Domino 6 For Iseries Best Practices Guide
Domino 6 For Iseries Best Practices Guide
Quickstart to performance
monitoring and tuning
Birgit Roehm
Paul Culpepper
Duane Fitzpatrick
Jennifer Ginder
Sirpa Lepisto
Gerri Passe
Marko Stefancic
John van den Berg
ibm.com/redbooks
International Technical Support Organization
June 2004
SG24-6937-00
Note: Before using this information and the product it supports, read the information in “Notices” on
page xix.
This edition applies to Version 5, Release 2, Modification 0 of OS/400 (product number 5733-SS1) and
Version 6.0.2 of Domino 6 for iSeries (5733-LD6).
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xx
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Contents v
6.5.4 Recover individual Domino databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
6.5.5 Recover changed objects (from an incremental backup) . . . . . . . . . . . . . . . . . . 273
6.5.6 Recover Domino program code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
6.5.7 Recreate a Domino server configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
6.6 Tips and techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
6.6.1 Save files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
6.6.2 Scheduled backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
6.6.3 Save databases while Domino server is running . . . . . . . . . . . . . . . . . . . . . . . . 285
6.6.4 Restore databases while Domino server is running . . . . . . . . . . . . . . . . . . . . . . 286
6.7 Tips for beginners: System management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
6.7.1 User profile requirements for backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
6.7.2 Determine used disk space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
6.7.3 Determine Domino data directory size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
6.7.4 Initialize tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
6.7.5 Find Domino objects on the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
6.8 Common SAV/RST problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Contents vii
9.4.5 Best practices for using ScanMail in your environment . . . . . . . . . . . . . . . . . . . 440
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Contents ix
x Domino 6 for iSeries Best Practices Guide
Figures
Figures xiii
7-27 Add media to media pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
7-28 Backup Policy properties - During Backup settings . . . . . . . . . . . . . . . . . . . . . . . . . 324
7-29 Select type of information to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
7-30 Select the directory to be restored . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
7-31 Select the date of the save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
7-32 Restore directory or select files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
7-33 Select files to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
7-34 Restore summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
7-35 WRKPCYBRM *SYS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
7-36 The weekly media policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
7-37 BRMSDAY control group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
7-38 BRMSWEEK control group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
7-39 Control group for full backup after incremental backup . . . . . . . . . . . . . . . . . . . . . . 339
7-40 Monthly backup control group attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
7-41 BRMSMONTH control group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
7-42 BRMSSYS control group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
7-43 Weekly backup of user data except Domino data . . . . . . . . . . . . . . . . . . . . . . . . . . 343
8-1 Data Protection for Domino on OS/400 architecture . . . . . . . . . . . . . . . . . . . . . . . . 356
8-2 Installation of Data Protection for Domino (RSTLICPGM) . . . . . . . . . . . . . . . . . . . . 358
8-3 Running dominstall command in QShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
8-4 The export command in QShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
8-5 Result of querying access to Lotus Domino server with domdsmc . . . . . . . . . . . . . 371
8-6 Result of querying access to IBM Tivoli Storage Manager server using domdsmc . 372
8-7 Result of running the selective backup for a single Domino database . . . . . . . . . . 377
8-8 Results of running the incremental backup command . . . . . . . . . . . . . . . . . . . . . . . 379
8-9 Transaction log archiving with Data Protection for Domino . . . . . . . . . . . . . . . . . . . 380
8-10 Scheduled Data Protection for Domino jobs on OS/400 . . . . . . . . . . . . . . . . . . . . . 384
8-11 Restoring a Domino database with Data Protection for Domino . . . . . . . . . . . . . . . 387
8-12 Prompting for databases to restore - PICK parameter. . . . . . . . . . . . . . . . . . . . . . . 388
8-13 The query pending command - show restored databases awaiting activation . . . . 390
8-14 Activation of restored Domino databases without applying transaction log changes 391
8-15 Activation of restored Domino databases to specific point in time. . . . . . . . . . . . . . 392
8-16 Domino console messages - transaction log operations during database activation 392
9-1 Sample FTP commands to transfer ScanMail installation file to the iSeries . . . . . . 425
9-2 The ScanMail configuration command CFGSM. . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
9-3 Output of running the CFGSM command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
9-4 Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 user interface . . . . . . . . . . . 431
9-5 The Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 registration form . . . . . 432
9-6 Update Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 settings . . . . . . . . . 433
9-7 Server Program document runs hourly updates - virus pattern file and scan engine 434
9-8 Real-time mail scan — the scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
9-9 Real-time mail scan “Action on Viruses” options . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
9-10 Real-time mail scan Virus Notification options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
9-11 Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 - Virus Top Ten . . . . . . . . . 448
10-1 Example table of existing system characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . 460
11-1 Workload Estimator Terms and Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
11-2 WLE Basic Workload Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
11-3 WLE Domino mail workload definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
11-4 Number of partitions for Domino workload instance . . . . . . . . . . . . . . . . . . . . . . . . 471
11-5 WLE Default mail workload settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
11-6 WLE Inbound Cluster Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
11-7 WLE Inbound Cluster Replication parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
11-8 WLE Mail workload - clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Figures xv
A-48 WLE for OSTI - Restore saved estimation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
A-49 WLE for OSTI - Basic Workload Selection (after restoring saved WLE file) . . . . . . 557
A-50 WLE for OSTI - Expert Workload Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
A-51 WLE for OSTI - change LPAR Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
A-52 WLE for OSTI - add logical partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
A-53 WLE for OSTI - add Workload to new LPAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
A-54 WLE for OSTI - add new Domino workload to LPAR. . . . . . . . . . . . . . . . . . . . . . . . 561
A-55 WLE for OSTI - change names of logical partitions . . . . . . . . . . . . . . . . . . . . . . . . . 562
A-56 WLE for OSTI - Partition Controller workload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
A-57 WLE for OSTI - define Domino #7 workload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
A-58 WLE for OSTI - define new Domino dev/test workload . . . . . . . . . . . . . . . . . . . . . . 564
A-59 WLE for OSTI - initial results after adding LPAR . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
A-60 WLE for OSTI - change growth rate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
A-61 WLE for OSTI - Selected System after changing growth rate . . . . . . . . . . . . . . . . . 567
A-62 WLE for OSTI - results with LPARs - pdf format . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
A-63 WLE for OSTI - Immediate Solution LPAR Information . . . . . . . . . . . . . . . . . . . . . . 569
A-64 WLE for OSTI - Growth Solution LPAR Information . . . . . . . . . . . . . . . . . . . . . . . . 570
A-65 WLE for OSTI - Growth Solution comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
B-1 Fields to fill in on Dump Entries to Printer from Licensed Internal Code Log Screen 577
B-2 Example call stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
C-1 Network retransmission information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
C-2 Example of a retransmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
C-3 CFGTCP option 2 - Work with TCP/IP Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
C-4 iSeries Navigator displaying active lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
C-5 Example of an ARP broadcast in a communications trace . . . . . . . . . . . . . . . . . . . 596
C-6 Example of a changing MAC address in a conversation . . . . . . . . . . . . . . . . . . . . . 597
C-7 CFGTCP option 2 with preferred bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
C-8 Example of the output from the DSPLOG command . . . . . . . . . . . . . . . . . . . . . . . . 601
C-9 Example of the output from F9 when in the Additional Message Information screen 602
C-10 SHOW SERVER command to check the Elapsed time parameter . . . . . . . . . . . . . 602
C-11 Mail rules in the Domino Directory configuration document. . . . . . . . . . . . . . . . . . . 608
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not give you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions are
inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and
distribute these sample programs in any form without payment to IBM for the purposes of developing, using,
marketing, or distributing application programs conforming to IBM's application programming interfaces.
Intel, Intel Inside (logos), and Pentium are trademarks of Intel Corporation in the United States, other
countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, and service names may be trademarks or service marks of others.
This IBM Redbook is a collection of Domino® 6 related topics that are important pieces of
information and are either not covered in other documents, or the existing information is
outdated because it applies to older versions of Domino, such as Domino V5.x. As such, the
topics vary widely and range from Domino deployment, performance monitoring and tuning to
Antivirus protection. This redbook complements and updates the content of existing
redbooks, for example, IBM Lotus Domino 6 for iSeries Implementation, SG24-6592; and
Domino for iSeries Sizing and Performance Tuning, SG24-5162-01.
This book takes into account that there are two different types of Domino administrators and
users: The first type consists of users that come from the iSeries™ world and are
implementing a Domino environment on their existing system with lots of iSeries experience.
The second user type includes experienced Domino administrators that are about to move or
have moved their Domino environment to the iSeries from another platform. Thus, wherever
possible and necessary, we have added information for both user types. Please keep this in
mind when you read information that seems very basic or obvious - it might be news for “the
other user type”!
Part 1 of this book covers Domino deployment, administration, and performance monitoring
and tuning.
Part 2 describes the various backup and recovery methods that are available for Domino on
iSeries and helps you to determine which backup and recovery strategy is right for you.
Antivirus protection is also covered in Part 2.
Part 3 teaches you what needs to be considered when sizing a Domino environment and
explains how to use the IBM Eserver Workload Estimator.
Part 4 gives you a quickstart to use the Workload Estimator based on fictitious customer
environments. It also helps you to solve some Domino performance problems and tells you
what information you need to collect for Domino troubleshooting.
Paul Culpepper is a Consulting IT Architect for the Strategy and Technical Enablement
Group for IBM Software Services for Lotus® in Phoenix, AZ. He has over 10 years of
technical expertise with messaging architectures and Lotus Products. He has been involved
in the design and deployment of many of the largest Domino environments in the U.S. His
areas of expertise are Lotus Notes® and Domino infrastructure design, messaging
migrations, deployment, messaging and collaborative strategies, and TCO improvement.
Paul Culpepper
Jennifer Ginder is a Staff Software Engineer in the IBM Rochester Support Center. She has
six years of experience with the iSeries specializing in Domino, performance, and work
management. She holds a Bachelor of Science degree from Carleton College.
Sirpa Lepisto is an IT Specialist from IBM Finland. She joined IBM in 1999 and is working
with the iSeries System Support Team. Her areas of expertise include Domino for iSeries,
operating system technical support, and iSeries software support. Before joining IBM, she
worked over 10 years as a system operator and system specialist in various IBM platforms,
including S/34,S/36,S/38 and AS/400 (iSeries). She is a Certified Lotus Professional (CLP) in
Domino R5 system administration.
Gerri Passe is a Senior Information Technology Specialist with the IBM Advanced Technical
Sales Support organization in Rochester, MN. She holds a Bachelor of Arts degree in
Mathematics. During the last four years at IBM, she has been focused on Lotus Domino for
iSeries and related solutions. Her prior experience at IBM has included working in the thin
client technology area and seven years as an IBM AS/400 Systems Engineer in southern
Minnesota. Also, her first nine years at IBM were spent working in the mainframe
(VM/VSE/MVS™) area. Gerri has worked on several previous redbooks and has spoken at
numerous IBM and customer conferences such as COMMON and iSeries Technical
conferences.
Marko Stefancic is the Chief Technology Officer and co-owner of the Genis
(http://www.genis.si), which is based in Slovenia. Marko attended the Faculty of
Economics of the University in Ljubljana and now lives with his wife in Kranj. He is an IBM
Certified Instructor and holds principal certifications in Lotus, iSeries and IBM DB2® with
more than 10 years of consulting experience. Currently he is responsible for Lotus
technologies, IBM DB2 Content Manager and IBM eServer™ iSeries consulting,
implementation and support services.
John van den Berg has worked in IBM for almost 25 years, as a Hardware and Software
Support Customer Engineer in The Netherlands. He was the DW/36 and OS/400® Office
Vision specialist in his department, and is now a Lotus CLP in Domino R5 Administration and
a certified Domino for iSeries specialist. Since 3 years he works in the IBM Strategic
Outsourcing department, specializing in Domino for iSeries, while participating in iSeries
outsourcing projects.
A special thanks goes to Debra Landon, ITSO Rochester, for her help and support throughout
the project.
Tom Gray
Marv Kulas
Joanna Pohl-Miszczyk
Craig Schmitz
Jenifer Servais
Janet Willis
International Technical Support Organization, Rochester Center
Preface xxiii
Terry Ackman
David Bhaskaran
Charlie Carroll
Swinder Dhillon
Melissa S. Fichtinger
Terrence Forrest
Mike Gordon
Dave Johnson
Paul Koeller
Gary Lakner
Clayton McDaniel
Laurie Miller
Ted Mongeon
Tony Mueller
Jeff Parker
Tony Perkins
Joe Peterson
Lee Prissel
Leif Rush
Walter Scanlan
Tracy Smith
William Smith
Steve Sparrow
Fant Steele
Mervyn Venter
Aditya Wresniyandaka
IBM Rochester
Bob Stegmaier
Will Witten
IBM Dallas
Terry Dimka
IBM Bethesda
Sabine Jordan
IBM Germany
Kim Greene
Kim Greene Consulting, Inc.
Sarah Gordon
John McArdle
Ron Ruggles
Symantec Corporation
Michael Eberl
Rolf Rennemo
Juergen Saamen
Trend Micro, Inc
Your efforts will help increase product acceptance and customer satisfaction. As a bonus,
you'll develop a network of contacts in IBM development labs, and increase your productivity
and marketability.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our Redbooks™ to be as helpful as possible. Send us your comments about this or
other Redbooks in one of the following ways:
Use the online Contact us review redbook form found at:
ibm.com/redbooks
Send your comments in an Internet note to:
[email protected]
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. JLU Building 107-2
3605 Highway 52N
Rochester, Minnesota 55901-7829
Preface xxv
xxvi Domino 6 for iSeries Best Practices Guide
Part 1
Part 1 Deployment,
administration, and
performance
Part 1 of this book covers Domino deployment, administration, and performance monitoring
and tuning.
