Professional Documents
Culture Documents
System Library
Software
Installation and
Configuration Guide
for Solaris
Version 6.0
CRC Update
The information in this document is confidential and proprietary to Storage Technology Corporation and may
be used only under the terms of the product license or nondisclosure agreement. The information in this
document, including any associated software program, may not be disclosed, disseminated, or distributed in
any manner without the written consent of Storage Technology Corporation.
Restricted Rights
Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)
(1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227–7013 or
subparagraphs (c) (1) and (2) of the Commercial Computer Software –– Restricted Rights at 48 CFR
52.227–19, as applicable.
Trademarks
The following terms are either trademarks or registered trademarks of Storage Technology Corporation:
StorageTekR
NearlineR
IBMR is a registered trademark of International Business Machines Corporation.
Other product names mentioned in this manual may be trademarks. They are used for identification purposes
only.
EC 123273
This edition applies to Version 6.0 of Automated Cartridge System Library Software. Information contained in
this publication is subject to change. Comments concerning the contents of this manual should be directed to:
Storage Technology Corporation
Manager, Software Information Development, MS 5209
One StorageTek Drive
Louisville, Colorado 80028–5209
OR
E–mail us at:
ACSLS Software
Audience
This book is written for StorageTek or customer personnel who
install and configure the Solaris operating system and ACSLS.
As the ACSLS installer, you should already know the following:
Reader’s We’d like to know what you think about this book. For that
Comments purpose, we’ve included a reader’s comment form in the back of
this book. Please copy the form, fill it out, and mail it to us.
If you prefer, you can e-mail your comments to Software
Information Development directly. Our Internet address is:
Be sure to include the document title and number with your
comments.
link.
S
is used to indicate that you must
substitute the actual value for a command parameter. In
the following example, you would substitute your name for
the “username” parameter.
Enter Command The instruction to “press the ENTER key” is omitted from most
examples, definitions, and explanations in this book.
For example, if the instructions asked you to “enter”
, you would type in and press ENTER.
Symbols The following symbols are used to highlight text in this book.
Warning: Information necessary to keep you from damaging
STOP
your hardware or software.
Caution: Information necessary to keep you from corrupting
! your data.
Hint: Information that can be used to shorten or simplify your
task or that may simply be used as a reminder.
xxxxx Note: Information that may be of special interest to you. Notes
xxx
are also used to point out exceptions to rules or procedures.
Technical Support
Refer to Requesting Help from Software Support for information
about contacting StorageTek for technical support and for
requesting changes to software products.
Related Documentation
link.
ACS Hardware The StorageTek CRC provides PDF file format of many of
Information on the StorageTek’s ACS hardware publications. Use the following
StorageTek CRC procedure to access these publications on the StorageTek CRC.
link.
Document Effectivity
EC Number Date Doc Kit Edition Effectivity
Number Type
123273 May 2001 –––––– Ninth This document applies to
Edition Automated Cartridge System
Library Software (ACSLS),
Version 6.0
Contents
About this Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
ACSLS Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Reader’s Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
About the Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
How this Guide is Organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
What’s New in This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Conventions for Reader Usability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Typographic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Enter Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
ACSLS 6.0 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
ACSLS Information on the StorageTek CRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
ACS Hardware Information on the StorageTek CRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Contents xv
9th ed., 313464701
Appendix A. Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Using the ACSLS Database Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
bdb.acsss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
db_export.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
db_import.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
kill.acsss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
rc.acsss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
sd_mgr.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Contents xvii
9th ed., 313464701
List of Figures
Figure 1. Dual LMU Connection Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Figure 2. Configuration Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Figure 3. Defining Primary Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Figure 4. Defining Secondary Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Figure 5. Defining Primary Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Figure 6. Defining Secondary Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Figure 7. Format Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Figure 8. Partition Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Figure 9. Partition Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Figure 10. Second Disk Partition Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Figure 11. Partition Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
List of Tables
Table 1. Pre-Installation Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 2. ACSLS Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Table 3. Library Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Overview
This chapter describes how to prepare for installation of the
Solaris operating system and for installation and configuration of
ACSLS.
