System summary details

The system configuration summary is a CSV file that contains information about your storage system.

Descriptions

The system summary items in the following tables are presented in the order in which they appear in the CSV file.

Table 1. Storage system
Data Description
Name The name of the DS8000® system as set by the administrator.
State The current state of the DS8000 system.
Product The product name of the IBM® system.
Release The release and version of the IBM system software.
Bundle The currently installed code bundle.
MTM The machine type and model of the DS8000 system.
S/N The unique serial number for the DS8000 system.
Machine Signature A string of characters that identifies a DS8000 system. The machine signature is used to retrieve license keys from the IBM Entitled Systems Support (ESS) website.
WWPN The unique 16-character identifier that represents the worldwide port name. It is used by the host to identify the storage system.
Number of Frames The number of frames in the storage system.
Processors The number of processors in the storage system.
System Memory (GB) The total system memory in gigabytes.
Raw Capacity (TB) The raw storage capacity of the system in terabytes.
Last Power on Time The date and 24-hour clock time in which the storage system was powered on
Install Time The date and time when the DS8000 system was initially installed.
Power Control Mode Specifies how the power supply to the storage system is controlled.
Automatic
Controls the power supply from the external power switch.
Manual
Controls the power supply from the Power Off action on the System page.
z System managed
Controls the power supply from an IBM Z host.
GUI version The currently installed GUI version.
NTP Indicates whether the option to use a Network Time Protocol (NTP) server is enabled or disabled. The NTP server provides the date and time for the storage system.
NTP servers The NTP servers that provide the date and time for the storage system.
Table 2. System Capacity
Data Description
Available(TiB) The amount of usable capacity that is not yet used on the storage system.
Used Standard(TiB) The amount of usable capacity that is taken up by data in volumes with standard provisioning.
Used Thin Provisioned (ESE)(TiB) The amount of usable capacity that is taken up by data in volumes with thin provisioning.
Used Safeguarded Copies(TiB) The amount of usable capacity that is taken up by data in volumes that contain safeguarded copies.
Used Overhead(TiB) The amount of usable capacity that is occupied by metadata on the storage system.
Over-Provisioned Indicator(TiB) The ratio of provisioned capacity to usable capacity on the storage system (overprovisioned ratio) multiplied by the usable capacity on the storage system.
Table 3. Used IBMZ(CKD) Capacity
Data Description
Available(kMod1) The amount of usable capacity for CKD data that is not yet used on the storage system.
Used Standard(kMod1) The amount of usable capacity that is taken up by CKD data in volumes with standard provisioning.
Used Thin Provisioned (ESE)(kMod1) The amount of usable capacity that is taken up by CKD data in volumes with thin provisioning.
Used Safeguarded Copies(kMod1) The amount of usable capacity that is taken up by CKD data in volumes that contain safeguarded copies.
Used Overhead(kMod1) The amount of usable capacity that is occupied by CKD metadata on the storage system.
Over-Provisioned Indicator(kMod1) The ratio of provisioned CKD capacity to usable CKD capacity on the storage system (overprovisioned ratio) multiplied by the usable CKD capacity on the storage system.
Table 4. Used Open Systems(FB) Capacity
Data Description
Available(TiB) The amount of usable capacity for FB data that is not yet used on the storage system.
Used Standard(TiB) The amount of usable capacity that is taken up by FB data in volumes with standard provisioning.
Used Thin Provisioned (ESE)(TiB) The amount of usable capacity that is taken up by FB data in volumes with thin provisioning.
Used Safeguarded Copies(TiB) The amount of usable capacity that is taken up by FB data in volumes that contain safeguarded copies.
Used Overhead(TiB) The amount of usable capacity that is occupied by FB metadata on the storage system.
Over-Provisioned Indicator(TiB) The ratio of provisioned FB capacity to usable FB capacity on the storage system (overprovisioned ratio) multiplied by the usable FB capacity on the storage system.
Table 5. Unassigned Capacity
Data Description
Unassigned Capacity The amount of usable capacity that is not provisioned on the storage system.
Table 6. Licensed Functions
Data Description
Name The name of the licensed function.
Enabled Indicates whether the licensed function is enabled.
Capacity (TiB) The amount capacity that is available for the licensed function.
Storage Type The amount of usable capacity that is taken up by FB data in volumes that contain safeguarded copies.
Key Code The key code that is assigned to the licensed function.
Table 7. Function switches
Data Description
Easy Tier Automatic Mode Determines which pools are automatically managed by Easy Tier®:
None
Easy Tier does not manage capacity placement for any pools.
Tiered
Easy Tier manages capacity placement within pools that have arrays with different drive classes.
All
Easy Tier manages capacity placement within all pools.
Easy Tier Monitor Mode Determines which pools include I/O activity monitoring by Easy Tier:
Automatic mode
Easy Tier monitors I/O activity for capacity within all pools that are automatically managed by Easy Tier.
All
Easy Tier monitors I/O activity for capacity within all pools.
None
Easy Tier does not monitor I/O activity.
Easy Tier Heat Map Transfer The enablement setting for Easy Tier Heat Map Transfer.
Easy Tier Allocation Order Sets the high utilization or high performance options for the ordering of tiers.
Power Control Mode Indicates how the power supply to the storage system is controlled.
Automatic
Power on automatically whenever external power is restored, if the storage system was originally on. For example, power automatically is restored after a power outage.
Manual
Use the System page on the DS8000 Storage Management GUI to power on and power off your storage system.
