Upload
hoanganh
View
234
Download
0
Embed Size (px)
Citation preview
Version 3 Release 2
IBM Db2 Cloning Tool for z/OSUser's Guide
SC27-6556
IBM
Version 3 Release 2
IBM Db2 Cloning Tool for z/OSUser's Guide
SC27-6556
IBM
Note:Before using this information and the product it supports, read the "Notices" topic at the end of this information.
Subsequent editions of this PDF will not be delivered in IBM Publications Center. Always download the latest edition fromthe Db2 Tools Product Documentation page.
March 29, 2019 edition
This edition applies to Version 3 Release 2 of Db2 Cloning Tool for z/OS (product number 5655-N15) and to allsubsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 2006, 2019; Copyright Rocket Software Inc., 2006, 2019.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM Corp.
http://www-304.ibm.com/support/docview.wss?uid=swg27020910
Contents
About this information . . . . . . . . ix
Chapter 1. Db2 Cloning Tool overview. . 1What's new in Db2 Cloning Tool . . . . . . . 1
New and changed functions . . . . . . . . 1Deprecated functions . . . . . . . . . . 6
What does Db2 Cloning Tool do? . . . . . . . 7Cloning definitions . . . . . . . . . . . 8Why clone a Db2 subsystem? . . . . . . . . 8Can I clone a Db2 subsystem without Db2Cloning Tool? . . . . . . . . . . . . . 8Db2 support . . . . . . . . . . . . . 8Volume copy products supported by Db2 CloningTool . . . . . . . . . . . . . . . . 9
Db2 Cloning Tool features and benefits . . . . . 10Service updates and support information . . . . 11Product documentation and updates . . . . . . 11Accessibility features . . . . . . . . . . . 12
Chapter 2. Preparing to customize Db2Cloning Tool . . . . . . . . . . . . 13Set up your environment prior to customization . . 14Function authorization requirements . . . . . . 17Use of the U.S.A. EBCDIC code set . . . . . . 19Filtering pattern masks . . . . . . . . . . 20Worksheets: Gathering required data set names . . 21APF authorizing load libraries . . . . . . . . 24Worksheets: Gathering parameter values for ToolsCustomizer . . . . . . . . . . . . . . 25
Chapter 3. Starting and preparing ToolsCustomizer for use . . . . . . . . . 57Starting Tools Customizer . . . . . . . . . 57Modifying Tools Customizer user settings . . . . 58
Chapter 4. Customizing Db2 CloningTool . . . . . . . . . . . . . . . . 63Roadmap: Customizing Db2 Cloning Tool for thefirst time . . . . . . . . . . . . . . . 63Roadmap: Customizing a new version of Db2Cloning Tool from a previous customization . . . 64Roadmap: Recustomizing Db2 Cloning Tool . . . 65Specifying the metadata library for the product tocustomize . . . . . . . . . . . . . . . 66Discovering Db2 Cloning Tool informationautomatically . . . . . . . . . . . . . . 68Creating and associating Db2 entries . . . . . . 70Defining parameters . . . . . . . . . . . 72
Defining Db2 Cloning Tool parameters . . . . 72Defining LPAR parameters . . . . . . . . 74Defining Db2 parameters . . . . . . . . . 75
Generating customization jobs . . . . . . . . 77Submitting customization jobs . . . . . . . . 78Browsing parameters . . . . . . . . . . . 80
Copying Db2 entries . . . . . . . . . . . 80Removing Db2 entries . . . . . . . . . . . 82Deleting Db2 entries . . . . . . . . . . . 82Displaying customization jobs . . . . . . . . 83Maintaining customization jobs . . . . . . . . 83Using Tools Customizer in a multiple-LPARenvironment . . . . . . . . . . . . . . 84
Chapter 5. After customizing Db2Cloning Tool using Tools Customizer . 85Reviewing the CKZINI PARMLIB member variables 85Verifying successful customization. . . . . . . 86
Using the Installation Verification Process . . . 86Adding Db2 Cloning Tool to the Db2 AdminLaunchpad . . . . . . . . . . . . . . 87Exporting and importing ISPF cloning profiles andsubsystem information . . . . . . . . . . 87
EXPORT command syntax . . . . . . . . 88IMPORT command syntax . . . . . . . . 90
Db2 version migration considerations. . . . . . 91
Chapter 6. Planning for copying andrenaming volumes. . . . . . . . . . 93Selection of source and target volumes . . . . . 93Volume relationship conflicts . . . . . . . . 96Ensure RACF and ACF authorities. . . . . . . 96Data set renaming considerations . . . . . . . 96Target ICF catalog considerations . . . . . . . 96Location of the source and target ICF catalogs . . . 97Target data set ICF catalog aliases . . . . . . . 98Considerations for DFSMS pervasive encryption . . 98Return code choices . . . . . . . . . . . 98Cloning a Db2 subsystem. . . . . . . . . . 99
Chapter 7. Setting up to copy byvolume with FlashCopy, SnapShot, orTimeFinder/Clone . . . . . . . . . 103Db2 Cloning Tool process for volume FlashCopy,SnapShot, or TimeFinder/Clone . . . . . . . 103Steps for volume FlashCopy, SnapShot, orTimeFinder/Clone. . . . . . . . . . . . 104
Chapter 8. Setting up to copy byvolume with an onsite mirror tool . . 107Db2 Cloning Tool process for user-created targetvolume clones . . . . . . . . . . . . . 107Steps for user-created target volumes . . . . . 108Db2 Cloning Tool process for EMCTimeFinder/Mirror target volume clones . . . . 110Steps for EMC TimeFinder/Mirror target volumeclones . . . . . . . . . . . . . . . . 110
iii
Chapter 9. Cloning Db2 subsystems 115Db2 offline cloning . . . . . . . . . . . 116
Db2 offline cloning procedure . . . . . . . 116Steps for Db2 offline cloning . . . . . . . 117Db2 offline cloning with removal of datasharing members procedure . . . . . . . 119Steps for Db2 offline cloning with removal ofdata sharing members . . . . . . . . . 120Db2 offline cloning with target becomingnon-data sharing procedure . . . . . . . 122Steps for Db2 offline cloning with targetbecoming non-data sharing. . . . . . . . 123
Db2 online cloning . . . . . . . . . . . 125Status of transactions in flight . . . . . . . 126Db2 online cloning procedure . . . . . . . 127Steps for Db2 online cloning . . . . . . . 128Db2 online cloning with removal of datasharing members procedure . . . . . . . 132Steps for Db2 online cloning with removal ofdata sharing members . . . . . . . . . 134Db2 online cloning with target becomingnon-data sharing procedure . . . . . . . 138Steps for Db2 online cloning with targetbecoming non-data sharing. . . . . . . . 140
Chapter 10. Subsystem cloning usingthe Db2 Cloning Tool storedprocedure . . . . . . . . . . . . . 147About the Db2 Cloning Tool stored procedure . . 147Migrating the stored procedure from Db2 CloningTool V3.1 . . . . . . . . . . . . . . . 148Steps for cloning a Db2 subsystem using the storedprocedure . . . . . . . . . . . . . . 150Parameter files and parameter descriptions . . . 150Calling the stored procedure . . . . . . . . 163Using a REXX EXEC to call the stored procedure 164Verifying the cloning . . . . . . . . . . . 165
JCL members generated by the stored procedure 166Building and running the verified cloning . . . . 167Stored procedure results set . . . . . . . . 167Recloning a Db2 system . . . . . . . . . . 168Stored procedure example: Cloning a non-datasharing subsystem. . . . . . . . . . . . 168Stored procedure example: Cloning by data set . . 169Stored procedure example: Cloning from asystem-level backup . . . . . . . . . . . 171Stored procedure example: Cloning from Db2system-level backup dump tapes . . . . . . . 172Stored procedure example: Cloning from Db2system-level backup dump tapes across sysplexes . 174
Chapter 11. Db2 Cloning Tool TableSpace Cloning overview. . . . . . . 177What does Db2 Cloning Tool Table Space Cloningdo? . . . . . . . . . . . . . . . . . 177Why you should use Db2 Cloning Tool Table SpaceCloning . . . . . . . . . . . . . . . 178Db2 Cloning Tool Table Space Cloning features andbenefits . . . . . . . . . . . . . . . 179
Db2 Cloning Tool Table Space Cloning terminology- Db2 objects vs. VSAM objects . . . . . . . 179Use of the U.S.A. EBCDIC code set . . . . . . 180
Chapter 12. Planning for copying Db2table spaces by data set . . . . . . 181Considerations for in-progress read/write activityor Db2 utilities . . . . . . . . . . . . . 181Considerations for the Db2 Cloning Tool TableSpace Cloning cloning process. . . . . . . . 181
Subsystem copy rules . . . . . . . . . 181Renaming table spaces and index spaces . . . 182Implicitly created objects . . . . . . . . 182Identity columns . . . . . . . . . . . 183LOBs, BLOBs, CLOBs, and DBCLOBs . . . . 183XML considerations . . . . . . . . . . 183DDF and TCP/IP considerations . . . . . . 184Object attributes . . . . . . . . . . . 185Object compatibility checking . . . . . . . 186APF authorization . . . . . . . . . . . 187Ensure RACF and ACF authorities . . . . . 187Missing target table spaces and index spaces 187Considerations for target objects created usingDEFINE NO. . . . . . . . . . . . . 188Considerations for DFSMS pervasive encryption 189Non-SMS managed volumes . . . . . . . 191Space processing order . . . . . . . . . 192How Db2 Cloning Tool Table Space Cloningstarts and stops table spaces and index spaces . 192Message output . . . . . . . . . . . 193
Considerations for Db2 Version 9.1 and later . . . 194Considerations for data set renaming . . . . . 195Considerations for using FUZZY-COPY . . . . 195Considerations for generating target object DDLusing PROCESS-DDL. . . . . . . . . . . 195
Sample DDL processing scenarios . . . . . 197Considerations for using catalog prefetch topopulate the object cache . . . . . . . . . 198
Considerations for caching indexes . . . . . 199Using a local TCP/IP server to populate thetarget cache for multiple source copy jobs . . . 200
Return code choices . . . . . . . . . . . 201Plans and packages . . . . . . . . . . . 201Dropped and altered tables . . . . . . . . . 201Copying versioned objects . . . . . . . . . 202
Chapter 13. Db2 Cloning Tool TableSpace Cloning function overview . . . 203Source job overview . . . . . . . . . . . 203Target job overview . . . . . . . . . . . 203TCP/IP server job overview (optional) . . . . . 204Report job overview (optional) . . . . . . . 204Source job details . . . . . . . . . . . . 204
Source job - Init phase I . . . . . . . . . 204Source job - Discovery phase II . . . . . . 205Source job - Eligibility phase III . . . . . . 205Source job - Copy phase IV. . . . . . . . 206
Target job details . . . . . . . . . . . . 207TCP/IP server job details (optional) . . . . . . 208Report job details (optional) . . . . . . . . 210
iv Db2 Cloning Tool User's Guide
CKZFIX job details (optional) . . . . . . . . 213Runtime repository functionality overview . . . 213
Chapter 14. Setup procedures forcopy by data set with FlashCopy,SnapShot, or TimeFinder/Clone . . . 215Setup for scenario 1: FlashCopy, SnapShot, orTimeFinder/Clone - All target table spaces andindex spaces already exist in Db2 catalog . . . . 215
Step 1: Create target Db2 table spaces and indexspaces in the target Db2 catalog . . . . . . 215Step 2: Set up and execute source job(CKZ1SRC) . . . . . . . . . . . . . 216Step 3: Set up and execute target job (CKZTRG) 220
Setup for scenario 2: FlashCopy, SnapShot, orTimeFinder/Clone - Some or all target table spacesand index spaces do not exist in Db2 catalog . . . 223
Step 1: Create target Db2 table spaces and indexspaces in the target Db2 catalog (if required) . . 224Step 2: Set up and execute source job(CKZ2SRC) . . . . . . . . . . . . . 225Step 3 (Optional): Create missing target tablespaces and index spaces . . . . . . . . . 229Step 4: Set up and execute optional FIX job(CKZFIX). . . . . . . . . . . . . . 230Step 5: Set up for a re-run of the source job . . 231Step 6: Set up and execute target job (CKZTRG) 231
Chapter 15. Set up procedures forcopy by data set for all othermethodologies . . . . . . . . . . . 235Setup for scenario 3: Other copy methodologies -all target table spaces and index spaces alreadyexist in Db2 catalog . . . . . . . . . . . 235
Step 1: Verify/create target Db2 table spaces andindex spaces in target Db2 catalog . . . . . 235Step 2: Set up and execute source job(CKZ3SRC) . . . . . . . . . . . . . 236Step 3 (Optional): Set up and execute stop targetjob (CKZSTPT) . . . . . . . . . . . . 240Step 4 (Optional): Set up and execute stopsource job (CKZSTPS) . . . . . . . . . 241Step 5: Set up and execute non-Db2 CloningTool Table Space Cloning job to execute data setcopies outside Db2 Cloning Tool Table SpaceCloning . . . . . . . . . . . . . . 242Step 6 (Optional): Set up and execute job tore-start source Db2 table spaces and indexspaces (CKZSTRS) . . . . . . . . . . . 242Step 7: Set up and execute target job (CKZTRG) 243
Setup for scenario 4: Other copy methodologies -some or all target table spaces and index spaces donot exist in Db2 catalog . . . . . . . . . . 247
Step 1: Create target Db2 table spaces and indexspaces in target Db2 catalog . . . . . . . 247Step 2: Set up source job (CKZ4SRC) . . . . 248Step 3 (Optional): Set up stop target job(CKZSTPT) . . . . . . . . . . . . . 253Step 4 (Optional): Set up stop source job(CKZSTPS) . . . . . . . . . . . . . 254
Step 5: Set up non-Db2 Cloning Tool TableSpace Cloning job to execute data set copiesoutside Db2 Cloning Tool Table Space Cloning . 255Step 6 (Optional): Set up job to re-start sourceDb2 table spaces and index spaces (CKZSTRS) . 255Step 7 (Optional): Create missing target tablespaces and index spaces . . . . . . . . . 256Step 8 (Optional): Set up job to make copiedVSAM objects available to target Db2 (CKZFIX) . 257Step 9: Set up for a re-run of the source job . . 258Step 10: Set up and execute target job(CKZTRG) . . . . . . . . . . . . . 258
Chapter 16. Procedures for cloningDb2 table spaces and index spaces. . 263Copy procedure 1: FlashCopy, SnapShot, orTimeFinder/Clone setup - when all target tablespaces and index spaces already exist in Db2catalog . . . . . . . . . . . . . . . 263
Step 1: Verify/create target Db2 table spaces andindex spaces in target Db2 catalog . . . . . 263Step 2 (Optional): Submit TCP/IP server job . . 264Step 3 (Optional): Submit source TCP/IP serverjob . . . . . . . . . . . . . . . . 264Step 4: Submit source job . . . . . . . . 264Step 5: Submit target job . . . . . . . . 264
Copy procedure 2: FlashCopy, SnapShot, orTimeFinder/Clone setup - when some or all targettable spaces and index spaces do not exist in Db2catalog . . . . . . . . . . . . . . . 265
Step 1: Verify/create target Db2 table spaces andindex spaces in target Db2 catalog . . . . . 265Step 2 (Optional): Submit TCP/IP server job . . 265Step 3 (Optional): Submit source TCP/IP serverjob . . . . . . . . . . . . . . . . 266Step 4: Submit source job . . . . . . . . 266Step 5: Create missing target Db2 table spacesand index spaces - manually or using non-Db2Cloning Tool Table Space Cloning Tool . . . . 267Step 6: Submit FIX job on target z/OS system(CKZFIX). . . . . . . . . . . . . . 267Step 7: Rerun source job . . . . . . . . . 267Step 8: Submit target job . . . . . . . . 267
Copy procedure 3: All other copy methodologies -All target table spaces and index spaces alreadyexist in Db2 catalog . . . . . . . . . . . 268
Step 1: Verify/create target Db2 table spaces andindex spaces in target Db2 catalog . . . . . 268Step 2 (Optional): Submit TCP/IP server job . . 268Step 3 (Optional): Submit source TCP/IP serverjob . . . . . . . . . . . . . . . . 269Step 4: Submit source job . . . . . . . . 269Step 5: Submit job CKZSTPT to stop target Db2table spaces and index spaces . . . . . . . 269Step 6: Submit job CKZSTPS to stop source Db2table spaces and index spaces . . . . . . . 269Step 7: Submit non-Db2 Cloning Tool TableSpace Cloning job to copy VSAM objects . . . 269Step 8: Submit job CKZSTRS to start source Db2table spaces and index spaces . . . . . . . 269Step 9: Rerun source job . . . . . . . . . 270
Contents v
||
Step 10: Submit target job . . . . . . . . 270Copy procedure 4: All other copy methodologies -some or all target table spaces and index spaces donot exist in Db2 catalog . . . . . . . . . . 270
Step 1: Verify/create target Db2 table spaces andindex spaces in target Db2 catalog . . . . . 271Step 2 (Optional): Submit TCP/IP server job . . 271Step 3 (Optional): Submit source TCP/IP serverjob . . . . . . . . . . . . . . . . 271Step 3: Submit source job . . . . . . . . 271Step 5: Create missing target Db2 table spacesand index spaces . . . . . . . . . . . 272Step 6: Submit job CKZSTPT to stop target Db2table spaces and index spaces . . . . . . . 272Step 7: Submit job CKZSTPS to stop source Db2table spaces and index spaces . . . . . . . 273Step 8: Submit non-Db2 Cloning Tool TableSpace Cloning job to copy VSAM objects . . . 273Step 9: Submit job CKZSTRS to restart sourceDb2 table spaces and index spaces . . . . . 273Step 10: Submit FIX job on target z/OS system(CKZFIX). . . . . . . . . . . . . . 273Step 11: Rerun the source job to prepare targetjob . . . . . . . . . . . . . . . . 273Step 12: Submit target job . . . . . . . . 274
Chapter 17. Using data masking withtable space cloning. . . . . . . . . 275Source job changes . . . . . . . . . . . 276Specifying the masking rule . . . . . . . . 277
MASKRULE(STATIC, numeric | “date_or_time” |“string”) . . . . . . . . . . . . . . 277MASKRULE(MASK, “pattern”, start, end) . . . 278MASKRULE(PATTERN, “pattern”, “use_sources”) 280MASKRULE(RANDOM, “min”, “max”,“check_bounds”)MASKRULE(RANDOM, "min_timestampz","max_timestampz", "min_timezone","max_timezone", "check_bounds") . . . . . . 282MASKRULE(USEREXIT, module) . . . . . . 283MASKRULE(SEQUENCE, initial_value,increment). . . . . . . . . . . . . . 284MASKRULE(SCRAMBLE) . . . . . . . . 284MASKRULE(CURRENT DATE)MASKRULE(CURRENT TIME)MASKRULE(CURRENT TIMESTAMP,"timezone") . . . . . . . . . . . . . 285MASKRULE(CURRENT USER) . . . . . . 285
Target job changes. . . . . . . . . . . . 286Examples of masking jobs . . . . . . . . . 287
Chapter 18. Using image copies toclone table spaces and index spaces . 295Steps for cloning from image copies (includingindex rebuilds) . . . . . . . . . . . . . 296Selecting a specific image copy to use as thecloning source . . . . . . . . . . . . . 297Selecting the last image copy to use as the cloningsource . . . . . . . . . . . . . . . . 298Source job changes for cloning from image copies 298
Chapter 19. Using LOG-APPLY tomake consistent copies of tablespaces and index spaces . . . . . . 301Source job changes . . . . . . . . . . . 302Using LOG-APPLY across multiple LPARs. . . . 303Target job changes. . . . . . . . . . . . 303
Chapter 20. Options for rebuildingindexes . . . . . . . . . . . . . . 305Recommendations when rebuilding indexes . . . 306Method 1: Intelligent rebuild . . . . . . . . 307Method 2: Using job templates in the source job 308Method 3: Using job templates in the target job . . 308
Chapter 21. Using job templates . . . 311Predefined processing variables . . . . . . . 312Data set processing variables . . . . . . . . 313Block processing variables . . . . . . . . . 314Job templates for utilities . . . . . . . . . 314Job templates for cloning consistent FlashCopydata sets to Db2 data sets using IBM SterlingConnect:Direct . . . . . . . . . . . . . 316
Using the ISPF interface and job templates toclone with IBM Sterling Connect:Direct . . . . 318Cloning source VSAM files using SterlingConnect:Direct . . . . . . . . . . . . 319
Chapter 22. Using the ISPF interface 321The Db2 Cloning Tool ISPF interface . . . . . 321Configuring Db2 subsystems . . . . . . . . 322
Configuring a subsystem . . . . . . . . 323Configuring user settings . . . . . . . . . 324
Setting job card defaults . . . . . . . . . 324Setting subsystem cloning defaults . . . . . 325Setting table space cloning defaults . . . . . 335
Creating cloning jobs using the interface . . . . 370Creating a profile . . . . . . . . . . . 370