This section describes each item on the basic checklist for planning your environment. We
recommend that you gather this information for planning and documenting your environment.
Retain the documentation for your reference and for auditing purposes.
For instance, you may want to group logical Domino partitions by location or business unit for
ease of administration (for example the Chicago office or Legal Department). Depending on
client access methods, you may want to balance your Domino Web Access (iNotes) users
and your Notes 6 client users for proper load balancing.
Here are the input parameters commonly used for server sizing exercises:
Number of registered users: The number of users defined in the directory to be homed
on a particular Domino server.
Client conversion factor: A ratio describing the workload of a Domino Web Access
(iNotes) user relative to a Lotus Notes client user.
User concurrency: Expected percentage of registered users active at any given time.
Percentage Lotus Notes clients: The percentage of users expected to use a Lotus
Notes client.
Percentage Domino Web Access (iNotes) clients: The percentage of users expected to
use Domino Web Access (iNotes).
Number of Domino partitions: The number of Domino servers per physical iSeries
server or OS/400 LPAR.
Average mail database size: Average size of each mail database in megabytes (MB).
Transaction log volatility: The percentage of the total data expected to change per day.
Backup cycle: The number of days worth of transaction logs that need to be supported.
Domino servers in a cluster: The number of member servers in the cluster.
Open databases allowed: Percentage expected of open mail databases.
Keep in mind that, when determining user topology, it is very common to achieve what seems
like an even distribution by basing your user spread on a count of registered users. Therefore,
by viewing the Domino Directory, it is easy to determine which servers have fewer users.
However, one thing to consider is that not all users in a Domino environment use resources
equally. The workload which results is never uniform across a given user population. Some
users are light, some medium, and some heavy in terms of the resources they require from
their server. Thus, if possible, it is much better to try to determine a workload balance as
opposed to a user count balance. This usually involves an assessment of the number of
transactions processed by a server and, since it is often a limiting factor, the amount of disk
space required for each user.
The best practices that enable a design to achieve these goals include centralizing servers as
much as possible, meaning co-locating servers in a single site rather than in different sites.
All other things being equal, hosting users from a centrally located server enables an
organization to:
Take advantage of economies of server scaling.
This reduces the number of servers in the environment and ensures maximum usage of
available resources, that is, no server "overkill".
Reduce the amount of mail routing in the environment.
Fewer servers means less routing since more mailboxes are located on the same server.
Reduce the amount of replication in the environment.
There is no need to replicate user applications between servers in the same location, as
users can get to either server equally well.
Reduce wide area network (WAN) traffic and speed replication and routing between
servers.
Administrative databases, such as the Domino Directory or the AdminP database, must
replicate to every server. In a centralized environment they are replicated over a
high-speed LAN connection. The same is true for mail that must route between servers.
However, centralizing servers should be carefully analyzed. Some items to consider are:
Increased WAN costs.
Dependency on WAN reliability.
Exposure to performance issues in extreme situations. In LAN based environments, for
example, the time to open an average message (10 KB) may be .05 seconds while in WAN
environments with 1/10 the available bandwidth, it is .5 seconds. Either is quite
acceptable. However, in the same LAN environment, the time required to open a message
100 times the size (1 MB) would be about 5 seconds, while in the WAN environment this
would take 50 seconds.
Perform network analysis to determine the network requirements for the Domino
environment. The following information details the methodology used to determine these
requirements:
1. The first step in the methodology is profiling user’s Notes usage. This is done by
monitoring network packets sent and received by the client workstation, isolating Notes
packets by monitoring for Notes server IP addresses. Analysis should be run and data
collected for a number of workstations, and the analysis should be repeated numerous
times for all clients, at different times during the workday.
2. Once the data is collected, total data transmissions should be summed and divided by the
number of seconds for the session for each client to arrive at a value for Kbps required for
the session. Obviously the numbers can vary widely. If the user sends notes with a large
file or spreadsheet attached, the Kbps/session would be high; if the user is sending a
simple text note, then it's low. Therefore, the requirements for each session should be
averaged. This average becomes the Actual Bandwidth Requirement for an Active Notes
User.
3. Next, determine the effective bandwidth requirement factoring in network efficiency. This
number will be larger than the actual bandwidth requirement due to losses for overhead.
This factor will differ for different network protocols and network environments.
4. Then, consider peak concurrency. Peak concurrency describes the highest percentage of
users that are actually communicating with the server at the same moment in time. Notes'
client-server architecture allows many functions to be accomplished without
communication with a server. For instance, in a mainframe environment, every keystroke
results in a transmission and reception with the host since the terminal has no processing
power. In contrast, the act of typing a Notes e-mail message does not result in any
communications between the Lotus Notes client and Domino server because this is all
handled internally at the client. Typically, the only actions that result in transmissions are
reading or writing a document. For this reason, peak concurrency is typically lower than
mainframe concurrency, although the size of each transmission is typically larger.
There are a couple of options for determining Peak Concurrency. One option is to use
known, industry standard peak concurrency ratios for Lotus Notes. These tend to range
from around 25% to 35% in most cases, with the higher percentage representing a more
intensive group of Notes users. Alternatively, Notes servers will report on peak
concurrency over time in terms of the number of users accessing a server. If the total
population of users is known, then the peak concurrency ratio can be determined by
dividing the server reported peak concurrency by the total population.
So for this example, having a T1 (1.544 MB) connection between your sites, you could
support 695 concurrent users (1.544MB x .45 = 695).
While the above formulas will provide fine planning data, in an evolving environment it is
important to repeat these procedures over time. Maturation of Notes users will change their
usage patterns, as will deployment and maturation of Notes applications. We suggest that
this analysis be repeated every 3 months during Notes implementation and/or migration from
a different environment, and every 6 - 12 months in a fully deployed environment.
Please note that Notes and Domino 6 can significantly reduce network bandwidth using
compression techniques:
Network port compression
Attachment compression
Streaming replication
Certain types of data are more compressible than others and the compression ratios will differ
accordingly. For example, JPG image files are already compressed and cannot be made
significantly smaller by subsequent compression. In most cases, network and attachment
compression can reduce the amount of data moved by up to 50%.
Streaming replication uses far fewer request and acknowledgements between the client and
server (or between servers) to provide much more efficient and shorter replication times.
It is best to have a corporate policy for which methods of access will be supported within the
proposed environment. Then appropriate capacity planning can be done and a structured
approach to user distribution can be put in place. Refer to Chapter 10, “Sizing tips and
techniques” on page 455 for more information about the impact certain access methods have
on the system size.
Code stream
Before Domino 6.0.3 and 6.5, when the Domino multi-versioning capability was introduced,
Domino for iSeries did not support multiple versions of the Domino code stream on the same
physical server unless you installed the different versions on separate LPARs. For more
information on the general concepts on multiple versions of Domino on one system prior to
Domino versions 6.0.3 and 6.5, refer to the redbook Coexistence of Multiple Lotus Domino
Releases in an LPAR Environment on the IBM eServer iSeries Server, SG24-6593, which is
available at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246593.html?Open
Multi-versioning itself is not a feature of the Domino server and is not a modification to the
“core” function that is part of the support of Domino server function. How multi-versioning
works is specific to the iSeries implementation for Domino. The support for multi-version
capable releases of Domino is designed to promote flexibility and add value to Domino
implementations for Domino for iSeries customers.
For more information about multi-versioning, please refer to the work-in-progress white paper
entitled Introduction to Multi-versioning Domino for iSeries, which is available at:
http://www.ibm.com/servers/enable/site/domino/downloads/multiversion.pdf
Also see the redbook Lotus Domino 6 for iSeries Multi-Versioning Support on the IBM
eServer iSeries Server, SG24-6940, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246940.html?Open
Isolation
LPARs may make sense to isolate separate functions, such as these:
Multiple Lotus products:
If you plan to run additional Lotus products on your iSeries such as Lotus Instant
Messaging and Web Conferencing (Sametime®), Lotus Team Workplace (QuickPlace®)
or Lotus Domino Document Manager (Domino.Doc®). Some versions of Domino are not
supported in conjunction with these additional products, for example, Lotus Team
Workplace only runs with Domino 5.x versions and the various Lotus Web Conferencing
versions require different Domino 5.x, Domino 6, or Domino 6.5 versions.
For the most recent information, please refer to the Lotus Software for iSeries
Compatibility Guide at:
http://www.ibm.com/servers/eserver/iseries/domino/domino6/releasesupport4up.pdf
SMTP mail routing
Will your iSeries be running Domino partitions that require exposure to the Internet? As an
example, if Domino partitions will be running SMTP functions, then — for security
purposes — you may want to consider a separate partition for these Domino servers.
Similar considerations should be made for Extranet based applications.
Important: Clustering between Domino partitions (subsystems) within the same partition,
or between Domino partitions in separate LPARs, within a single iSeries server, has a
single point of failure. This is the primary partition and the entire system’s common
hardware. We recommend that, where clustering is implemented for true high availability,
you use a separate system, that is similarly configured, as the cluster partner.
Tip: You should consider all of your LPAR requirements before using the Workload
Estimator. You could invalidate the estimates generated by Workload Estimator if you add
more LPARs to your iSeries after purchasing your hardware since your estimate could not
factor in the additional overhead generated by adding more LPARs.
Resources
The following list of documents related to logical partitioning and Domino provides in-depth
information:
Topic: “Plan for logical partitions” on the iSeries Information Center Web site, at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/info/rzait/rzaitoverview.htm
Redbook Slicing the AS/400 with Logical Partitioning: A How to Guide, SG24-5439, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG245439.html?Open
Redbook LPAR Configuration and Management: Working with IBM ^ iSeries
Logical Partitions, SG24-6251, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246251.html?Open
Planning for Domino on iSeries: Resources, Subsystems, Partitioning, and Clustering by
Thomas Myer and Daniel Hill, at:
http://www.ibm.com/servers/esdd/articles/domino_iseries.html
Redbook IBM Lotus Domino 6 for iSeries Implementation, SG24-6592, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246592.html?Open
Redbook Domino for iSeries Domino for iSeries Sizing and Performance Tuning,
SG24-5162, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG245162.html?Open
Also, refer to the chapters related to sizing, Workload Estimator, and performance tuning
in this redbook.
The example in Figure 1-1 shows a 12 processor iSeries configured with two LPARs. The
primary LPAR has five active Domino servers using nine processors to run the mail
environment. There is one inactive Domino partition used for restores. The second LPAR has
two Domino servers using three processors for the application environment. This example is
one possible configuration. You can create a configuration on your iSeries that fits your
business requirements.
Restore Application
System LPAR
Figure 1-1 Example Domino partition configuration for mail and applications
1.1.8 Indexing
Domino 6 included some major changes to the Global Text Retrieval (GTR) engine used to
build and maintain views and full-text indexes. The new release of the GTR engine in
Domino 6 is 4.1 compared to version 3.4 used in Domino R5. In addition, Domino uses the
NSF buffer manager for memory services, which improves caching and balances memory
between NSF and FT. Furthermore, a new search processor results in closer integration of
text retrieval and significantly faster Boolean processing.
Benefits
Some of the benefits of the new GTR engine are:
Performance gains:
– Better handling of booleans
– FTSearch Limit used by engine
– Caching of result data since GTR now uses the Unified Buffer Manager (UBM)
Resource utilization improvements:
– Lower indexing memory footprint (6 MB per document limit is gone), GTR memory use
improved, now using Notes Memory Services
Capacity:
– Up to 16 terabytes per index (versus 2 gigabytes before)
Note: If you are moving from a another platform to iSeries, it is important to check whether
or not your current toolset have equivalent ports for the iSeries platform.
Also, it is wise to understand the differences in code streams, especially if you have not
migrated to an R5 SMTP server. The architecture is different between Domino R4.x and
Domino R5/Domino 6.
1.1.11 Services
It is important to plan the services your Domino server will provide since OS/400 and Domino
both provide some of the same Internet protocols. As a result, it is possible to get port
conflicts if not configured correctly. Services such as SMTP, POP3, IMAP, HTTP, and LDAP
need to be configured so that they do not conflict. For more information, please refer to
Installing and Managing Domino 6 for iSeries (i400help.pdf) at:
http://www.lotus.com/ldd/notesua.nsf/0b345eb9d127270b8525665d006bc355/505c677e79adb59100
256c44003288ee?OpenDocument
Consider these four areas when planning for the backup and recovery for your Domino
environment:
Determine and document your backup and recovery business requirements
Decide what type of transaction logging to use
Decide which backup method to use
Decide what files to back up
We discuss these areas in detail in Chapter 5, “Backup and recovery of Domino 6 for iSeries:
Concepts” on page 243 in this book.
Resources
You may find the following documentation helpful when planning and setting up your Domino
backup and recovery strategy:
Chapter 17, “Managing Backup and Recovery” from Installing and Managing Domino 6 for
iSeries (i400help.pdf).
For information about planning a backup strategy for your iSeries server, see the manual
Backup and Recovery, SC41-5304. If you are new to the iSeries, also see the descriptions
of using the Save menu and using the SAVxxx and RSTxxx commands. This book comes
with your OS/400 software. It is also available in the iSeries supplemental manual library
in the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/c4153046.pdf
Tip: With OS/400 V5R1 or later, system directory services (LDAP) is always started by
default when TCP is started. It automatically binds to port 389 on all configured IP
addresses. This can cause a port conflict when you start up a Domino server that runs the
LDAP task. You have several configuration options to prevent this from happening. For
more information, see the following Web site:
http://www.ibm.com/eserver/iseries/ldap
The iSeries platform is ideal for implementing the new centralized directory architecture in
Domino 6. The extremely fast internal connections between servers on an LPAR or between
LPARs enables spoke or mail servers to use configuration directories.
