iTech Solutions - for all of your IBM i System needs

IBM i Tech Tips

Posted on March 23, 2020

Steve Pitcher, iTech Solutions

We had a customer recently who had someone locking out a service account on IBM i. This service account ran their BI dashboard. The question was asked: “how can we find out who did this?”

Using the audit journal, we have the ability to find out where the bad password requests came from. When you narrow down the where, the who becomes much easier to figure out.

If you are auditing your security events (which you should be) then you can do the following steps. You’ll need your QAUDLVL system value to include *AUTFAIL and *SECURITY. If you don’t audit security events, check this IBM technote to start doing so: http://www-01.ibm.com/support/docview.wss?uid=nas8N1014712.

(more…)

Posted on February 26, 2020

Marc Vadeboncoeur, iTech Solutions

Many of you are familiar with the PASE runtime environment that IBM i has had for many years, if you have licensed program 5770-SS1 option #33 (Portable App Solutions Environment) installed then you have It running on your system.  The PASE environment is the secret sauce that enables AIX/Linux apps to run on your IBM i.  One very common misconception is that PASE on IBM i is an AIX/Linux “emulation” environment, but, it is not.  PASE supplies a collection of AIX shared libraries that run directly on the same IBM Power processor that IBM i runs on.  Because it is a true AIX/Linux environment interacting directly with the Power-based processors and not an emulated one, PASE on IBM i runs apps at the same performance level as if they were running natively on an AIX/Linux system.  PASE on IBM i is significant in that it opens-up the IBM i to the vast world of free Open Source applications that are out there now in the mainstream.

(more…)

Posted on February 25, 2020

Pete Massiello, President, iTech Solutions

Problem

This is only occurring on Power9 servers, and you need to get the FSP firmware updated, as well as a patch for IBM i.  If you don’t have the patches, do not use concurrent maintenance, or dynamic LPAR on POWER9 servers under the following conditions:

  1. The resource is a physical PCIe adapter, an EMX0 cable, fanout module, chassis management card, or midplane.
  2. The resource physically owned by an IBM i partition
  3. The firmware fix is not applied.

Without the fix applied, the server can go to an incomplete state during the operation requiring server level IPL to recover.

(more…)

Posted on January 21, 2020

Oh Where Oh Where Can My System Save Information Be…?

 

Marc Vadeboncoeur, iTech Solutions

With its unique integrated architecture, the IBM i system has many inherent strengths, not the least of which is fully baked-in and robust save/restore functionality.  When you save an object on the system such as a file or a data area or a program in a user library with commands such as SAVLIB or SAVOBJ, the system will inform you on the “when” and the “where” of the save of that object by displaying the saved date/time of the object and the save media or save file used to do the save.  For example, if you want to know the last time file QRPGLESRC in library QGPL was saved and what it was saved to, you would simply execute command DSPOBJD OBJ(QGPL/QRPGLESRC) OBJTYPE(*FILE) and take option #5 to display the full attributes, and then scroll down to the last screen where the system tells you the last save date and time and the tape volume ID or save file used to save the object, this is basic functionality that we are all familiar with.

(more…)

Posted on January 20, 2020

Nathan Williams, iTech Solutions

I’ve been asked several times in the last few weeks about ODBC drivers for IBM i and how to obtain them for a PC running Client Solutions. There are actually a number of pieces to the IBM i Access puzzle that are nowhere to be found in the base ACS “installation,” so I thought I’d take a minute to revisit how ACS is structured by IBM for those who might be looking for something specific.

The Client Solutions base package, which includes the 5250 emulator and even the SQL scripting tools, is a platform-independent Java application. It doesn’t use a traditional installation method for setup, so it cannot account for anything that might need to be installed on the PC in an OS-dependent way. The ODBC drivers and a few other things fall under this category, and needed to be separated out from the Java applications so they could be given special handling.

(more…)

Posted on

Steve Pitcher, iTech Solutions

I recently answered a Facebook group thread about the frequency of doing an IPL. A couple of people said it’s a best practice to do one every week. One even said it was an “IBM best practice.” Of course, there’s no supporting documentation to support that claim. I’m sure it was an offhand remark by an IBM CE in 1997 while he or she was replacing a 4 GB disk drive. But a weekly IPL as a best practice? I completely disagree.

Why?

Performance. Database performance specifically.

The SQL Plan Cache is cleared during each IPL. It contains access plans for database accesses that were optimized by SQE. After an IPL, let’s say when a database query is run its access plan is rebuilt and then put into the Plan Cache for future use, making those eventual operations much faster. The IPL effectively takes those plans and throws them out the window, making database performance less efficient.

(more…)

Posted on

Chris Flick, iTech Solutions

When using BRMS control groups (WRKCTLGBRM), it is possible to add user commands using the *EXIT option for the backup item. These commands can run many different backup items or end/start applications.

First and Last *EXIT
If used, these are processed outside of the control group. The first *EXIT is the pre-control group exit that runs before any of the control group attributes are run (signing off users, ending subsystems, holding job queues, and so on). The last *EXIT is the post-control group and is run after all entries in the control group have been run.