Easy Tier Automatic Migration Acceleration Indicates whether the option to double the maximum amount of data that Easy Tier can automatically migrate is enabled. This option might cause your existing workload to experience increased latency and decreased bandwidth while migration occurs.
Resource Group Checking Indicates whether the Resource Group Control feature of logical configuration is enabled. The Resource Group Control feature allows storage administrator to specify which user can perform certain logical configuration actions such as create/delete volumes in a pool.
DS Service GUI Access Indicates whether IBM service access to the Service Management Console is enabled.
SSH Service Access Indicates whether IBM service access to the Secure Shell (SSH) command line on the Hardware Management Console (HMC) is enabled.
IBMi Serial Number Prefix A prefix to avoid duplicate LUN IDs for an IBM i host.
CUIR Support Indicates whether the Control-unit initiated reconfiguration (CUIR) option is enabled. This option allows automation of channel path quiesce and resume actions during certain service actions, which eliminates the requirement for manual actions from the IBM Z host.
ESSNet Copy Services The user interface on the host for managing Copy Services on the storage system.
ESSNet Volume Group The set of logical volumes.
Host pre-check Indicates whether the FB and CKD volume delete protection option is enabled.
Device Threshold The threshold level for IBM Z , presenting a Service Information Message (SIM) to the operator console for device-related errors. Device threshold levels are the same type and severity as control unit threshold settings. The following values are available:
0
Service, Moderate, Serious, and Acute (all)
1
Moderate, Serious, and Acute
2
Serious and Acute
3
Acute
4
None
Full Page Protection Indicates whether the ability to ensure that the maintenance of the atomicity of a database page-write is enabled.
PPRC Path Recovery Indicates whether the option for the storage system to monitor Peer-to-Peer Remote Copy (PPRC) paths for signs of failure is enabled. If a path fails, it is placed into a degraded state in which it is used minimally until the problem stops. If this setting is disabled, paths are never put into degraded state.
Present SIM data to all hosts Indicates whether the option for Service Information Messages (SIMs) to be offloaded to the first I/O request is enabled.
Enhanced Information Unit Pacing Indicates whether the option for increased write performance of large writes at long distances and improvement of z/OS® Global Mirror initial copy performance is enabled.
Suggested Tasks Indicates whether the option to display suggested tasks is enabled.
Table 8. ICS (Installed Corrective Service)
Data Description
Name The name of the ICS that was installed on the storage system.
State The HMC in which the ICS was installed (or not installed).
Last installed The date on which the ICS was installed.
Table 9. Frames
Data Description
ID The frame ID in the storage system.
Frame The frame number in the storage system.
Location The frame location in the storage system.
Table 10. Call Home
Data Description
Call Home Indicates whether the call home feature is enabled or disabled.
Company name Your company name.
Company ID Your company ID.
Administrator name The system administrator's name.
Administrator email The system administrator's email address.
Administrator telephone The system administrator's telephone number.
Administrator alternate telephone The system administrator's alternate telephone number.
Administrator address The system administrator's street address.
Administrator address 2 The system administrator's street address.
Administrator city/locality The system administrator's city or locality.
Administrator country/region The system administrator's country or region.
Administrator state/province The system administrator's state or province.
Administrator postal code The system administrator's postal code.
System telephone The phone number of the system's location.
System address The address of the system's location.
System address 2 The address of the system's location.
System city/locality The city or locality of the system's location.
System country/region The country or region of the system's location.
System state/province The state or province of the system's location.
System postal code The postal code of the system's location.
Table 11. Remote Support Center
Data Description
Connection Indicates whether the Remote Support Center (RSC) connection is open or closed.
Sessions Indicates whether the system is connected to the RSC.
Timeout Displays the timeout option for the RSC connection.
Access code Indicates whether the access code feature is enabled or disabled.
Debug mode Indicates whether debug mode is enabled or disabled.
IBM Server The RSC servers that can connect to your storage system
Table 12. Assist On-Site
Data Description
Connection Indicates whether the Assist On-Site (AOS) connection is started or stopped.
Company name The name of your organization.
Company ID The IBM ID assigned to your organization.
AOS groups The AOS support groups for your organization.
HTTP proxy Indicates whether the system uses an HTTP proxy for the AOS connection.
Broker list The AOS host addresses.
Table 13. Nodes
Data Description
ID The node identifier. There are two nodes on the DS8000 system (Node 0 and Node 1).
State The current state of the nodes.
Release The version of the licensed machine code (LMC) or hardware bundle on the node.
Bundle The currently installed code bundle.
Processor The type and configuration of the processor on the node.
Processor Memory (GB) The amount of raw cache memory that is installed in the node.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
Table 14. HMCs
Data Description
Name The name of the HMC as defined by the user.
State The status of the HMC.
Release The version of the licensed machine code (LMC) installed on the HMC.
Bundle The currently installed code bundle.
Host Address The IP address for the host system of the HMC.
Role The primary or secondary HMC.
AOS Access The enablement setting for Assist On-site (AOS) connection to the HMC for IBM service. If this connection is not enabled, AOS must be configured on an external server to allow IBM service access to the storage system. AOS must be configured through the DS Service GUI before it can be enabled with this setting.
Service GUI Access The enablement setting for authorized IBM service representatives to access the DS Service GUI.
SSH Access The enablement setting for authorized IBM service representatives to access the Secure Shell (SSH) command-line on the HMCs. This setting does not affect access to the system through the DS command-line interface.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
NTP Indicates whether the option to use a Network Time Protocol (NTP) server is enabled or disabled. The NTP server provides the date and time for the storage system.