Subsystem cloning. . . . . . . . . . . . 371Subsystem cloning steps summary . . . . . 371Step summary for subsystem cloning from asystem-level backup . . . . . . . . . . 371Select source and target subsystems . . . . . 372Add or verify high level qualifiers . . . . . 374Specify source and target volume pairings. . . 374Specify source and target ICF catalogs . . . . 375Specify rename masks for source and target datasets. . . . . . . . . . . . . . . . 375Build the cloning jobs from a profile. . . . . 376Submit the jobs. . . . . . . . . . . . 385
Table space cloning . . . . . . . . . . . 386Table space cloning steps summary . . . . . 386Select the source and target Db2 subsystems . . 387Edit the source job . . . . . . . . . . 387Verify the target job settings . . . . . . . 388Verify the report job settings . . . . . . . 389Verify the TCP/IP server job settings . . . . 389Verify the source TCP/IP server job settings . . 389Build the table space cloning jobs from a profile 390Submit the jobs. . . . . . . . . . . . 391
vi Db2 Cloning Tool User's Guide
Table space cloning across multiple profiles . . 391
Chapter 23. Table spacing cloningusing z/OSMF REST services . . . . 395Sample members and descriptions . . . . . . 395Variable input file parameters . . . . . . . . 396
Considerations for multi-line variable values 401Considerations for multi-line variable valuesin a JSON request body . . . . . . . . 402
Configuring and running the workflow . . . . 403Running the workflow via REST services . . . 404Running the workflow via the z/OSMF webbrowser-based interface . . . . . . . . . 406
Chapter 24. Cloning table spaces fromDb2 Administration Tool. . . . . . . 409
Chapter 25. Db2 Cloning ToolSubsystem Cloning commands. . . . 411BACKINFO-REFORMAT . . . . . . . . . 412
BACKINFO-REFORMAT command syntax . . 413BACKINFO-REFORMAT command andkeyword definitions . . . . . . . . . . 415BACKINFO-REFORMAT step JCL examples . . 417
BCSCLEAN . . . . . . . . . . . . . . 420BCSCLEAN command syntax . . . . . . . 420BCSCLEAN command and keyword definitions 421BCSCLEAN step JCL examples . . . . . . 423
COPY . . . . . . . . . . . . . . . . 425COPY command syntax . . . . . . . . . 429COPY command and keyword definitions . . . 430COPY step JCL example . . . . . . . . . 448
COPY-BY-DS . . . . . . . . . . . . . 451Planning for subsystem cloning by data set . . 451COPY-BY-DS command syntax . . . . . . 452COPY-BY-DS command and keyworddefinitions . . . . . . . . . . . . . 453COPY-BY-DS step JCL example . . . . . . 456
COPYCHECK . . . . . . . . . . . . . 457COPYCHECK command syntax . . . . . . 458COPYCHECK command and keyworddefinitions . . . . . . . . . . . . . 458COPYCHECK step JCL example . . . . . . 459
DB2ALTERBSDS . . . . . . . . . . . . 460DB2ALTERBSDS command syntax . . . . . 461DB2ALTERBSDS command and keyworddefinitions . . . . . . . . . . . . . 461DB2ALTERBSDS step JCL example . . . . . 463
DB2FIX . . . . . . . . . . . . . . . 466DB2FIX command syntax . . . . . . . . 467DB2FIX command and keyword definitions . . 468DB2FIX step JCL example . . . . . . . . 470
DB2GETBACKINFO . . . . . . . . . . . 471DB2GETBACKINFO command syntax . . . . 472DB2GETBACKINFO command and keyworddefinitions . . . . . . . . . . . . . 472DB2GETBACKINFO step JCL examples . . . 475
DB2LGRNXCLEAN . . . . . . . . . . . 477DB2LGRNXCLEAN command syntax . . . . 478
DB2LGRNXCLEAN command and keyworddefinitions . . . . . . . . . . . . . 478DB2LGRNXCLEAN step JCL example . . . . 479
DB2RBLDBSDS. . . . . . . . . . . . . 480DB2RBLDBSDS command syntax. . . . . . 480DB2RBLDBSDS command and keyworddefinitions . . . . . . . . . . . . . 480DB2RBLDBSDS step JCL example . . . . . 482
DB2SCHEMA-UPDATE . . . . . . . . . . 483DB2SCHEMA-UPDATE command syntax . . . 484DB2SCHEMA-UPDATE command and keyworddefinitions . . . . . . . . . . . . . 485DB2SCHEMA-UPDATE step JCL example . . . 488
DB2SETLOG . . . . . . . . . . . . . 488DB2SETLOG command syntax . . . . . . 489DB2SETLOG command and keyword definitions 489DB2SETLOG step JCL example . . . . . . 490
DB2SQL . . . . . . . . . . . . . . . 491DB2SQL command syntax . . . . . . . . 492DB2SQL command and keyword definitions . . 493DB2SQL step JCL example . . . . . . . . 496
DB2START . . . . . . . . . . . . . . 497DB2START command syntax . . . . . . . 498DB2START command and keyword definitions 499DB2START step JCL example . . . . . . . 501
DB2STOP. . . . . . . . . . . . . . . 502DB2STOP command syntax. . . . . . . . 502DB2STOP command and keyword definitions 503DB2STOP step JCL example . . . . . . . 504
DB2UPDATE . . . . . . . . . . . . . 504DB2UPDATE command syntax . . . . . . 506DB2UPDATE command and keyworddefinitions . . . . . . . . . . . . . 507DB2UPDATE step JCL example . . . . . . 511
DB2UTILXCLEAN . . . . . . . . . . . 515DB2UTILXCLEAN command syntax . . . . 515DB2UTILXCLEAN command and keyworddefinitions . . . . . . . . . . . . . 516DB2UTILXCLEAN step JCL example . . . . 517Step JCL example to identify objects with UTstatus . . . . . . . . . . . . . . . 517
DB2XCFCLEAN . . . . . . . . . . . . 518DB2XCFCLEAN command syntax . . . . . 519DB2XCFCLEAN command and keyworddefinitions . . . . . . . . . . . . . 519DB2XCFCLEAN step JCL example . . . . . 520
FINDUCATS . . . . . . . . . . . . . 520FINDUCATS command syntax . . . . . . 521FINDUCATS command and keyworddefinitions . . . . . . . . . . . . . 521FINDUCATS step JCL example . . . . . . 522
JRNLUPGRADE . . . . . . . . . . . . 522JRNLUPGRADE command syntax . . . . . 524JRNLUPGRADE command and keyworddefinitions . . . . . . . . . . . . . 524JRNLUPGRADE step JCL example . . . . . 524
ONLINECLIP . . . . . . . . . . . . . 525ONLINECLIP command syntax . . . . . . 526ONLINECLIP command and keyworddefinitions . . . . . . . . . . . . . 526ONLINECLIP step JCL example . . . . . . 526
Contents vii
RENAME . . . . . . . . . . . . . . 527RENAME command syntax . . . . . . . 527RENAME command and keyword definitions 530RENAME step JCL example . . . . . . . 543
RESTORE-FROM-DUMPTAPES . . . . . . . 544RESTORE-FROM-DUMPTAPES commandsyntax . . . . . . . . . . . . . . . 546RESTORE-FROM-DUMPTAPES command andkeyword definitions . . . . . . . . . . 546RESTORE-FROM-DUMPTAPES step JCLexample . . . . . . . . . . . . . . 550
UCATOPTIONS . . . . . . . . . . . . 552UCATOPTIONS command syntax . . . . . 553UCATOPTIONS command and keyworddefinitions . . . . . . . . . . . . . 553UCATOPTIONS step JCL example . . . . . 554
VARYOFF . . . . . . . . . . . . . . 555VARYOFF command syntax . . . . . . . 556VARYOFF command and keyword definitions 556VARYOFF step JCL example . . . . . . . 558
VARYON. . . . . . . . . . . . . . . 560VARYON command syntax. . . . . . . . 560VARYON command and keyword definitions 560VARYON step JCL example . . . . . . . 562
VOLOPTIONS . . . . . . . . . . . . . 564VOLOPTIONS command syntax . . . . . . 565VOLOPTIONS command and keyworddefinitions . . . . . . . . . . . . . 566VOLOPTIONS step JCL example . . . . . . 568
Chapter 26. Db2 Cloning Tool TableSpace Cloning commands . . . . . . 569COPY . . . . . . . . . . . . . . . . 569
COPY command syntax . . . . . . . . . 570COPY command and keyword definitions . . . 573OBJECT-TRANSLATE considerations . . . . 613DDL-ATTRIBUTE-CHANGE parameter values 614GLOBAL command values for EMCTimeFinder/Clone Mainframe Snap Facility dataset level support . . . . . . . . . . . 617
DATASUBTYPE . . . . . . . . . . . . 619DATASUBTYPE command syntax . . . . . 620DATASUBTYPE command & keyworddefinitions . . . . . . . . . . . . . 620
HLQDDDF . . . . . . . . . . . . . . 620HLQDDDF command syntax . . . . . . . 620HLQDDDF command and keyword definitions 621
LISTDEF . . . . . . . . . . . . . . . 621LISTDEF command syntax . . . . . . . . 624LISTDEF command and keyword definitions 624
SET. . . . . . . . . . . . . . . . . 627SET command syntax . . . . . . . . . 627SET command and keyword definitions . . . 628
Chapter 27. Troubleshooting . . . . . 643Messages . . . . . . . . . . . . . . . 643
Messages and descriptions . . . . . . . . 643How to look up message explanations . . . 1044
Gathering diagnostic information . . . . . . 1045Gathering maintenance level information with theDISPLAY MEPL command . . . . . . . . 1046Validating load module contents withMODLEVEL . . . . . . . . . . . . . 1046Tools Customizer troubleshooting . . . . . . 1047
Gathering diagnostic information . . . . . 1048Determining the trace data set name . . . . 1048
Chapter 28. Tools Customizerreference. . . . . . . . . . . . . 1049Tools Customizer terminology and data sets. . . 1049
Tools Customizer terminology . . . . . . 1049Data sets that Tools Customizer uses duringcustomization . . . . . . . . . . . . 1052
Chapter 29. Reference . . . . . . . 1055Cloning scenarios . . . . . . . . . . . 1055
Volume cloning using an interim set ofvolumes . . . . . . . . . . . . . . 1055Volume cloning using multiple interim sets ofvolumes . . . . . . . . . . . . . . 1061Db2 subsystem cloning using data set copy 1070Db2 subsystem cloning from a Db2 BACKUPSYSTEM backup . . . . . . . . . . . 1072Db2 subsystem cloning to a specific point intime from a Db2 BACKUP SYSTEM backup . . 1083Db2 subsystem cloning from Db2 BACKUPSYSTEM dump tapes . . . . . . . . . 1099Db2 subsystem cloning from other system levelbackups when backup volumes are online . . 1106Db2 subsystem cloning from other system levelbackups when backup volumes are offline . . 1112
CKZINI customization values . . . . . . . 1119Structure of the CKZINI member . . . . . 1119Syntax rules . . . . . . . . . . . . 1119About Db2 Cloning Tool Table Space Cloningtoken errors . . . . . . . . . . . . 1120CKZINI keyword syntax and descriptions . . 1121
Deallocating target Db2 coupling facilitystructures . . . . . . . . . . . . . . 1136Previous changes to Db2 Cloning Tool. . . . . 1137
Notices . . . . . . . . . . . . . 1153
Index . . . . . . . . . . . . . . 1157
viii Db2 Cloning Tool User's Guide
About this information
Db2® Cloning Tool for z/OS® (also referred to as Db2 Cloning Tool) makes it easyto quickly clone a Db2 subsystem or a Db2 table space. Db2 Cloning Tool can alsobe used to clone non-Db2 volumes.