(more…)

Posted on November 20, 2019

Nathan Williams, iTech Solutions

With Client Solutions now being the only IBM-supported client software for IBM i, quite a few organizations have made the switch from the old iAccess products or are in the process of doing so. ACS is as flexible as the old application was rigid, and there are many different ways to configure it on a PC. One of the recurring questions we get from clients who are planning the switch relates to controlling what the end-user can see and use within the application. To address this,  I’d like to discuss a bit about how ACS does configuration under the hood and how administrators can have some control over what can be accessed within the application.

(more…)

Posted on

Chris Flick, iTech Solutions

BRMS is not a set it and forget it backup and recovery application.  Since BRMS uses database files to store information, some of these files can get large and have many records inserted and/or deleted every day.  There are ways that you can clean up BRMS data files on a regular and as-needed basis.

Regular BRMS data files cleanup strategy:

BRMS recommends that the Start Maintenance for BRM (STRMNTBRM) command with *YES specified for the reorganize BRMS database (RGZBRMDB) parameter, is run at least once a month to clean up the files.  Because it can take a long time to reorganize the BRMS database, it may be desirable to reorganize the BRMS database in batch using the STRMNTBRM command, and performing this when no other BRMS activity is being performed.  The more often you run it, the less time it takes to run.  I would recommend running daily, as part of your BRMS strategy to include:

(more…)

Posted on October 21, 2019

When installing software on a new machine, or even slipping the License Internal Code, you can now do this via the USB.  I will show you how to download IBM I 7.4 LIC, but you can do this for 7.2, 7.3, or 7.4. My screenshots show 7.4, and the only difference would be the USB I_BASE_01 code for each release.  For POWER7, POWER7+, POWER8, and POWER9 systems tag the USB adapter as the alternate restart adapter using an HMC.  For POWER9 systems not managed by an HMC the USB system ports are in the default search sequence for a D-mode IPL, so it is not necessary to tag the USB adapter.

In order to do this, you need to do the following:

From the ESS website you need to sign in and download the software.  You will select the version of the operating system that you want.  I selected IBM i as below along with the version that I wanted and then go to the bottom of the screen and hit continue.

(more…)

Posted on
Chris Flick, Technician at iTech Solutions

Chris Flick, iTech Solutions

How to Remove a File Share

You can stop sharing an existing file share by using IBM Navigator for i or System i Navigator.

To remove a file share, follow these steps: 

In IBM Navigator for i

  1. In IBM Navigator for i, under the IBM i Management node, expand File Systems > Integrated File System.
  2. Navigate through the file system folders until you locate the folder that contains the file for which you want to remove a share.
  3. Click on this folder to display its contents in the console workspace.
  4. Right-click the shared directory that you want to stop sharing in the console workspace and select Sharing > Stop Sharing.
  5. On the Stop Sharing window that displays next, click OK.

(more…)

Posted on September 25, 2019

Nathan Williams, iTech Solutions

One of the topics that seem to pop up in my email on a regular basis is SMB. If you have users that access the IFS through Windows file shares or mapped drives, then you’re probably already somewhat familiar with NetServer. NetServer is an implementation of the Server Message Block (SMB) protocol used primarily by Windows clients for file and print sharing. It is to IBM i what Samba is to Unix and similar platforms.

Over the years, several different versions of the SMB protocol have been released to address shortcomings, add features, and increase security. Support for the various flavors is generally broken down into broad categories of SMBv1, SMBv2, and SMBv3, although there are minor revisions to each of these. The latest version introduced by Microsoft with Windows 10 and Windows Server 2016 is v3.1.1. It is important to be aware of the different versions because in order for two machines to converse using SMB, both sides need to support a common version.

(more…)

Posted on
Amy Upton, Technician at iTech Solutions

Amy Upton, iTech Solutions

Here are 8 helpful hints for upgrading your MIMIX environment. It is important to keep you MIMIX environment update to ensure you are replicating properly.

One of the most important things with any upgrade is to determine compatibility between the OS and the releases of 3rd party software. MIMIX is no different, and this chart shows you which versions of MIMIX are compatible with which versions of IBM i. (more…)

Posted on
Chris Flick, Technician at iTech Solutions

Chris Flick, iTech Solutions

I have been asked by customers using BRMS, if there is an easy way to exclude objects in the IFS, that are unable to be saved, when using *LINK, to prevent getting the softer error: “Save of list *LINK completed with errors” (BRM10A1 is issued)”.

There are several methods:

  • Create and use a BRMS backup list in your backup control group, type *LNK, specifying the IFS directories or files you want to include and omit, and use that as a backup item *LNK in your BRMS backup control group for saving IFS information.
  • When using *LINK, list type *LNK, as a backup item in your backup control group, for saving the IFS, use the BRMS backup list, type *LNK, QLNKOMT, to specify any directories or links to be excluded from a *LNK backup, by adding them to the OQLNKOMT user-modifiable list.  This is the method I will discuss in further detail in this article.

(more…)

Posted on August 26, 2019
Chris Flick, Technician at iTech Solutions

Chris Flick

Have you ever seen or gotten a BRM1744 during a BRMS full system save or SAVSYSBRM?  Here is what you need to do to resolve this, and I am only going to address V5R3M0 and above. When a SAVSYS is performed through BRMS using a backup control group or the SAVSYSBRM command, BRMS will automatically attempt to end the system to a restricted condition by issuing the following command:

ENDSBS SBS(*ALL) OPTION(*CNTRLD)

(more…)

Newsletters