Table 15. HMC Network Settings
Data Description
HMC ID The HMC ID.
LAN adapter The LAN adapter used by the HMC.
MAC The HMC MAC address.
Media speed The network connection speed and duplex option.
IPv4 address The IPv4 address of the HMC.
IPv4 subnet mask The network IPv4 subnet mask address.
Autoconfigure IP address Indicates whether the Autoconfigure IP address option for IPv6 addresses is enabled or disabled.
Use DHCPv6 to configure IP settings Indicates whether the Use DHCPv6 to configure IP settings option for IPv6 addresses is enabled or disabled.
IPv6 Autoconfigure IP The IPv6 address of the HMC.
IPv6 Autoconfigure prefix length The bit length for the network prefix of the HMC IPv6 address.
IPv6 static IP A static IPv6 address that is assigned to the HMC.
Use Settings from DHCP Indicates whether the Use Settings from DHCPoption is enabled or disabled.
DNS Indicates whether the option to use a DNS server is enabled or disabled.
DNS server search order The DNS servers in the order of preference, starting with the server to use for DNS searches first.
DNS suffix search order The suffixes to append to domain names in the order of preference, starting with the suffix to use first.
Routing entries Routing information for hosts or networks that are not accessible from the default gateway.
Table 16. Storage enclosures
Data Description
ID The enclosure number for the storage enclosure.
Frame A frame is a hardware support structure, covers, and all of the hardware components that are mounted within. A DS8000 system can include up to three frames.
State The current state of the storage enclosure as follows:
Online
The storage enclosure is operating normally.
Service requested
A service request to IBM was generated for one or more drives within the storage enclosure.
Service required
The storage enclosure is online, but requires service. A call home was initiated to IBM Hardware Support.
Service in progress
The storage enclosure is being repaired.
Offline
The storage enclosure requires service. A call home was initiated to IBM Hardware Support.
Number of Drives The number of drives contained in the storage enclosure.
Raw Capacity (GB) The raw capacity of the drives in the storage enclosure.
Drive Class The class and speed of the drive.
Install Time The time stamp that indicates when the storage enclosure was installed.
S/N The serial number of the storage enclosure.
Location The location code of the storage enclosure.
Table 17. Drives
Data Description
S/N The serial number of the drive.
State The current state of the drive.
Array The ID of the array that the drive belongs to.
RawCapacity (GB) The raw capacity of the drive.
Drive Class The class and speed of the drive.
Interface The type of interface that is used by the drive.
Interface Rate (Gbps) The speed of the interface that is used by the drive.
Firmware The level of firmware that is installed on the drive.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
WWNN The unique 16-digit hex number that represents the worldwide node name of the drive.
Encryption The encryption state of all data in the pool. Encryption protects data from unauthorized access and helps to keep your data secure.
Table 18. I/O enclosures
Data Description
ID The enclosure number for the I/O enclosure.
State The current state of the I/O enclosure.
Number of HAs The number of host adapters contained in the I/O enclosure.
Number of DAs The number of device adapters contained in the I/O enclosure.
S/N The serial number of the I/O enclosure.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
Table 19. Host adapters
Data Description
S/N The serial number of the host adapter.
State The current state of the host adapter.
Number of I/O Ports The number of I/O ports contained in the host adapter.
Type The interface type of the host adapter.
Speed (Gbps) The speed of the host adapter.
Encryption Capable Indicates whether the host adapter supports encryption.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
Table 20. Fibre Channel ports
Data Description
ID The identification number of the Fibre Channel port.
Frame The system frame that contains the Fibre Channel port.
I/O Enclosure The I/O enclosure that contains the Fibre Channel port.
Host Adapter The host adapter that contains the Fibre Channel port.
State The current state of the Fibre Channel port.
Protocol One of three Fibre Channel protocols.
WWPN The unique 16-digit hex number that represents the worldwide port name of the Fibre Channel port.
Speed The speed of the Fibre Channel port.
Location The location in the enclosure consisting of the machine type and model, serial number, slot, and connector.
Security The Endpoint Security level for the Fibre Channel port.
Disabled
Endpoint Security is not enabled for the port.
Enabled
Endpoint Security is enabled to allow authentication between the host and the port, but authentication is not required for I/O processing.
Enforced
Endpoint Security is enabled and authentication is required between the host and the port for I/O processing. Host ports that do not support security or do not complete authentication will be logged out and denied login.
Table 22. Device adapters
Data Description
S/N The serial number of the device adapter.
State The current state of the device adapter.
DA Pair The identifier of the device adapter pair that the device adapter belongs to.
Location The location in the enclosure, consisting of the machine type and model, serial number, slot, and connector.
Table 23. Arrays
Data Description
ID The unique identifier for an array that is assigned by the system.
State The status of an array.
Unassigned
The array is not assigned to a pool; all of the drives in the array are in a normal state.
Formatting
One or more drives in the array are being formatted.
Unavailable
The array is not assigned to a pool and one or more of the drives are not in the normal state. This state prevents you from selecting the array for operation.
Normal
The array is assigned to a pool and none of the other states apply. This state is the preferred state for arrays in most cases.
Reserved
No new capacity can be allocated from the array.
Depopulating to unassign
Data is being deleted and the array is no longer assigned to a pool. Capacity that was allocated to the array is being migrated to other arrays in the pool.
Depopulating to reassign
Data is being deleted and the array is being assigned to another pool. Capacity that was allocated to the array is being migrated to other arrays in the pool.
