1466
z/OS Version 2 Release 3 DFSMShsm Storage Administration IBM SC23-6871-30

Version 2 Release 3 z/OS - IBM · Automatic recall.....32

  • Upload
    others

  • View
    17

  • Download
    0

Embed Size (px)

Citation preview

  • z/OSVersion 2 Release 3

    DFSMShsm Storage Administration

    IBM

    SC23-6871-30

  • Note

    Before using this information and the product it supports, read the information in “Notices” on page1323.

    This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.

    Last updated: 2019-06-24© Copyright International Business Machines Corporation 1984, 2017.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.

  • Contents

    Figures.............................................................................................................xxxv

    Tables............................................................................................................... xliii

    About this document......................................................................................... xlviiWho should read this document............................................................................................................. xlviiMajor divisions of this document.............................................................................................................xlviiRequired product knowledge........................................................................................................................lz/OS information........................................................................................................................................... lHow to read syntax diagrams........................................................................................................................l

    Symbols....................................................................................................................................................lSyntax items............................................................................................................................................liSyntax examples..................................................................................................................................... li

    Abstract for DFSMShsm Storage Administration................................................... liii

    How to send your comments to IBM.......................................................................lvIf you have a technical problem..................................................................................................................lv

    Summary of changes...........................................................................................lviiSummary of changes for z/OS Version 2 Release 3 (V2R3)..................................................................... lviiSummary of changes for z/OS Version 2 Release 2 (V2R2) as updated December 2015....................... lixSummary of changes for z/OS Version 2 Release 2 (V2R2)...................................................................... lixSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated February 2015.......................... lxSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated September 2014....................... lxz/OS Version 2 Release 1 summary of changes......................................................................................... lx

    Part 1. DFSMShsm Storage Administration Guide................................................... 1

    Chapter 1. Welcome to DFSMShsm.............................................................................................................7Purpose of space management..............................................................................................................7Purpose of availability management......................................................................................................8What you are expected to do..................................................................................................................8

    Tasks for managing storage with DFSMShsm.................................................................................. 8Overview of DFSMShsm functions......................................................................................................... 9

    DFSMShsm functions for SMS-managed volumes.........................................................................10DFSMShsm functions for non-SMS-managed volumes.................................................................14

    Devices supported by DFSMShsm....................................................................................................... 16How to use the example system..........................................................................................................17

    Multiple z/OS images in the example system................................................................................ 18DASD storage in the example system............................................................................................ 18Tape devices in the example system..............................................................................................19Other assumptions in the example system....................................................................................20

    Chapter 2. Space management of SMS-managed storage.......................................................................23Space management functions............................................................................................................. 23

    Automatic primary space management.........................................................................................23Automatic secondary space management.....................................................................................24Event-driven migration................................................................................................................... 24

    iii

  • Automatic recall..............................................................................................................................32Automatic dynamic volume expansion space management.........................................................32Command space management.......................................................................................................32

    Tasks for automatic space management.............................................................................................32Specifying the storage to be managed and the space requirements............................................32Specifying how groups of data sets are managed......................................................................... 35Specifying when automatic primary space management can process.........................................42Specifying when automatic secondary space management can process.....................................43Specifying migration of data sets to overflow volumes................................................................. 43Specifying how to migrate data sets to migration level 2..............................................................43Specifying how to do extent reduction...........................................................................................45Specifying how to scratch expired data sets................................................................................. 45Specifying the maximum automatic volume space management tasks and subtasks................ 46Specifying the maximum automatic secondary space management tasks..................................47Specifying the maximum interval migration or on-demand migration tasks................................47Specifying an on-demand migration number of concurrently queued volumes notification

    limit............................................................................................................................................ 48Specifying recall tasks.................................................................................................................... 48Specifying small data set packing.................................................................................................. 48Specifying the first qualifier for names of migrated data sets.......................................................49Specifying if class transitions should be performed during event-driven migration.................... 49Configuring migration cleanup....................................................................................................... 49Identifying migration level 2 volumes to DFSMShsm....................................................................51Specifying duplexing for migration level 2 tapes...........................................................................51

    Integrity age for space management...................................................................................................51Automatic space management operation examples...........................................................................51

    Automatic space management.......................................................................................................51Starting automatic secondary space management....................................................................... 53Starting automatic primary space management........................................................................... 59Automatic primary space management.........................................................................................60Event-driven migration example scenario..................................................................................... 75Class transitions for DB2 objects example scenario..................................................................... 76Automatic recall..............................................................................................................................77Additional space management during migration and recall when DFSMShsm is the data

    mover......................................................................................................................................... 81Command space management tasks...................................................................................................82

    Deleting migrated data sets........................................................................................................... 82Migrating an individual data set..................................................................................................... 83Transitioning an individual data set................................................................................................84Migrating and transitioning an SMS-managed volume.................................................................. 85Migrating and transitioning a storage group.................................................................................. 86Recalling SMS-managed data sets.................................................................................................86Recalling direct access data sets................................................................................................... 87Moving data sets............................................................................................................................. 87Reconnecting data sets using fast subsequent migration.............................................................88

