iTech Solutions - for all of your IBM i System needs

IBM iTech Tips

Posted on January 21, 2020

Oh Where Oh Where Can My System Save Information Be…? With its unique integrated architecture, the IBM i system has many inherent strengths, not the least of which is fully baked-in and robust save/restore functionality.  When you save an object on the system such as a file or a data area or a program in a user library with commands such as SAVLIB or SAVOBJ, the system will inform you on the “when” and the “where” of the save of that object by displaying the saved date/time of the object

Posted on January 20, 2020

I’ve been asked several times in the last few weeks about ODBC drivers for IBM i and how to obtain them for a PC running Client Solutions. There are actually a number of pieces to the IBM i Access puzzle that are nowhere to be found in the base ACS “installation,” so I thought I’d take a minute to revisit how ACS is structured by IBM for those who might be looking for something specific. The Client Solutions base package, which includes the 5250 emulator and even the SQL scripting

Posted on

I recently answered a Facebook group thread about the frequency of doing an IPL. A couple of people said it’s a best practice to do one every week. One even said it was an “IBM best practice.” Of course, there’s no supporting documentation to support that claim. I’m sure it was an offhand remark by an IBM CE in 1997 while he or she was replacing a 4 GB disk drive. But a weekly IPL as a best practice? I completely disagree. Why? Performance. Database performance specifically. The SQL Plan

Posted on

When using BRMS control groups (WRKCTLGBRM), it is possible to add user commands using the *EXIT option for the backup item. These commands can run many different backup items or end/start applications. First and Last *EXIT If used, these are processed outside of the control group. The first *EXIT is the pre-control group exit that runs before any of the control group attributes are run (signing off users, ending subsystems, holding job queues, and so on). The last *EXIT is the post-control group and is run after all entries in

Posted on November 20, 2019

With Client Solutions now being the only IBM-supported client software for IBM i, quite a few organizations have made the switch from the old iAccess products or are in the process of doing so. ACS is as flexible as the old application was rigid, and there are many different ways to configure it on a PC. One of the recurring questions we get from clients who are planning the switch relates to controlling what the end-user can see and use within the application. To address this,  I’d like to discuss

Posted on

BRMS is not a set it and forget it backup and recovery application.  Since BRMS uses database files to store information, some of these files can get large and have many records inserted and/or deleted every day.  There are ways that you can clean up BRMS data files on a regular and as-needed basis. Regular BRMS data files cleanup strategy: BRMS recommends that the Start Maintenance for BRM (STRMNTBRM) command with *YES specified for the reorganize BRMS database (RGZBRMDB) parameter, is run at least once a month to clean up

Posted on October 21, 2019

When installing software on a new machine, or even slipping the License Internal Code, you can now do this via the USB.  I will show you how to download IBM I 7.4 LIC, but you can do this for 7.2, 7.3, or 7.4. My screenshots show 7.4, and the only difference would be the USB I_BASE_01 code for each release.  For POWER7, POWER7+, POWER8, and POWER9 systems tag the USB adapter as the alternate restart adapter using an HMC.  For POWER9 systems not managed by an HMC the USB system

Posted on

How to Remove a File Share You can stop sharing an existing file share by using IBM Navigator for i or System i Navigator. To remove a file share, follow these steps:  In IBM Navigator for i In IBM Navigator for i, under the IBM i Management node, expand File Systems > Integrated File System. Navigate through the file system folders until you locate the folder that contains the file for which you want to remove a share. Click on this folder to display its contents in the console workspace. Right-click the shared directory that

Posted on September 25, 2019

One of the topics that seem to pop up in my email on a regular basis is SMB. If you have users that access the IFS through Windows file shares or mapped drives, then you’re probably already somewhat familiar with NetServer. NetServer is an implementation of the Server Message Block (SMB) protocol used primarily by Windows clients for file and print sharing. It is to IBM i what Samba is to Unix and similar platforms. Over the years, several different versions of the SMB protocol have been released to address

Posted on

Here are 8 helpful hints for upgrading your MIMIX environment. It is important to keep you MIMIX environment update to ensure you are replicating properly. One of the most important things with any upgrade is to determine compatibility between the OS and the releases of 3rd party software. MIMIX is no different, and this chart shows you which versions of MIMIX are compatible with which versions of IBM i.   [ View full-size chart ] MIMIX Upgrade tips: MIMIX 8.0 will not be compatible with OS version V7R4, this is