Resources
These documents provide additional information:
For more information on setting up and using a centralized directory with Domino, see the
topic “Planning a central directory architecture for a domain” in the Domino 6 Administrator
Help database.
Refer to Chapter 19, “Setting Up the Domino Directory” in Administering the Domino
System, Volume 1 available at:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
The default naming convention for the data directory in the Domino Server Setup wizard is
/domino/servername/data. If you want to shorten the directory path, you can specify the path
as /domino/dominoservername. The /data directory is not really necessary, but you can keep
the full default path to be consistent with the configuration defaults when using the Domino
Server Setup wizard if you prefer.
Example: /domino/domsvr1/data
For additional considerations regarding IFS and performance, refer to “Integrated File System
(IFS)” on page 218 and to “Mapping drives to the iSeries IFS” on page 33.
Resources
These resources can help you with planning and setting up transaction logging for your
environment:
Chapter 55, “Transaction Logging and Recovery” in Administering the Domino System,
Volume 2, Lotus software documentation, available at:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
The paper “Why you need Transactional Logging” describes the benefits of transaction
logging. It is available at the following Web site:
http://www.lotus.com/ldd/notesua.nsf/572150f5ef0dfb1385256cb8005224be/ffa56f8938579a
4585256d2b005bbd6c?OpenDocument
“Assessing the impacts of new transaction logging features” by Jim Powers on LDD Today:
http://www.lotus.com/ldd/today.nsf/aa2db969526197dd85256b56004e5a7b/c7632f2b5dbbd265
85256b9d0072b9fb?OpenDocument
“More on Domino 6 transaction logging” by Jim Powers on the LDD Today Web site at:
You can also assign an exception attribute to either an organizational or explicit policy. You
use an exception to allow the user to override a policy setting that is otherwise enforced
throughout an organization. When you create an exception policy, you specify only the
settings that will not be enforced. Then when you assign the exception policy, it exempts
users from enforcement of those settings only.
Exception policies are a way to give someone in an organization special treatment, possibly
because of their position or job requirements, for example, those employees who need to
exceed the organizational Registration setting that enforces a mail database quota of 60 MB.
Resources
For more information on policies, refer to the following resources:
Topic "Policies" in Domino 6 Administrator Help
Chapter 9, “Using Policies” in Administering the Domino System, Volume 1
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
LDD article entitled Policy-based system administration with Domino 6 by Bob Balfe and
Dick McCarrick found at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/d78ede75b351cf81
00256be9005b7d35?OpenDocument&Highlight=0,internet,site
1.2 Hardware
This section includes a basic hardware planning checklist, setup guidelines and special
considerations for the iSeries.
Also refer to the iSeries Information Center Web site for information about planning and
performing your migration.
You can contact your Lotus representative or ISSL Sales Specialist for documented
approaches for preparing or organizing your consolidation effort.
The best online resource we found on this topic is Appendix A, “Consolidation” in the redbook
Upgrading to Lotus Notes and Domino 6, SG24-6889.
For more information about iSeries consolidation solutions, see the Server Consolidation
solutions Web site at:
http://www.ibm.com/servers/eserver/iseries/scon/
Also, specially priced 810 and 825 models called iSeries for Domino are now available. To
qualify for the special price, these configurations require the purchase of certain Lotus
software (One Domino server license plus x Lotus Notes clients — depending on the model).
For more information, see the iSeries for Domino Web site at:
http://www.ibm.com/servers/eserver/iseries/domino/is4domino.html
We recommend that you evaluate the availability of system upgrades for any DSD/DSDplus
server whether you purchase it new or used.
You should then determine what iSeries software to install, including the current program
temporary fixes (PTFs). A PTF on the iSeries is similar to a service pack on the Windows
platform. You can install PTFs as individual fixes or as cumulative fixes known as group
PTFs. Refer to the following Web site for common questions and answers related to
preventive maintenance on the OS/400 Operation System and Domino:
http://www.ibm.com/servers/eserver/iseries/domino/domptfgi.htm
Whether or not you are upgrading from a previous release of OS/400 and Domino or installing
Domino 6 for the first time on your iSeries, please refer to the iSeries Support Recommended
fixes Web site for the most recent information:
http://www-912.ibm.com/s_dir/slkbase.nsf/recommendedfixes
If you are upgrading from a previous release of Domino for iSeries, you should also verify that
you can upgrade to Domino 6 and V5R2 from your current version of Domino and OS/400.
You can find this information on the Domino 6 for iSeries system requirements Web site at:
http://www.ibm.com/servers/eserver/iseries/domino/domino6/sysreqs.html
For example, administrators running OS/400 V5R2 on their iSeries servers must upgrade
from Domino for iSeries 5.0.8 or above (or 5.0.9 or above for users running Domino for
iSeries on an iSeries i890 server).
OS/400 requirements
Here is a list of the software requirements for running Domino 6 for iSeries. Again, please
check the iSeries Support Recommended fixes Web site for the most recent information.
IBM Operating System/400® (OS/400®), 5722-SS1, Version 5 Release 1 or higher with
the latest PTFs applied.
OS/400 — Host servers, 5722-SS1 option 12.
TCP/IP Connectivity Utilities for iSeries, 5722-TC1.
IBM Developer Kit for Java™, 5722-JV1 plus the 1.3 JDK option for 5722-JV1, which is
option 5.
OS/400 — QShell Interpreter, 5722-SS1 option 30.
Note: It should be observed that the scope of this book is Domino 6 for iSeries running on
OS/400 V5R2. Please check the Domino 6 for iSeries Web site for information on Domino
6 and OS/400 compatibility at:
http://www.ibm.com/servers/eserver/iseries/domino/domino6/
PTF requirements
Here is the current list (January 2004) of individual and group PTFs required for Domino 6 for
iSeries. For the most recent PTF requirement information, please refer to:
http://www.ibm.com/servers/eserver/iseries/domino/support/ptf.htm#v5r2
Group PTFs
A group PTF is a single PTF order number that provides a logical set of PTFs affecting a
specific function. Information on all group PTFs by release can be found at the Preventive
Service Planning Web page at:
http://www-912.ibm.com/s_dir/sline003.NSF/ALLPSPBYREL?OpenView&Start=1&Count=30&Collapse
=1#1
DB2/400 Group PTF:
If you are moving data between DB2/400 and Domino, it is suggested that you order the
latest DB2/400 Group PTF that is available for your OS/400 release. More information is
available at the IBM Software Technical Document — DB2/400 Group PTF Information
Web site:
http://www-912.ibm.com/s_dir/slkbase.nsf/4086d1dc7efffb0a862565d80076c024/e1bfadb199
55c444862565c2007ceabe
Java Group PTF:
If you are using Java, it is suggested that you order the latest Java Group PTF. See the
Preventive Service Planning Web page noted above for more information about the
availability of iSeries group PTFs.
IBM HTTP Server for iSeries Group PTF:
If you are using the IBM HTTP Server (original with Domino R5 or powered by Apache
with Domino 6) it is suggested that you install the latest HTTP Group PTF. See the
Preventive Service Planning Web page noted above for more information about the
availability of iSeries group PTFs and refer to the HTTP Server (powered by Apache)
plug-in for Domino 6 on iSeries Web page for specific PTFs that are required:
http://www.ibm.com/servers/eserver/iseries/domino/apache.html#requiredptfs
BRMS Group PTF:
If you are using Backup, Recovery, and Media Services for iSeries (BRMS), it is
suggested that you order the latest BRMS Group PTF that is available for your OS/400
release. See the Backup and recovery solution Group PTFs Web page for additional
information:
http://www.ibm.com/servers/eserver/iseries/service/brms/group.htm
Uses InstallShield
Note: The licensed product number for Domino 6 for iSeries changed to 5733-LD6.
Domino 6.5 for iSeries uses product number 5733-L65. The licensed product code for
Domino R5 for iSeries was 5769-LNT.
CD versus file
If you feel more comfortable using a GUI interface, then follow the recommended installation
method of using the Domino Server Installation wizard. The CD installation takes longer than
the RSTLICPGM installation method since the installation files are decompressed on the fly,
then transferred from the PC workstation to the iSeries during the installation.
If you feel comfortable using the RSTLICPGM installation method, it will be faster, since the
save files are decompressed before you install and they already reside on the iSeries (you
have to transfer the files via FTP to the iSeries prior to installation). Install instructions can be
found in the readme1st.pdf file. You will need to run the RSTLICPGM command twice, once
for the *BASE code and once for option 1 (C API toolkit). There are only two save files for
Domino 6 for iSeries compared to seven for Domino R5 for iSeries.
Attention: Starting with Domino for iSeries 6.0.3 and 6.5.0 it is possible to install and run
multiple versions of Domino on one iSeries system or LPAR. Installing these multi-version
capable releases of Domino for iSeries requires the installation of an additional “product
option” — which is the actual Domino version code. Please refer to the redbook Lotus
Domino 6 for iSeries Multi-Versioning Support on the IBM eServer iSeries Server,
SG24-6940 for detailed information on how to install multi-version capable Domino
releases.
A guideline is 30 to 180 minutes for a basic install. The actual installation time will vary
depending on the hardware resources available on your system and the method of installation
you choose.
Domino 6.0.3, Domino 6.5 and higher: The Domino library structure for multiversion
capable Domino releases has changed. You might need to take this into consideration
when doing a remote or batch installation. For more information please see “Future
release changes” on page 247.
Trick: You receive message “Option *Base not restored” on your 5250 workstation
emulation console.
– If you have Domino servers already installed on this LPAR or iSeries (not partitioned),
verify that all Domino servers have been stopped. The RSTLICPGM command will not
work if one or more Domino servers are running.
Resolution: Stop all Domino servers, then issue the command again.
– Another possible reason for this error message is that the save files could have been
damaged unexpectedly when transferred to the iSeries.
Resolution: Transfer the save files to the installation directory again, then reissue the
RSTLICPGM command.
Resolution: Once the LODRUN command has completed, you will need to reapply the
Language Pack for your preferred language for the release of Domino you just installed.
Important: If you have a Domino server with a language pack installed and your
environment requires this language support, do not upgrade Domino until language
packs for that Domino release are available.
1.3.4 iSeries Access for Windows and iSeries Navigator tips and tricks
This section describes new features in iSeries Navigator and iSeries Access for Windows as
they apply to best practices for Domino for iSeries. We also include some tips and tricks for
beginning, intermediate, and experienced administrators.
You can use iSeries Navigator to graphically manage both your iSeries server and the
Domino servers (as well as IBM Lotus Team Workplace (QuickPlace) servers) configured on
your iSeries from a Windows workstation. Through the Domino for iSeries support in iSeries
Navigator, you can:
View the status of all Domino servers on your iSeries server.
Use the context menu (right mouse button) to perform administrative tasks on a Domino
server, such as starting and stopping the server, determining the properties of a server,
and changing the NOTES.INI file for the server, and more.
More information can be found in section 2.2.3 “iSeries Access for Windows” of the redbook
IBM Lotus Domino 6 for iSeries Implementation, SG24-6592.
For more information, refer to the iSeries Access for Windows Web site at:
http://www.ibm.com/servers/eserver/iseries/access/expresslinks.htm
For more information, refer to the iSeries Navigator Web site at:
http://www.ibm.com/servers/eserver/iseries/navigator/index.html
Installation of plug-ins
An iSeries Navigator plug-in is a separately installable component of iSeries Navigator that
may be installed on your workstation. To install any plug-ins, you must start iSeries NetServer
on your iSeries and share the iSeries integrated file system (IFS) folder where the iSeries
Navigator code containing the plug-ins is installed. See section 3.6 entitled “Installing the
iSeries Navigator Domino plug-in” in IBM Lotus Domino 6 for iSeries Implementation,
SG24-6592.
To install iSeries Navigator plug-ins, click the Install Plug-ins link on the bottom right hand
corner of the iSeries Navigator window. This displays the Install Plug-ins dialog window
where you can select the server from which to install the plug-ins.
Important: A plug-in may require a certain minimum level of OS/400 and a specific
licensed program to be installed on your iSeries before it will appear in the list of supported
plug-ins. Refer to the Help Topics in iSeries Navigator for more information.
For the current list of available plug-ins, go to the iSeries Navigator Available Plug-ins Web
site at:
http://www.ibm.com/servers/eserver/iseries/navigator/availplugins.html
Domino plug-in
The Domino plug-in is needed if you want to manage your Domino environment using iSeries
Navigator. Installing the plug-in adds folders and objects to the hierarchy tree, choices to
menus, and additional property pages to the property sheet for a folder or object in iSeries
Navigator.
You can install the Domino plug-in after installing iSeries Navigator on your workstation and
installing the Domino software on your iSeries. You can then perform the following tasks
using iSeries Navigator:
Configure Domino for iSeries servers
Access Domino for iSeries server properties
Start and stop Domino for iSeries servers
Launch the Domino Administrator client
Register Domino users
View or modify a Domino server’s NOTES.INI file
For more information, refer to the article entitled “Operations Navigator on iSeries...and why
it's good for Domino” by Thomas Myer and Daniel Hill at:
http://www.ibm.com/servers/esdd/articles/opsnav/index.html#8
You can also refer to section 3.6, “Installing the iSeries Navigator Domino plug-in” in the
redbook IBM Lotus Domino 6 for iSeries Implementation, SG24-6592.
For more information, refer to the BRMS graphical user interface Web page at:
http://www.ibm.com/servers/eserver/iseries/service/brms/brmsplugin.htm
Tips and techniques for using the BRMS iSeries Navigator client can be found here:
http://www.ibm.com/servers/eserver/iseries/service/brms/plugintips.htm
These are the steps to display your Domino servers in iSeries Navigator:
1. Open iSeries Navigator. Create a connection to your iSeries server if you have not already
done so. If you have multiple LPARs on your iSeries, create a connection to each LPAR.