These topics provide instructions for installing, configuring, and using Db2Cloning Tool.
These topics are designed to help database administrators, system programmers,application programmers, and system operators perform these tasks:v Plan for the installation of Db2 Cloning Toolv Install and operate Db2 Cloning Toolv Customize your Db2 Cloning Tool environmentv Diagnose and recover from Db2 Cloning Tool problemsv Design and write applications for Db2 Cloning Toolv Use Db2 Cloning Tool with other Db2 products
Tip: To find the most current version of this information, always use IBM®
Knowledge Center, which is updated more frequently than PDF books.
ix
https://www.ibm.com/support/knowledgecenter/https://www.ibm.com/support/knowledgecenter/
x Db2 Cloning Tool User's Guide
Chapter 1. Db2 Cloning Tool overview
Db2 Cloning Tool for z/OS (also referred to as Db2 Cloning Tool) makes it easy toquickly clone a Db2 subsystem or a Db2 table space.
Db2 Cloning Tool can also be used to clone non-Db2 volumes.
What's new in Db2 Cloning ToolThis section describes recent technical changes to Db2 Cloning Tool.
New and changed information is marked like this paragraph, with a vertical bar tothe left of a change. Editorial changes that have no technical significance are notmarked.
Older changes and enhancements are described in “Previous changes to Db2Cloning Tool” on page 1137.
New and changed functionsThis topic summarizes the recent enhancements and changes in Db2 Cloning Tool.
March 29, 2019
Description Related APARs
The USE-RUNTIME-REPOSITORY functionality was enhanced andthe documentation updated to describe restartability of the tablespace cloning target job. The following topics were added orupdated, and messages were updated and added for thisenhancement:
v “Target job overview” on page 203v “Report job details (optional)” on page 210v “Runtime repository functionality overview” on page 213v Chapter 18, “Using image copies to clone table spaces and index
spaces,” on page 295
v ISPF interface topics “Table space cloning DD descriptions” onpage 338, “SET command defaults” on page 341, and “COPYcommand defaults” on page 347
v “COPY command and keyword definitions” on page 573v “SET command and keyword definitions” on page 628
PH09043
The topic “DB2SCHEMA-UPDATE” on page 483 was updated toadd details about how the command works.
None
1
|||
Description Related APARs
Updates to the scenario topics provide additional details forsubsystem cloning when ICF catalogs may already reside on thetarget volumes. The following topics were updated:
v “Volume cloning using an interim set of volumes” on page 1055v “Volume cloning using multiple interim sets of volumes” on page
1061
v “Db2 subsystem cloning from a Db2 BACKUP SYSTEM backup”on page 1072
v “Db2 subsystem cloning to a specific point in time from a Db2BACKUP SYSTEM backup” on page 1083
v “Db2 subsystem cloning from other system level backups whenbackup volumes are online” on page 1106
v “Db2 subsystem cloning from other system level backups whenbackup volumes are offline” on page 1112
None
Access to the BPX.FILEATTR.APF FACILITY class profile is nolonger required to use log apply functionality with Db2 CloningTool Table Space Cloning. The topic “Function authorizationrequirements” on page 17 was updated.
PH05570
Information was added to “Set up your environment prior tocustomization” on page 14 to include the requirement for all cloningjobs to be at the same maintenance level.
None
The default for TCPIP_ENCRYPTION_ENABLE was changed to Nin “CKZINI keyword syntax and descriptions” on page 1121 andtext was added stating that this parameter must be set to the samevalue on the source and the target systems.
None
January 25, 2019
Description Related APARs
Support was added for subsystem and table space cloning whenpervasive data encryption in DFSMS and Db2 V12 with functionlevel 502 is implemented. The following topics were updated oradded:
v Information was added to the Db2 Cloning Tool SubsystemCloning topic “Considerations for DFSMS pervasive encryption”on page 98.
v The ENCRYPTION-MISMATCH-RC parameter was added to theISPF interface topic “COPY command defaults” on page 347 andthe Db2 Cloning Tool Table Space Cloning topics “COPYcommand syntax” on page 570 and “COPY command andkeyword definitions” on page 573.
v The KEYLABEL parameter was added to the Db2 Cloning ToolTable Space Cloning topic “DDL-ATTRIBUTE-CHANGEparameter values” on page 614.
v The TCPIP_ENCRYPTION_ENABLE and TCPIP_KEY_LABELparameters were added to the CKZINI PARMLIB member asdescribed in “CKZINI keyword syntax and descriptions” on page1121.
v The topic “Db2 subsystem cloning using data set copy” on page1070 was updated.
PH05821
2 Db2 Cloning Tool User's Guide
Description Related APARs
Support was added to allow you to specify DDF dynamic locationaliases for the subsystem cloning DB2UPATE command. Thefollowing topics were modified and messages were updated:
v Stored procedure topic “Parameter files and parameterdescriptions” on page 150.
v ISPF interface topic “Specifying information for subsystemcloning” on page 323.
v Subsystem cloning command topics “DB2UPDATE commandsyntax” on page 506 and “DB2UPDATE command and keyworddefinitions” on page 507.
PH05491
Doc clarifications were made to describe the behavior of the tablespace cloning COPY parameter COPY-IJ-TO-NONEXISTENT-TARGET. The following topics were updated:
v “Considerations for target objects created using DEFINE NO” onpage 188.
v ISPF interface topic “COPY command defaults” on page 347.v Table space cloning topic “COPY command and keyword
definitions” on page 573.
None
Documentation updates include the following:
v The job names that are generated by Tools Customizer wereupdated and a section was added that describes the job namingconventions. The topic “Worksheets: Gathering parameter valuesfor Tools Customizer” on page 25 was updated.
v The ISSUE-UCAT-UNALLOCATE keyword was missing from theDb2 Cloning Tool Subsystem Cloning RENAME command. Thekeyword and its parameters were added to “RENAME commandsyntax” on page 527 and “RENAME command and keyworddefinitions” on page 530.
v Db2 Cloning Tool removes the SLB information from the BSDS aspart of Db2 conditioning; the topic “DB2UPDATE” on page 504was updated with this information.
v Information about cloning a mixture of explicitly and implicitlycreated objects was added to “Implicitly created objects” on page182.
v Many messages were renumbered and updated in the “Db2Cloning Tool messages” on page 704 reference.
PH06199
The KEEP-VOLUMES-SEQUENCE keyword was incorrect in sometopics and has been corrected. The topics “Parameter files andparameter descriptions” on page 150, “Db2 subsystem cloning froma Db2 BACKUP SYSTEM backup” on page 1072, and “Db2subsystem cloning from Db2 BACKUP SYSTEM dump tapes” onpage 1099 were updated.
None
Chapter 1. Db2 Cloning Tool overview 3
2018-11-15
Description Related APARs
Job templates were added that can be used to clone consistentFlashCopy® data sets from the source system to Db2 data sets onthe target system using Sterling Connect:Direct®. The followingtopic were added:
v “Job templates for cloning consistent FlashCopy data sets to Db2data sets using IBM Sterling Connect:Direct” on page 316
v “Using the ISPF interface and job templates to clone with IBMSterling Connect:Direct” on page 318
v “Cloning source VSAM files using Sterling Connect:Direct” onpage 319
PI87947
An Installation Verification Process (IVP) was added for Db2Cloning Tool Table Space Cloning. The topic “Using the InstallationVerification Process” on page 86 was added and the topics“Worksheets: Gathering parameter values for Tools Customizer” onpage 25 and “Verifying successful customization” on page 86 weremodified.
PH03430
Tools Customizer parameters were added to add additional indexeson the Db2 catalog tables and to provide a buffer pool name forthose additional indexes to help improve the performance of theDB2SCHEMA-UPDATE command. The topic “Worksheets:Gathering parameter values for Tools Customizer” on page 25 wasupdated.
PH04472
The SOURCE-TCPIP-STC-NAME and TCPIP-STC-NAMEparameters were clarified in the topic “SET command and keyworddefinitions” on page 628.
None
The LISTDEF command description was enhanced to describe howCOPY command keywords can impact the construction of theLISTDEF command. The topics “LISTDEF” on page 621, “LISTDEFcommand and keyword definitions” on page 624, and “COPYcommand and keyword definitions” on page 573 were updated.
PI99297
The topic “Object compatibility checking” on page 186 was addedto clarify how Db2 Cloning Tool Table Space Cloning processesobject checking for mismatches.
None
2018-10-09
Description Related APARs
The KEEP-VOLUMES-SEQUENCE keyword was added tosubsystem cloning so that source volumes can be paired withspecific target volumes. The following topics were modified andmessage were added and removed for this feature:
v “Parameter files and parameter descriptions” on page 150v “COPY” on page 425, “COPY command syntax” on page 429, and
“COPY command and keyword definitions” on page 430
v “RESTORE-FROM-DUMPTAPES command syntax” on page 546and “RESTORE-FROM-DUMPTAPES command and keyworddefinitions” on page 546
PH02084
4 Db2 Cloning Tool User's Guide
Description Related APARs
Subsystem cloning has been enhanced so that you can clone sourcevolumes to target volumes that have ICF catalogs on them, withouthaving to move the target catalogs off the volumes before thecloning and moving them back afterwards. TheTARGET-UCATS-ON-TARGET-VOLUME keyword was added tothe COPY and RESTORE-FROM-DUMPTAPES commands, and thestored procedure and cloning scenarios were updated for the newkeyword. The following topics were added or changed:
v Chapter 9, “Cloning Db2 subsystems,” on page 115v “Location of the source and target ICF catalogs” on page 97v “Parameter files and parameter descriptions” on page 150v “COPY” on page 425, “COPY command syntax” on page 429, and
“COPY command and keyword definitions” on page 430
v “RESTORE-FROM-DUMPTAPES” on page 544,“RESTORE-FROM-DUMPTAPES command syntax” on page 546,and “RESTORE-FROM-DUMPTAPES command and keyworddefinitions” on page 546
v Cloning scenarios “Db2 subsystem cloning from a Db2 BACKUPSYSTEM backup” on page 1072 and “Db2 subsystem cloningfrom Db2 BACKUP SYSTEM dump tapes” on page 1099
v Messages were modified and added.