Posted on

I have been asked by customers using BRMS, if there is an easy way to exclude objects in the IFS, that are unable to be saved, when using *LINK, to prevent getting the softer error: “Save of list *LINK completed with errors” (BRM10A1 is issued)”. There are several methods: Create and use a BRMS backup list in your backup control group, type *LNK, specifying the IFS directories or files you want to include and omit, and use that as a backup item *LNK in your BRMS backup control group for

Posted on August 26, 2019

Have you ever seen or gotten a BRM1744 during a BRMS full system save or SAVSYSBRM?  Here is what you need to do to resolve this, and I am only going to address V5R3M0 and above. When a SAVSYS is performed through BRMS using a backup control group or the SAVSYSBRM command, BRMS will automatically attempt to end the system to a restricted condition by issuing the following command: ENDSBS SBS(*ALL) OPTION(*CNTRLD) In V5R3M0 and above, once the time limit is up on the *CNTRLD ENDSBS SBS(*ALL), BRMS will use

Posted on

Every now and then you get to help a customer via a cool solution. Problem: We have a customer who was running three Domino 9 servers (mail, applications and Traveler) on three separate physical Windows servers at various OS versions. One of these servers was drastically underpowered from both processing and network throughput perspectives. Furthermore, nightly maintenance jobs (compact, updall, fixup) were not completing due to the large size of the databases and the underpowered servers. The lack of processing and network speed made backing up those Domino servers a

Posted on

Last month, I talked about the importance of the HMC and how it shouldn’t be ignored. That leads to the question: How do I keep it running smoothly? The full answer can be pretty complex. In fact, Pete regularly speaks at conferences on the topic of HMC maintenance and the presentation can easily fill a 90-minute session. Today, I’d like to set our sights a bit lower and just talk about the basics of HMC updates. IBM regularly releases Service Packs and PTFs for each version of the HMC software

Posted on July 31, 2019

We get asked this question all the time: “how can I protect IBM i against ransomware?” Ransomware is a hot button topic. It should be. The average ransom that companies paid in Q1 2019 rose to $12,762 from $6,733 the previous quarter. In some instances, ransoms are in the six-figure range or higher for large organizations with a low tolerance for downtime. So, how do you protect the data on your IBM i partitions from being held hostage? The first step is to acknowledge that your IBM i may be

Posted on July 30, 2019

The Hardware Management Console (HMC) is a strange beast. Anyone with a partitioned system needs one, and it can be an indispensable tool for anyone whose desk isn’t within 100 yards of the machine room…but it isn’t part of the system itself and it usually isn’t critical to everyday operations once things are up and running. Is it part of your critical path or is it an accessory largely to be forgotten? To answer that question, let’s examine how the HMC relates to your system and how IBM supports the

Posted on

Found and interesting option the other day I wanted to share, it is not new but something I think most people don’t know.  IBM created a program that you can run to display the status of all your cache batteries.  This is great because you don’t need to sign on to SST and take several options to get to the individual batteries to check the cache battery days remaining.  Just execute this program in QSYS – (CALL QSYS/QSMBTTCC). It should run on any system 5.4 or over, you may have

Posted on June 27, 2019

If you have an IASP’s and want/need to use the Collect Disk Space Information option on the DISKTASKS menu, it does not have an option to collect data for an Independent Auxiliary Storage Pool (IASP).  You actually have two methods to use. One method to collect data for an IASP, is by using the RTVDSKINFcommand and specify the IASP device name on the ASPDEV parameter, this can either be submitted to batch or scheduled to run using either the IBM i job scheduler (WRKJOBSCDE), or the Advanced Job Scheduler (GO JS).

Posted on

We run into a lot of older iron and because of that we find fax cards and Facsimile Support installed every now and again. The question that stumps almost everyone is “do you still use fax?” That question usually results in someone checking the physical machine to see if there’s a cable plugged into the fax card. No cable? No fax. That’s easy! But if there’s a cable plugged into the card it’s usually a guessing game for the customer. An easy way to determine if you’re using fax support

Posted on May 30, 2019

At each release, IBM tightens up the security of the system, which is a good thing for many shops.  There are two system values, which while you might have set to *OPSYS, the underlying security will change when you upgrade to a new release.  Now, I certainly recommend that most places have both System Values QSSLPCL (Secure Sockets Layer Protocols) and QSSLCSLCTL (Secure Sockets layer cipher control) both set to *OPSYS.  This way, when IBM changes the defaults associated with the release, you get the newer versions, but you should