Computer Drive User Manual
Table Of Contents
- Chapter 1. HPSS 7.1 Configuration Overview
- Chapter 2. Security and System Access
- Chapter 3. Using SSM
- 3.1. The SSM System Manager
- 3.2. Quick Startup of hpssgui
- 3.3. Configuration and Startup of hpssgui and hpssadm
- 3.4. Multiple SSM Sessions
- 3.5. SSM Window Conventions
- 3.6. Common Window Elements
- 3.7. Help Menu Overview
- 3.8. Monitor, Operations and Configure Menus Overview
- 3.9. SSM Specific Windows
- 3.10. SSM List Preferences
- Chapter 4. Global & Subsystem Configuration
- 4.1. Global Configuration Window
- 4.2. Storage Subsystems
- 4.2.1. Subsystems List Window
- 4.2.2. Creating a New Storage Subsystem
- 4.2.3. Storage Subsystem Configuration Window
- 4.2.3.1. Create Storage Subsystem Metadata
- 4.2.3.2. Create Storage Subsystem Configuration
- 4.2.3.3. Create Storage Subsystem Servers
- 4.2.3.4. Assign a Gatekeeper if Required
- 4.2.3.5. Assign Storage Resources to the Storage Subsystem
- 4.2.3.6. Create Storage Subsystem Fileset and Junction
- 4.2.3.7. Migration and Purge Policy Overrides
- 4.2.3.8. Storage Class Threshold Overrides
- 4.2.4. Modifying a Storage Subsystem
- 4.2.5. Deleting a Storage Subsystem
- Chapter 5. HPSS Servers
- 5.1. Server List
- 5.1. Server Configuration
- 5.1.1. Common Server Configuration
- 5.1.1. Core Server Specific Configuration
- 5.1.2. Gatekeeper Specific Configuration
- 5.1.3. Location Server Additional Configuration
- 5.1.4. Log Client Specific Configuration
- 5.1.1. Log Daemon Specific Configuration
- 5.1.2. Migration/Purge Server (MPS) Specific Configuration
- 5.1.3. Mover Specific Configuration
- 5.1.3.1. Mover Specific Configuration Window
- 5.1.3.1. Additional Mover Configuration
- 5.1.3.1.1. /etc/services, /etc/inetd.conf, and /etc/xinetd.d
- 5.1.3.1.2. The Mover Encryption Key Files
- 5.1.3.1.3. /var/hpss/etc Files Required for Remote Mover
- 5.1.3.1.1. System Configuration Parameters on IRIX, Solaris, and Linux
- 5.1.3.1.1. Setting Up Remote Movers with mkhpss
- 5.1.3.1.2. Mover Configuration to Support Local File Transfer
- 5.1.1. Physical Volume Repository (PVR) Specific Configuration
- 5.1.1. Deleting a Server Configuration
- 5.1. Monitoring Server Information
- 5.1.1. Basic Server Information
- 5.1.1. Specific Server Information
- 5.1.1.1. Core Server Information Window
- 5.1.1.1. Gatekeeper Information Window
- 5.1.1.1. Location Server Information Window
- 5.1.1.2. Migration/Purge Server Information Window
- 5.1.1.3. Mover Information Window
- 5.1.1.1. Physical Volume Library (PVL) Information Window
- 5.1.1.2. Physical Volume Repository (PVR) Information Windows
- 5.1. Real-Time Monitoring (RTM)
- 5.2. Starting HPSS
- 5.1. Stopping HPSS
- 5.2. Server Repair and Reinitialization
- 5.1. Forcing an SSM Connection
- Chapter 6. Storage Configuration
- 6.1. Storage Classes
- 6.2. Storage Hierarchies
- 6.3. Classes of Service
- 6.4. Migration Policies
- 6.5. Purge Policies
- 6.6. File Families
- Chapter 7. Device and Drive Management
- Chapter 8. Volume and Storage Management
- 8.1. Adding Storage Space
- 8.2. Removing Storage Space
- 8.3. Monitoring Storage Space
- 8.4. Dealing with a Space Shortage
- 8.5. Volume Management
- 8.6. Monitoring and Managing Volume Mounts
- 8.7. New Storage Technology Insertion
- Chapter 9. Logging and Status
- Chapter 10. Filesets and Junctions
- Chapter 11. Files, Directories and Objects by SOID
- Chapter 12. Tape Aggregation
- Chapter 13. User Accounts and Accounting
- Chapter 14. User Interfaces
- Chapter 15. Backup and Recovery
- Chapter 16. Management Tools

A server’s log policy can be modified to control the volume of messages to the chosen logging
destinations. Typically, during normal operations, the level of logging may be decreased to only Alarm,
Event, and Security to reduce overhead. However, while tracking an HPSS problem, it may be desirable
to include more log message types such as Debug, Request and Trace to obtain more information. As
stated previously, it is recommended that Trace not be selected except for short periods as an aid to
isolating a problem.
After a server’s log policy has been modified, the Log Client running on the same node as the server
must be reinitialized for it to reread the new log policy. If the server is a Mover, then that Mover itself
must be reinitialized in order for the new log policy to take effect.
9.2.4. Deleting a Log Policy
To delete a log policy, select the log policy from the Logging Policies window (Section 9.2.2: Logging
Policies Window on page 296) and click the Delete button. A log policy can also be deleted by opening
the Logging Policy window (Section 9.2.2.1: Logging Policy Configuration Window on page 297) for
the appropriate log policy and clicking the Delete button.
A third way to delete a log policy is to open the Log Policy tab of the Server Configuration window for
that server and push the Use Default Log Policy button. This removes the unique log policy configured
for that server and makes it revert to using the default policy.
Before deleting a log policy, ensure that no servers are configured to use it. Otherwise, the log policy
deletion could result in loss of important log messages. After deleting a log policy, the Log Clients
supporting any servers that were using the policy must be reinitialized or restarted. If the log policy was
used by a Mover, then that Mover itself must be reinitialized or restarted in order for the Mover to stop
using the deleted policy.
9.3. Managing the Central Log
This section describes configuring and viewing the central log file. Note that the central log is located on
the node with the Log Daemon and is in binary format.
9.3.1. Configuring Central Log Options
The central HPSS log is managed by the Log Daemon and consists of two log files, logfile01 and
logfile02. These log files can be controlled by changing the Archive Logfiles and the Switch Logfiles
flags on the Log Daemon Specific Configuration window (Section 5.1.1: Log Daemon Specific
Configuration on page 101). The Archive Logfiles flag dictates whether the log files will be
automatically archived when they are filled. The Switch Logfiles flag dictates whether a switch to the
second log file should be done if the archive of the second log file has not yet completed. The
administrator needs to consider whether archiving of the log files is needed and then set these flags
appropriately.
In addition to modifying the logging configuration to control logging, the HPSSLOG_SHMKEY,
HPSSLOG, and HPSSLOGGER environment variables described in the HPSS Installation
Guide, Section 5.6: Define HPSS Environment Variables can also be used.
HPSS Management Guide November 2009
Release 7.3 (Revision 1.0) 299