PH01928
The EXECUTE-CREATE-DDL parameter was added to the Db2Cloning Tool Subsystem Cloning DB2SCHEMA-UPDATE commandso that you specify whether to run the DDL as part of the job. Thetopics “DB2SCHEMA-UPDATE command syntax” on page 484 and“DB2SCHEMA-UPDATE command and keyword definitions” onpage 485 were updated.
PH01085
A clarification about using data masking for columns withreferential integrity was added to Chapter 17, “Using data maskingwith table space cloning,” on page 275.
None
Additional job templates CKZJOBT6, CKZJOBT7, and CKZJOBT8were provided for use when you want to clone table spaces usingFUZZY-COPY(Y). The topics Chapter 21, “Using job templates,” onpage 311, “Specifying job template data set and member namedefaults” on page 356, and “GLOBAL command values for EMCTimeFinder/Clone Mainframe Snap Facility data set level support”on page 617 were modified.
PH01998
For Db2 subsystem cloning, the following command names wererenamed to clarify which volumes are being clipped:
v CLIP was changed to SOURCECLIPv UNCLIP was changed to TARGETUNCLIPv OFFLINECLIP was changed to TARGETOFFLINECLIP
Updates were made throughout the documentation to reflect thecommand name changes.
None
PGM(EMCSNAP) and PGM(SRCVSCPY) were added to somecommands and keyword descriptions. The topics “Volume copyproducts supported by Db2 Cloning Tool” on page 9, subsystemcloning “COPY command and keyword definitions” on page 430,and table space cloning “COPY command and keyword definitions”on page 573 were updated.
None
The DATA-SHARING keyword of the DB2RBLDBSDS commandwas clarified in “DB2RBLDBSDS command and keyworddefinitions” on page 480.
None
Chapter 1. Db2 Cloning Tool overview 5
Description Related APARs
The topic “Cloning a Db2 subsystem” on page 99 was updated toadd an important note about Db2 address spaces.
None
Information was added to the topic “DB2UTILXCLEAN” on page515 about when to run the command.
None
A note was added to BCSCLEAN and COPY-BY-DS to explain howto clean up the target catalog after cloning with COPY-BY-DS. Thetopics “BCSCLEAN” on page 420 and “Planning for subsystemcloning by data set” on page 451 were updated.
None
The BIND-ON-TARGET parameter in the Db2 Cloning ToolSubsystem Cloning stored procedure was updated to describe fromwhere the DB2PLAN value is retrieved. The topic “Parameter filesand parameter descriptions” on page 150 was updated.
None
The work member name that is updated as part of the DB2SQLcommand was added to clarify the documentation. The followingtopics were updated:
v “Steps for Db2 offline cloning” on page 117v “Steps for Db2 offline cloning with removal of data sharing
members” on page 120
v “Steps for Db2 offline cloning with target becoming non-datasharing” on page 123
v “Steps for Db2 online cloning” on page 128v “Steps for Db2 online cloning with removal of data sharing
members” on page 134
v “Steps for Db2 online cloning with target becoming non-datasharing” on page 140
v “DB2SQL” on page 491
None
Additional information was provided about the minilog table that isrequired for log apply processing. The topics “Worksheets:Gathering parameter values for Tools Customizer” on page 25 andChapter 19, “Using LOG-APPLY to make consistent copies of tablespaces and index spaces,” on page 301 were updated.
None
The topics “Method 3: Using job templates in the target job” onpage 308, “COPY command and keyword definitions” on page 573,and “Report job details (optional)” on page 210 were updated toprovide information about several DDs that previously were notdescribed.
None
Warning message CKZ23526W was changed to an error message(CKZ23526E); documentation was updated throughout.
None
Message “CKZ57508I” on page 943 was added. PH02002
Message “CKZ11157E” on page 792 was modified. None
Deprecated functionsThis topic summarizes the Db2 Cloning Tool functions that were recentlydeprecated.
6 Db2 Cloning Tool User's Guide
Deprecated parameters
Description Related APARs
For Db2 Cloning Tool Table Space Cloning, the EXTEND-TARGET-PBG-TABLESPACE command has been removed. When a targetpartition-by-growth (PGB) table space has less partitions that thesource PBG table space, ALTER ADD PARTITION syntax isautomatically generated. If your existing JCL contains theseparameters, you should remove them from the JCL.
PI92866
The following Db2 Cloning Tool Table Space Cloning parametersare obsolete. If your existing JCL contains these parameters, youshould remove them from the JCL.
v COPY command V7-MIGRATED-OBJECTS-PRESENT parameterv COPY command parameter SOURCE-PREFETCH-DATABASE-
LIST in the CATALOG-PREFETCH parameter
PI92862
What does Db2 Cloning Tool do?Db2 Cloning Tool has two components: Db2 subsystem cloning and Db2 tablespace cloning.
Db2 subsystem cloning:
v Clones automatically by using IBM FlashCopy, STK SnapShot, or EMCTimeFinder/Clone Mainframe Snap Facility's volume level support
v Uses any volume fast replication or onsite mirror tool
The cloned Db2 subsystem can be accessed from the same z/OS system. Thisincreases productivity in several ways:v Significantly reduces production online downtime and the costs associated with
cloning a Db2 subsystem with traditional tools.v Provides more availability and services to customers because Db2 no longer
needs to be shut down or conditioned the long traditional way.v Uses less personnel time to clone a Db2 subsystem – what used to take hours or
days now takes just minutes.v Allows management of larger storage environments with the same staff.v Provides quicker throughput and faster turnaround time.v Provides virtually 24x7 access to data.v Creates fast quality assurance and/or test environments.
Volume fast replication tools allow a group of data to be replicated within minutesto provide duplicate environments. However, these clones have an inherentproblem: the internal volume name, volume internals, and all data set namesreflect the source volume name.
Db2 Cloning Tool quickly solves this problem. Once the data is cloned orreplicated, Db2 Cloning Tool renames and catalogs the data sets on the clonedvolumes, fixes the volume internals, and updates the Db2 internals so the clonedDb2 subsystem can be accessed from the same MVS™ system. Db2 Cloning Toolprovides a vast improvement over existing methods. It supports entire Db2, Db2PeopleSoft, and Db2 SAP subsystems in either online or offline mode.
Db2 table space cloning:
Chapter 1. Db2 Cloning Tool overview 7
v Clones automatically by using IBM FlashCopy, STK SnapShot, or EMCTimeFinder/Clone Mainframe Snap Facility's data set level support
v Uses any data set copy, fast or slow
The cloned Db2 table spaces can be cloned within the same or different z/OSsystem. This increases productivity in several ways:v Uses less personnel time to copy Db2 table spaces and associated manual tasks –
what used to take hours now takes just minutes.v Provides quicker throughput and faster turnaround time.v Provides virtually 24x7 access to data.v Creates fast refreshes of quality assurance and/or test environments
The remainder of this introductory topic addresses only Db2 subsystem cloningusing volume copies. For more information about Db2 Cloning Tool table spacecloning, refer to Chapter 11, “Db2 Cloning Tool Table Space Cloning overview,” onpage 177.
Cloning definitionsA clone is an exact copy, indistinguishable from the original.
Cloning is the act of replicating data, making it accessible, and then using thereplica in lieu of the original data for other purposes. Replication tools clone thedata by volume, and Db2 Cloning Tool makes the clone accessible.
Why clone a Db2 subsystem?There are several reasons to clone a Db2 subsystem.
Clone a Db2 subsystem:v To create a production quality assurance environmentv To move a group of end users to the cloned Db2 subsystem to lessen the
performance impact on the production systemv To give end users access to an application that is updated on a continual basisv To allow developers to begin changing the application for the next phase of code
updatesv To test new functions and features of SAP, or PeopleSoftv To run an online inquiry while batch runsv For data miningv For data warehousing
Can I clone a Db2 subsystem without Db2 Cloning Tool?A Db2 subsystem can be cloned without using Db2 Cloning Tool but it is acomplicated process that can take days, and requires using target volumes on aseparate LPAR.
By using Db2 Cloning Tool, you can clone a Db2 subsystem within minutes insteadof hours or days. Also, Db2 Cloning Tool does not require a separate LPAR.
Db2 supportA Db2 subsystem can be cloned in either an offline environment (Db2 is stoppedand started) or an online environment (using Db2 SUSPEND and RESUME, or via
8 Db2 Cloning Tool User's Guide
consistent FlashCopy, SnapShot, or TimeFinder/Clone, or via consistent split orbreak mirror). There is no requirement for a separate LPAR.
Db2 Cloning Tool updates Db2 internal control information in the BSDS, directory,and Db2 catalog to reflect the target Db2 subsystem names.
Db2 data sharing groups and non-data sharing Db2 subsystems are supported.When cloning a Db2 data sharing group, you can optionally reduce the number ofDb2 data sharing members, or go from data sharing to non-data sharing.
Volume copy products supported by Db2 Cloning ToolDb2 Cloning Tool will rename and catalog data sets on target volumes created withany type of replication mechanism, where target volumes are exact replicas ofsource volumes.
If target volumes still have the source volume serial number (VOLSER), and arevaried offline, Db2 Cloning Tool can re-label and vary the target volumes online.
Restriction: "Exact Replicas": The only exception to a target volume being an exactreplica of its source volume counterpart is the internal volume serial number.Copies already partially modified are not acceptable – such as volume snaps viaSIBBATCH where the SYS1.VVDS and SYS1.VTOCIX names may have alreadybeen modified.
Storage blades
The fast replication copy services outlined in this section can be used to create thevolume copies used for Db2 system clones, or to create the data set copies used fortable space and index space refreshes. A storage blade represents fast replicationcopy services invoked directly by Db2 Cloning Tool.
Db2 Cloning Tool executes the DFSMSdss blade to issue IBM FlashCopy or STKSnapShot copy commands either by volume or by data set. When cloning usingADRDSSU, Db2 Cloning Tool specifies the DUMPCONDITIONING keyword.When cloning Db2 systems or table spaces that reside on EMC DASD, Db2Cloning Tool uses the EMC API to invoke TimeFinder/Clone to copy the data byvolume or by data set, and specifies the COPYVOLID=N and VARY_OFFLINE=Nkeywords. When cloning Db2 subsystems that reside on EMC DASD and useTimeFinder/Mirror, or that reside on Hitachi Storage Systems, an appropriateprocess is performed before Db2 Cloning Tool cloning automation is invoked and alist of copied storage volumes are passed to Db2 Cloning Tool for use in laterprocessing steps.