    Chapter 3. Space management of non-SMS-managed storage............................................................... 91Differences in what the example system shows................................................................................. 91Tasks for space management of non-SMS-managed storage.............................................................91

    Specifying the age for deleting list and utility data sets................................................................92Specifying the minimum age for migrating data sets.................................................................... 93Specifying when data sets become eligible for level 1 to level 2 migration................................. 93Specifying recall characteristics for the type of volume................................................................93Defining primary volumes to DFSMShsm.......................................................................................94Attributes of primary volumes........................................................................................................95Defining pools of volumes.............................................................................................................. 97Pools in systems running under JES2............................................................................................ 97Pools in systems running under JES3............................................................................................ 98

    iv

  • Automatic space management processing for non-SMS-managed storage....................................100Automatic secondary space management.................................................................................. 102Automatic primary space management.......................................................................................102Automatic interval migration........................................................................................................110Recall............................................................................................................................................ 110

    Command space management.......................................................................................................... 114Command volume space management....................................................................................... 115Command volume space management (primary)....................................................................... 115Controlling migration of data sets and volumes.......................................................................... 115Recalling a data set to a specific volume..................................................................................... 115Recalling an SMS-managed data set to a non-SMS-managed volume.......................................116Recalling an SMS-managed BDAM data set to a non-SMS-managed volume............................116Recalling an SMS-managed sequential extended-format data set to a non-SMS-managed

    volume..................................................................................................................................... 116

    Chapter 4. Other space management considerations............................................................................117Space management of extended address volumes (EAVs).............................................................. 117

    Track management for SMS-managed volumes..........................................................................118Track management for non-SMS-managed volumes.................................................................. 118Controlling allocations to extended address volumes (EAVs).....................................................119Recommendations for using extended address volumes (EAVs)................................................119

    Common recall queue........................................................................................................................ 119Connecting to a common recall queue list structure...................................................................121Populating the common recall queue.......................................................................................... 121Selecting requests from the common recall queue.....................................................................122Processing recall requests on the common recall queue............................................................122Disconnecting from the common recall queue............................................................................122Processing of common recall queue requests during shutdown................................................ 123Deleting the common recall queue structure.............................................................................. 123Processing failures in a common recall queue environment...................................................... 123

    Processing priority of recalls and deletions...................................................................................... 125Specifying the order in which data sets from a single tape are processed...................................... 126Migration volume contention priorities............................................................................................. 126

    Tape migration level 2 volume contention...................................................................................126Specifying the desired number of ML2 partial tapes...................................................................131SDSP data set contention.............................................................................................................132Multitasking considerations for SDSP data sets.......................................................................... 137

    Preventing the processing of data sets during space management.................................................139Deferred generation data sets........................................................................................................... 139Security considerations for automatic space management............................................................. 139

    Space management of data sets with discrete data set profiles................................................ 140Password protection of data sets on DASD................................................................................. 141

    Access method services considerations........................................................................................... 142GUARANTEED SPACE attribute considerations................................................................................ 142

    Results of recalling GUARANTEED SPACE VSAM data sets.........................................................142Possible problems........................................................................................................................ 143

    DFSMShsm retrieval of management classes and storage groups...................................................144Deletion of dynamic I/O device considerations................................................................................ 145Space management considerations for sequential extended-format data sets..............................145

    Volume space management processing...................................................................................... 145Automatic primary space management processing.................................................................... 145Recall processing..........................................................................................................................145

    Object storage in the cloud................................................................................................................ 146System set up to use the cloud.................................................................................................... 146DASD volumes.............................................................................................................................. 146SETSYS..........................................................................................................................................146Cloud password............................................................................................................................ 146

    Using the Cloud.................................................................................................................................. 147

    v

  • Workload distribution................................................................................................................... 147Migration....................................................................................................................................... 147Recall............................................................................................................................................ 147Delete............................................................................................................................................147Listing information........................................................................................................................147Auditing information.....................................................................................................................148

    Chapter 5. Space management procedures........................................................................................... 149Interrupting and restarting primary space management, secondary space management, or

    event-driven migration................................................................................................................. 149When primary space management, secondary space management, or event-driven

    migration needs to be restarted..............................................................................................149Automatic restart of primary space management or secondary space management............... 150Automatic restart of event-driven migration............................................................................... 150Manual restart of primary space management or secondary space management.................... 151

    Defining a new primary space management or secondary space management processingwindow.......................................................................................................................................... 152

    Allowing another host to take over secondary space management functions................................ 152

    Chapter 6. Availability management of SMS-managed storage.............................................................153What the example system shows...................................................................................................... 153

    Automatic incremental backup.................................................................................................... 153Automatic full-volume dump....................................................................................................... 153Command availability management.............................................................................................153

