Admin Alert: Critical Information That Every i Administrator Should Have Handy
May 11, 2011 Timothy Prickett Morgan
Similar to other hardware systems, crises can happen whenever you administer iSeries, System i, and Power i equipment in a data center. However, being a good administrator means knowing what to do and having the appropriate information available when you’re handling a crisis. This week, I’ll look at four key lists you should have handy to restore functionality after a system issue or disaster occurs.
The Big Four Lists
Generally, you’ll need the following information at your fingertips when a critical issue occurs that eliminates some or all i operating system functionality in your shop.
Let’s look at each list and see how they can help you recover from a localized or global system issue.
IP Addresses, Profile Names, and Passwords
Hardware and software breakdowns aren’t always about your iSeries, System i, or Power i hardware. Sometimes a tape drive or other peripheral device is broken. Other times you need to sign on to your Hardware Management Console (HMC) to make an adjustment. Given the need for service access to Power i and non-Power i equipment, you should know how to retrieve the following information for use by service personnel.
I’m not necessarily advocating you keep a list of your critical passwords pinned to your cubicle wall. However, you will need a secured mechanism where you can quickly retrieve sign-on information for critical servers. The challenge is to keep this information accessible while protecting it from malicious or prying eyes.
Emergency Call Trees for When Problem Occurs
No matter how well you know your machines, you’ll often have to call someone else for help during off-hours. To complicate matters, you’re going to have to call different people for different issues. To handle this, make your staff a call tree that has contact numbers for any or all of the following people who may be needed to fix an iSeries, System i, or Power i issue.
Make sure you have an electronic copy of this information as well as a physical copy for each of your responders to keep in their car or house. It doesn’t do much good if your call trees are on the network and your building looks like this.
In certain situations, paper backup is more than appropriate.
Critical Documents for When Things Go Wrong
If a real emergency hits your building (see above) and you have to restore off-site or put your disaster recovery plan (DR) into play, make sure that you have access to your disaster recovery plan. It sounds simple, but many times the worst place to store a DR plan is as a single copy on an internal server. Besides having an electronic copy of your DR plan, keep one or more physical copies off-site in the event your electronic copies aren’t reachable. The same goes for your Capacity BackUp (CBU) system run book, so that you can reconfigure and restart your CBU as your production box when your network isn’t available.
Other Identifying Information
Whenever I call IBM hardware service, the service representative always asks me for the phone number where the machine is located, so that they can verify service. And no, it’s not enough to give them the machine serial or the building’s address or even the organization name. For some reason, IBM must check the official phone number in its database or they don’t seem able to place the call for me. And since I sometimes have a hard time finding that number, I usually have to cajole and beg the rep to look it up for me. It’s a heck of a way to run a help desk.
So make sure you always have the IBM registered phone number where your machine is located. In my experience, your service call will go smoother if you have it.
There may also be information other vendors require to provide service in an emergency. Off-site media storage vendors may require special passwords to release tapes. Co-Lo vendors may require additional information to add vendors or outside personnel to enter their secured facility (they may even require you to call from a certain cell phone or desk phone). Many outside entities and some internal ones will require identification before they help you. Make sure you know what ID is required and how to go about laying your hands on it if you can’t reach your network or enter your building.