This chapter includes:
LMU
...........................
SPARCStation-5
) establish a
-6/ network
connection
+ ,
CSI acts as a TCP Static TRUE
RPC server ((') FALSE
)
( or not (7!)
,
(
-('/
,
'&
-('/
3 )
Pathname for Static $ACS_HOM
directory E/log
)
# containing the
event log
9
#
-@! *A<0
/
3 ) 01 Maximum event Dynamic 500
# log size (Kb); see 32 or more
)
) ) “Specifying
B Options for Event
C#
and Statistic Logs”
8D+555 on the following
#
> pages.
-.55/
3 ) & Date and time Dynamic The E:
format for all variable can
)
ACSLS logs and specify
-E:FEFE command and 4–digit year
EAE0E/ utility output formats,
which is the
default
*
rollover statistics 0–9
log files; see
) -?/ “Specifying
)
Options for Event
and Statistic Logs”
on the following
pages.
G 01 Maximum Dynamic 500
# statistics log size 32K or more
) (Kb); see
)
*
“Specifying
)
B Options for Event
C#
and Statistic Logs”
8D+555 on the following
#
> pages.
-.55/
*
configuration
program to enable
auto-cleaning for
drives attached to
SCSI–attached
LSMs. Using
ACSLS, you can
only clean these
drives by manually
mounting a
cleaning cartridge.
The LSM
hardware,
however, lets you
enable
auto–cleaning via
the LSM control
panel. For more
information, see
your LSM
documen-
tation.
G # Initialize ACSLS Static RUN
) in ' or ,& IDLE
state
)
)
8',&>
-'/
“Specifying
)
! Options for
ACSLS Processes”
on the following
pages.
-3/
G H': (' specifies that Static TRUE
ACSLS executes FALSE
queries as one or
) 8('7!> more persistent
)
-('/ processes. Use the
following option
to specify the
number of query
persistent
processes; see
“Specifying
Options for
ACSLS Processes”
on the following
pages.
“Specifying
)
! Options for
ACSLS Processes”
on the following
pages.
#
-3/
G
Maximum ACSLS Static 40
1 transient 32 and above
processes; see
) ! “Specifying
)
Options for
ACSLS Processes”
on the following
pages.
01
!
-65/
G Log automatic Dynamic FALSE
mode enters in the TRUE
event log ((') or
)
not (7!)
)
#
8('7!>
-7!/
((') or not
)
(7!)
!
)
8('7!>
-7!/
6 & If no access Dynamic ACCESS
Log command and Dynamic FALSE
TRUE
& messages
)
8('7!>
-7!/
. 9 # Allows you to Dynamic or
change the default
# automatic backup If you respond
schedule, which is , you are
set to do a backup further
I every day at prompted for
8# > midnight. the day and
Note: Automatic the time you
backups and want to have
manual backups automatic
need not be done backups.
on the same day.
. You select the Dynamic Between 4
period of time that and 30
you will retain
backups on local
,0 disk. You can
) select a period
between 4 and 30
A days. See “Setting
1 the Retention
-4/ Period” on the
following pages.
*
) as follows:
*
(base) file reaches maximum size, ACSLS renames it to
the first rollover file ()
5
), then starts a new
*
file. When the
*
file
again reaches maximum size, ACSLS renames the
)
5
file to )
+
, renames
*
to )
5
, and starts a new
*
file. When all rollover files contain
data and another rollover occurs, the highest numbered
rollover file will be discarded.
S You can specify the maximum log file size; this maximum
applies to both the base log and rollover log files. If you
specify rollover log files, you can typically specify a
smaller maximum file size (that applies to both base log
and rollover files) than the maximum file size you would
specify for a base log only, which must be large enough to
contain enough meaningful entries.
*
)
S ACSLS query persistent (specified via
*
)
S ACSLS mount persistent (specified via
*
)
For the ACSLS transient, query persistent, and mount persistent
process options, StorageTek recommends that you accept the
default value at initial configuration, then change the value as
required. Increasing this value may improve performance.