    Tasks for automatic availability management...................................................................................154Dump tasks.........................................................................................................................................154

    Specifying which volumes to dump and the dump classes to use..............................................154Specifying when automatic dump processing starts...................................................................156Specifying the DFSMSdss DASD I/O buffering technique to use for dump................................ 156Specifying concurrent copy for volume dumps........................................................................... 157Specifying the maximum number of dump tasks........................................................................ 157Specifying the day on which a dump occurs................................................................................158Specifying the characteristics of dump classes...........................................................................159Defining dump volumes to DFSMShsm........................................................................................165

    Backup tasks...................................................................................................................................... 166Specifying which storage group has automatic backup performed............................................166Specifying how to manage groups of data sets........................................................................... 167Specifying a storage group priority for autobackup processing..................................................167Specifying whether to use concurrent copy................................................................................ 167Specifying frequency of backup................................................................................................... 168Guaranteeing frequency of backup..............................................................................................169Specifying the maximum number of backup versions to keep................................................... 169Specifying how long to keep backup versions............................................................................. 170Specifying who can back up data sets by command................................................................... 174Specifying whether to perform automatic backup...................................................................... 174Example management classes.....................................................................................................174Specifying the start time for automatic backup...........................................................................177Specifying whether to perform volume backup and the kind of device to use...........................177Specifying the first qualifier for names of backup versions........................................................ 178Specifying the maximum number of volume backup tasks in each host....................................178Specifying the data set backup by command environment........................................................ 179Specifying whether to back up RACF discrete data set profiles................................................. 179Specifying whether DFSMShsm performs spill processing.........................................................179Specifying whether to back up only changed data sets.............................................................. 179Specifying how DFSMShsm should respond to a data set in use................................................180Specifying the days on which automatic backup occurs.............................................................180Defining backup volumes to DFSMShsm..................................................................................... 181Specifying duplexing for backup tapes........................................................................................ 182

    vi

  • Automatic availability management operation................................................................................. 182Dump processing............................................................................................................................... 182

    Deleting expired dump copies......................................................................................................183Defining what to do with tapes marked unavailable during DUMP processing.......................... 184Dumping DFSMShsm-managed volumes.................................................................................... 184Deleting and uncataloging excess dump VTOC copy data sets...................................................187

    Automatic backup processing........................................................................................................... 187Phase 1: Backing up the control data sets...................................................................................188Phase 2: Moving backup versions................................................................................................ 189Phase 3: Backing up migrated data sets......................................................................................189Phase 4: Backing up SMS-managed volumes from storage groups with the automatic

    backup attribute...................................................................................................................... 190Selecting daily backup volumes...................................................................................................195

    Backup volume spill process............................................................................................................. 203Selecting spill backup volumes......................................................................................................... 204

    Initial spill backup volume selection (DASD and tape)............................................................... 205Subsequent spill backup volume selection (DASD and tape)..................................................... 206

    Cleanup processing............................................................................................................................206Backup volume cleanup process................................................................................................. 207

    Releasing a backup volume............................................................................................................... 208Automatic backup example............................................................................................................... 208Command availability management.................................................................................................. 209

    Dumping a volume........................................................................................................................210Dumping the volumes in one or more storage groups.................................................................210Backing up an individual data set................................................................................................ 211Using the data set backup by command capabilities.................................................................. 211Backing up all data sets on one or more volumes....................................................................... 217Backing up all data sets in one or more storage groups..............................................................217Backing up all eligible changed data sets on one or more volumes........................................... 217Backing up all eligible changed data sets in one or more storage groups..................................217Deleting expired backup versions from the backup volumes..................................................... 218Deleting backup versions of specific data sets............................................................................224Command recovery and restore...................................................................................................225Data set recovery and restore...................................................................................................... 225Restoring a data set from a DFSMShsm dump copy....................................................................234Restoring VSAM data sets............................................................................................................ 236

    Managing volume backups with fast replication............................................................................... 236Combining fast replication options in DFSMShsm.......................................................................238Combining copy services operations in DFSMS...........................................................................239Using the copy pool construct for fast replication setup.............................................................239Using the copy pool backup storage group type for fast replication setup................................ 241Using the extend and overflow storage group types with fast replication..................................242Preparing for the fast replication backup.....................................................................................242Creating a fast replication backup............................................................................................... 243Recovering a fast replication backup........................................................................................... 252Withdrawing DFSMShsm background copies.............................................................................. 263Holding and releasing the fast replication functions...................................................................264Deleting unneeded DFSMShsm fast replication backup versions...............................................265Obtaining DFSMShsm fast replication backup information.........................................................266Preventing DFSMShsm functions from processing target volumes............................................ 270Other copy pool considerations................................................................................................... 270Collecting fast replication messages in message data sets ....................................................... 273