Depopulating
Data is being deleted from the array. Capacity that was allocated to the array is being migrated to other arrays in the pool.
Configured
The array is configured with a storage type or RAID level. Unassign the array to unconfigure it.
Configuring
The array is being configured with a storage type and RAID level.
Reconfiguring
The drives in the array are being reformatted and repartitioned, and the array is not yet assigned to a pool.
Depopulation error
The depopulation of the array failed. If the array is reserved when this error occurs, it remains in the reserved state. Contact IBM Hardware Support.
Internal error
An internal system error occurred and the problem cannot be determined. Contact IBM Hardware Support.
Degraded
One or more drives in the array are in a rebuild state. The array is not in the read-only, failed, repairing, or inaccessible state. Contact IBM Hardware Support
Read-only
One or more drives failed, but the array is not in a failed, repairing, or inaccessible state. An insufficient number of spares are left to support rebuild operations. Contact IBM Hardware Support.
Failed
Two or more drives in the array failed and the array is not in the repairing or inaccessible state. An insufficient number of drives are left in the array to rebuild the data that was lost on the failed drives. Contact IBM Hardware Support.
Repairing
The array was previously in a failed state, but is being repaired and is not accessible.
Inaccessible
One or more drives in the array cannot be accessed for reading or writing. Contact IBM Hardware Support.
Unknown
The state of the array cannot be determined. Contact IBM Hardware Support.
Pool The name of the associated pool.
Storage Type The type of storage architecture, either CKD for IBM Z hosts or FB for open systems hosts, for which a pool is provisioned.
Usable Capacity (GiB) The amount of capacity that the array can contribute to the associated pool.
Used Capacity (GiB) The amount of capacity that the array contributes to the associated pool.
Drive Capacity (GB) The raw capacity of the drives in the array, before they are formatted and configured. For example, a drive might have a raw capacity of 146 GB before it is formatted and configured with a RAID level within an array.
Drive Class The class and speed of the drive.
DA Pair The two device adapters in the I/O enclosures that work together to provide redundancy for I/O requests for one or more storage enclosures to improve overall throughput. A DS8000 storage system can have a maximum of four DA pairs to support up to eight storage enclosures.
RAID Level A collection of two or more drives that provides data protection by using the techniques of striping, mirroring, or parity to drives.
Configuration The number of spare, data, and parity drives within the array.
Spare Drives The number of drives that are reserved as spares within an array. These spare drives can be used to rebuild any array within the same DA pair as the array.
Volumes The number of volumes that are associated with the array.
Migrating Capacity The amount of allocated capacity that is being migrated into or out of the associated pool. The migration value can include array depopulation, manual volume migration, or Easy Tier volume migration.
Extent Size The standard unit of allocation for standard and ESE volumes. It is approximately equal to 1 GiB for FB and is 0.881 GiB for CKD data type 3390, and 0.738 GiB for CKD data type 3380.
Usable Capacity (Extents) The number of usable extents that are available for storing data in the array.
Used Capacity (Extents) The number of extents in the array that are taken up by data in the array.
Table 24. Pools
Data Description
Name The user-defined name or identification of the pool.
Storage Type The type of storage architecture, either CKD for IBM Z hosts or FB for open systems hosts, for which a pool is provisioned.
Usable Capacity (GiB/Mod1) The amount of capacity that the array can contribute to the associated pool.
Used Capacity (GiB/Mod1) The amount of capacity that the array contributes to the associated pool.
Overprovisioned Ratio The ratio of the provisioned capacity to the total capacity allowed for volumes.
Threshold The percentage of maximum total capacity in use by the pool.
Encryption The encryption state of all data in the pool. Encryption protects data from unauthorized access and helps to keep your data secure.
Easy Tier The indication of whether the Easy Tier allocation method is used to manage all capacity allocations for the pool.
Arrays The number of arrays that are assigned to the pool.
Volumes The number of volumes that are associated with the pool.
Migrating Capacity The amount of allocated capacity that is being migrated into or out of the associated pool. The migration value can include array depopulation, manual volume migration, or Easy Tier volume migration.
Extent Size The standard unit of allocation for standard and ESE volumes. It is approximately equal to 1 GiB for FB and is 0.881 GiB for CKD data type 3390, and 0.738 GiB for CKD data type 3380.
Usable Capacity (Extents) The number of usable extents that are available for storing data in the pool.
Used Capacity (Extents) The number of extents in the array that are taken up by data in the pool.
Table 25. Volumes
Data Description
Name The name and identification of the volume. The volume name contains the user-defined name prefix and the system-defined suffix ID, for example, "FBvol_00a2."
State The status of the volume.
Normal
There are no volume configuration operations in progress, and the volume is not being unconfigured, merged, or migrated. This state is the preferred state of the volume in most cases.
Data loss (pinned)
Data was lost before it was written and the track identifiers that are associated with the data are unknown. Pinned data cannot be removed from the cache by the storage controller because of a hardware failure. Overwrite or discard the pinned non-retryable tracks from the host to return the volume to a normal state.
Read-only
The volume can be read but not written. Either a thin provisioned volume needs more available capacity, or an internal error occurred. Either free up space for the thin provisioned volume or contact IBM Hardware Support.
Inaccessible
I/O access to data on the volume was lost. Contact IBM Hardware Support.
Virtual space fault
There was not enough available space on a thin-provisioned volume to convert a virtual logical track to a real logical track. I/O access to data on the volume was lost. Contact IBM Hardware Support.