Warning: With a minimum server platform configuration,
STOP
higher than 10 query persistent processes could use up system
resources and not allow ACSLS to start up.
If the total number of all the processes listed above exceeds the
Solaris system limit on processes per user, ACSLS may fail to
start. If this happens, either increase the system limit on
processes per user or lower one or more of the values for the
ACSLS process options that you can specify via
* .
2 – Cursor Stability
Acquires a shared lock on the selected row. Another
process can also acquire a shared lock on the same row, but
no process can acquire an exclusive lock to modify data in
the row. When you fetch another row or close the cursor,
the database server releases the shared lock. If you set the
isolation level to Cursor Stability, but you are not using a
transaction, the Cursor Stability isolation level acts like the
Committed Read isolation level. Locks are acquired when
the isolation level is set to Cursor Stability outside a
transaction, but they are released immediately at the end of
the statement that reads the row.
3 – Repeatable Read
Acquires a shared lock on every row that is selected during
the transaction. Another process can also acquire a shared
lock on a selected row, but no other process can modify
any selected row during your transaction or insert a row
that meets the search criteria of your query during your
transaction. If you repeat the query during the transaction,
you reread the same information. The shared locks are
released only when the transaction commits or rolls back.
Repeatable Read is the default isolation level in an
ANSI–compliant database.
Where To Go Next?
The remainder of this chapter contains procedures to complete
pre-installation preparation. These procedures include:
Press ENTER.
xxxxx Note: If you have configured the SCSI/Ethernet card on
xxx
an Ultra 10 and you are not using the second Ethernet
connection, then disregard the message, “home1: link
down”.
Hint: The
,
will appear first.
During the installation process, this console provides
messages indicating what the system is doing.
5. Answer :
to the prompt :
and
press .
8. Confirm the A
, I, and ,
11. Select #
in screen.
Enter your netmask and press .
12. Select :
or in the
screen.
If you selected :
, the
screen appears. Enter
your Netmask and press .
13. Specify your timezone type in the ( K screen and
click .
14. Enter the current date and time in the & (
screen and press .
screen.
;
G in the
32. Press
B in the 7 #
&
#
screen to define disk partitions for ACSLS.
The
B &
screen displays.
Disk: c0t0d0
0 / .4 5
1 1 /44 5
3 7( 24 5
5 7 24 5
6 7 644 5
7 7 37$
Based on disk size
Disk: c0t1d0
0
*
0.8 5
1
*
Based on disk size
screen.
The 7 #
&
# screen appears.
35. Are the file systems and disk layout correct in the 7
#
&
# screen?
YES Press to accept the layout displayed.
NO Press
B to change the file system or
layout information.
screen,
which shows the progress with a sliding bar.
Press ENTER.
xxxxx Note: If you have configured the SCSI/Ethernet card on
xxx
an Ultra 10 and you are not using the second Ethernet
connection, then disregard the message, “home1: link
down”.
Hint: The
,
will appear first.
During the installation process, this console provides
messages indicating what the system is doing.
6. In the A
screen, enter the Host Name for your
system and press .
9. Confirm the A
, I, and ,
13. Select #
in screen.
Enter your netmask and press .
14. Select :
or in the
screen.
If you selected :
, the
screen appears. Enter
your Netmask and press .
15. Specify your timezone type in the ( K screen and
click .
16. Enter the current date and time in the & (
screen and press .
23. Press
B .
The
B screen appears displaying the
window.
Hint: In the
;
G in the
33. Press
B in the 7 #
&
#
screen to define disk partitions for ACSLS.
The
B &
screen displays.
Disk: c0t0d0
0 / .4 5
1 1 /44 5
3 7( 24 5
5 7 24 5
6 7 644 5
7 7 37$
Based on disk size
Disk: c0t1d0
0
*
0.8 5
1
*
Based on disk size
screen.
The 7 #
&
# screen appears.
36. Are the file systems and disk layout correct in the 7
#
&
# screen?
YES Press to accept the layout displayed.
NO Press
B to change the file system or
layout information.
screen,
which shows the progress with a sliding bar.