    Volume recovery and restore.............................................................................................................275Specifying the maximum number of data set recovery tasks in each host................................ 275Specifying the maximum number of volume recovery from dump tasks................................... 276Full-volume restore with update..................................................................................................277Full-volume restore from a dump copy........................................................................................279Volume recovery from incremental backup versions.................................................................. 281

    vii

  • Processing priority of volume recoveries.....................................................................................283

    Chapter 7. Availability management of non-SMS-managed storage..................................................... 285Tasks for availability management of non-SMS-managed storage.................................................. 285

    Specifying how frequently data sets are backed up....................................................................285Specifying how many versions to keep for each backed up data set..........................................285Specifying which volumes are backed up automatically.............................................................286Specifying which volumes are dumped automatically................................................................ 287

    Automatic availability management of non-SMS-managed volumes.............................................. 288Backing up cataloged and uncataloged data sets with the same name.....................................289

    Command availability management for non-SMS-managed storage...............................................290Dumping a volume........................................................................................................................290Changing the backup conditions for a data set............................................................................290Backing up an individual data set................................................................................................ 291Inline backup of an individual data set........................................................................................ 291Backing up all primary volumes................................................................................................... 291Backing up all changed data sets on volumes.............................................................................291Deleting expired backup versions of non-SMS-managed data sets........................................... 292Deleting backup versions of specific data sets............................................................................293Recovering specific data sets.......................................................................................................293Recovery of VSAM data sets.........................................................................................................295Data set restore from a DFSMShsm dump copy.......................................................................... 296Data set recovery of retired data sets..........................................................................................297Combining full-volume restore with volume recovery.................................................................297Volume recovery from incremental backup versions.................................................................. 298

    Chapter 8. Aggregate backup and recovery support (ABARS)............................................................... 301How aggregate backup works............................................................................................................304

    Specifying data sets to be backed up.......................................................................................... 304Backing up applications..................................................................................................................... 305

    ABACKUP command.....................................................................................................................306Example of data sets associated with an aggregate group......................................................... 307

    Filtering for generation data sets.......................................................................................................308Preparing for aggregate backup.........................................................................................................308

    SMS requirements during aggregate backup...............................................................................310Creating selection data sets.........................................................................................................311Creating an instruction data set................................................................................................... 316Defining an aggregate group........................................................................................................ 318Management class considerations...............................................................................................320DFSMShsm coexistence considerations for aggregate groups and management classes........ 321Protecting aggregate backup tape volumes................................................................................ 322Checking authorization during aggregate backup....................................................................... 322Authorizing comprehensive ABACKUP command authority....................................................... 323Authorizing restricted ABACKUP command authority.................................................................323Using the aggregate backup installation exits............................................................................. 324Ensuring that the necessary volumes are online.........................................................................325Defining SETSYS parameters for aggregate backup....................................................................325Determining the unit type for the control and data files............................................................. 327Minimizing data set contention.................................................................................................... 327Data sets that DFSMShsm dynamically allocates during aggregate backup processing........... 327

    Performing aggregate backup............................................................................................................328ABACKUP command.....................................................................................................................329Issuing the ABACKUP command with the VERIFY parameter.................................................... 331Issuing the ABACKUP command with the EXECUTE parameter.................................................332

    Aggregate backup output...................................................................................................................333Data files....................................................................................................................................... 333Control file.....................................................................................................................................333Instruction and activity log file.....................................................................................................334

    viii

  • Activity log.................................................................................................................................... 334ABACKUP CPU time and accounting codes................................................................................. 335DFSMShsm coexistence considerations for new ABACKUP output data sets............................335Expiring ABR records in the BCDS................................................................................................336ABACKUP considerations............................................................................................................. 337ABARS user catalog and catalog alias ABACKUP support.......................................................... 338

    Aggregate backup assist.................................................................................................................... 339How aggregate backup assist works............................................................................................339What aggregate backup assist produces..................................................................................... 339Special considerations for ABARS................................................................................................339Authorization and security requirements.................................................................................... 340Input requirements...................................................................................................................... 340SMF data....................................................................................................................................... 340Aggregate job names....................................................................................................................340Storage requirements...................................................................................................................341DD statements used by ABA........................................................................................................ 341Sample JCL................................................................................................................................... 342Sample output.............................................................................................................................. 342

    Aggregate stacking procedure...........................................................................................................342Backing up data with ABARS aggregate backup function........................................................... 343Stacking multiple aggregates on one tape...................................................................................344Aggregate recovery from the stacked tape..................................................................................346Preventing aggregate roll off and tape expiration....................................................................... 347Deleting specific versions of aggregates from a stacked tape.................................................... 347RACF protection of tapes used for stacking.................................................................................348RACF protection of tapes after EXPIREBV processing of versions............................................. 348End of volume during the stacking process................................................................................. 349Cleanup after stacking errors....................................................................................................... 349Copying ABARs aggregates to another device type.....................................................................350

    How aggregate recovery works..........................................................................................................354Recovered aggregate data sets....................................................................................................355Example aggregate recovery site................................................................................................. 356