IBM storage blades
v IBM DFSMSdss bladev ADRDSSU utility invokedv Fast replication (preferred)v By volume or data setv FlashCopy V2 (IBM, EMC, HDS)v SnapShot (STK, Ramac)
EMC storage blades
v EMC TimeFinder
Chapter 1. Db2 Cloning Tool overview 9
v TimeFinder/Clone Mainframe Snap Facility's volume level supportv EMC Consistency Technologyv TimeFinder/Clone Mainframe Snap Facility's data set level support
IBM FlashCopy, STK SnapShot, and EMC TimeFinder/Clone allow the creation ofwhat appears to be a copy of a volume, in a short period of time. The targetvolume of a copy will be a mirror image of the source volume, with the exceptionof the internal 'VOLSER', which remains as is, if the COPYVOLID option is notspecified. Db2 Cloning Tool requires the target VOLSER to remain as is, whichallows the target volume to remain varied online after the copy initiation, andtherefore negates the need for a CLIP (re-label) and VARY ON.
Because the logical image of a target volume may be modified before the copy isactually complete, the Db2 Cloning Tool rename step may be executed while thebackground copy is still in progress. Likewise, should the Db2 Cloning Toolprocess complete before a volume is completely copied, the application may alsobegin using volumes before the background copy is complete.
Onsite mirror tools by volume
Other cloning mechanisms, such as IBM PPRC, Hitachi ShadowImage, EMCTimeFinder/Mirror, Softek Replicator, or Innovation Data Processing FDRPAS,allow the creation of a point-in-time image of a volume by establishing a mirror,and then splitting the mirror once the target volume is synchronized with thesource volume. At the time of this publication, establishing and splitting mirrorsmust be accomplished with user-provided steps prior to execution of Db2 CloningTool.
Db2 Cloning Tool features and benefitsDb2 Cloning Tool provides solutions to many different types of problems.
Db2 Cloning Tool offers several unique and significant features that you can use toquickly clone your Db2 data for use in testing or other requirements:v Quickly fixes volume conflicts (VTOC, VTOCIX and VVDS) and then renames
and re-catalogs the target data sets to solve the data access problemv Offers extended rename capability to support Db2 log and BSDS desired namesv Db2 online or offline cloning in minutes instead of days, without a separate
imagev Automatic updating of Db2 internals to reflect renamed data setsv Db2 data sharingv Db2 data sharing many to less membersv Db2 support for either Db2 data sharing or from data sharing to non-data
sharing for maximum flexibilityv Provides automatic pairing of volume characteristics (SMS and non-SMS, or by
device size) that DFSMSdss doesn't dov Allows FlashCopy, SnapShot, or TimeFinder/Clone by VOLSER masks or entire
storage groups or any combination to eliminate the requirement for individualvolume specification
v Provides extensive SMS options that enable you to determine how the SMS classconstructs will be applied to your cloned data sets to ensure they are managedcorrectly
10 Db2 Cloning Tool User's Guide
v Issuance of DFSMSdss commands or EMC TimeFinder/Clone commands withinthe product for ease of use
v Source volume ICF catalog information collection concurrent with FlashCopy,SnapShot, or TimeFinder/Clone initiation for rename integrity
v Early resumption of source volume activity to reduce outagesv Enhanced data set rename masking characters for flexibilityv User options to decide disposition of 'abnormal' data sets and catalog entriesv Multivolume data set and VSAM sphere integrity checks to prevent orphaned
datav Rename into existing populated ICF catalog(s) or a specific onev Faster cataloging than conventional meansv Test for termination of FlashCopy, SnapShot, or TimeFinder/Clone relationshipsv Mechanism to remove orphaned catalog entries from previous executionsv Simulate modes for most commands
Service updates and support informationService updates and support information for this product, including software fixpacks, PTFs, frequently asked questions (FAQs), technical notes, troubleshootinginformation, and downloads, are available from the web.
To find service updates and support information, see the following website:
http://www.ibm.com/support/entry/portal/Overview/Software/Information_Management/DB2_Tools_for_z~OS
Product documentation and updatesDb2 Tools information is available at multiple places on the web. You can receiveupdates to Db2 Tools information automatically by registering with the IBM MyNotifications service.
Information on the web
The most current version of this information is available on IBM KnowledgeCenter:
http://www.ibm.com/support/knowledgecenter
A PDF version of this information is available on the Db2 Tools ProductDocumentation web page; however, IBM Knowledge Center is updated morefrequently than PDF books. The Db2 Tools Product Documentation web page islocated at:
http://www.ibm.com/support/docview.wss?uid=swg27020910
IBM Redbooks® publications that cover Db2 Tools are available from the followingweb page:
http://www.redbooks.ibm.com
Chapter 1. Db2 Cloning Tool overview 11
http://www.ibm.com/support/entry/portal/Overview/Software/Information_Management/DB2_Tools_for_z~OShttp://www.ibm.com/support/entry/portal/Overview/Software/Information_Management/DB2_Tools_for_z~OShttp://www.ibm.com/support/knowledgecenterhttp://www.ibm.com/support/docview.wss?uid=swg27020910http://www.redbooks.ibm.com
The IBM Information Management System website shows how IT organizationscan maximize their investment in Db2 databases while staying ahead of today's topdata management challenges:
https://www.ibm.com/analytics/us/en/db2/db2-for-zos/
Receiving documentation updates automatically
To automatically receive emails that notify you when new technote documents arereleased, when existing product documentation is updated, and when new productdocumentation is available, you can register with the IBM My Notifications service.You can customize the service so that you receive information about only thoseIBM products that you specify.
To register with the My Notifications service:1. Go to http://www.ibm.com/support/mysupport2. Enter your IBM ID and password, or create one by clicking register now.3. When the My Notifications page is displayed, click Subscribe to select those
products that you want to receive information updates about. TheDb2 Toolsoption is located under Software > Information Management.
4. Click Continue to specify the types of updates that you want to receive.5. Click Submit to save your profile.
How to send your comments
Your feedback helps IBM to provide quality information. Send any comments thatyou have about this book or other Db2 Tools documentation [email protected]. Include the name and version number of the product andthe title and number of the book. If you are commenting on specific text, providethe location of the text (for example, a chapter, topic, or section title).
Accessibility featuresAccessibility features help a user who has a physical disability, such as restrictedmobility or limited vision, to use a software product successfully.
The major accessibility features in this product enable users to perform thefollowing activities:v Use assistive technologies such as screen readers and screen magnifier software.
Consult the assistive technology documentation for specific information whenusing it to access z/OS interfaces.
v Customize display attributes such as color, contrast, and font size.v Operate specific or equivalent features by using only the keyboard. Refer to the
following publications for information about accessing ISPF interfaces:– z/OS ISPF User's Guide, Volume 1– z/OS TSO/E Primer– z/OS TSO/E User's GuideThese guides describe how to use the ISPF interface, including the use ofkeyboard shortcuts or function keys (PF keys), include the default settings forthe PF keys, and explain how to modify their functions.
12 Db2 Cloning Tool User's Guide
https://www.ibm.com/analytics/us/en/db2/db2-for-zos/http://www.ibm.com/support/mysupportmailto://[email protected]
Chapter 2. Preparing to customize Db2 Cloning Tool
Before you start to customize Db2 Cloning Tool for the first time, determine all ofthe customization values that you need to specify during the customizationprocess, and familiarize yourself with all of the customization tasks.
Checklist for customization tasks
The following checklist lists and describes each significant customization step. Usethis checklist to guide you through the entire customization process.
Tip: Print the following checklist and the data set names and parameter valuesworksheets. Use the worksheets to record your values, and refer to them duringthe customization process.
Task Link to detailed instructions Status
Tools Customizer basics
Before you begin the customization process,familiarize yourself with Tools Customizerterminology, data sets, and other basic informationabout Tools Customizer.
“Tools Customizer terminology” on page 1049 and“Data sets that Tools Customizer uses duringcustomization” on page 1052
Software requirements
Verify that your environment meets the minimumsoftware requirements. To install and use Db2Cloning Tool, your environment must be runninga supported version of the z/OS operating systemand of Db2 for z/OS. Additionally, certain levelsof maintenance must be applied.
“Verify that your environment meets softwarerequirements” on page 15
SMP/E installation
Verify that Db2 Cloning Tool was installedcorrectly. Db2 Cloning Tool is installed by usingstandard SMP/E processing.
“Verify that Db2 Cloning Tool has been installedsuccessfully” on page 15
Verify that Tools Customizer for z/OS wasinstalled correctly. Tools Customizer for z/OS isinstalled by using standard SMP/E processing.
“Verify that Tools Customizer for z/OS has beeninstalled successfully” on page 16
Security requirements
Confirm that you have the required authorizationsto use Db2 Cloning Tool.
“Verify that your environment meets securityrequirements” on page 16
Function authorization requirements
Review the level of authority required to performcertain Db2 Cloning Tool functions.
“Function authorization requirements” on page 17
Use of the U.S.A. EBCDIC code set
Db2 Cloning Tool uses the U.S.A. EBCDIC codeset for specification and display of EBCDICcharacters and for the extended ACS maskingcharacters used for filtering. If the code tablesused by your installation are different, then youmay need to specify characters particular to yourcode table.
“Use of the U.S.A. EBCDIC code set” on page 19
Filtering pattern masks
13
Task Link to detailed instructions Status
Many Db2 Cloning Tool commands allowspecification of powerful filtering masks. Thesefiltering pattern masks can be specified withextended ACS masking characters, as specified inthe table. Your installation may need to specifydifferent masking characters to achieve the desiredresult if your code tables are different from theU.S.A. EBCDIC code set.
“Filtering pattern masks” on page 20
Gather data set names
During the customization process, you mustspecify data set names for Tools Customizer, Db2Cloning Tool, and several other items.
“Worksheets: Gathering required data set names”on page 21
APF authorization
The SCKZLOAD library must be APF authorized. “APF authorizing load libraries” on page 24
Gather parameter values
During the customization process, you mustspecify parameter values for Db2 Cloning Tool, forDb2, and for your LPAR.
“Worksheets: Gathering parameter values for ToolsCustomizer” on page 25
Customize Db2 Cloning Tool
Start Tools Customizer by running a REXX EXECfrom the ISPF Command Shell panel.