Overview
This chapter describes how to install and configure ACSLS on a
Solaris platform. It includes:
1. Log in as root.
8. If you find the value 106 and you decide to delete, select
Edit –> Delete.
9. From the menu select File –> Exit to exit the tool.
Installing ACSLS
To install ACSLS:
1. Log in as .
7. Reboot by entering:
$
8. Log in as .
22. Enter
9
Configuring ACSLS
To configure ACSLS:
2. Log in as
12. Enter the device name for each connection. (See Table
3, “Library Configuration Options.”)
&) " ! RM ) R
Example device names for 4400 or 9300 libraries
&) " ! R5M ) R5 7 (7
&) " ! R5M ) R+ 7 (7$
xxxxx Note: If you are using 9840 10– or 20–drive panels, you
xxx
must have Compatibility Level 12 LMU microcode
installed. If you have Compatibility Level 11 and 12 or
Compatibility 6 LMUs, you receive the following
message:
+5") 35")
#
# 6")
#I 8# >
If you respond #, the old panel files will be used. If you
respond , the configuration routine will exit with the
message:
(
) M
)"+3
#
xxxxx Note: If you are running Compatibility Level 6 on a 4430
xxx
LMU, you must upgrade your library hardware to include a 9330
LMU.
*
NO Continue with Step 16.
& #
,
8>
,
('
The database backup procedure
#
NO Press CTRL+ C and refer to
on page
93 in Appendix A to back up the database to disk
file. This completes this procedure.
&
#
Warning: Interrupting the backup process before
STOP
completion will cause a corrupted backup file or tape.
2. Change directories:
7 37
7&77$
3. Enter:
6. Is an error returned?
YES Continue with Step 7.
NO The problem points to a hardware condition such as
faulty cable connections or a faulty LMU. Check
all connections. Then rerun the configuration
program (Step 5 in “Configuring ACSLS”).
7. If
failed with a permission error, you get
output such as:
<8> )#
D +GM
)#
0'
This error message indicates that permissions need to be
changed on the low level tty device.
2. Run
.
*
If your troubleshooting efforts fail, contact StorageTek
Software Support for assistance.
Overview
This chapter describes the steps necessary to complete the
ACSLS installation. They include:
Space Required by Second disk is used to contain the transaction logs in order to
ACSLS on the assure recoverability to the most recent transaction, even in the
Second Disk event of primary disk failure. The storage requirements for
second disk can be met with 256 MB in Partition 0 and the
remainder in Partition 1.
1. Is ACSLS running?
YES Continue with Step 2.
NO Go to Step 7.
7. Log in as .
7<0!( 0'
"
# "
8>
#
"
8>
"
" #B
" )
"
#B "
#
)# "
#
) "
)
!(,(,< 0'
5 "
T5U
+ "
T+U
3 "
T3U
G "
TGU
6 "
T6U
. "
T.U
L "
TLU
2 "
T2U
"
# " #
"
"
#
"
xxxxx Note: The values in your partition table might differ from those
xxx
shown, depending on the size of your disk and whether you have
previously partitioned it.
Warning: Modifying an existing partition will destroy any data
STOP
in that partition.
/
Accept either the default
or enter
to bring up a list of available id tags.
b.
-/ 1
c.
# -5/ 4
d.
B -5M 5M 5 55/ 0.8
/
Accept the default.
b.
-/ 1
c.
# -5/
To determine this value, add 1 to the highest
numbered cylinder in partition 0. For example, if
partition 0 contains cylinders 5".35, enter .0:
d.
B -5M 5M 5 55/
Enter the amount displayed in 7 (see Chapter 2,
page 38).
!(,(,< 0'
5 "
T5U
+ "
T+U
3 "
T3U
G "
TGU
6 "
T6U
. "
T.U
L "
TLU
2 "
T2U
"
# " #
"
"
#
"
Creating the File In this procedure, you create the file systems on the disk you just
Systems partitioned.
)
5+5
5 )
5+5
5
*
+ #
"
Installing ACSLS
Second Disk
Support
1. Is ACSLS running?
YES Continue with Step 2.