2. Click the iSeries server or LPAR name to expand the list of options. iSeries Navigator will
probably prompt you for your iSeries user ID and password at this point.
3. Click Network.
4. Click Servers.
5. Click Domino.
6. You will see a list of your Domino servers in the right hand pane of iSeries Navigator as
shown in Figure 1-2.
8. Select the task you want to perform, such as starting or stopping a Domino server, viewing
the Domino server Properties or selecting the Server Administration option to open the
Domino 6 Administrator client.
Here are the steps to display the BRMS features in iSeries Navigator:
1. Open iSeries Navigator. Create a connection to your iSeries server if you have not already
done so. If you have multiple LPARs on your iSeries, create a connection to each LPAR.
2. Click the iSeries server or LPAR name to expand the list of options. iSeries Navigator will
probably prompt you for your iSeries user ID and password at this point.
3. Click Backup, Recovery and Media Services.
4. The list of BRMS features is displayed in the right hand pane of iSeries Navigator. You
also see a list of BRMS tasks in the bottom right hand side of iSeries Navigator that you
can execute with a single mouse click, as shown in Figure 1-4.
5. Click the feature or task you want to perform. Additional prompts for each task are
displayed before executing a function.
Selection or command
===>_____________________________________________________________________________
__________________________________________________________________________________
F3=Exit F4=Prompt F9=Retrieve F12=Cancel
F13=Information Assistant F16=AS/400 main menu
Figure 1-5 Example of a 5250 emulation session menu for Domino administrators
We recommend that all administrators learn the OS/400 commands needed to manage a
Domino for iSeries environment. Entering the commands manually is usually much faster
than using a menu system.
You can request a list of OS/400 commands specific for Domino by typing the following
command on the 5250 emulation screen command line:
GO CMDDOM
You can execute options from the Domino Commands menu, as shown in Figure 1-6.
Commands
1. Add Domino Application ADDDOMAPP
Selection or command
===>
Attention: Using a mapped drive or the drag-and-drop feature of iSeries Navigator could
possibly cause issues with OS/400 object ownership. Verify that the object is still owned by
the QNOTES user profile after you copy or move a file. Do this either by executing the
command WRKLNK, then select option 9 in a 5250 emulation session or by right-clicking
the file in iSeries Navigator and selecting the file’s properties.
Note: Though much of the Domino 6 documentation says you can enable IPv6 support
for SMTP, POP3, IMAP, LDAP and HTTP services, IPv6 support is not available for
Domino for iSeries as of 6.0.2 CF1. Lotus plans to implement this feature in a future
Domino 6 release. Refer to the iSeries section of the Domino 6.0.2 CF1 Release Notes
for more information.
PPPoE: Remote access services is introducing PPP over Ethernet (PPPoE) with this
release. You can now support a PPPoE connection to your ISP through your iSeries
server.
Virtual IP address support: In the event of an adapter failover you can now use proxy
Address Resolution Protocol (ARP), along with virtual IP, to provide seamless availability
to clients.
The V5R2 implementation of VIPA incorporates the ability to do proxy ARP for a Virtual IP
Address. Proxy ARP allows for the iSeries to respond to ARP requests for the Virtual IP
Address. This simplifies fault tolerance, especially for locally attached LAN devices as the
configuration of indirect routes in the local LAN attached hosts is no longer necessary. The
proxy ARP for VIPA allows local LAN hosts to see the virtual IP addresses.
When configuring your iSeries for Domino 6, the primary advantage that is gained by setting
up VIPA is the added failover capability, which would be invisible to Domino. By configuring
Domino for iSeries server(s) to use a virtual IP address, rather than a static IP address, your
Domino server(s) continue to function properly as long as one of the physical interfaces
associated with the virtual IP address stays active. The IP routing tables adjust seamlessly to
route IP traffic to a different physical adapter in the event that an interface fails for some
reason. To some extent, load balancing can also be achieved with VIPA, but we feel that
using Domino clustering is a much more practical solution.
In general, we recommend implementing Domino clustering for load balancing and failover
functionality instead of VIPA as a best practice. While there are no known problems running
Domino for iSeries using VIPA when correctly configured, it is not commonly used.
Resources
Here is a list of resources for configuring TCP/IP for Domino and iSeries:
For step by step instructions, refer to Section 2.3 in IBM Lotus Domino 6 for iSeries
Implementation, SG24-6592 available for download at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/sg246592.html?Open
For general information about configuring TCP/IP for Domino servers, refer to the
Domino 6 Administrator Help topic “Planning the TCP/IP network”.
For information about virtual IP and PPPoE on the iSeries, refer to iSeries IP Networks:
Dynamic!, SG24-6718 available at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/SG246718.html?Open
For specific information about TCP/IP in V5R2, refer to the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Learn the basics of TCP/IP and an overview of the latest developments in the world of
TCP/IP and the Internet from the redbook TCP/IP Tutorial and Technical Overview,
GG24-3376 at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/gg243376.html?Open
All You Need to Know When Migrating from IBM Firewall for AS/400, SG24-6152 at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/SG246152.html?Open
Resources
The following is a list of resources related to Domino Web functionality:
Building Web applications in Domino 6: Web site rules by John Chamberlain
http://www.lotus.com/ldd/today.nsf/f01245ebfc115aaf8525661a006b86b9/b86a878b9ae5ee0d
85256ad8000813a6?OpenDocument
The document entitled “OS/400 Ethernet - 100 Mbps (FC2838 / FC2849), 1 Gigabit
(FC2760 / FC5701 STP or UTP), or 1 Gigabit (FC2843 or FC5700 Fiber), and Full Duplex
(CRTLINETH, CHGLINETH)” contains recent information on the adapters and configurations
supported on the iSeries. Refer to the article on the iSeries and AS/400 Technical Support
Web site at:
http://www.ibm.com/support/docview.wss?rs=203&q=duplex+iSeries+auto&uid=nas1990a2cc52f1f
b76186256665004727bf&loc=en_US&cs=utf-8&lang=en
You can also refer to the iSeries: Networking Ethernet on iSeries 400 book for detailed
information about understanding, configuring, managing, tuning, and troubleshooting
Ethernet support on the iSeries. The book is available at:
http://www.ibm.com/support/docview.wss?uid=nas1990a2cc52f1fb76186256665004727bf&aid=1
Whatever structure you choose, you need to develop a set of security documentation for your
organization if they are not already in place.
There are four basic types of security documents needed for any security implementation:
Policies are the driving documents for the business. These are typically high level
statements about the security needs of the business. Your organization probably already
has policy documents for the organization as a whole. You build and, if necessary, expand
on these to develop the security policies for your Domino and iSeries environments.
Guidelines provide overall guidance on how to support and maintain security in the
enterprise.
Standards are established rules on what will and will not happen in an enterprise. Audits
may cover all four types of documents, but the auditor will really focus on the standards set
down by a company. Standards typically cover things like minimum password strength,
password expiration intervals, server operating systems and physical environments,
Internet and dial-in access controls, background checks for administrators, and auditing
requirements.
The Domino and iSeries security teams are responsible for initial direction, feedback, and
auditing of these documents. The team must include representatives from each department
within the enterprise. With this approach, the security documents created will meet the needs
of the entire company. This has the added benefit of creating buy-in from the participating
departments.
Bearing in mind that your organization’s needs may differ, of course, here is a list of
recommended roles and guidelines for OS/400 access:
Senior iSeries server administrators (SrAdmin):
– QSECOFR access to the iSeries and OS/400 features and security
Junior iSeries server administrators (JrAdmin):
– All object access (*ALLOBJ)
– Security administration (*SECADM)
Domino software installation/configuration (DomSoftInst):
– All object access (*ALLOBJ)
– Security administration (*SECADM)
– System configuration (*IOSYSCFG)
– Job control (*JOBCTL)
Domino senior administrators (DomSrAdmin):
– All object access (*ALLOBJ)
– Security administration (*SECADM)
– Job control (*JOBCTL)
– Access to start and end Domino servers
– Access to check PTF and software installation information
Domino junior administrators (DomJrAdmin):
– Access to run display type commands for the Domino servers
– Job control (*JOBCTL)
Management reporting access (MgtRepAcc):
– Grants reader access to the library and database tables that contain the Collection
Services data, if you use this feature of Domino 6 and V5R2.
Administrator access
You can define several levels of Domino administration for your organization, depending on
the access required to various administration resources. Create a group for each role, then
set the administration access for these roles in the Domino server document. For example,
your organization might have the following roles or some combination of these roles:
Full Access Administrators:
Domino 6 introduced the Full Access Administration feature that replaces the need to run
a Lotus Notes client locally on a server. It resolves access control problems -- for example,
such as those caused when the only managers of a database ACL have left an
organization.
We highly recommend using this feature only as needed. If you have an issue that
requires the Full Access Administration feature, grant the access temporarily, fix the issue,
then remove the access.
We recommend creating an ID file for each user that requires the Full Access
Administration feature using a special OU with a naming convention like John
Doe/FullAccessAdmin/YourDomain. Each administrator must use the FullAccessAdmin ID
file and enable the Full Access Administration option in the Domino 6 Administrator client
to gain this level of access.
We also recommend that you audit how the full access administrator access privilege is
used:
– Configure the Event Handler to send notification through EVENTS4.NSF when full
access administration privileges are invoked.
– Any database activity performed by an administrator using full access administrator
access is recorded in the database activity log, under Database Properties. Monitor
this log on important databases such as your Domino Directory.
Administrators:
Assign this level to senior level administrators who manage servers, databases and
operating system level settings.
Database administrators:
Assign this level to mid level administrators who don’t need Manager access to databases
or authority to run operating system level commands.
Full remote console administrators:
Assign this level to database administrators, view-only administrators, and systems
administrators who may use the remote console to issue commands.
View-only administrators:
Assign this level to administrators who can use the remote console to issue only those
commands that provide system status information, but not commands that affect the
server’s operation.
System administrators:
Assign this level to administrators who can issue any operating system level command
based on their security level to the operating system.
Note: Refer to the topic “Restricting administrator access” in the Domino 6 Administrator
Help for a complete description of each role.
We recommend creating a group for each role, then enter the group names in the server
document for each server in your environment. We also recommend creating a policy for each
role with a registration setting containing the correct group. New administrators will inherit the
correct administrator access during the Notes ID creation process.
There are two additional roles that are not specifically addressed on the Security tab on the
server document. It should be noted that these roles must have at least Editor access to the
master Domino Directory for the domain to complete their tasks.
Certificate authority administrator (CAA):
This role is for administrators who create, modify, and configure certifiers and add or
remove certification and registration authority administrators. As a best practice, designate
at least two CAAs for each certifier. You then have a backup if one leaves the organization.
Registration authority administrator:
This role is for administrators who register Notes users and Domino servers, approve or
deny Internet certificate requests, and, if necessary, revoke Internet certificates.
Important: We recommend that you thoroughly test the certification authority feature in
Domino 6 before implementing it in your production environment. There are several
steps required to set up this feature. It is also recommended that you understand the
differences between using the certification authority and the standard method for
registering Notes users and servers. Refer to the topic “Administering a Domino CA” in
the Domino 6 Administrator Help for more information.
Digital signatures
Digital signatures assure a reader that the writer's identity is genuine and that information has
not changed since the user saved the document. A digital signature includes the user's
hierarchical name, the name of the certifier of the User ID, and the date the document was
saved.
Database ACLs
Every Domino database has an ACL that specifies the level of access that users and servers
have to that database. Access levels assigned to users determine the tasks that they can
perform in a database, while those assigned to servers determine what information within the
database the servers can replicate.
In Lotus Domino R5, you had to e-mail your users a button with a formula command to update
the ECL on their local workstations. In Domino 6, you can enforce a consistent ECL on each
workstation assigning a policy with a security setting. See the article “Setting up Notes users”
in the Domino 6 Administrator Help for more information on specifying a default workstation
execution control list.
Smartcards
Beginning with Lotus Notes 6, you can use a Smartcard with your user ID to login to Notes,
provided you have a Smartcard reader installed on your computer. Once your user ID is
enabled for Smartcard login, you are prompted for your Smartcard Personal Identification
Number (PIN) in place of your Notes password. One of the major differences between
The advantage of using a Smartcard with Notes is that you use a Smartcard to lock your
user ID. Without a Smartcard, you only need your user ID and your Notes password to access
Notes. When using a Smartcard, you need your user ID, your Smartcard, and your Smartcard
PIN to access Notes. Also, because you carry your Smartcard with you (just as you would
carry a credit card with you), you are much less vulnerable to user ID theft.
Refer to the following resources for more information about using Smartcards with Lotus
Notes and Domino 6:
“Password-protection for Notes and Domino IDs” topic in the Domino 6 Administrator Help
“Lotus Notes and Domino 6 Security Standards” article at the following Web site:
http://www.lotus.com/products/rnext.nsf/0/a2685e8c2814040f85256ae900775c9c?OpenDocum
ent
"Fewer name variations" is the default, and recommended, setting for Domino 6 servers.
Please remember that if you use an Internet site document to configure one Internet protocol
on a server, you must also use Internet site documents for all Internet protocols on that
server. For example, you cannot set up an LDAP Internet Site document and, on the same
server, use the Server document to configure HTTP.
Here are our recommendations for configuring the addressing of Web sites for proper
operation and greatest security:
Use DNS host names wherever possible to identify your Web sites. Note that the host
name field allows multiple values to handle the case where a Web site has a number of
host name aliases.