“Starting Tools Customizer” on page 57
Set up Tools Customizer user settings. If you arerunning Tools Customizer for the first time, youmust modify several user settings for yourenvironment. Otherwise, if the user settings thatyou have already established are still appropriate,skip this step.
“Modifying Tools Customizer user settings” onpage 58
Complete the steps in the appropriate customization roadmap based on the type of customization that you areperforming.
Customizing Db2 Cloning Tool for the first time
Follow this roadmap if you do not have acustomized version of Db2 Cloning Tool, and youneed to customize it for the first time.
“Roadmap: Customizing Db2 Cloning Tool for thefirst time” on page 63
Customizing a different version of Db2 CloningTool
Follow this roadmap if you previously customizeda version of Db2 Cloning Tool and want to use thesame parameter values to customize a differentversion.
“Roadmap: Customizing a new version of Db2Cloning Tool from a previous customization” onpage 64
Recustomizing Db2 Cloning Tool
Follow this roadmap if you already customizedDb2 Cloning Tool but want to change one or moreparameter values.
“Roadmap: Recustomizing Db2 Cloning Tool” onpage 65
Set up your environment prior to customizationPrior to beginning the customization process, ensure that your environment meetsall requirements, that you have installed all prerequisite software, and that youhave considered how you want to customize optional features.
14 Db2 Cloning Tool User's Guide
Verify that your environment meets software requirements
The operation of Db2 Cloning Tool depends on the following software levels:v z/OS 2.1 and later.
Restriction: The following restrictions apply:– A source or target ICF catalog cannot be defined with extended addressability
or EATTR(OPT).– The VVDS on the volume where a source or target ICF catalog resides cannot
be defined with EATTR(OPT).– The VVDS on a source or target volume cannot be defined with EATTR(OPT).
v Db2 11 or Db2 12, until end of support for the given Db2 version.v Any available new PTFs. The same level of Db2 Cloning Tool maintenance is
required for all cloning jobs.v One or more of the cloning tools listed in section “Volume copy products
supported by Db2 Cloning Tool” on page 9, or slow copy utilities, such asDFSMSdss copy or Innovation Data Processing products.
v If you will use Db2 Cloning Tool’s stored procedure for subsystem cloning, theDb2 administrative task scheduler must be configured and available on the Db2systems where the stored procedure will be run.
v If you will use IBM FlashCopy for Db2 Cloning Tool Table Space Cloning,FlashCopy version 2 is required.
v If you plan to use fast replication via the DFSMSdss (ADRDSSU) COPY utility,review the following references prior to performing a cloning. The informationin these links might help you avoid cases when a FlashCopy target device maybe in conflict with a copy services status:– The Combining copy services operations topic in the z/OS DFSMS Advanced
Copy Services documentation.– The Preserve Mirror FlashCopy topic in the z/OS DFSMSdss Storage
Administration documentation.v If you will use the Db2 Cloning Tool ISPF interface, a minimum region size of
20000 KB is required.v If you will use Db2 Cloning Tool Table Space Cloning, UNIX System Services
access is required. The user ID under which the source and the target jobs runmust have an OMVS segment in its RACF® profile. To check whether the userID has an OMVS segment in its profile, use the following command:LU userid OMVS
To add an OMVS segment to a user ID's RACF profile, use the followingcommand:ADDUSER ddfuid OMVS(UID(nnn))
Verify that Db2 Cloning Tool has been installed successfully
See the Program Directory for IBM Db2 Cloning Tool for z/OS, GI10-8910-00, forinstallation instructions.
Chapter 2. Preparing to customize Db2 Cloning Tool 15
||
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.antg000/gr143.htmhttps://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.adru000/flcpprmir.htm
Verify that Tools Customizer for z/OS has been installedsuccessfully
Tools Customizer for z/OS is a component of IBM Tools Base for z/OS (5655-V93),which is available free of charge. Tools Customizer for z/OS provides a standardapproach to customizing IBM Db2 for z/OS Tools.
See the Program Directory for IBM Tools Base for z/OS, GI10-8819 for installationinstructions.
Verify that your environment meets security requirements
You can prevent unauthorized personnel from executing Db2 Cloning Toolcommands. To use Db2 Cloning Tool Table Space Cloning, specific authorizationsare also required.
In addition to user authorizations, some functions require other authorizations;refer to “Function authorization requirements” on page 17.
Authorizations required for Db2 Cloning Tool are:v Db2 Cloning Tool requires ALTER authority to both the source and target user
catalogs. By protecting ALTER authority, unauthorized personnel are preventedfrom executing the COPY and RENAME commands.
v Db2 Cloning Tool requires UPDATE authority to the target data sets. Byprotecting UPDATE authority, unauthorized personnel are prevented fromexecuting the DB2UPDATE command.
v The COPY command requires authorization to ADRDSSU ADMIN. By protectingADRDSSU ADMIN, unauthorized personnel are prevented from executing theCOPY command. This only applies for FlashCopy where ADRDSSU is used.
v The COPYCHECK command could be used by an unauthorized person using anauthorized person's journal file. To prevent this, secure the journal files.
Authorizations for Db2 Cloning Tool Table Space Cloning are:v SELECT authority on the Db2 catalog tables for both source and target
subsystemsv EXECUTE authority on the CKZPLAN on both source and target subsystemsv DISPLAYDB authority on both source and target databasesv STOPDB authority on the target databasev STARTDB authority on the target databasev ALTER authority for all target tables with identity columnsv If FUZZY-COPY(Y) is used to not stop the source, and ADRDSSU is used, then
RACF authority for “TOLERATE(ENQF)” is requiredv If FUZZY-COPY(N) (the default) is used, then STOPDB and STARTDB authority
for the source database is required
If your site uses ACF2 to restrict TSO command use, you may need to add theTSO commands that Db2 Cloning Tool uses to the ACF2 Command Limiting table.The TSO commands that Db2 Cloning Tool uses are CKZARGSZ, CKZ2MAIN,CKZ00500, and CKZ00600.
16 Db2 Cloning Tool User's Guide
Function authorization requirementsThe level of authority required to perform certain Db2 Cloning Tool SubsystemCloning and Db2 Cloning Tool Table Space Cloning is detailed in this topic.
For Db2 Cloning Tool subsystem or volume cloningv Db2 Cloning Tool COPY and RENAME commands require ALTER authority to
both the source and target user catalogs. Db2 Cloning Tool does NOT update thesource catalog but requires ALTER authority to access the catalog via directaccess.– The source ICF catalog(s) requires ALTER because an IDCAMS VERIFY and
an IDCAMS EXAMINE INDEXTEST NODATATEST is done prior to readingit to ensure the source catalog is not broken.
– The target ICF catalog(s) requires ALTER because it is opened and updatedusing a routine that manages catalog updates.
v Db2 Cloning Tool COPY command when using DATA-MOVERPGM(ADRDSSU) may require the user ID running the command to have specificaccess to STGADMIN profiles in the FACILITY class.– The ADMINISTRATOR operand is always specified when invoking
DFSMSdss. To avoid WTORs, ADRDSSU ADMINISTRATOR is used to gainpermission to overlay the target volume VTOCIX and/or VVDS during theCOPY process. Because the ADMINISTRATOR operand is generated, the userID running COPY must have READ access to FACILITY class profileSTGADMIN.ADR.STGADMIN.COPY.
– If FCSETGTOK is specified, READ access is needed to FACILITY class profileSTGADMIN.ADR.COPY.FCSETGT if it exists.
– If FCTOPPRCPRIMARY is specified, READ access is needed to FACILITYclass profile STGADMIN.ADR.COPY.FCTOPPRCP if it exists.
– If FlashCopy is being used, READ access is needed to FACILITY class profileSTGADMIN.ADR.COPY.FLASHCPY if it exists.
– If CONSISTENT(YES) is specified, READ access is needed to FACILITY classprofiles STGADMIN.ADR.COPY.FCFREEZE andSTGADMIN.ADR.CGCREATE if they exist.
– If the CONCURRENT option is being used, READ access is needed toFACILITY class profile STGADMIN.ADR.COPY.CNCURRENT if it exists.
v If Db2 Cloning Tool is going to relabel the target volumes, ICKDSF REFORMATrequires RACF volume access of ALTER to RACF class DASDVOL or READaccess to FACILITY class profile STGADMIN.ICK.REFORMAT. Db2 Cloning Toolwill relabel the target volumes as part of COPY when VOLPAIRSDEVN orVOLPAIRSDEVN-DDN is used, or as part of VOLOPTIONS whenSOURCECLIP, TARGETOFFLINECLIP, or TARGETUNCLIP are used.
v Db2 Cloning Tool RENAME command invokes ICKDSF to rebuild the VTOCIX,if VTOCIX_REBUILDER = IBM is specified in CKZINI or the volume is an ExtendedAddress Volume. ICKDSF requires RACF volume access of ALTER to RACFclass DASDVOL or READ access to FACILITY class profileSTGADMIN.ICK.BUILDIX. If the default, VTOCIX_REBUILDER = MSC, is specifiedin CKZINI, ICKDSF is not used, unless the volume is an Extended AddressVolume for which ICKDSF will always be used to rebuild the VTOCIX.
v Db2 Cloning Tool COPY-BY-DS command requires READ authority to the sourcedata sets and ALTER authority to the target data sets.
v If Db2 Cloning Tool RENAME has NOTRENAMED(DELETE) in effect, READ access toFACILITY class profile STGADMIN.IGG.DLVVRNVR.NOCAT is required.