NO Go to Step 6.
6. Log in as .
7. Change directories.
7 37
7&7
10. When you are prompted for the directory for second
disk support, press ENTER to accept the default of
*
if you used
*
as the mount
point in your )
entry (see “Creating the File
Systems” on page 77). If you used an optional directory
11. When you are prompted for the second disk directory
for database backups, press ENTER to accept the
default of
*
if you used
*
as the mount point in your
)
entry (see “Creating the File Systems” on page
77). If you used an optional directory name instead of
/second_disk/backup on page 77, enter that name.
13. Insert the tape if you need to and wait for the backup
to complete.
Restarting ACSLS
To restart ACSLS:
1. Log in as .
3. Log in as
6. Log back in as
user by
entering:
If the response is not
* file.
('
The database backup procedure
#
Disk Enter CTRL + C and refer to
on
page 93 to back up the database to disk file. Then
continue with Step 9.
&
#
Verifying ACSLS
1. Log in as
Running ivp.sh to Use this procedure to run the IVP program ()
) to mount
Verify ACSLS and dismount a volume. You specify the volume and drive that
)
uses in the ) file.
Run )
to mount/dismount a volume to verify
ACSLS:
Appendix A. Utilities
Overview
This appendix contains general guidelines for using specific
ACSLS database utilities and descriptions of the library utilities
mentioned in this book. These include the following:
S bdb.acsss
S db_export.sh
S db_import.sh
S kill.acsss
S rc.acsss
S sd_mgr.sh
Appendix A. Utilities 91
9th ed., 313464701
as
described in the System Administrator’s Guide.
to
manually back up the database for disaster recovery after:
d A large number of enters or ejects
d A large number of scratch mounts
d Running *
d Running
*
d Any database recovery
S *1
and *
database utilities are for
capturing and recovering database table data and
miscellaneous files for upgrades or OS changes to avoid
having to run a lengthy audit.
bdb.acsss
The
utility, ACSLS
xxx
automatically creates a backup on local disk as well.
Format
Options
F
specifies a UNIX file to contain the ACSLS database. You
must have write permissions to the file.
F
specifies any tape device attached and configured to the
ACSLS server.
Appendix A. Utilities 93
9th ed., 313464701
to manually
back up the database to tape after:
S Running
*
.
S Importing the database. After you upgrade to a new
version of ACSLS, do not use database backups or exports
created with previous versions. Make sure, however, to
create a new backup as soon as you have upgraded.
db_export.sh
The *1
utility exports the ACSLS database table
data and miscellaneous files in preparation for an upgrade
installation or a reinstallation of ACSLS.
Format
*1
F
Hint: If you enter *1
with no options, the export
utility defaults to the default tape device attached and configured
to the ACSLS server.
Options
F
specifies a UNIX file to contain a backup of the ACSLS
database. You must have write permissions to the file.
xxxxx Note: If you export the database to a file, the file must reside in
xxx
a directory above /export/home/ACSSS.
Appendix A. Utilities 95
9th ed., 313464701
9. Remove the cartridge from the drive only when you see
a message indicating the export is complete.
Caution: You will lose files if you remove the cartridge
! before the program completes. Write protect the cartridge
and clearly mark it to identify the contents as the exported
database.
Appendix A. Utilities 97
9th ed., 313464701
db_import.sh
The *
utility imports the ACSLS database table
data and the miscellaneous files that you exported when you
used the *1
utility.
Format
*
F
Options
F
specifies a UNIX file created by db_export.sh.
9. Run
Appendix A. Utilities 99
9th ed., 313464701
7. Run
kill.acsss
The
Format
Options None.
See Also
Notes
Caution: Do not run
rc.acsss
The
Format
-/
Options
puts the ACSLM in the idle state.
, so you may be
prompted to enter the
sd_mgr.sh
The
*
utility installs or deinstalls second disk support.
Format
*
Options None.
Overview
De-installing a second disk is usually done when the second disk
needs to be serviced or replaced.