Data loss
Data was lost before it was written to the volume and the track identifiers that are associated with the data are unknown. Contact IBM Hardware Support.
Configuring
The volume is being configured for the first time.
Reconfiguring
The volume is being reallocated to modify the capacity.
Unconfiguring
The volume is being deleted.
Merging
The pool that contains the volume is merging with another pool.
Migrating
Provisioned capacity is either migrating to another pool or migrating within the pool.
Migration canceled
Provisioned capacity migration was canceled. Resume migration to continue migrating capacity.
Migration paused
Provisioned capacity migration is paused. Resume migration to continue migrating capacity.
Migration error
Provisioned capacity migration did not complete successfully. Resume migration to continue migrating capacity. If migration does not resume, contact IBM Hardware Support.
Configuration error
The initial configuration did not complete successfully. Delete the volume and create a new volume. If you cannot delete and re-create the volume, contact IBM Hardware Support.
Reconfiguration error
The volume reconfiguration did not complete successfully. Delete the volume and create a new volume. If you cannot delete and re-create the volume, contact IBM Hardware Support.
Deconfiguration error
A delete volume request did not complete successfully. Delete the volume. If you cannot delete the volume, contact IBM Hardware Support.
Transposition error
The volume is in a pool that did not merge successfully. Delete the volume and create a new volume. If you cannot delete and re-create the volume, contact IBM Hardware Support.
Storage Type Volumes can either be fixed block (FB) or count key data (CKD). Open systems hosts such as AIX®, Windows, or Linux use FB volumes. IBM Z hosts that are running z/OS® use CKD volumes.
Capacity Details (GiB/Mod1) Provisioned capacity in blocks or cylinders.
Used Capacity (GiB/Mod1) Provisioned capacity in blocks or cylinders.
Pool The pool where capacity is allocated for the volume.
Processor The node of the volume. There are two nodes on the DS8000 system (Node 0 and Node 1).
Thin-provisioning Allocates provisioned capacity as needed to manage storage usage more efficiently. Physical capacity is only needed for written data; parts of the volume that are not written to do not use physical space.
ESE
Extent space efficient (ESE) thin provisioning allocates capacity in a performance efficient manner on a per extent basis in the pool or in the ESE repository.
None
All provisioned capacity was allocated when the volume was created. Also referred to as standard provisioning.
Allocation Method The way that provisioned capacity is allocated within the pool.
Rotate capacity
Provisioned capacity is striped across several arrays within the pool. Rotating allocated capacity over as many arrays as possible provides optimal performance.
Rotate volumes
Provisioned capacity is allocated from one array until it is full and then continues with the next array until it is full. This method makes it easier to manage performance manually and identify bottlenecks.
Managed
Provisioned capacity is allocated by Easy Tier®.
LSS A logical subsystem (LSS) is associated with one or more volumes and consists of a group of up to 256 volumes.
Address Group The address group of the volume.
MTM The machine type and model number (MTM) that is reported for the volume on the interface type that is associated with its data type.
Data Type The data type determines the type of host access emulation that is used for the volume.
VOLSER The serial number in the volume label that is assigned to the volume for use on a z/OS system.
GUID The GUID for the volume.
Host Mappings The number of hosts to which the volume is mapped.
Scope Multitenancy, in storage terms, is a system architecture in which a hardware component or software application services the needs of more than one customer. Each customer is referred to as a tenant. Tenants can be given the ability to customize and run functions for defined parts of the infrastructure to which they are granted permission. This defined area is the customer's multitenancy scope. Multitenancy generally prevents a host or user from initiating a Copy Services operation that would cross the tenant’s domain boundaries.
Migrating Capacity The amount of capacity within the volume that is being migrated from one pool to another. The migration value includes array depopulation, manual volume migration, and Easy Tier volume migration.
Safeguarded Backup Capacity (GiB/Mod1) The amount of provisioned capacity that is reserved for safeguarded backups for this volume.
Safeguarded Used Capacity (GiB/Mod1) The amount of safeguarded backup capacity that is that is taken up by safeguarded backups.
Safeguarded Backup Location The pool where safeguarded backups are stored for this volume.
Safeguarded Indicates whether a safeguarded backup has been configured for this volume.
Recovered A safeguarded backup for this volume is being recovered to a recovery volume by using a FlashCopy® relationship.
Table 26. LSSs
Data Description
ID The system-issued ID number of the LSS.
SSID The subsystem identifier (SSID) of the LSS within a z/OS® environment.
Type The count key data (CKD) LSS type.
Node The node of the LSS. There are two nodes on the DS8000 system (Node 0 and Node 1).
Volumes The number of volumes in the LSS.
Aliases The number of aliases in the LSS.
Volume Address Start The lowest volume address for the LSS.
Volume Address End The highest volume address for the LSS.
Alias Address Start The lowest alias address for the LSS.
Alias Address End The highest alias address for the LSS.
Scope The multitenancy scope of the LSS.
Address Group The address group of the LSS that is assigned by the system.
Consistency Group The Remote Mirror and Copy consistency group setting for the LSS. Consistency groups are used to help create a consistent point-in-time copy across multiple volumes, and even across multiple DS8000 systems.
Consistency Group Timeout (sec) The time (measured in seconds) that an LSS consistency group volume displays as busy after the reporting of an error that suspends remote mirroring and Copy Services functions.
Concurrent Copy Session Timeout (sec) The concurrent copy session timeout parameter (measured in seconds) that a CKD LSS in a concurrent copy session displays as busy before a concurrent copy session is suspended.
Global Mirror Session Timeout (sec) The Global Mirror session timeout parameter (as measured in seconds) that a CKD LSS displays as busy before the Global Mirror session is suspended.
Critical Heavy Mode The critical heavy mode controls the behavior of the remote copy and mirror pairs that are associated with a CKD volume on the LSS.
3390-1, 3390-3, etc. The number of volumes in the LSS by device type.
Table 27. Clusters
Data Description
Name The name of the cluster.
State The online or offline state of the cluster.
Address Mode The method that is used by a host to discover the LUNs that are available to its host ports (for example, SCSI map, SCSI mask, or OS/400® mask).
Number of Hosts The number of hosts contained in the cluster.
Number of Volumes The number of volumes in the cluster.
Table 28. Hosts
Data Description
Name The name of the host that was assigned by the user.
State The online or offline state of the host. If at least one host port is in the logged-in state, the state is displayed as online. If no host ports were added to this host, or if all of the added host ports are logged out, the state is displayed as offline.
Type The host type is defined by the operating system and platform.
Cluster  
Address Mode The method that is used by the host to discover the LUNs that are available to its host ports (for example, SCSI map, SCSI mask, or OS/400® mask).
Number of Volumes The number of volumes that are mapped to the host.
Number of Host Ports The number of ports on the host system that are connected to the storage system, either directly or through a switch.
Number of Accessible Fibre Channel Ports The number of Fibre Channel ports on the storage system that are available for the host to access through the host ports.
Address Discovery The address discovery method that was determined through the DS CLI for host connections, based on the host type.
Logical Block Size The logical block size of the volumes that the host can access. Block size is determined by the host type. Possible values include 512 and 520 (for IBM® i).
Table 29. Host ports
Data Description
WWPN The unique 16-digit hex number that represents the worldwide port name of the host port.
State The connection state of the host port, either logged in or logged out.
Host The name of the host for the selected host port.
Type The host type is defined by the operating system and platform of the host.
Address Mode The method that is used by the host to discover the LUNs that are available to its host ports (for example, SCSI map, SCSI mask, or OS/400® mask).
Number of Volumes The number of volumes that are mapped through this host port to the host.
Number of Accessible Fibre Channel Ports The number of Fibre Channel ports that are allowed to access this host port.
Address Discovery The address discovery method that was determined through the DS CLI for host connections, based on the host type.
Logical Block Size The logical block size of the volumes that the host intends to access. The block size is determined by the host type. Possible values include 512 and 520 (for IBM® i).
Host Connect The name of the host connection for a host port that was previously created through an earlier release of the DS CLI.
Volume Group The volume group that is accessible through a host port that was previously configured by using an earlier release of the DS CLI.
Table 30. Users
Data Description
Name The name of the user as defined by an administrator.
State The login state of the user.
Connected
The user is logged in to the storage system.
Disconnected
The user is not logged in to the storage system.
Locked
The user account is locked and requires administrator action to unlock the account and reset the password.
Role An identifier that defines the set of permissions and authorization level that are assigned to the user. If a user is mapped to multiple roles, only the highest authorization role level for that user is displayed.
Administrator
Manages all resources with the exclusion of security functions.
Security administrator
Manages encryption recovery keys and creates security administrators. Users in this role cannot be assigned to any other role, and users in any other role cannot be assigned to this role.
Physical operator
Manages all resources, with the exclusion of user accounts and security functions.
Logical and copy operator
Manages volumes, hosts, host ports, LSSs, and Copy Services relationships.
Logical operator
Manages volumes, hosts, host ports, and LSSs.
Copy operator
Manages Copy Services.
Auditor
Offloads DS8000 audit logs for review. Audit logs contain an unalterable record of all user interactions with the system.
Monitor
Views but cannot manage resources.
No access
This role cannot access resources. This is the default selection until a user role is assigned by an administrator.
Scope The multi-tenancy scope for a user. Multitenancy, in storage terms, is a system architecture in which a hardware component or software application services the needs of more than one customer. Each customer is referred to as a tenant. Tenants can be given the ability to customize and run functions for defined parts of the infrastructure to which they are granted permission. This defined area is the customer's multitenancy scope. Multitenancy generally prevents a host or user from initiating a Copy Services operation that would cross the tenant’s domain boundaries.
Number of Connections The number of times that the user has connected to the storage system.
Table 31. Roles
Data Description
Name The role name.
Users The number of users that are assigned to the role.
Table 32. Endpoint Security
Data Description
State Indicates whether Endpoint Security is enabled or disabled.
Encryption Key UUID The UUID of the Endpoint Security encryption key.
Encryption Key Date The date of the Endpoint Security encryption key.
Table 33. Endpoint Security Key Servers
Data Description
Host Address The address of the Endpoint Security key server.
Port The host port of the Endpoint Security key server.
State The current active or inactive setting of the Endpoint Security key server.
Type The encryption protocol of the Endpoint Security key server.
Certificate The encryption certificate used by the Endpoint Security key server.
Table 34. Syslog server
Data Description
Name The name of the Syslog server as set by the administrator.
IP address The IP address for the Syslog server.
Port The communications port of the Syslog server. The default value is 514.
Facility The facility of the Syslog server.
State The current active or inactive setting of the Syslog server.
HMC ID The HMC on which audit logs are forwarded.
Protocol The protocol in use by the Syslog server, Transmission Control Protocol (TCP) or Transport Layer Security (TLS).
Table 35. FlashCopy
Data Description
Date Created The date and time when the FlashCopy relationship was created.