    Preparing for aggregate recovery...................................................................................................... 356Authorization checking during aggregate recovery..................................................................... 358Authorizing comprehensive ARECOVER command authority..................................................... 359Authorizing restricted ARECOVER command authority...............................................................359Considering storage management subsystem requirements..................................................... 360Determining aggregate recovery site constraints........................................................................361Retrieving the instruction data set............................................................................................... 361Creating an ABR record in the BCDS............................................................................................ 363Issuing the DEFINE ARPOOL command...................................................................................... 364Defining SETSYS parameters for aggregate recovery..................................................................366Defining the model entity............................................................................................................. 369Using the aggregate recovery installation exits...........................................................................369

    Processing generation data sets........................................................................................................369GDSs from level 0 DASD in the include list.................................................................................. 370Migrated GDSs in the include list................................................................................................. 370GDSs in the ALLOCATE list............................................................................................................371GDS processing order................................................................................................................... 371

    Processing migrated data sets in the INCLUDE list...........................................................................371Processing VSAM data sets in the ALLOCATE list..............................................................................371Catalog considerations during ARECOVER processing..................................................................... 372Performing aggregate recovery......................................................................................................... 373

    ARECOVER command...................................................................................................................374Issuing the ARECOVER command with the PREPARE parameter...............................................380Issuing the ARECOVER command with the VERIFY parameter.................................................. 380Issuing the ARECOVER command with the EXECUTE parameter...............................................380Issuing the ARECOVER command with the ONLYDATASET parameter...................................... 381

    ix

  • Recovering the ABARS instruction data set.................................................................................382Backing up and recovering the ABARS activity log......................................................................383Conflict avoidance and conflict resolution processing options...................................................383ARECOVER data set name conflict resolution............................................................................. 384Holding and releasing ABARS functions...................................................................................... 390Displaying SMS class definitions during ABACKUP and ARECOVER........................................... 391ABARS user catalog and catalog alias ARECOVER support........................................................ 391Data sets that are dynamically allocated during aggregate recovery processing...................... 392

    Aggregate recovery output................................................................................................................ 393Activity log.................................................................................................................................... 393ARECOVER CPU time and accounting codes............................................................................... 395Using ISMF panels to perform aggregate backup....................................................................... 395Using ISMF panels to perform aggregate recovery..................................................................... 400

    Using the NetView file transfer program to transmit aggregate Backup files.................................. 409Using NetView file transfer program panels................................................................................ 409Issuing the ARECOVER command when using NetView FTP...................................................... 413

    ABARS considerations for sequential data striping.......................................................................... 414Aggregate backup processing...................................................................................................... 414Aggregate recovery processing.................................................................................................... 414

    Aggregate roll-off processing............................................................................................................ 415Defining GDGs at the recovery site....................................................................................................416Ensuring backup copies of ARECOVERed SMS-managed data sets exist at the recovery site........416Directing ABARS files to DASD...........................................................................................................416

    Chapter 9. Making disaster backup copies of DFSMShsm-owned tape volumes..................................419Planning disaster recovery.................................................................................................................419Disaster backup facilities...................................................................................................................420

    Making copies of DFSMShsm-owned tape volumes....................................................................420Converting tape volumes marked partially full to marked full.................................................... 424Replacing an original with an alternate tape volume.................................................................. 424Creating duplex tapes off site...................................................................................................... 425Sending alternate tapes off site................................................................................................... 425Managing alternate volumes........................................................................................................ 425

    Disaster alternate volumes................................................................................................................ 426Considerations when using disaster alternate volumes..............................................................428

    Chapter 10. Other availability management considerations..................................................................429Additional considerations for backup................................................................................................429

    Backup volume contention resolution......................................................................................... 429Implications of redefining the backup cycle................................................................................430Inline backup................................................................................................................................ 431Preventing backup processing when using the HOLD BACKUP command.................................433GUARANTEED SPACE attribute.................................................................................................... 435Data set backup with concurrent copy........................................................................................ 437Data set backup using NEWNAME............................................................................................... 438

    Additional considerations for dump.................................................................................................. 438Dumping DFSMShsm-owned volumes.........................................................................................439Dumping control data sets........................................................................................................... 439Dumping the journal data set....................................................................................................... 439Preventing dump processing........................................................................................................439Dumping all allocated space........................................................................................................ 440Invoking full-volume dump compression.................................................................................... 440Bypassing enqueue processing between full-volume dump and DFP functions....................... 440

    Volume recovery and restore considerations....................................................................................441Restoring data sets or volumes directly with DFSMSdss............................................................ 441Requesting a list of dump volumes for a dump copy...................................................................441Determining the dump copy data set name.................................................................................441Invoking the DFSMSdss RESTORE function.................................................................................441

    x

  • Preventing recovery and restore processing when using the HOLD RECOVER command......... 442Using the date-last-referenced field for recovery....................................................................... 442

    Deferred generation data sets........................................................................................................... 442Security considerations for availability management.......................................................................443

    Authorization checking during recovery...................................................................................... 443Recovering or restoring RACF-indicated data sets......................................................................444Maintaining password protection for recovered data sets.......................................................... 446

    DFSMShsm retrieval of management classes................................................................................... 446Availability management considerations for extended SAM and extended and compressed

    VSAM data sets............................................................................................................................. 447Availability management considerations for sequential data striping............................................. 447

    Backup processing........................................................................................................................447Recover and restore processing...................................................................................................448

    Common dump queue........................................................................................................................449Types of hosts used in a common dump queue.......................................................................... 451Connecting to a common dump queue........................................................................................ 452Placing requests on the common dump queue........................................................................... 453Selecting requests from the common dump queue.................................................................... 453Processing requests off of the common dump queue.................................................................454Disconnecting from the common dump queue........................................................................... 454Using QUERY, CANCEL and ALTERPRI in the common dump queue.......................................... 455Processing of failures in the common dump queue.................................................................... 456

    Common recover queue.....................................................................................................................457Types of hosts used in a common recover queue........................................................................459Connecting to a common recover queue..................................................................................... 461Placing requests on the common recover queue........................................................................ 462Selecting requests from the common dump queue.................................................................... 463Processing requests off of the common recover queue.............................................................. 463Using QUERY, CANCEL and ALTERPRI in the common recover queue....................................... 464Disconnecting from the common recover queue.........................................................................465Processing of failures in the common recover queue..................................................................466

    Chapter 11. Availability management procedures................................................................................. 467Backup and recovery procedures...................................................................................................... 467

    Interrupting and restarting backup processing........................................................................... 467Defining a new automatic backup start window..........................................................................469Backing up and recovering a catalog........................................................................................... 469

    Full-volume dump procedures...........................................................................................................471Interrupting and restarting automatic dump processing............................................................ 471Defining a new automatic dump start window............................................................................ 472

    Chapter 12. Maintaining DFSMShsm control data sets.......................................................................... 475Tasks for maintaining the control data sets...................................................................................... 475Specifying how DFSMShsm backs up the control data sets............................................................. 475

    Allocating backup data sets......................................................................................................... 476Choosing the data mover to be used............................................................................................476Using non-intrusive journal backup............................................................................................. 478Specifying how many backup versions to keep........................................................................... 479Specifying the names of the backup data sets............................................................................ 479Specifying the device type for backup of the control data sets.................................................. 480

    Invoking the CDS backup exit (ARCCBEXT).......................................................................................481Backing up to multiple DASD data sets............................................................................................. 481Backing up to multiple tape data sets............................................................................................... 483Considerations in a multiple DFSMShsm host environment.............................................................484Considerations when using multicluster control data sets...............................................................484Nulling the journal..............................................................................................................................485Changing the names of the backup data sets................................................................................... 485Changing backup device from tape to DASD.....................................................................................485

    xi

  • Changing backup device from DASD to tape.....................................................................................486Using the QUERY command to get CDS information.........................................................................487Backing up the control data sets manually....................................................................................... 487Possible failures during CDS and journal backup..............................................................................488Reasons for recovering the control data sets....................................................................................489

    I/O errors...................................................................................................................................... 490Recovering control data sets using the enhanced CDS recovery function....................................... 490

    Requirements for using the enhanced CDS recovery function....................................................490Implementing enhanced CDS recovery using JCL.......................................................................491

    Recovering multicluster non-key range control data sets................................................................ 495Control data set recovery procedure using CDSVERSIONBACKUP with UPDATEC......................... 496

    Updating recovered control data sets using UPDATEC............................................................... 498VSAM considerations for the control data sets................................................................................. 499Determining if control data sets are accurate................................................................................... 499Repairing errors in the control data sets........................................................................................... 500Procedures for handling a journal EOV error.....................................................................................500Recovering from a journal I/O error...................................................................................................500Moving the journal..............................................................................................................................501Steps to ensure that the control data sets are accurate...................................................................501Control data set backup and recovery examples..............................................................................501

    Recovery examples using the enhanced CDS recovery function................................................ 502Performance considerations in a multiple DFSMShsm host environment....................................... 507

    MASH configuration considerations.............................................................................................508

    Chapter 13. Managing DFSMShsm media...............................................................................................509Moving all data sets from one level 0 volume to other level 0 volumes...........................................509

    Processing SMS-managed data sets............................................................................................509Processing non-SMS-managed data sets.................................................................................... 510Examples of moving data sets between level 0 volumes............................................................510

    Moving some data sets from migration level 1 volumes...................................................................512Using the FREEVOL command for migration level 1 volumes..................................................... 513Using the MIGRATE command for migration level 1 volumes.....................................................514Deleting non-SMS-managed data sets from migration volumes................................................ 514

    Moving all the data sets from a migration level 1 volume................................................................ 515Processing for SMS-managed data sets...................................................................................... 515Processing for non-SMS-managed data sets...............................................................................515

