Computer Drive User Manual
Table Of Contents
- Chapter 1. HPSS 7.1 Configuration Overview
- Chapter 2. Security and System Access
- Chapter 3. Using SSM
- 3.1. The SSM System Manager
- 3.2. Quick Startup of hpssgui
- 3.3. Configuration and Startup of hpssgui and hpssadm
- 3.4. Multiple SSM Sessions
- 3.5. SSM Window Conventions
- 3.6. Common Window Elements
- 3.7. Help Menu Overview
- 3.8. Monitor, Operations and Configure Menus Overview
- 3.9. SSM Specific Windows
- 3.10. SSM List Preferences
- Chapter 4. Global & Subsystem Configuration
- 4.1. Global Configuration Window
- 4.2. Storage Subsystems
- 4.2.1. Subsystems List Window
- 4.2.2. Creating a New Storage Subsystem
- 4.2.3. Storage Subsystem Configuration Window
- 4.2.3.1. Create Storage Subsystem Metadata
- 4.2.3.2. Create Storage Subsystem Configuration
- 4.2.3.3. Create Storage Subsystem Servers
- 4.2.3.4. Assign a Gatekeeper if Required
- 4.2.3.5. Assign Storage Resources to the Storage Subsystem
- 4.2.3.6. Create Storage Subsystem Fileset and Junction
- 4.2.3.7. Migration and Purge Policy Overrides
- 4.2.3.8. Storage Class Threshold Overrides
- 4.2.4. Modifying a Storage Subsystem
- 4.2.5. Deleting a Storage Subsystem
- Chapter 5. HPSS Servers
- 5.1. Server List
- 5.1. Server Configuration
- 5.1.1. Common Server Configuration
- 5.1.1. Core Server Specific Configuration
- 5.1.2. Gatekeeper Specific Configuration
- 5.1.3. Location Server Additional Configuration
- 5.1.4. Log Client Specific Configuration
- 5.1.1. Log Daemon Specific Configuration
- 5.1.2. Migration/Purge Server (MPS) Specific Configuration
- 5.1.3. Mover Specific Configuration
- 5.1.3.1. Mover Specific Configuration Window
- 5.1.3.1. Additional Mover Configuration
- 5.1.3.1.1. /etc/services, /etc/inetd.conf, and /etc/xinetd.d
- 5.1.3.1.2. The Mover Encryption Key Files
- 5.1.3.1.3. /var/hpss/etc Files Required for Remote Mover
- 5.1.3.1.1. System Configuration Parameters on IRIX, Solaris, and Linux
- 5.1.3.1.1. Setting Up Remote Movers with mkhpss
- 5.1.3.1.2. Mover Configuration to Support Local File Transfer
- 5.1.1. Physical Volume Repository (PVR) Specific Configuration
- 5.1.1. Deleting a Server Configuration
- 5.1. Monitoring Server Information
- 5.1.1. Basic Server Information
- 5.1.1. Specific Server Information
- 5.1.1.1. Core Server Information Window
- 5.1.1.1. Gatekeeper Information Window
- 5.1.1.1. Location Server Information Window
- 5.1.1.2. Migration/Purge Server Information Window
- 5.1.1.3. Mover Information Window
- 5.1.1.1. Physical Volume Library (PVL) Information Window
- 5.1.1.2. Physical Volume Repository (PVR) Information Windows
- 5.1. Real-Time Monitoring (RTM)
- 5.2. Starting HPSS
- 5.1. Stopping HPSS
- 5.2. Server Repair and Reinitialization
- 5.1. Forcing an SSM Connection
- Chapter 6. Storage Configuration
- 6.1. Storage Classes
- 6.2. Storage Hierarchies
- 6.3. Classes of Service
- 6.4. Migration Policies
- 6.5. Purge Policies
- 6.6. File Families
- Chapter 7. Device and Drive Management
- Chapter 8. Volume and Storage Management
- 8.1. Adding Storage Space
- 8.2. Removing Storage Space
- 8.3. Monitoring Storage Space
- 8.4. Dealing with a Space Shortage
- 8.5. Volume Management
- 8.6. Monitoring and Managing Volume Mounts
- 8.7. New Storage Technology Insertion
- Chapter 9. Logging and Status
- Chapter 10. Filesets and Junctions
- Chapter 11. Files, Directories and Objects by SOID
- Chapter 12. Tape Aggregation
- Chapter 13. User Accounts and Accounting
- Chapter 14. User Interfaces
- Chapter 15. Backup and Recovery
- Chapter 16. Management Tools

5. The SSM Alarms and Events window (Section 5.2.2.3: on page 151)
A standard configuration for logging services is usually set by the administrator during the HPSS system
configuration. Specialized configurations can be set up and used to temporarily (or permanently) provide
more or less logging for site-specific or shift-specific operational situations. Increasing the level of
logging may slow down overall system operation due to the overhead of extra messages, and decreasing
the amount of logging may eliminate certain log messages that could prove useful in a postmortem
analysis of problem situations. The logging configuration can be tailored as needed to satisfy site or shift
requirements.
Each SSM graphical user session (hpssgui) and command line session (hpssadm) can write a session log
file of the SSM error and informational messages issued during the session. These are not the same as
the alarm, event, and other HPSS log messages described above and are not described in this chapter.
See the '-S' option in the hpssgui and hpssadm man pages for details.
9.2. Log Policies
For any HPSS server or utility which uses the HPSS logging facility, a log policy can be configured to
specify which log message types will be sent to the HPSS logs and which message types will be sent to
SSM for display. Log policies are configured by Server Name, which is displayed on each HPSS
Server's Server Configuration window.
If no log policy is configured for a server, the server will use the Default Log Policy. If no
default is defined, only Alarm and Event message types will be logged.
After changing any log policy information, including the Default Log Policy, the appropriate Log Clients
must be reinitialized to make the changes effective. The Log Clients associated with a particular policy
are the ones which execute on the same hosts as the servers to which the policy applies. For example, if
you modified only policies for servers which execute on host A, then only the Log Client which runs on
host A needs to be reinitialized. The Mover log policy is handled differently. If the Mover log policy is
modified, the Mover itself must be reinitialized in order for the policy changes to take effect.
9.2.1. Creating a Log Policy
A log policy can be created for any unique name which is typed into the Descriptive Name field on the
Logging Policy window, regardless of whether or not the name refers to any actual server or utility.
A new log policy can be created and managed using the Log Policy window or via the Log Policy tab of
of an HPSS Server's Server Configuration window (Section 5.1.1.1: Log Policy on page 95). This Log
Policy window can be accessed from the Logging Policies window (Section 9.2.2: Logging Policies
Window on page 296). From this window, a log policy can be created for any unique name which is
typed into the Descriptive Name field on the Logging Policy window, regardless of whether or not the
name refers to any actual server or utility.
A server's logging policy is determined according to the following precedence rules:
• If a server-specific logging policy is configured for a server, that policy is used for the server.
• If no server-specific logging policy is configured for a server, but a default logging policy is
configured, the default policy will be used for the server.
HPSS Management Guide November 2009
Release 7.3 (Revision 1.0) 295