Use an IP address to identify a site only if it is explicitly required. There are only two
common cases where an IP address is required:
– If a site supports SSL
Resources
Here is a list of resources related to Internet client authentication:
Chapter 42, “Setting Up Name-and-Password and Anonymous Access to Domino
Servers” in Administering the Domino System, Volume 2
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
Refer to the topic “Controlling the level of authentication for Internet clients” in the
Domino 6 Administrator Help for more information about Internet authentication.
Refer the topic “Internet Site documents” in Domino 6 Administrator Help for more
information about configuring Internet Site documents.
developerWorks : Lotus LDD Today article “A tutorial on Web site addressing” by John
Chamberlain at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/8f68a440f2182b1e
88256a9a005d40da?OpenDocument
This section also lists additional resources about national language support and globalization
for Domino 6 and the iSeries.
For details on national language support, refer to 3.7, “National language support” and
Appendix B, “Additional national language support considerations” in IBM Lotus Domino 6 for
iSeries Implementation, SG24-6592.
A new feature with Domino 6 is the ability to deploy more than one language on a Domino
server or have Domino servers with differing languages through the use of a language pack
and multilingual database support. For detailed information on this type of environment, see
the Domino administration documentation or the Domino Administrator 6 Help database.
Date/time settings
Here is a list of NOTES.INI settings that affect the localization of a Domino 6 server:
Date time setting
ClockType
DateOrder
TimeSeparator
DateSeparator
If you run Domino servers with different languages, set the NOTES.INI parameter as follows:
COUNTRY_LANGUAGE= language (for example sl-SI for Slovenia)
In the case of an upgrade from Domino R5, you might need to change the locale for the
QNOTES user profile using the following command, which uses the country of Slovenia as an
example:
CHGUSRPRF USRPRF(QNOTES) LOCALE('/qsys.lib/qnotes.lib/sl_si.locale') SETJOBATR(*ccsid
*datfmt *datsep *decfmt *srtseq *timsep)
The *srtseq parameter sets the sorting sequence for your Domino server.
Again, more information on setting these NOTES.INI parameters and changing the locale
settings for a user can be found in Appendix B, “Additional national language support
considerations” of the redbook IBM Lotus Domino 6 for iSeries Implementation, SG24-6592.
1.6.5 Resources
Here are some other references for your convenience:
Section 3.7, “National language support” in IBM Lotus Domino 6 for iSeries
Implementation, SG24-6592
Chapter 20, ‘Using national language versions of Domino” in Installing and Managing
Domino 6 for iSeries (i400help.pdf)
Help topic “Setting up language preferences” in Domino 6 Administrator Help
Lotus Domino for iSeries FAQs at:
http://www.ibm.com/servers/eserver/iseries/domino/faqs/pack.htm
Technote 1112457, “Change in Notes/Domino EMEA Language Delivery Plan Starting in
5.0.12” at:
http://www.ibm.com/support/docview.wss?rs=0&q=localization&uid=swg21112457&loc=en_US
&cs=utf-8&cc=us&lang=en
Article: “What's New with Domino 6 and V5R2” by Dan Hill available at:
http://www.ibm.com/servers/enable/site/domino/v5r2/v5r2.pdf
Section 12.3.1, “Language differentiation” in Upgrading to Lotus Notes and Domino,
SG24-6889
Globalizing your e-business Web site at:
http://www.ibm.com/software/globalization/software/lotus.jsp
Section entitled “Adding an alternate language and name to a user ID” starting on page
5-38 in Administering the Domino System, Volume 1.
Avg. # of Avg.
# processors & Notes Client/ Avg. mail Classification of
Server Location primeshift registered Concurrent # of Apps
MHZ HTTP/ Outlook file size applications
CPU users users
DOMCHIM01 Chicago 2 way -450MHZ 5% CPU 750 Notes Client 35% 120MB 50 Simple workflow
(500MB)
DOMCHIM02 Chicago 2 way -400MHZ 10% CPU 540 Outlook Clients 35% 100MB mail
DOMCHIH01 Chicago 4 way 500MHZ 10% CPU --- --- --- --- --- Domino mail routing &
rep
DOMRocAP01 Rockford 1 way 450MHZ 25% CPU 400 Notes Clients 15% --- 250 Simple workflow
(1.5GB)
DOMDAYAP01 Dayton 2 way 500MHZ 15% CPU 200 Browsers 15% --- 10 Salesforce automation
(DB2 integration)
(2GB)
DOMDAYIM01 Dayton 4 way 500MHZ 10% CPU 1290 --- 20% --- --- Lotus Instant
Messaging (Sametime
Chat) server
Firewall Chicago 1 way 500 MHZ 5% CPU --- --- ---
2.2.1 Getting the most out of your Domino Directory on Domino 6 for iSeries
This section contains some updates that are specific to Domino 6 and the iSeries platform
and some tips and tricks you can use in your environment.
View logging should not be used for every view since there is some performance cost, though
minimal, associated with view logging. The guideline is to only enable view logging where a
real benefit would be realized from doing so. For more information this topic, refer to the LDD
Today article “Assessing the impacts of new transaction logging features” by Jim Powers at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/c7632f2b5dbbd2658525
6b9d0072b9fb?OpenDocument&Highlight=0,view,logging
Use Domino Designer to enable view logging. In Designer, open a view or folder, select the
Advanced tab, and check “Logging - Include updates in transaction log” at the bottom of the
panel as shown in Figure 2-2. You must enable view logging on a view by view basis.
Note: If you enable view logging in a template, all databases created from that template
and all databases whose designs are replaced from that template have those views
logged.
View logging for the $Users and $ServerAccess views in your Domino Directory is set by
default in the Domino Directory template (pubnames.ntf). This enables users to have access
to a server sooner after a server recovery than if the view was not view logged.
Please be aware that customized templates are neither certified nor supported. Standard
practice for Lotus Support for customers who open incidents resulting from a customized
template will be to instruct the customer to revert back to the stock template and see if the
problem still occurs. If it does, Lotus Support will troubleshoot the problem as it exists in the
stock template (in other words they will not troubleshoot the customized template). If the
problem does not exist in the stock template, Lotus Support shall recommend the customer to
remove the modifications and submit an enhancement request of the desired functionality for
the next release.
Domino and Notes offer these LDAP features in addition to the LDAP service:
Lotus Notes client support for LDAP. For more information, see the Notes 6 Help.
A command-line utility called ldapsearch, for searching LDAP directories
Migration tools that use LDAP to import entries from another LDAP directory and register
the entries in Domino
LDAP C API Toolkit
Tip: The administration server for your Domino Directory automatically runs the LDAP
server task and manages the LDAP schema for the entire domain in Domino 6. You need
to be aware of this if you want to run LDAP on Domino servers other than the
administration server. See the Lotus Domino Administrator 6 Help article entitled “The
LDAP Service” for more information.
2.3 ID management
Domino uses ID files to identify users and to control access to servers. Every Domino server,
Notes certifier, and Notes user must have an ID. When you register users and servers,
Domino can automatically create their IDs. While the overall process for creating, managing
and recovering Notes IDs has not changed dramatically in the past few years, the tools and
features available greatly improved.
This section describes the new features regarding creation, management and recovering
Notes ID files in Domino 6 for iSeries. It also identifies several additional resources for your
convenience.
User IDs
We recommend using [lastname + first initial].id for naming user ID files, where the middle
initial is added for unique naming and the last name is contained to the first 7 characters. The
user ID file for John Smithson, for example, is smithsoj.id using this standard.
Server IDs
We recommend using [server name].ID for naming server ID files. The server ID file for the
DOMCHIM01 server is domchim01.id using this standard.
The Advanced registration option offers all the settings included in Basic registration and also
allows you to change default settings and apply advanced settings to users.
This method does not create an OS/400 user profile for the Domino user.
The most notable change is the “Use the CA process” feature when registering a new user.
This option enables you to specify a certifier without having access to the certifier ID file or
certifier password. See the Domino 6 Administrator Help for more information.
We recommend using these new features if you need them in your environment:
Create mail file replicas on all the Domino servers in a cluster.
Assign an explicit policy.
Assign an appropriate password quality based on your organization’s standards.
Set the user’s Internet password and synch it to their Notes password.
Set mail file owner access to a maximum of Editor.
Set the location to store the ID file: In Domino Directory, in File and/or in mail file.
Storing the Notes ID file in all three locations is sometimes required for business reasons,
though it is not recommended because this practice can greatly complicate your support
procedures.
Supply roaming user settings if your organization decides to implement this feature.
Refer to the Domino 6 Administrator Help article “Using Advanced Notes user registration
with the Domino Administrator” for complete information.
You can use the User Registration feature in the Domino 6 Administrator client to create user
accounts that do not require a Notes ID. The Domino 5 Administrator client required you to
create a Notes ID for every user you created with that tool. To disable the automatic creation
of a Notes ID, uncheck the Create a Notes ID for this person field on the Basics tab.
This method does not create an OS/400 user profile for the Domino user.
iSeries Navigator
From an administrator workstation connected to the iSeries, you can use iSeries Navigator to
create an OS/400 user profile and register the user for Domino at the same time. You can also
use this method to register an existing iSeries user as a Domino user. The workstation used
for this needs a Lotus Notes client connection to the iSeries and an iSeries Access for
Windows connection to the iSeries server. The Other tab on the Domino Registration tab
allows you to specify where to save the user’s ID file.
Tip: To create an OS/400 user profile, your Domino administrator’s OS/400 user profile
must have at least *SECADM special authority. Please remember that you do not have to
create an OS/400 user profile for every Domino user. Create an OS/400 user profile only
for Domino users requiring access to the iSeries via tools such as iSeries Access for
Windows or iSeries Navigator.
Tip: We recommend that you keep the new “in mail file” option in mind when creating your
strategy for managing Notes ID files and for supporting user issues with lost IDs or
forgotten passwords.
Storing ID files
Storing and securing Notes ID files can be tedious, but there are several best practices
options depending on the size of your organization, administration resources and business
requirements.
Here are some options for storing and securing Notes ID files for Domino administrators:
Store a copy of the most recent ID file with the known password on a secured LAN drive.
Users retain the current name, certificates and encryption keys associated with the ID
when you restore their ID files using this option.
We recommend that you exercise great care in sending a Notes ID and password to a user.
The file contains the user’s identity in your Domino environment. Prevent unauthorized use of
the Notes ID by using a consistent, secure procedure, for example, sending the Notes ID and
password to the user’s manager.
We recommend that your organization designates several administrators who will act as a
group to recover IDs and passwords. We recommend having two or more administrators work
together to recover ID files instead of a single administrator. Designating a group of
administrators helps to prevent a breach of security by one administrator who has access to
all ID files. You can specify that only a subset of the group be present during the actual ID
recovery.
Before you can recover ID files, an administrator who has access to the certifier ID file must
specify recovery information, and the ID files themselves must be made recoverable. You can
set up ID recovery for user IDs at any time. If you do so before you register users, ID recovery
information is automatically added to user IDs the first time that users authenticate with their
home servers. If you set up ID recovery information after you have registered Notes users,
recovery information is automatically added to the user IDs the next time users authenticate
with their home servers.
Caution: If your users will be enabling Smartcards to use with their Notes IDs, set up ID
recovery information for these IDs before any Internet keys are pushed onto the
Smartcard. Otherwise, the ID file recovery process will not be able to restore those keys.
We mention the roaming user feature in this section because it can add another level of
complexity to managing ID files in your Domino 6 environment. The ID file can be stored on
the roaming user server or in the user’s Personal Address Book. Please be aware of this
issue when resolving ID file issues for roaming users.
Password verification
You can enable password verification so that a Notes user can authenticate with a server only
after providing the correct password that is associated with the user ID in the Person
document. If an unauthorized user obtains an ID and learns the ID's password, the owner of
the ID can use password verification to change the password and prevent the unauthorized
user from continuing to use the ID to authenticate with servers.
Password verification is also used in conjunction with security policy settings to enforce an
organization’s password expiration and password quality policies. Domino 6 provides
features such as change/grace intervals and expiration intervals.
Restriction: You must disable password checking, change/grace intervals and expiration
in the user's Person document for Notes users set up to use Smartcards. Otherwise,
Smartcard users will eventually be locked out.
Refer to the Domino 6 Administrator Help topic “Verifying user passwords during
authentication” for more information.
Refer to the Domino 6 Administrator Help topic “Creating a security policy settings document”
for more information.
By not limiting and controlling the current mail environment through implementation of a mail
retention policy, you are at risk of experiencing the following difficulties:
Significant impacts to system performance and administration.
Significant redundancy of data and duplication of storage requirements, resulting in higher
hardware and administration costs (higher total cost of ownership (TCO)).
Losing critical intellectual capital to the organization by managing valuable information to
the business in individual mail files. Data is lost to the organization as users delete mail or
leave the organization.
Inefficient sharing of intellectual capital. Critical business information is not available to
others who may require this information – current intellectual capital is only accessible by
individuals in their own mail file.
Mail retention policies typically address one or both of the following situations:
Preserving key corporate data for an appropriate length of time.
Deleting data that has outlived its usefulness and that is taking up needed disk storage
space.
When the policy is aimed at keeping disk consumption to a minimum, often an automated tool
is employed to enforce the policy, since users typically do not clean up old mail on their own.
This tool may operate on criteria such as document age, document size, content (for example,
no MP3 attachments allowed), document type, or overall mail file size. In addition, alternative
document management mechanisms are typically provided for storage of critical information
that should be made available to the organization as a whole.
Record Categorization
Mail Files
Data
Data
Document Mgt
System Sync Mail Quota
(for example Engine Enforcement
Domino.Doc) Data
Data
Data
Retention Conditions
Database
User Community
Archiving mail
The objective is to separate the active mail from the old mail. This requires the use of two mail
files. The active mail file should be small in size, so it can more easily be managed and so the
indexer does not take much resource every time new mail is delivered. The archive mail file
should only be accessed whenever an old e-mail needs to be retrieved. This means that you
will see low user activity on this mail file. As this mail file does not require immediate updates,
the load of the indexer is limited as well.
