• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Save-Restore Commands

    January 26, 2005 Hey, Ted

    We have a new machine and have joined the world of logical partitioning. We have a partition for production and one for development. I am struggling with copying data and source code between the two machines. FTP copies source members without a problem, but it drops the modification dates on the source records. To copy data files, I’ve been transmitting save files in binary mode, which is a hassle. Also, I’d like to set up a scheduled job to refresh certain files on the test system from the production system at night, and while FTP would work, it would be difficult for my job to determine if the transmission succeeded. Do you have any other ideas?

    –Andrew

    I use FTP heavily, but only because it’s convenient. For robust computing, you need something more than cobbled-together utilities. The iSeries system on which I spend most of my time also has two partitions, as you’ve described. The administrator has it set up for both TCP/IP and SNA communications. He tells me that it is possible to use both protocols if you have an Ethernet card for each partition.

    If you can use SNA, let me suggest you look at the SAVRSTxxx commands, especially Save Restore Object (SAVRSTOBJ). Two other commands that you might need occasionally are Save Restore Library (SAVRSTLIB) and Save Restore Objects (SAVRST), for the IFS. There are also Save Restore Configuration (SAVRSTCFG), Save Restore Changed Objects (SAVRSTCHG), and Save Restore Doc/Lib Object (SAVRSTDLO) commands. The SAVRSTxxx commands have been around for a while, but I never had much use for them until I began working on a partitioned system.

    The SAVRSTxxx commands go through a process similar to the binary FTP of save files, but without the hassle. Here are some examples.

    This command copies data file SOMEFILE from the production system to the TEST system.

    SAVRSTOBJ OBJ(SOMEFILE) LIB(MYLIB) RMTLOCNAME(TEST) 
       OBJTYPE(*FILE)
    

    This command copies an entire source physical file to the test system.

    SAVRSTOBJ OBJ(QRPGLESRC) LIB(MYLIB) RMTLOCNAME(TEST)
    

    Here’s a command to copy one RPG source member, MYSRCMBR, from production to TEST. Notice MBROPT(*NEW) was used here, because the source member did not already exist in QRPGLESRC on the TEST system.

    SAVRSTOBJ OBJ(QRPGLESRC) LIB(MYLIB) RMTLOCNAME(TEST)
       OBJTYPE(*FILE) FILEMBR((QRPGLESRC (MYSRCMBR))) MBROPT(*NEW)                
    


    If all goes well, you’ll see message CPCAD80 (x objects saved and restored). If you get message CPFAD8D (an error occurred during the SAVRSTOBJ operation), check the messages in the job log to find the exact cause. Depending on things like object ownership and authority, you may have to specify MBROPT(*ALL) ALWOBJDIF(*ALL). If so, you have a problem, because you must have *ALLOBJ authority to use ALWOBJDIF(*ALL). Do not assume that the transfer did not take place when you see CPFAD8D. The transfer may have been successful, but the error may have been sent because authority changes took place.

    Another nice thing about the SAVRSTxxx commands is that they do not require enrollment in the system distribution directory, as SNDNETF (Send Network File) does.

    –Ted

    Click here to contact Ted Holt by e-mail.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Brooks Launches ExcelliPrint for IPDS Conversion SkyView Addresses Compliance with New OS/400 Security Service

    Leave a Reply Cancel reply

Volume 5, Number 4 -- January 26, 2005
THIS ISSUE
SPONSORED BY:

Advanced Systems Concepts
Patrick Townsend & Associates
Guild Companies

Table of Contents

  • An Introduction to WDSc Table Views
  • Another Reason to Use P-Fields
  • The Save-Restore Commands

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle