
section about modifying ownership of any disk volumes so they would be
read/write for the instance owner. I'm assuming this is true for RAW logical
volumes as well but can anyone confirm? For example I was wondering if
15 matches
Mail list logo