Tip: Archiving the active mail file to an archive mail file on the same server is not
recommended. Though the archive mail file does not take up as many resources as the
active mail file, maintaining the indexes and doing full text searches by the user still require
server resources. We suggest putting the archive mail file on a server dedicated for mail
archiving or archiving mail on the local workstation.
The most important question to ask is, which messages should be moved to the archive file,
and which should not. To keep things simple, on the active mailbox you can set a cutoff date,
for example, 60 days. You can then have a replica of the mail file on a Domino server which is
dedicated to storing archiving mail files, or you can let the user store the archive mail file on
the local hard drive. In the latter case, backup of the archive becomes more tedious. For this
reason, this section assumes that you are placing the archive on a dedicated Domino server.
The mail file stored on this server does not have a cutoff date set. Because deletions that are
made by a cutoff date do not replicate, they are not removed from the archive file.
The replication schedule between the mail server and the archive mail server (or the personal
replication schedule, in the case of a local copy) can be set to replicate only once a day, or
even less frequently. This prevents the users from only using their archive mail, because their
most recent messages will not be in there. This is why one archive mail server can service
many regular, or active mail servers. Also, if you make this a billable service, not everyone
would require this, which would lower the number of required archiving servers.
The example in Figure 2-4 sets the database quota to 50 MB and the warning threshold to
40 MB.
In Domino 6, you have three options for the action taken when a quota is exceeded:
Deliver anyway (don’t obey quotas): Mail will be delivered to the user’s mail file
regardless of the mail file size.
Non-deliver to originator: Messages are returned to the sender with a delivery failure
notification. The notification states that the recipients mail file has exceeded the quota.
Hold mail and retry: The Router temporarily holds incoming messages in MAIL.BOX until
space is available in the mail file. Messages that cannot be delivered before the
configured expiration time (default =1 day) are returned to the sender as undeliverable.
You can specify how the server handles held messages.
We recognize from our experience in real world situations that there are exceptions to every
rule, especially mail database quotas. The policy-based management feature in Domino 6
offers more flexibility for setting and enforcing mail database quotas than in previous Domino
releases. We recommend creating mail database policy settings for each type of user in your
organization. For example, executives, knowledge workers, graphics designers, and
administrative support staff have different business requirements for mail file size. If you can’t
create settings and policies to address the specific needs of your users, consider the options
below or a combination of options to accomplish the best practice of managing mail file size.
Handling attachments
The main reason that mail files grow so large is the use of attachments. Even though e-mail is
not designed to be a file transfer system, it is often used as such. This does not need to be a
problem. However, users often do not detach the files from their messages once they have
received them. This leads to large mail files and also larger messages when the “reply with
history” button is used.
The most effective way to address this issue is to train users to not include attachments on
their reply e-mails, by using one of the following menu options or buttons:
Actions -> Reply -> Reply without Attachment(s)
Actions -> Reply to All -> Reply without Attachment(s)
Reply -> Reply without Attachment(s)
Reply to All -> Reply without Attachment(s)
Some organizations use custom agents to remove attachments from e-mails in a mail file.
There are many possibilities for this solution, including deleting all attachments from e-mails,
saving attachments locally and deleting, and deleting all e-mails with attachments. If your
organization pursues this option, consider writing the application outside of the mail file so
you do not have to modify your standard mail template.
After you enable shared mail on a server, all mail databases on the server automatically use
the shared mail database to store the content of new messages, unless you explicitly exclude
a database from using shared mail. You do not need to configure each user's mail file
individually for shared mail use. You can refer to the Domino 6 Administrator Help topic
“Shared Mail Overview” for more information on this feature. However, this feature is not
widely used because it adds an additional level of complexity to your environment.
Tip: The value after the word “and” is a computed field equal to the Maximum message
size. If you still see a zero after the “and”, press <F9> to recalculate the value.
On the Router/SMTP -> Restrictions and Controls -> Transfer Controls tab, you can set
times at which low priority messages should be routed. The example in Figure 2-6 shows
that low priority messages will be routed between 12:00 AM and 6:00 AM. We also
recommend changing the value of the Low priority delay notification field to “Only if priority
changed for policy reasons”. The sender then receives a notification that the Domino
server changed the e-mail to low priority because of a policy put in place by the Domino
administrators.
There is a mail rule in Domino 6 that detects e-mails being sent to a large number of
users. You can setup this mail rule in the server configuration document on the
Router/SMTP -> Restrictions and Controls -> Rules tab. With the server configuration
document in Edit mode, click the New Rule... button. Figure 2-7 shows an example of a
rule that changes the routing state of an e-mail to held if it is sent to more than 50
recipients.
Figure 2-7 Example of a mail rule for e-mails with more than 50 recipients
Tip: Use the Domino 6 Web Administration Tool if you prefer to view the above information
in a graphic representation.
FIXUP
If a corrupted database is in Domino 6 format and you are not using transaction logging, you
can use the FIXUP task to repair it. If the database is in Domino 6 format and you are using
transaction logging, you must use the -J option with the FIXUP task to repair the corrupted
database, then back up the database immediately afterwards, since the database instance ID
(DBIID) has changed. In Domino 6, you will receive the following message if you try to run
FIXUP on a logged database without the -J option:
Recovery Manager: Preserving backups by skipping fixup of logged DB without -j switch,
DB=/LOTUS/DATA/DOMBRMS/admin4.nsf
COMPACT
When documents and attachments are deleted from a database, Domino tries to reuse the
unused space, rather than immediately reducing the file size. Sometimes Domino is not able
Tip: Domino does not automatically maintain the Web server log files generated by the
HTTP task. You need to remove the files as part of the weekly maintenance tasks.
Tip: We recommend that you monitor for NSD objects in your environment. This is
especially important on the iSeries because Domino servers usually restart automatically
after a crash. Refer to “Domino server crashes” on page 581 for more information.
Get approval for each change and any system outages required for it
We recommend getting management approval for each change. Management usually likes to
know if their phone might ring because of a system change or outage. Verify that a system
outage, if required, does not disrupt crucial business functions like monthly or quarterly close
for the accounting department or deadlines for the sales department. You want the outage to
negatively affect as few users as possible. We recommend making changes during regularly
scheduled outages when possible. Use caution in making too many changes at one time.
Since you planned and tested this change, hopefully you will not have any issues. That is a
nice thought, but issues may arise. If the change failed or did not work as expected, execute
the backout plan you documented in the change request form. Verify that your server(s) work
as expected after rolling back the change. Document the issue or issues you encountered.
Use this information to improve your planning for future change request documents.
Tip: Many companies use a simple Lotus Notes database to document and track change
requests. You can also use the workflow features of Lotus Notes to automate the approval
process.
Refer to the Domino 6 Administrator Help topic “Setting Domino Administration preferences”
for more information.
4. Click Send.
You can also create server groups that you can use for sending commands instead of
selecting the servers individually each time. See the Domino 6 Administrator Help topic
entitled “Sending commands from the Domino Administrator console” for more information.
We recommend creating server groups by function, for example MailServers or HubServers,
to take full advantage of this feature.
Tip: If you require a 5250 workstation emulation session on a platform other than
Windows, you might consider the emulation products described on the following Web sites:
http://www.businesslink.com
http://www.mochasoft.dk
http://www.pericom-usa.com
http://www.modernminds.com
To start a Domino server in iSeries Navigator, use the context menu (right mouse click) as
shown in Figure 2-9.
This command stops all the Domino servers on your iSeries or LPAR in a controlled manner:
ENDDOMSVR *ALL
You can also end a Domino server immediately using the *IMMED option. You should end the
Domino server immediately only if the controlled shutdown fails. Data can be lost if Domino
server processes are stopped abruptly.
You can end or stop a Domino server using iSeries Navigator. See Figure 2-10 for an
example of stopping a Domino server.
Notice that you can stop the Domino server without stopping the server controller. There are
times that you might want to work on the Domino server using the new Java Domino Console
instead of a 5250 workstation emulation session. Usually you will stop both the Domino
server and the controller at the same time.
Enter this command in a 5250 emulation session and press the Enter key:
WRKDOMCSL servername
Note: WRKDOMCSL may only be done by one person at a time from an OS/400
command line.
There is no corresponding command for WRKDOMCSL in iSeries Navigator. Instead, you will
open the Domino 6 Administrator client to the server you selected in iSeries Navigator and
use the Administrator client console. Right-click a Domino server, then select Properties.
You can also start the Domino Console Java application from iSeries Navigator, connect to
the desired server, then submit commands to a Domino server. To start the Domino Console
from iSeries Navigator, select File -> Start -> Domino Console.
Like the WRKDOMCSL command, there is no corresponding command that works the same
way as DSPDOMCSL in iSeries Navigator, but you can again use the Administrator client’s
console function. To do so, select Properties from a server’s context menu. You can also use
the Domino Console Java application to display a Domino server console.
Enter this command in a 5250 workstation emulation session and press the Enter key to see
all Domino servers configured on your iSeries or LPAR:
WRKDOMSVR
Enter the following command and press the Enter key to work with a specific Domino server:
WRKDOMSVR servername
Domino Domino
Opt Server Subsystem Status
___ PROJECTS PROJECTS *ENDED
___ DOMAV DOMAV *STARTED
___ DOMBRMS DOMBRMS *STARTED
___ DOMCLUS2 DOMCLUS2 *STARTED
___ DOMTDP DOMINO05 *ENDED
___ DOMREST DOMREST *STARTED
Bottom
Parameters or command
===>___________________________________________________________________________
F3=Exit F4=Prompt F5=Refresh F9=Retrieve F10=Sort by name
F11=Display library F12=Cancel F17=Top F18=Bottom F24=More keys
The Domino server list in iSeries Navigator is the equivalent to the WRKDOMSVR command.
You can perform most of the same options from iSeries Navigator using the File menu and
the context menu. Figure 2-12 shows an example of using the context menu to work with
Domino servers in iSeries Navigator.
Enter this command and press the Enter key to see all the active jobs for your iSeries or
current LPAR:
WRKACTJOB
Enter this command and press the Enter key to work with the active jobs for a specific
subsystem:
WRKACTJOB subsystem_name
Figure 2-13 shows all the active jobs for the DOMAV subsystem. You can press the F10 key
to see the system statistics for the entire system, for example the CPU % in the upper left
hand corner of the screen and the CPU % used by each of the jobs in the DOMAV
subsystem. This display is especially helpful when you troubleshoot spikes in CPU usage.
You can determine what job is the root of the problem. More information on troubleshooting
Domino performance issues and the WRKACTJOB display can be found in Appendix B,
“Information to collect for Domino troubleshooting” on page 573 and Appendix C, “Common
configuration problems that affect Domino performance” on page 589.
Here are the steps to display and work with active jobs in iSeries Navigator:
1. Open iSeries Navigator. Create a connection to your iSeries server if you have not already
done so. If you have multiple LPARs on your iSeries, create a connection to each partition.
2. Click the iSeries server or LPAR name to expand the list of options. iSeries Navigator will
probably prompt you for your iSeries user ID and password at this point.
After displaying the active jobs in the right hand pane of the iSeries Navigator window, you
can right-click one of the jobs for options such as hold, monitor, and show details about the
job. As an example, please see the options for the AMGR job in Figure 2-14. You can also
click any of the Work Management tasks in the bottom right pane of iSeries Navigator to
execute tasks such as monitor system performance, view system status, and monitor jobs.
Double-clicking on a job displays its properties. Figure 2-15 on page 79 shows an example of
the job properties window for the Adminp job under the DOMAV subsystem. As a Domino
administrator, you will usually not work with these properties. An experienced iSeries
administrator can change job properties here, but the changes are only valid until the next
time you restart the job, subsystem, or LPAR. It does not change the default settings for the
job.
Enter the following command and press the Enter key to work with all subsystems on your
iSeries system or partition:
WRKSBS
Enter the following command and press the Enter key to work with one specific subsystem:
WRKSBS subsystem_name
Figure 2-18 on page 82 shows an example of the screen that displays when you use the
WRKSBS command. Notice the options available at the top of the screen.
Here are the steps to display and work with active subsystems in iSeries Navigator:
1. Open iSeries Navigator. Create a connection to your iSeries server if you have not already
done so. If you have multiple LPARs on your iSeries, create a connection to each partition.
2. Click the iSeries server or LPAR name to expand the list of options. iSeries Navigator will
probably prompt you for your iSeries user ID and password at this point.
3. Click Work Management.
4. Click Subsystems.
5. Click Active Subsystems.
After displaying the active subsystems, you can double-click a subsystem to display the jobs
running under that subsystem. Figure 2-17 shows all of the jobs running in the DOMAV
subsystem. You can right-click one of the jobs for options such as hold, monitor, and details
about the job. You can also click any of the Work Management tasks in the bottom right pane
of iSeries Navigator to execute tasks such as monitor system performance, view system, and
monitor jobs.
End a subsystem
The Domino server subsystem is not ended when you end your Domino server controlled
(with the *CNTRLD option), so you must end the Domino server subsystem manually when
you run maintenance tasks or when you upgrade your Domino server program version.
If you end the Domino server immediately (with the *IMMED option), the subsystem is also
ended.
Important: Do not end the Domino server subsystem using the End Subsystem
(ENDSBS) command while the Domino server is still active! Always end the Domino server
before you end the Domino server subsystem, or data can be lost.
To end a subsystem after ending the corresponding Domino server, type the following
command, then press Enter.
ENDSBS subsystem_name
To end the subsystem named domperf, for example, type in the following command, then
press Enter:
ENDSBS domperf
The Stop Subsystem window shown in Figure 2-19 is displayed. You can usually accept the
default options by clicking OK. We recommend using the *IMMED stop option only if
absolutely necessary.
