• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Admin Alert: Corralling i/OS Storage Hogs, Part 1

    March 2, 2011 Joe Hertvik

    Last year, I wrote an article on finding and expelling i/OS storage hogs. Since then, I’ve pinpointed some other items that illustrate how Power i system storage fills up unnecessarily, leaving you contemplating buying additional disk drives when all you really need is a good housecleaning. This week and next, I’ll expand on my storage hog list to help you keep your storage problems under control.

    The Big Seven Storage Hogs

    When looking for ways to reclaim disk storage, I usually focus my attention on the big seven culprits of unnecessary storage consumption.

    1. Excessive spooled files and other system objects
    2. Walking Dead libraries
    3. Just In Case files
    4. Large files that need reorganization
    5. Files with obsolete members
    6. Cleaning up utility program data
    7. Controlling your journaling

    Let’s look at each of these disk hogging factors in turn and see what you can do to control them.

    Hog #1: Excessive spooled files and other system objects

    Some shops have an unnatural attraction for hanging on to almost any spooled file they have ever produced, especially job logs. The solution to unnecessary spooled files and other objects is twofold. First, carefully examine your system cleanup options inside the Cleanup Tasks (GO CLEANUP) menu. Take option 1 off this menu (Change Cleanup Options) to get to the following screen.

    These options control how disk consuming system objects (including spooled files) are automatically cleaned off the system.

    Step number one on this screen is to make sure that the Allow automatic cleanup setting is set to ‘Y’ (Yes). The default value is ‘N’, but the system will set this parameter to ‘Y’ during a scratch install. If it isn’t turned on, turn it on. The next step is to go through each option on this screen so the operating system knows what to get rid of when it runs its daily clean up routine. Here’s what the options do.

    • Time cleanup starts each day–Put in a time if you want the system to clean up storage each day (you do) or set it to *NONE to turn clean up off.
    • User messages–Specifies how many days you want to keep messages in each user profile’s message queue.
    • System and workstation messages–Specifies how many days you want to keep informational system messages and messages in the workstation message queues.
    • Critical system messages–Specifies the number of days you want to keep critical system messages in the QSYSMSG message queue. All the messages that are considered critical on your system are kept here, including serious storage condition messages, hardware error messages, and messages that occur whenever the system disables a user profile. These messages are different from the standard inquiry messages you get when a printer has a form change, a program crashes, etc. The initial value for Critical system messages is *KEEP, which means i/OS will never delete messages from QSYSMSG. This means you may still have critical messages sitting on your system from the time your system was installed, but you can change this value to any number of days that you want.
    • Job logs and other system output–This is the critical value that may hide a storage hog. It controls how long system spooled files, such as you might see in the QEZJOBLOG (job logs), QPPGMDMP (program dumps), and QEZDEBUG (debug traces) output queues, are kept on the system. When set to a number between 1 and 366 days, the system will delete job logs and other system spooled file output as it ages. All of which will help keep your system storage down. If this number is set to an unusually high value, such as 366 days or *KEEP, all the job logs and other system output will remain on your system for a very long time, gobbling up disk space. In my experience, I haven’t found too much sense in keeping these spooled files for more than a month. However, your shop may need to keep them for a longer period so set these values as needed.
    • System journals and logs (SYSLOG)–Specifies how long you want to keep system journals, history files, problem log files, and alert databases. I’ll get into controlling journal receivers next issue but this value can also be set to keep your system storage down.

    You’ll generally get the biggest storage-saving bang for your bucks setting the system and workstation messages and job logs and other system output values as low as you possibly can.

    The second spooled file control issue deals with excessive user-generated spooled files. As far as I know, there is no i/OS setting in V6R1Mx or V5R4Mx to control when the system should delete aged user-generated spooled files. User generated spooled files can cause a problem if they are written to an output queue that is seldom cleared (such as a fax queue or an queue that’s used for generating email reports) or the files are printed with the Save File spooled file attribute set to *YES (save), causing the spooled file to remain on the output queue in save status after printing. For situations like these, you either have to clear the output queues yourself or come up with a routine or third-party software package that deletes user-generated aged spooled files for you. Check out this article for an example of how you might setup your own routine to delete aged user-generated spooled files and regain system storage.