System The storage system ID number.
Source volume The name of the source volume.
Target volume The name of the target volume.
State The state of the FlashCopy relationship:
Background copy (x%)
Indicates that the background copy process is active and the percentage of the process that is complete.
Copied
The background copy process is complete.
Established
A FlashCopy relationship was created, but background copy is disabled.
Dataset
The source volume is participating as a source or a target in a dataset, or extent level, FlashCopy relationship.
Volume inaccessible
The volume cannot be accessed and the query of the volume failed. This state generally indicates that the volume is in a fenced condition.
Invalid
A general internal error occurred when the query of the volume was processed.
Source LSS The Consistency Group LSS ID that is associated with the source volume of the FlashCopy relationship.
Background Copy Indicates whether background copy is enabled.
Recording Indicates whether the FlashCopy relationship was created with one of the change recording options:
Yes
The relationship was created with one of the change recording parameters.
No
The relationship was not created with one of the change recording parameters.
MultInc
The relationship is a type 1 incremental relationship, which records data changes on both the source and target volumes of the FlashCopy pair.
Persistent Indicates whether the FlashCopy relationship was established with the persistent option.
Revertible Indicates whether the FlashCopy relationship was established with the revertible option.
Source Write Indicates whether the source writes option is enabled or disabled for the FlashCopy relationship.
Target Write Indicates whether the target writes option is enabled or disabled for the FlashCopy relationship.
Out of Sync The number of tracks that are not synchronized for this FlashCopy relationship. The maximum value that can be displayed depends on the source volume size.
Date Synced The date and time when the FlashCopy relationship was synchronized. A blank value indicates that the relationship is not synchronized.
IBM Remote Pair Copy Indicates whether the FlashCopy relationship uses the IBM Remote Pair Copy option.
No
The relationship does not use the IBM Remote Pair Copy option.
Preferred
The IBM Remote Pair Copy option was specified. If the target is a Metro Mirror primary, then the FlashCopy function can preserve the Full Duplex mode of the target Metro Mirror relationship, if it is possible. If the IBM Remote Pair Copy function is not possible, you can use processing defined for the IBM Remote Pair Copy option of "No".
Required
The IBM Remote Pair Copy option was specified. If the target is a Metro Mirror primary, then the FlashCopy function is required to preserve the Full Duplex mode of the target Metro Mirror relationship. Processing can fail if the IBM Remote Pair Copy function is not possible.
Remote
A remote FlashCopy relationship was initiated by another FlashCopy established at the Metro Mirror primary site with an IBM Remote Pair Copy option of ‘preferred' or ‘required'.
Sequence Number The sequence number that is associated with the FlashCopy relationship.
Time Out The consistency group Long Busy Timeout setting for the LSS ID that is associated with the source volume of the FlashCopy relationship.
Table 36. Mirroring Paths
Data Description
System The storage system ID number.
Port The fully qualified unique Port ID for the source storage system. The port ID component is four hexadecimal characters in the format EEAP, where EE is a port enclosure number (00 - 3F), A is the adapter number (0 - F), and P is the port number (0 - F). The number is prefixed with the letter I.
Remote Port The fully qualified unique Port ID for the remote storage system. The port ID component is four hexadecimal characters in the format EEAP, where EE is a port enclosure number (00 - 3F), A is the adapter number (0 - F), and P is the port number (0 - F). The number is prefixed with the letter I.
State The current remote mirror and copy path state:
Success
The path is established and it is operating normally.
Invalid
The path is in an unknown state.
Failed (reason)
The path is not established and failed. See reason for an explanation of the failure.
Degraded (reason)
The path is established, but with degraded performance. See reason for an explanation of the failure.
reason
When the state is Failed or Degraded, the following reasons for the failure are displayed.
Configuration Error
A path failed for one of the following reasons:
  • The specification of the SA ID does not match the installed ESCON adapter cards in the primary controller.
  • For ESCON paths, the secondary control unit destination address is zero and an ESCON Director (switch) was found in the path.
  • For ESCON paths, the secondary control unit destination address is nonzero and an ESCON Director does not exist in the path. The path is a direct connection.
Delete the original entry and resubmit the mkpprcpath command.
Down
An FCP path failed because of a communication or hardware failure.
Primary Login Exceeded
The maximum number of log ins for each source FCP path was exceeded.
Retry Exceeded
The maximum number of times that the storage system tried to reestablish FCP paths was exceeded.
Secondary Login Exceeded
The maximum number of log ins for each FCP path to the secondary LSS was exceeded. The FCP target is unavailable.
Secondary Unavailable
An FCP path to the secondary LSS is unavailable.
Primary No Resources
No resources are available at the source site for the logical paths to be established.
Retry
The number of attempts to reestablish a path connection.
Secondary Mismatch
A mismatch occurred that involves the secondary control unit sequence number or the LSS.
Secondary No Resources
Resources are not available at the secondary LSS to establish logical paths.
Secondary LSS Mismatch
A mismatch of the secondary control unit LSS ID occurred, or a failure of the I/O that collects secondary information for validation occurred.
Timeout
A timeout occurred. No reason is available.
Not Properly Configured
The primary Fibre Channel adapter is not configured properly, or it is not loaded with the correct version of microcode.
Secondary Not PPRC Capable
The Fibre Channel path from the secondary adapter is not capable of processing a remote mirror and copy path. This issue can occur from one of the following reasons:
  • The secondary adapter is not configured properly, or it is not loaded with the correct version of microcode.
  • The secondary adapter is already a target of 32 different storage systems.
ESCON Channel Direction
The primary control unit port or link cannot be converted to channel mode because a logical path is already established on the port or link. The establish path operations are not automatically retried within the control unit.
ESCON Initialization Failed
Initialization for the ESCON protocol failed.
ESCON Link Offline
The ESCON link is offline. This problem is caused by the lack of light detection coming from a host, peer, or switch.
Path Degraded Due to High Failure Rate
A Fibre Channel path is established; however, because of the high failure rate, the path is degraded.
Path Removed Due to High Failure Rate
The Fibre Channel path link was removed because the path experienced a high failure rate.
System Reserved Path
The system has reserved resources for a remote mirror and copy path, for example, after a failoverpprc or a freezepprc command is used. The resources can be used later, such as for the failbackpprc command. In most cases, no action is required. If it is known that a system reserved path is not required, it can be removed with the rmpprcpath command only after no remote mirror and copy pairs remain between the LSSs.
LSS A two-digit hexadecimal value that identifies the logical subsystem (LSS) on the source storage system.
Remote LSS A two-digit hexadecimal value that identifies the logical subsystem (LSS) on the remote storage system.
Target WWNN The worldwide node name (WWNN) of the remote storage system.
Consistency Group Indicates whether the remote mirror and copy consistency group is enabled.
Table 37. Mirroring
Data Description
Source Volume The name of the source volume.
Target Volume The name of the target volume.
State The state of the mirroring relationship:
Copy Pending (1st pass)
The first pass of the Global Copy process is complete.
Copy Pending
The relationship is copy pending.
Synchronizing
The Metro Mirror process is synchronizing.
Full Duplex
The relationship is full duplex.
Suspended
Not in mirroring Relationship
The designated volume is not part of a remote mirror and copy pair.
Host Source
The remote mirror and copy processing on the volume was suspended by the primary host. The host command might specify an immediate suspension or that the volume is to be suspended when it entered a full duplex state.
Host Target
Remote mirror and copy processing was suspended on the secondary volume. Updates to primary volumes and out-of-sync tracks are still being processed.
Update Target
Remote mirror and copy processing was suspended on a secondary volume by the primary control unit update secondary device status command.
Internal Conditions Both
Remote mirror and copy processing was suspended on a volume by either the primary control unit or the secondary control unit because of internal conditions.
Simplex Target
Remote mirror and copy processing was suspended on a volume when the secondary control unit sent a state change to the primary control unit indicating a transition to a simplex state.
Internal Conditions Target
Remote mirror and copy processing was suspended on a secondary volume when the primary control unit was notified that the secondary volume became suspended due to internal conditions.
Power
Remote mirror and copy processing was suspended on a volume when the primary or secondary control unit was shut down or restarted.
Notes:
  1. The paths to the secondary controller might not be available if the power to the primary controller was shut down. If only the secondary control unit was shut down, it might be possible for the paths to be restored depending on the path status. Use the following process to determine whether your remote mirror and copy processing can be restored on the affected volumes:
    1. Enter the lspprc command and use the generated report to determine the path status.
    2. Enter the mkpprc command if the paths are still intact. This process resynchronizes the volume pairs.
    3. Continue with your processing.
  2. If the previous process cannot be completed, you must remove the pair relationships on the affected volumes and start your remote mirror and copy processing from the beginning on the affected volumes.
Freeze
Remote mirror and copy processing was suspended on a volume pair because the host issued a Freeze PPRC Group order.
Volume Not Configured
Remote mirror and copy processing was suspended on a volume because the volume is not part of a copy pair relationship.
Remote Copy Pending
The volume transitioned to the pending state as a result of establishing a FlashCopy relationship. Before the attempt was made to establish the FlashCopy relationship, the volume was in Full Duplex mode.
Release Space Failure
The pair is suspended due to the failure to release unused space-efficient storage on the Remote Mirror and Copy secondary volume.
With Secondary Consistency
The Remote Mirror and Copy secondary volumes form a consistent data set.
Target Copy Pending
The source volume is unknown or cannot be queried and the target state is copy pending.
Target Full Duplex
The source volume is unknown or cannot be queried and the target state is full-duplex.
Target Suspended
The source volume is unknown or cannot be queried and the target state is suspended.
Invalid State
A general internal error occurred when the query was processed.
Validation Required
The status of the volume cannot be currently determined. Further validation is required.
Volume Inaccessible
The volume might not be queried. This information means that the volume is fenced.
Out Of Sync The number of gibibytes (GiBs) that are not synchronized for this FlashCopy relationship. The maximum value depends on the source volume size.
Target Read Read I/O operations to the target volume are allowed.
Target Write Input is allowed to the remote mirror and copy secondary volume.
Cascade Indicates whether the volume is in a cascading relationship:
Source
The source volume of this relationship is enabled to also be a target volume of a different relationship.
Target
The target volume of this relationship is enabled so that it is also a source volume for a different relationship.
blank
The volume is not in a cascading relationship.
Source LSS The consistency group LSS ID that is associated with the source volume of the volume relationship.
Long Busy Timeout The consistency group Long Busy Timeout setting for the LSS ID that is associated with the source volume of this PPRC volume relationship. This value can be modified by entering the chlss (FB) or the chlcu (CKD) command.
Critical Mode Indicates whether the remote copy and mirror primary volume represents a critical volume.
Incremental Resync Indicates whether incremental resynchronization is running.
Automatic Resync Indicates whether the function that automatically resumes a suspended Global Copy relationship is active.