Chapter 2. Preparing to customize Db2 Cloning Tool 17
v Db2 Cloning Tool DB2UPDATE command requires authority to the target datasets.
v Db2 Cloning Tool COPYCHECK command requires UPDATE to the journal file.v Db2 Cloning Tool FINDUCATS command invokes DCOLLECT to identify
ALIAS names of the source volume data sets in order to identify the correctsource user catalogs. DCOLLECT controls access to the DCOLLECT function, byissuing a security (RACF) check for a facility class profile ofSTGADMIN.IDC.DCOLLECT. If this profile exists, then Read authority isnecessary.
v Db2 Cloning Tool DB2FIX command requires either Db2 install SYSADM orSYSADM2 authority.
v Db2 Cloning Tool DB2SQL command requires either Db2 install SYSADM orSYSADM2 authority.
v Db2 Cloning Tool DB2SETLOG command requires authorization to connect tothe Db2 subsystem and to issue Db2 SET LOG commands.
v Db2 Cloning Tool DB2START command requires authorization to issue z/OSSTART Db2 commands and to connect to the Db2 subsystem. When theSPECIAL or MAINT keyword is used, it requires either Db2 install SYSADM orSYSADM2.
v Db2 Cloning Tool DB2STOP command requires authorization to connect to theDb2 subsystem and issue the Db2 STOP DB2 command. When the Db2subsystem is running in maintenance mode, it requires either Db2 installSYSADM or SYSADM2.
v Db2 Cloning Tool RENAME command requires authorization to create an EMCSconsole and issue z/OS MODIFY CATALOG commands. Update authorizationto the VVDS data sets on the target volumes is also required.
v Db2 Cloning Tool DB2UPDATE command (if DB2XCFCLEAN(Y) is specified)requires authority to clean up XCF structures. The ability to clean up XCFstructures is controlled with profiles in the FACILITY class with names ofIXLSTR.structurename. If profiles exist that cover the target Db2 structures, thenUPDATE access is necessary.
v Db2 Cloning Tool DB2XCFCLEAN command requires authority to clean up XCFstructures. The ability to clean up XCF structures is controlled with profiles inthe FACILITY class with names of IXLSTR.structurename. If profiles exist thatcover the target Db2 structures, then UPDATE access is necessary.
v Db2 Cloning Tool DB2GETBACKINFO command requires authority to issueHSM LIST COPYPOOL commands. The ability to issue HSM LIST COPYPOOLcommands is controlled with profiles in the FACILITY class with names ofSTGADMIN.ARC.LC.copypoolname. If profiles exist that cover thecopypoolname being used, then READ access is necessary.
v Db2 Cloning Tool RESTORE-FROM-DUMPTAPES command requires thefollowing:– READ access to HSM dump tapes (for example, TAPEVOL profile HSMHSM,
or READ access by data set name).– RACF volume access of ALTER to RACF class DASDVOL.– READ access to FACILITY class profile STGADMIN.ICK.REFORMAT.– READ access to STGADMIN.ADR.STGADMIN.RESTORE for the target
volumes.v Db2 Cloning Tool BCSCLEAN command requires READ authority to profiles in
the FACILITY class with names of STGADMIN.IGG.DIRCAT andSTGADMIN.IGG.DELETE.NOSCRTCH.
18 Db2 Cloning Tool User's Guide
For Db2 Cloning Tool Table Space Cloningv SELECT authority on the Db2 catalog tables is required for both source and
target subsystems.v EXECUTE authority on the CKZ plan is required on both source and target
subsystems.v DISPLAYDB authority is required on both source and target databases.v STOPDB authority is required on the target database.v STARTDB authority is required on the target database.v ALTER authority is required for all target tables with identity columns.v If FUZZY-COPY(Y) is used to not stop the source, and ADRDSSU is used, then
RACF authority for “TOLERATE(ENQF)” is required.v If FUZZY-COPY(N) (the default) is used, then STOPDB and STARTDB authority
for the source database is required.v If the TCP/IP server job is run as a started task, SYSCTL authority must be
granted to the started task's user ID on the target Db2 subsystem.
Use of the U.S.A. EBCDIC code setDb2 Cloning Tool uses the U.S.A. EBCDIC code set for specification and display ofEBCDIC characters and for the extended ACS masking characters used for filtering.
If the code tables used by your installation are different, then you need to enter theEBCDIC character peculiar to your code tables that results in the binary value forthe EBCDIC character specified in the product manuals.v Data supplied as input to batch programs or input to ISPF panels:
For product code shipped in binary, when specifying input where the producttakes special action based on specific characters, you must enter the EBCDICcharacter peculiar to your code tables that results in the binary value for theEBCDIC character specified in the product manuals, according to the U.S.A.EBCDIC code set.For example, if an exclamation mark ( ! ) is called for, and your code tables donot translate the ! character to a hexadecimal 5A, you must enter the characterthat your code table will translate to a 5A.
v Distributed ISPF panels:Do not change distributed ISPF panels. Program code may reference ISPF panelattribute bytes. A panel change that affects an attribute byte may cause aprogram error.
v Product output:Depictions of product output shown in the product manuals are based on theU.S.A. EBCDIC code set. Actual output may vary if your EBCDIC code tablesare different.
v Extended ACS masking characters:Your installation may need to specify different masking characters to achieve thedesired result if your code tables are different from the U.S.A. EBCDIC code set.For more information about extended ACS masking characters, see “Filteringpattern masks” on page 20.
Chapter 2. Preparing to customize Db2 Cloning Tool 19
Filtering pattern masksMany commands allow specification of powerful filtering masks. These filteringpattern masks can be specified with extended ACS masking characters, as specifiedin the table.
Note: Your installation may need to specify different masking characters to achievethe desired result if your code tables are different from the U.S.A. EBCDIC codeset.
Table 1. Filtering pattern masks
Mask Hex Description
* 5C A single asterisk (*) represents 0–ncharacters. It can be used before and/orafter an item to designate a wildcardcharacter position. You cannot use anasterisk in the middle portion of a singleitem (except for data set names). Use thepercent sign (%) character for that purpose.
Example:*PROD
In this example, an item is selected if thelast four characters are PROD regardless ofthe starting characters. Using a singleasterisk character before and after an item(i.e. *ZREM*) means that item is to beselected if any character string matchesZREM in its name.
% 6C A percent sign (%) denotes asingle-character placeholder value, whichcan be alpha-numeric or any specialcharacter. The percent sign can be used inany position order.
Example:CRM%%ER6
In this example, an item is selected if it iseight characters in length, the first threecharacters are CRM, and the last threecharacters are ER6. The two middleplaceholder values (%%) can be anycharacters.
< 4C Similar to the percent sign (%) value, the"less than" character (
Table 1. Filtering pattern masks (continued)
Mask Hex Description
> 6E Similar to the percent sign (%) value, the"greater than" character (>) denotes aplaceholder value for only numeric characters.The > character can be used in any positionorder.
Example:CR>>ER*
In this example, an item is selected if thefirst two characters are CR, the third andfourth characters are numeric, and the fifthand sixth characters are ER. Any remainingcharacters are also allowed.
** 5C5C Using two asterisks (**) allows compatibilitywith standard ACS and DFSMSdss filteringmasks. Only used for partially qualified dataset names. The * or ** characters can beused in any qualifier position to denote awildcard node.
Example:CRFM*.*VER.**
In this example, a data set entry is selectedif it has at least two qualifiers, the firstqualifier starts with CRFM, and the secondqualifier ends with VER. Any remainingqualifiers are also allowed.Note: As with common data set namemasking, any combination of *, **, %, <and/or > characters can be used for theitem mask value.
! 5A Similar to the percent sign (%) value, theexclamation point character (!) denotes aplaceholder value for only national characters,based on the U.S.A. EBCDIC code set. Referto the topic “Use of the U.S.A. EBCDICcode set” on page 19 for more information.The exclamation point (!) can be used inany position order.
National characters (based on the U.S.A.EBCDIC code set) are: @ # $
Worksheets: Gathering required data set namesIdentify and record the data set names that will be used during the customizationprocess and make sure that requirements for certain data sets are met.
Data set names for Tools Customizer
Identify and record the following Tools Customizer data set names:
Data set name Description Special requirements Your data set name
SCCQDENU Metadata library for ToolsCustomizer
Chapter 2. Preparing to customize Db2 Cloning Tool 21
Data set name Description Special requirements Your data set name
SCCQLOAD Executable load modulelibrary for ToolsCustomizer
SCCQMENU ISPF messages for ToolsCustomizer
SCCQPENU ISPF panels for ToolsCustomizer
SCCQSAMP Sample members for ToolsCustomizer
SCCQTENU Table library for ToolsCustomizer
You must have write accessto this data set.
Data set names of Db2 Cloning Tool
Identify and record the following Db2 Cloning Tool data set names. During thecustomization process, you will enter the following values on panel CCQPPRD.
Data set name Description Special requirements Your data set name
Installation high-levelqualifier
The high level qualifier ofthe Db2 Cloning Toolinstalled libraries.
Installation high-levelqualifier of previous releaseof Db2 Cloning Tool
The high level qualifier ofthe previous release of Db2Cloning Tool installedlibraries.
Only needed if upgradingfrom a previous release.
SCKZDBRM DBRM library for Db2Cloning Tool
SCKZDENU Metadata library for Db2Cloning Tool
SCKZJCL Sample members for Db2Cloning Tool
SCKZLOAD Executable load modulelibrary for Db2 CloningTool
You must APF authorizethis data set.
SCKZMENU ISPF messages for Db2Cloning Tool
SCKZPARM Parameter library for Db2Cloning Tool
SCKZPENU ISPF panels for Db2Cloning Tool
SCKZSLIB Skeleton library for Db2Cloning Tool
Data set names of other libraries
Identify and record the following data set names. During the customizationprocess, you will enter the following values on the Setup panel.
22 Db2 Cloning Tool User's Guide
Data set name Description Special requirements Your data set name
Discover output data set Contains the output that isgenerated when you runthe Db2 Cloning ToolDiscover EXEC.
The Db2 CloningToolDiscover EXECretrieves the metadata andvalues for the parametersfrom a previouscustomization of Db2Cloning Tool.
The default name of thedata set isDB2TOOL.CCQ110.DISCOVER. You canchange the default value onthe Tools CustomizerSettings panel or theDiscover CustomizedProduct Information panel.
You must have write accessto this data set.
Data store data set Contains product, LPAR,and Db2 parameter values,and Db2 entry associations.Tools Customizer uses thisdata set to permanentlystore all information that isacquired about the product,Db2 subsystems, and LPARwhen you customizeproducts on the local LPAR.
The default name of thedata set isDB2TOOL.CCQ110.DATASTOR. You canchange the default value onthe Tool CustomizerSettings panel.
You must have write accessto this data set.
Chapter 2. Preparing to customize Db2 Cloning Tool 23
Data set name Description Special requirements Your data set name
Product customizationLibrary
Contains the customizationjobs that Tools Customizergenerates for Db2 CloningTool.
To customize Db2 CloningTool, submit the membersof the data set in the orderin which they are displayedon the Finish ProductCustomization panel. Thedata set naming conventionis:
hlq.$LPAR-name$.xyzvrm
where:
v hlq is the value of theCustomization libraryqualifier field on theTools CustomizerSettings panel(CCQPSET)
v LPAR-name is thefour-character LPARname
v xyzvrm is the three-letterproduct identifier withthe version, release, andmodification level
For example, the data setname might beDB2TOOL.PRODUCT.CUST.$MVS1$.XYZ410.
You must have write accessto this data set.
APF authorizing load librariesSome of the programs in Db2 Cloning Tool load libraries must be APF-authorizedto run.
About this task
The SCKZLOAD library for Db2 Cloning Tool must have APF authorization.Consult your Systems Programmer to have this library added into the APF list andensure appropriate access controls have been established
Procedure