    Hog #2: Exercising the Walking Dead (libraries)

    Here I’m referring to software and data libraries that are saved before replacement and never deleted. For example, let’s say you installed a credit card software upgrade to the CRTCRD library but you wanted to save a copy of the old library in case the installation went bad. So you copied the old library to the CRTCRDXXX library so that you could update the existing CRTCRD library. The new installation goes great but somehow you never delete the old CRTCRDXXX library from your system, so you’re carrying two program libraries for that product.

    Worse, you may do the same thing when you updating or making mass file changes to one of your data libraries. As happens with software libraries, you make a copy of the data library in case something goes wrong and then forget about it. Just like that, you’ve doubled the amount of disk storage for that particular data set.

    My recommendation here is to review all your libraries and if you notice a Walking Dead library that you no longer need, back it up to media, and then delete it. Taking a backup before deletion ensures that if you delete the library in error, you can bring it back as needed.

    To find Walking Dead libraries, look for libraries that have literals like ‘OLD’, ‘XX’, or ‘SAV’ tacked on to the end of their original library name. Libraries with funny names that start with a programmer’s initials are also a dead giveaway (e.g., JHCRTCRD instead of CRTCRD).

    Hog #3: Just In Case files

    Similar to Walking Dead data libraries, Just In Case files are usually taken before a file change is enacted. For example, if you’re changing a file format for the SALEHIST file you may make a copy of the file called SALESHSTXX. Like Walking Dead libraries, Just In Case files protect you against mistakes. However, people don’t always get rid of their Just In Case files and they frequently wind up taking up more room on the system.

    Just In Case files can be harder to find than Walking Dead Libraries, but they can return more system storage when deleted. Similar to the dead libraries, Just In Case file names may contain programmer initials, give away literals (‘OLD’, ‘XX’, ‘SAV’), or numbers (SALESHIST1, SALESHIST2, etc.). You may also be able to use some of the techniques I’ll talk about next issue for spotting large storage hogging backup files.

    Finding More Storage Hogs

    Next issue, I’ll review the rest of the list and show you where you may be able to pick up some more storage in a pinch. See you in 14.

    RELATED STORIES

    Hunting Down Storage Hogs

    To Each Its Own in Spooled File Management



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    WEBINAR
    Unit Test Automation: Secure Application Quality on IBM i
    April 15, 12 p.m. EDT, 5 p.m. BST

    Unit testing is arguably the most effective element of your testing strategy, driving the quality of your application as it is being developed.  Yet how can unit testing benefit legacy applications on IBM i – and especially those containing ‘monolithic’ sections of code?

    In this Webinar we will demonstrate how specialized unit test automation can safeguard application quality and generate reusable test assets for both modular and monolithic code.

    You will learn how to automate the IBM i unit testing process within a standard DevOps stack., including RDi, JUnit and Jenkins.

    Using ARCAD iUnit, you’ll see:

    • Automated test creation for modules, programs and service programs
    • Code coverage results
    • Mock capability – simulates key components like data, files programs
    • Test execution history
    • Version control with Git

    Register today and secure the quality of your IBM i application.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Orlando, March 22-24
    Townsend Security:  Learn how to easily and securely communicate with XML
    Northeast User Groups Conference:  21th Annual Conference, April 11 - 13, Framingham, MA

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Solarsoft Reports New Implementations of iVP Suite Some Insight Into the iASP and ISV Issue

    Leave a Reply Cancel reply

Volume 11, Number 8 -- March 2, 2011
THIS ISSUE SPONSORED BY:

WorksRight Software
SEQUEL Software
Northeast User Groups Conference

Table of Contents

  • Running Totals in an SQL Query
  • Odds and Ends: The Reader is the Guru
  • Admin Alert: Corralling i/OS Storage Hogs, Part 1

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Query Supervisor Gives Database Engineers New Power
  • IBM Unveils New and Improved IBM i Services
  • 3 Takeaways from the 2021 PowerTech Security Report
  • Four Hundred Monitor, April 14
  • IBM i PTF Guide, Volume 23, Number 15
  • Big Blue Unveils Spring 2021 IBM i Technology Refreshes
  • Thoroughly Modern: Innovative And Realistic Approaches To IBM i Modernization
  • Guru: Web Services, DATA-INTO and DATA-GEN, Part 2
  • Back To The Future With A New IBM i Logo
  • IBM i PTF Guide, Volume 23, Number 14

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.