    Moving data sets from a DASD migration level 2 volume to other migration level 2 volumes........ 516Removing residual dump and backup VTOC copy data sets from migration level 1 volumes.........516Preventing further migration to a DASD migration volume...............................................................517Moving data sets from DASD backup volumes..................................................................................517Removing volumes from DFSMShsm management or control......................................................... 517

    Removing dump copies and dump VTOC copy data sets from DFSMShsm................................518JES3 considerations...........................................................................................................................519Consolidating valid data on tape volumes.........................................................................................519

    Defining the parameters of the recycle process..........................................................................519Initiating recycle processing........................................................................................................ 521PERCENTVALID calculation..........................................................................................................522Selecting tape volumes during recycling..................................................................................... 523Making cartridge-type, single-file-format tapes from reel-type or multiple-file-format tapes. 523

    Limiting data that is written to a cartridge-type device.................................................................... 524Specifying capacity utilization........................................................................................................... 525Considerations for using the 3592 Model J tape drive..................................................................... 526Considerations for using the 3592 Model E05 tape drive................................................................ 527Considerations for using the 3592 Model E06 tape drive................................................................ 528Considerations for using the 3592 Model E07 tape drive................................................................ 530Limiting the number of ML2 and backup data sets that span tape volumes....................................531How to handle inconsistencies between tape media contents and OCDS TTOC records............... 532Recovering a damaged DFSMShsm single-file migration level 2 volume.........................................533

    xii

  • Making migration level 2 key range volumes available.....................................................................533Recovering a migrated data set......................................................................................................... 533Recovering a migration volume......................................................................................................... 534

    Procedure 1...................................................................................................................................534Procedure 2...................................................................................................................................535

    Recovering backup versions from a damaged migration level 1 volume......................................... 536Returning dump tapes to use.............................................................................................................537Managing SDSP data sets.................................................................................................................. 537

    Reorganizing SDSPs......................................................................................................................538SDSP backup and recovery...........................................................................................................538Removing SDSPs...........................................................................................................................539

    Protecting DFSMShsm-owned tape volumes....................................................................................540Converting to a new tape technology................................................................................................ 540Requesting DFSMShsm service from your applications................................................................... 540

    Chapter 14. Obtaining information......................................................................................................... 541Obtaining information from the control data sets.............................................................................541

    Obtaining backup volume information.........................................................................................542Obtaining data set information.....................................................................................................542Obtaining copy pool information..................................................................................................543Obtaining dump class information............................................................................................... 546Obtaining dump volume information........................................................................................... 546Obtaining DFSMShsm host serialization information.................................................................. 547Obtaining lists of backup and dump parameters and backup volume serial numbers.............. 547Obtaining information about migration and DFSMShsm-managed volumes............................. 547Obtaining DFSMShsm-managed volume information................................................................. 548Obtaining tape volume information............................................................................................. 549Obtaining user authorization information....................................................................................550Determining which tape dump volumes are available for output during dump processing.......551

    Obtaining information about the DFSMShsm address space........................................................... 551Determining which tape volumes are available for output............................................................... 554

    Determining which tape backup volumes are available for output.............................................554Determining which tape migration level 2 volumes are available for output............................. 554

    Obtaining statistical information about DFSMShsm operations.......................................................555Running new reports with report generator...................................................................................... 555Using the problem determination aid to trace DFSMShsm processing............................................567

    Specifying to DFSMShsm to use the PDA.................................................................................... 567Using the TRAP command to obtain information about conditions in the system when an error

    occurs............................................................................................................................................ 567Using DEBUG to determine the results of DFSMShsm processing without moving data sets.........568

    Chapter 15. DFSMShsm tape libraries.................................................................................................... 571Automated tape library...................................................................................................................... 571Manual tape library............................................................................................................................ 571

    Chapter 16. Using DFSMShsm with DFSMSrmm.................................................................................... 573Retaining DFSMShsm tape volumes by expiration date................................................................... 573Retaining DFSMShsm tape volumes by DFSMSrmm vital record processing.................................. 573Tape security when using DFSMShsm and DFSMSrmm................................................................... 574Recommendations for using DFSMShsm with DFSMSrmm..............................................................574

    Chapter 17. Operating procedures for DFSMShsm................................................................................ 575Partitioning DFSMShsm functions..................................................................................................... 575Starting DFSMShsm........................................................................................................................... 576Stopping DFSMShsm..........................................................................................................................577

    Shutdown processing on the common recall queue................................................................... 578Preventing DFSMShsm functions from running................................................................................ 578Allowing previously prevented DFSMShsm functions to run............................................................ 582

    xiii

  • Canceling DFSMShsm requests......................................................................................................... 586Altering the priority of DFSMShsm queued requests........................................................................588Printing DFSMShsm log information..................................................................................................589Restarting DFSMShsm after an abnormal end.................................................................................. 596Running automatic functions concurrently....................................................................................... 597Updating the DFSMShsm control data sets.......................................................................................598

    Chapter 18. RACF considerations........................................................................................................... 599RACF basics........................................................................................................................................599

    RACF data set profiles.................................................................................................................. 599RACF indication.............................................................................................................................600Always-call support......................................................................................................................600RACF protect-all environment......................................................................................................601

    RACF environment for DFSMShsm.................................................................................................... 601DFSMShsm and RACF concepts................................................................................................... 602

    The RACF user ID for DFSMShsm...................................................................................................... 603RACF started task table..................................................................................................................... 604Always-call support for migrated data sets and backup copies.......................................................605Migration and recall from DASD.........................................................................................................605Backup and recovery from DASD.......................................................................................................605Aggregate backup and recovery data set security............................................................................ 606Backing up RACF-indicated data sets............................................................................................... 606Authorizing the use of concurrent copy for data set backup commands.........................................606Small data set packing data set security...........................................................................................607Uncataloging migrated data sets.......................................................................................................607Controlling command access with RACF FACILITY class................................................................. 607

    Chapter 19. Health Checker for DFSMShsm...........................................................................................609Check registration.............................................................................................................................. 609

    Chapter 20. Data recovery scenarios...................................................................................................... 611Case 1: Damaged CDS, full journal.................................................................................................... 611Case 2: Damaged journal, undamaged CDS......................................................................................613Case 3: Full journal, undamaged CDS................................................................................................614Case 4: Structurally damaged CDS, missing journal records............................................................615Case 5: Time sequence gaps in CDS records, journal records also missing.................................... 615Case 6: Overwritten migration tape...................................................................................................615Case 7: Overwritten backup tape...................................................................................................... 619Case 8: Damaged ML1 volumes.........................................................................................................623Case 9: Reestablish access to previously deleted migrated data sets (no backup exists, ML2

    only)...............................................................................................................................................628Case 10: Correcting errors within the common recall queue........................................................... 629Case 11: Recovering a deleted ML1 data set without a backup....................................................... 631

    Chapter 21. Consolidated commands, storage group definitions, and management classes for theexample system..................................................................................................................................633ADDVOL command.............................................................................................................................633DEFINE command..............................................................................................................................636SETSYS command.............................................................................................................................. 636Storage groups................................................................................................................................... 638Management classes..........................................................................................................................639

    Chapter 22. Preventive methods for avoiding data loss.........................................................................641Steps for preventing a full journal (damaged CDS)........................................................................... 641Preventing a full journal (undamaged CDS).......................................................................................641Preventing structural damage to CDS and missing journal records................................................. 642Preventing time sequence gaps in CDS records (journal records also missing).............................. 642Preventing overwritten migration tape or overwritten backup tape.................................................643

    xiv

  • Prepare for recovery of a head crash on an ML1 volume..................................................................643Reestablishing access to previously deleted, migrated data sets (no backup exists, ML2 only).... 643

    Chapter 23. Linux-z/OS DFSMShsm dump or restore how-to................................................................645How DFSMShsm supports linux.........................................................................................................645Using DFSMShsm with Linux requirements...................................................................................... 645

    Hardware environment.................................................................................................................645DASD background.........................................................................................................................645Linux requirements.......................................................................................................................646Linux disk utilities......................................................................................................................... 646Authorization requirements......................................................................................................... 647

    Setting up your dump environment for Linux volumes..................................................................... 647Performing only dumps................................................................................................................ 647When do you want your dumps performed?................................................................................647How long do you want to keep your dumps?............................................................................... 647How many dumps are stacked on each dump tape?...................................................................648How many tape drives do you have?............................................................................................648

    Recovering your data......................................................................................................................... 648Recovering a volume with DFSMShsm.........................................................................................648Recovering a volume with DFSMSdss.......................................................................................... 649Recovering a partition with DFSMShsm.......................................................................................649Recovering a partition with DFSMSdss........................................................................................ 650

    Example dump environment..............................................................................................................650How to define your dump cycle....................................................................................................651How to define your dump classes................................................................................................ 651How to ADDVOL your volumes..................................................................................................... 652How to start automatic dumping..................................................................................................652Recovering from a dump.............................................................................................................. 653

    Submitting DFSMShsm commands using JCL and FTP.................................................................... 654The DFSMShsm LIST command........................................................................................................ 655Naming conventions...........................................................................................................................655

    Data set and partition naming conventions................................................................................. 655Volume serial number naming conventions.................................................................................656

    Part 2. DFSMShsm Storage Administration Reference......................................... 657

    Chapter 24. DFSMShsm commands....................................................................................................... 661User commands................................................................................................................................. 661Operator commands.......................................................................................................................... 661Storage administrator commands..................................................................................................... 662System programmer commands....................................................................................................... 663Using RACF FACILITY class to control authorization of commands.................................................664Using DFSMShsm commands............................................................................................................ 664

    Positional parameters.................................................................................................................. 665Keyword parameters.................................................................................................................... 665Abbrevia