To edit the NOTES.INI file for a Domino server, type in the following command, then press
Enter:
EDTF path/file
For example, to edit the NOTES.INI file for the DOMAV Domino server, type in the following
command, then press Enter:
EDTF 'lotus/data/domav/notes.ini'
You have several options if you want to edit a NOTES.INI file in iSeries Navigator:
Option 1: From the Domino servers view:
a. Maneuver to the Domino server list (See “Work with Domino servers in an LPAR or
system” on page 75 for instructions.)
b. Right-click the Domino server related with the NOTES.INI file you want to edit.
c. Select Properties.
d. Select the Initialization File tab.
e. Click the Edit button.
Option 2: From the File Systems view:
a. Select the iSeries server or LPAR where your Domino server is located.
b. Click File systems.
c. Click Integrated File System.
d. Click Root.
e. Click Lotus.
f. Click Data.
g. Select the desired Domino server name, for example, DOMAV.
Note: These instructions are describing the most common subdirectory structure for
Domino. You have to use the actual directory structure for your Domino servers.
h. Find the NOTES.INI file in the list in the right hand pane and right-click it.
i. Select Edit. You might be prompted for your iSeries user ID and password at this point.
j. After changing the file, click File -> Save to save your changes. Click File -> Exit to exit
the editor.
For additional information, please refer to Appendix C, “Editing stream files in the OS/400
integrated file system (IFS)” of the redbook IBM Lotus Domino 6 for iSeries Implementation,
SG24-6592.
To run this command, type the following and press the F4 key:
CHGDOMSVR
The command execution prompts you for the name of the Domino server. You can press F4
again to see a list of Domino servers that are currently configured on your iSeries server or
partition. After entering the Domino server name and pressing Enter, the system retrieves the
current Domino server properties that are eligible to be changed by this command.
Refer to section 4.4, “CHGDOMSVR command” in the redbook IBM Lotus Domino 6 for
iSeries Implementation, SG24-6592 for more information.
The Run Domino Command (RUNDOMCMD) command runs an OS/400 CL command in the
context of a particular Domino for iSeries server. It sets up the environment that allows the
command to be run regardless of whether the Domino server is active. When the Domino
server is not active, you can run such batch processing type commands as FIXUP,
COMPACT, and UPDALL.
The RUNDOMCMD is well documented in section 5.1.6, “Running Domino tasks when the
Domino server is not active” of the redbook IBM Lotus Domino 6 for iSeries Implementation,
SG24-6592, including the authorities required to execute the command and examples of the
syntax.
The syntax for the CMD parameter is the same as what you would enter at the Domino server
console. The following command is an example of running the COMPACT task on the
ADMIN4.NSF database on the DOMAV server using the SBMDOMCMD:
SBMDOMCMD CMD('LOAD COMPACT admin4.nsf') SERVER(DOMAV)
Tip: Before you copy and paste long OS/400 commands into your 5250 workstation
emulation command line, type in CALL QCMD to get more command lines. Long
commands scroll to the additional command lines automatically, making this process much
easier.
Please be sure you understand the authorities and environment variables needed to run
SBMDOMCMD. See the section describing SBMDOMCMD starting on page 123 in Lotus
Domino for AS/400 R5 Implementation, SG24-5592 for more detailed information.
You can run the SBMDOMCMD in iSeries Navigator using the Run Command feature.
Finding the Run Command is not particularly intuitive, so follow these instructions:
1. Open iSeries Navigator.
2. Right-click the iSeries server or LPAR where you want to submit the command.
3. Select Run Command, as seen in Figure 2-20.
4. Key in SBMDOMCMD plus the Domino command you want to submit or select the
command from previously submitted commands. Figure 2-21 shows how you enter the
SBMDOMCMD for running the load compact task on the ADMIN4.NSF database on the
DOMAV server.
5. Click OK.
To check the status of SBMDOMCMD jobs run in iSeries Navigator, follow these instructions:
1. Open iSeries Navigator.
2. Click Management Central.
3. Click Task Activity.
4. Click Commands.
5. Look for entries called “Run Command” on the iSeries server or LPAR where you ran the
command. The first Run Command entry in the list shown in Figure 2-22 is the command
submitted previously (and displayed in Figure 2-21). As you can see, the status is
“Completed”. You can also see the systems or groups where the command ran.
Creating a CL program
Here’s a simple way to create a CL program without using OS/400 application development
tools such as Programming Development Manager (PDM). This method is not officially
supported, but you might find it useful in your environment. We suggest it as an alternative for
Domino administrators or iSeries administrators who do not know PDM, but still need to
create CL programs. You need to have appropriate access on the iSeries to use this method.
Please refer to Chapter 8, “Understanding the Domino server jobs” in Domino for iSeries
Sizing and Performance Tuning, SG24-5162-01 for a more thorough explanation of each job.
Also, please refer to “iSeries performance tuning for Domino” on page 172 regarding
performance tuning of these jobs.
Here are the main areas you need to address in administering LPARs on your iSeries:
Retrieving the resources allocated to a partition
Changing partition processing resources
Saving and restoring partitions
System values affected by logical partitioning
Securing considerations
Date and time processing between partitions
Main storage dump processing
Managing the hardware resource configuration
The IPL process
Work management
Resources
Please refer to the resources below for more information on these areas.
Topic: “Logical partitions” in the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm?info/rzaj9/rzaj9iclpar.htm
Slicing the AS/400 with Logical Partitioning: A How to Guide, SG24-5439 available at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG245439.html?Open
LPAR Configuration and Management: Working with IBM ^ iSeries Logical
Partitions, SG24-6251:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246251.html?Open
Benefits of clustering
These are the main benefits of Domino clusters:
High availability of important databases: When a hardware or software problem
occurs, clustered servers redirect database open requests to other servers in the cluster
to provide users with uninterrupted access to these databases. This process is called
failover. Clusters provide failover for business-critical databases and servers, including
passthru server failover to other servers in the cluster. Failover also lets you perform
server maintenance, such as hardware or software upgrades, with little negative effect on
users.
Workload balancing: When users try to access databases on heavily-used servers,
Domino can redirect the user requests to other cluster servers so that workload is evenly
distributed across the cluster. Workload balancing of cluster servers helps your system
achieve optimum performance, which leads to faster data access.
Tip: Cluster replication overrides any database quotas configured in policies or on specific
databases. Please consider this when planning or maintaining your Domino cluster
environment.
Resources
For more information on Domino clustering, refer to the following resources:
Administering Domino Clusters describes how to set up, manage, and troubleshoot
Domino clusters, and is available at this Web site:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
Section 10.2, “Clustering” in Domino for iSeries Sizing and Performance Tuning,
SG24-5162-01.
“What is a Domino Cluster?” topic in the Domino 6 Administrator Help.
IBM Lotus Team No Although a QuickPlace server can run in the same Domino
Workplace domain as a Domino 6 server, QuickPlace cannot currently
(QuickPlace) be installed on top of a Domino 6 server. QuickPlace must
be installed on a specified Release 5 version of Domino.
IBM Lotus Instant Yes Has been tested and is compatible with Domino 6 for iSeries.
Messaging and
Web Conferencing Check the Sametime for iSeries Web site for the most
(Sametime) current information about requirements. For example,
Sametime 3.1 requires Domino 6.0.2 and above.
IBM Integrated Yes Has been tested and is compatible with Domino 6 for iSeries.
Domino Fax for
iSeries, 5733-FXD
Lotus Workflow™ Yes Workflow 3.0.1 is compatible with Domino 6 for iSeries.
Domino Document Yes Has been tested and is compatible with Domino 6 for iSeries.
Manager
(Domino.Doc) Domino.Doc 3.1 with 3.5 client works with the Domino
versions 6.0 and 6.0.1. It is not compatible with Domino 6.0.2
or higher.
Lotus Enterprise Yes Has been tested and is compatible with Domino 6 for iSeries.
Integrator® (LEI) 6
for iSeries
Resources
Here is a list of the Web sites for the Lotus Extension Products mentioned in Table 2-1.
IBM Lotus Team Workplace (QuickPlace) for iSeries Web site:
http://www.ibm.com/servers/eserver/iseries/quickplace/
IBM Lotus Instant Messaging and Web Conferencing (Sametime) for iSeries Web site:
http://www.ibm.com/servers/eserver/iseries/sametime/
Poor planning and design are common causes for upgrade shortcomings. Consider these key
causes during your planning and design exercises:
Incomplete assessment and requirements gathering
Inconsistent architecture and design
Undefined migration and coexistence plan
This section lists the general steps for approaching your upgrade. We recommend that you
document each step in the process thoroughly to make the upgrade proceed as smoothly as
possible. We also include a brief discussion about interoperability issues you should
understand before starting your planning.
Notes/Domino releases
In general, the Notes/Domino products have an excellent record of accomplishment of
backwards compatibility, however, it is important to understand the specific areas that may
cause problems during a migration that extends over a lengthy period. For example when
migrating an environment that contains three major releases of the Domino server code in
use; such as 6.0, 5.x and 4.x (legacy application domain), there are several technical
considerations.
Where databases are shared between servers on different software releases, care must be
taken to ensure that when designs are upgraded on one server, they do not have a
detrimental impact on the server running the older version of the software.
From the perspective of client interoperability, calendaring and scheduling is usually the most
difficult feature to maintain during a coexistence period. Delegation of a calendar between
users can be an issue if those users are on different releases of the client. More information
on this topic is provided in “Calendaring and scheduling interoperability” on page 96.
Domino Directory
In many environments, the Domino Directory contains customizations based on particular
business and application needs. Prior to the upgrade of the directory design to Domino 6, it is
advisable that these views be removed from the design or at least consolidated where
duplicates exist. Removing unnecessary views can significantly reduce the size of the
directory and the amount of time that servers spend indexing its content.
This is especially important when a server restarts with a new version of the server software
but with data in an existing older format. The server will convert all view indexes to a new
updated format. Removing these views will have a positive impact in shortening the amount
of time that the server will require to rebuild the view indexes of the directory.
If some of the customized views are still considered necessary, they can be reproduced in the
new directory.
It is also recommended to clean up the content of the directory such that it is consistent and
accurate before migration or deployment of the new infrastructure. This will remove
unnecessary data that is no longer required and make administration and troubleshooting
much simpler. The following areas are noted as examples:
1. Server documents:
a. Ensure consistency of configurations
b. Disable unused port definitions
c. Remove duplicate named networks
d. Ensure membership in correct named networks
2. Connection documents:
a. Verify schedules and priorities
b. Ensure scheduled replication between cluster members
3. Configuration documents:
a. Server group versus individual configurations
b. Router thread count configurations
c. Consistency of configuration entries across servers with a common role
4. Program documents:
a. Verify schedules
5. Remove all redundant documents
6. Review access control groups
The Domino 6 full-text engine has been improved and like view indexes, full-text indexes will
be updated by the server on demand. An administrator can optionally replace existing full-text
indexes after the server upgrade all at once but beware that the server may take a long time
to complete this process.
Since each server has different data volumes, it is not possible to quantify the amount of time
these processes will take.
To better understand the length of time that the compact and view/full-text index rebuilds
might take, it is best to take a mirror image of the data from a fully loaded production server
(typically from a recent backup). Then test the upgrade, compact, and rebuild of all indexes in
an isolated environment. While the result will not be universally applicable across all other
servers due to variations in such things as hardware, data volume, view/full-text index
complexities, it provides a rough guideline. For example, you could create an estimate in
terms of “minutes per gigabyte of data” that could be scaled based on the data size of a given
server. It must be stressed that this is a rough estimate at best.
To reduce the potential for interoperability issues in calendaring and scheduling between
owners and delegates of calendars, the client migration benefits from knowing which users
share responsibility for calendars so that their client upgrades can be scheduled at the same
time or as closely as possible. In this respect, database usage tracking tools that show which
users access a database regularly, are very useful. Armed with this information, it is then
feasible, but more time consuming, to build a client migration schedule which specifically
targets batches of delegated users and the owners of the calendars for which they are
responsible.
Until clients are upgraded to the new release, the mail database design should not be
upgraded to minimize the risk of problems with interoperability.
If client upgrades cannot be timed to coincide closely, then it is advisable to upgrade the
delegated user (typically the administrative assistant) before the owner of the mail database.
However, if the executive is still based on a Domino 4.x server, this creates an unsupported
configuration for the administrative assistant. The best solution in this case is to move the
executive’s mail file to a Domino 6 server, whether or not you upgrade their client to Notes 6.
Design
The design step includes evaluating and documenting the following areas:
Recommended upgrade path:
a. Domino Administration client for all administrators involved in the upgrade project
b. Pre-upgrade cleanup activities
c. Domino Directory design (can be done when upgrading first administration server)
d. Domino Administration servers
e. Hub servers/SMTP servers
f. Spoke servers
• Mail servers
• Application servers
• Web servers
g. Lotus Notes clients
h. Mail template and application designs
Streamlining processes and procedures in your environment using new Domino 6 features
New standardized client design:
– Lotus Notes clients
– iNotes Web Access
– Profile considerations
– Multi-user and roaming user
Mail file retention and policies
Considering the upgrade as an opportunity for server consolidation
Global language requirements, if applicable
Third party software readiness, if applicable
Pilot
The pilot phase includes testing and piloting tasks as follows:
Set up and test the new environment as completely as possible, including the following
areas:
– Directory and core system database designs and interoperability
– Mail; calendaring and scheduling
– Resource reservations
– Critical applications
– Server interoperability, for example, routing and replication
– Sametime/QuickPlace/DEAS server interoperability
– Language packs
– Localized language client software
– Lotus Enterprise Integrator (LEI) or other connectors
– 3rd party products (for example, Antivirus solution, etc.)