Caution: De-installation of the second disk should be used if
! there is a hardware failure of the second disk. ACSLS will not
start if a hardware failure occurs.
5. Log in as .
6. Change directories.
11. Insert the tape and wait for the backup to complete.
The backup takes several minutes to complete.
Restarting ACSLS
To restart ACSLS:
1. Log in as .
3. Log in as .
Restarting ACSLS
To restart ACSLS:
1. Log in as .
3. Log in as
6. Log back in as
Glossary
ACS—See Automated Cartridge System. ACSLS platform—The server hardware and
software that provide the proper
ACSEL—See ACS Event Logger. environment for ACSLS.
Glossary 109
9th ed., 313464701
CAP—See Cartridge Access Port. channel—A device that connects the host
and main storage with the input and output
CAP ID—A unique identifier for the control units.
location of a CAP. A CAP ID consists of the
ACS ID, the LSM number, and the CAP client applications—Software applications
number. that manage tape cartridge contents. They
access tape cartridges by interacting with
cartridge—A plastic housing containing a ACSLS. Any number of client applications
length of data recording tape. The tape is can be resident on a client system.
threaded automatically when loaded in a
transport. A plastic leader block is attached client computing system—A computer and
to the tape for automatic threading. The an executable image of the operating
spine of the cartridge can contain an system.
OCR/Bar Code label listing the volume ID.
client software— This software manages
Cartridge Access Port (CAP)—A tape cartridge contents, generates requests
bidirectional port built into the door panel of for cartridges, and transfers data to and from
an LSM, which provides for the manual cartridges. The client software is not part of
entry or automatic ejection of tape ACSLS.
cartridges.
Client System Component—Software
cartridge drive (CD)—A device containing which provides an interface between the
two or four cartridge transports and their client computing system’s operating system
associated power and pneumatic supplies. and ACSLS.
control path adapter—A hardware device end of tape (EOT)— The location on a tape
which converts from a Client Computing where written data ends.
System’s control protocol to the control
protocol of the StorageTek Library Control EOT— See end of tape.
System.
EPO—Emergency Power Off.
control unit (CU)—A microprocessor-based
unit logically situated between a channel EPROM—See erasable programmable read
and up to sixteen cartridge transports. The only memory.
CU translates channel commands into
transport commands and sends transport
erasable programmable read-only
status to the channel. memory (EPROM)—A special memory
chip that can be erased and reprogrammed.
CSE—Customer Services Engineer.
Event Log—A file, maintained by the
CSC—Client System Component. ACSEL, that contains messages describing
library and ACSLS events.
CSI—See Client System Interface.
Event Logger—See ACS Event Logger.
CSI variables—Used to define various
options to fine–tune communications external label identifiers— A
between a CSC and the CSI. You change six–character alphanumeric label on the
these variables in the
Glossary 111
9th ed., 313464701
LSM ID—A unique identifier for an LSM. pool—A collection of tape cartridges having
The LSM ID consists of the ACS ID and the one or more similar features or attributes,
LSM number. such as a pool of scratch tapes.
Glossary 113
9th ed., 313464701
redo log files—Backup files used to restore SQL—See structured query language.
the ACSLS database.
SRN. See service request number.
relational database—A database that is
organized and accessed according to SSI—See Storage Server Interface.
relationships between the data items;
relationships are represented by tables. SSR—Software Support Representative.
server system user—A person who invokes TLMS—See tape library management
ACSLS commands, utilities, or procedures system.
on the server system. Server system users
are generally site and maintenance personnel TOD—Time of day.
(for example, library operators, tape
librarians, system administrators, CSEs, and UDP—User Datagram Protocol.
systems personnel).
UNIX—An operating system originally
servo—A system that uses feedback to developed by Bell Laboratories (now UNIX
control a process. Systems Laboratories, Inc.) and used by a
variety of computer systems.
silo—A commonly used term for an LSM.
unsolicited messages—Messages that
See Library Storage Module.
indicate an error or notify you when a
SIMM—Single inline memory module. particular routine action can be taken.
Glossary 115