– Backup/restore
After testing, pilot the environment involving a complete scenario of candidates including:
– Different types of servers
– A healthy load of users
– The support structure
– Your applications
– Globalization and time zone issues
– Clustering
– Mobile users
Note: One of the Domino R5 enhancements was the support for the compacting of
databases even when they are in use. However, databases need to have the R5 ODS
version to allow this. We assume in this step that all your Domino databases have the
R5 ODS version and that NAMES.NSF has been compacted with the server down once
(this was a special requirement for NAMES.NSF when upgrading a Domino server from
Domino 4.x).
If this is not true for your environment, then refer to section 4.11.1 of the Redbook Lotus
Domino for AS/400 R5 Implementation, SG24-5592-01 for instructions on how to
execute the SBMDOMCMD in a properly set up environment to compact Domino
databases when the server is inactive.
10.End the Domino servers on this LPAR or iSeries server in a controlled manner using the
ENDDOMSVR command:
ENDDOMSVR SERVER(*all)
11.Verify all Domino servers on the LPAR or iSeries server are stopped using the
WRKUSRJOB command. Use the DROP ALL and DBCACHE FLUSH commands on the
Domino server console, if needed, to stop user activity.
WRKUSRJOB QNOTES STATUS(*ACTIVE)
12.On your LDAP server(s), rename SCHEMA50.NTF / SCHEMA50.NSF at the OS/400 level
to OLDSCHEMA50.NTF and OLDSCHEMA50.NSF.
13.When the servers are down, back up your Domino servers:
– Save everything in the Domino data directory. Do not use SAVDOMBRM.
– Save all Domino libraries
– Save the /QIBM IFS directory and all subdirectories
14.Verify that the backups completed successfully.
15.Verify that the Domino servers start up correctly after the backups.
16.End the Domino servers again using the ENDDOMSVR command:
ENDDOMSVR SERVER(*all)
After the installation finishes, confirm it was successful by using the Display Software
Resources (DSPSFWRSC) command or the GO LICPGM menu option 10.
Production
Here is what you need to do after your upgrade:
Know the new features and how they work in your environment.
Share the wealth of knowledge.
Deploy using guidelines stated earlier.
Administer and maintain your Domino 6 for iSeries using best practices from this book and
from other IBM/Lotus documentation.
Distributed administration
There are several new features in Domino 6 that enable you to distribute automated
administration tasks between servers and manual administration tasks between groups of
administrators. We recommend that you review these new features to determine the best
approach for your organization.
An extended administration server can add, modify or delete documents in the Domino
Directory only if they belong to a particular namespace within the Domino Directory. A
namespace is defined by a certification hierarchy, for example, OU=Sales/O=Acme, where
the organization is Acme and the organizational unit is Sales. You can specify the
organization or one or more organizational units as a namespace for which an extended
administration server is used to process administration requests. The traditional
administration server modifies all of the target documents in a Domino Directory which either
Restriction: All Domino servers in the domain must be at least Lotus Domino 6.0 servers
to use the extended administration server feature.
See the section entitled “Using an extended administration server” in the Domino 6
Administrator Help for more information.
Important: To ensure that the database replicates properly, extended access requires the
use of the advanced database ACL option “Enforce a consistent Access Control List
across all replicas.”
See Chapter 14, “Extended ACL” in Upgrading to Lotus Notes and Domino 6, SG24-6889 for
more information about planning and implementing extended ACLs in your organization.
Policy-based administration
A new technology, introduced in Domino 6, helps you to apply and manage standard
corporate client and desktop-based policies. This technology is called policy-based
administration. With the new policy-based administration model you can control your users’
desktops, security settings, archiving, client setup, and user registration in a structured way.
This will put you, as an administrator, more firmly in control of your environment and also
gives you a flexible way to manage and assist users, down to the client and even the
document or field level, without needing direct access to each user's computer frequently.
Resources
The following resources help you to plan and setup policies for your environment:
See Chapter 15, “Policy-based administration” in Upgrading to Lotus Notes and Domino 6,
SG24-6889 for more information about planning and implementing policies in your
organization.
Refer to Chapter 9, “Using Policies” in Administering the Domino System, Volume 1
available at this Web site:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
For details about these options, please see the section entitled “Setting up client installation
for users” starting on page 5-41 in Administering the Domino System, Volume 1.
We recommend creating desktop policy settings documents for user groups that require
similar desktop configurations such as the help desk, accounting department, and marketing
department.
See the section entitled “Creating a desktop policy settings document” in the Domino 6
Administrator Help for more information.
Resources
This is a list of documents related to Lotus Notes client administration:
See chapter 7, “Lotus Notes client upgrades” and chapter 16, “Administering the Notes 6
client” in Upgrading to Lotus Notes and Domino 6, SG24-6889 for more information.
Refer to the topic “Setting up client installation for users” in the Domino 6 Administrator
Help.
See the section entitled “Setting up client installation for users” on page 5-41 in
Administering the Domino System, Volume 1.
Distributing Notes Clients Automatically, REDP3693, available at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/redp3693.html?Open
Spam filtering
In a very broad sense, spam is the reception of unsolicited commercial e-mail. Spam is
designed to flood the Internet with mass mailings, attempting to reach the largest audience
possible. A very important aspect of what constitutes spam is that spam has negative effects
on those who receive it.
Many organizations address spam filtering at several levels, for example, at the firewall level,
the Internet mail server level, the Domino server level, and the desktop level. We recommend
that you understand how spam filtering works at all levels in your organization. This
understanding provides you with more problem solving tools when supporting e-mail for your
users.
Please refer to the redbook Lotus Domino 6 spam Survival Guide for IBM eServer,
SG24-6930, for information on the following topics:
Spam avoidance techniques
How to block spam
Domino 6 anti-spam architecture
Domino 6 anti-spam features
Third party anti-spam products
Antivirus protection
Many organizations also address antivirus protection at several levels, for example, at the
firewall level, the Internet mail server level, the Domino server level and the desktop level. We
recommend that you understand how antivirus protection works at all levels in your
organization. Your organization could possibly take advantage of economies of scale when
purchasing an antivirus solution for the enterprise.
Please refer to Chapter 9, “Antivirus protection” on page 405 in this book for more
information.
Domino 6 includes the HTTP header, cache information and expiration information
functionality in its HTTP server. You can include configure the HTTP server to include
customized information at the server level for your environment and include customized HTTP
header information in your Domino Web applications.
If the network team in your organization created exception rules for Web content generated
by Domino servers, test the behavior of the Web content when generated by the Domino 6
HTTP server. They can disable the exception rules since Domino 6 provides explicit
instructions for handling Web content.
For information on configuring the Domino HTTP server, refer to the following references:
The topic “Web Site rules and global Web settings” in the Domino 6 Administrator Help.
The section called “HTTP response header rules”, starting on page Page 34-36, in
Administering the Domino System, Volume 1.
For information on customizing HTTP header information in your Domino Web applications,
see the following references:
LDD Today article: “Building Web applications in Domino 6: Browser caching and
response header rules” by John Chamberlain:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/2aa6ecf8f2950190
85256b9c006fd147?OpenDocument&Highlight=0,cache
Table 4-7 (Table of CGI variables supported by Domino) in the redbook Domino
Designer 6: A Developer’s Handbook, SG24-6854 at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/SG246854.html?Open
We recommend thorough testing of this feature before introducing it into your production
environment because it is not widely used yet.
Resources
These documents contain information about Citrix MetaFrame and Windows Terminal Server:
Technote 1098489 entitled “Supported Configurations and Support Policy for Citrix
MetaFrame” available at:
http://www.ibm.com/support/docview.wss?rs=203&q=citrix+%22domino+6%22&uid=swg21098489&lo
c=en_US&cs=utf-8&lang=en+en
Redpaper Implementing Windows Terminal Server and Citrix MetaFrame on
IBM ^™®xSeries Servers, REDP-3629 at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/REDP3629.html?Open
Technote 1101768 entitled “Is iNotes Access for Microsoft Outlook or iNotes Web Access
Supported on the Citrix Platform?” available at:
http://www.ibm.com/support/docview.wss?rs=0&uid=swg21101768
A SAN can be used to bypass traditional network bottlenecks. It facilitates direct, high speed
data transfers between servers and storage devices, potentially in any of the following three
ways:
Server to storage: This is the traditional model of interaction with storage devices. The
advantage is that the same storage device may be accessed serially or concurrently by
multiple servers.
Server to server: A SAN may be used for high-speed, high-volume communications
between servers.
Storage to storage: This outboard data movement capability enables data to be moved
without server intervention, thereby freeing up server processor cycles for other activities
like application processing. Examples include a disk device backing up its data to a tape
device without server intervention, or remote device mirroring across the SAN.
Since this is a highly specialized area, please contact your IBM representative or ISSL Sales
Specialist for documented approaches for using a SAN with the iSeries.
SSL accelerators
SSL accelerators have already been discussed in “Environmental planning” on page 4.
Please refer to 1.1.12, “SSL accelerators” on page 13.
Overview
When looking at performance, you also need to look at capacity and tuning, by monitoring the
resources used in your system. Figure 2-23 shows the flow of the initial sizing, the monitoring,
and either the tuning actions to be undertaken or the adding of additional resource to adjust
the initial sizing.
Initial sizing
Monitor
Figure 2-23 Process diagram of monitoring and tuning your Domino system
Refer to the section called “Statistics and the Domino system” starting on page 52-24 in
Administering the Domino System, Volume 1.
The Domino SNMP agent supports SNMP version 1. For more information about
implementing the Domino SNMP agent in your environment, consult chapter 53, “Using the
Domino SNMP Agent” in Administering the Domino System, Volume 2.
The Server Health Monitor determines server health by calculating health statistics and
comparing them against preset thresholds. The Server Health Monitor reports the
information, pinpoints problematic server components, and provides short-term and
long-term recommendations for restoring server health.
Activity Trends collects and stores activity statistics as current observations and historical
trends. The activity statistics relate to the server, databases, users, and connections of users
to databases. You can explore the collected data to see how database workload is distributed
across servers. Using the data, Activity Trends recommends a resource-balancing plan.
Then, working with the Domino Change Manager, which is a part of the Domino server,
Activity Trends provides a workflow that facilitates implementing the recommended changes.
For more information on the IBM Tivoli Analyzer for Lotus Domino, refer to Chapter 54, “Using
IBM Tivoli Analyzer for Lotus Domino” in Administering the Domino System, Volume 2 and to
the IBM Tivoli Analyzer for Lotus Domino Web site at:
http://www.ibm.com/software/tivoli/products/analyzer-lotus-domino/
Overview
Domino for iSeries brings together different environments, which were until recently far apart:
The iSeries environment and the Domino environment, both with a history of their own. It is,
therefore, absolutely essential for a successful implementation of Domino for iSeries, that the
people in these environments communicate and establish a mutual understanding of each
others’ backgrounds and methods of work.
iSeries background
The iSeries environment is highly automated. In most cases it is monitored from one central
point, called the operations department. The main objectives of the operations department
are to keep the system up and running, monitor performance, and react to any incidents
which might hamper the availability and performance of the system. In addition, iSeries
operators also start, stop, and restart tasks running in the system, and they restart (IPL) the
entire system if needed. Users are concerned about availability of the system, maintenance
windows (downtime), and performance requirements. So they often work out an SLA with the
operations department. A job scheduler task, such as the Advanced Job Scheduler, is very
often used to run jobs at a predetermined time or when certain predefined conditions are met.
This is for example used for running housekeeping jobs and the subsequent restart of an
application or task.
Domino background
In most distributed implementations of Domino, the operating platform (for instance, NT or
AIX) is usually dedicated to the Domino server. Because of this, OS level access is often
restricted to Domino administrators. SLAs are, therefore, made by the Domino administration
group, since they control the service end-to-end. The Domino administrator usually goes to
the operating system of the server to accomplish the following tasks:
Perform maintenance on the OS, such as examining the log files or changing the IP
address.
Access a database in local mode to modify the ACL, in case it becomes corrupted or was
misconfigured (such as excluding anyone from having manager access).
Examine the contents of the NOTES.INI file.
In case of a server crash, examine the last messages on the Domino server console for
further investigation into the cause of the crash.
Note: The latter two tasks can also be performed by an automated monitoring utility.
Reboot the Domino server to let a changed NOTES.INI parameter take effect (one that is
only read during startup of the Domino server).
Reboot the server at OS level to clean up all Domino processes and free up all resources
allocated by Domino after a crash.
Run Domino maintenance utilities, such as COMPACT and FIXUP, in an offline mode.
Restore databases from backup.
Conflicting interests
From the backgrounds mentioned above, you can see that when Domino is installed on an
iSeries, there are areas where the iSeries and Domino administration groups have
overlapping activities, such as:
Emergency stopping and starting of the Domino server
Scheduled stopping and starting of the Domino server
Backup and restore activities
Monitoring and maintaining hardware and OS
Setting up of SLAs
Monitoring of application (Domino) behavior
Application (Domino) maintenance
Tuning and monitoring of servers
Application development, for instance, DB2 access
To avoid a situation where both groups claim they need to perform one or more of these
activities, careful consideration needs to be made when deciding which activity is most
applicable to which group. Before assigning responsibilities, the following questions should be
considered:
Can the operation be completed entirely from the Domino environment? If so, the Domino
administrators are the most likely candidates for the operation.
Can the operation be completed entirely from the iSeries environment? If so the iSeries
administrators are the most likely candidates for the operation.
Which group does the user community see as owner of the system. This is the group
whom the user contacts in case of failure. Since a chain is only as strong as its weakest
link, we recommend that all groups be consulted or at least notified before any “user
noticeable” action is taken.
Based upon the previous considerations, assigning the tasks can be done as follows:
Emergency stopping and starting of the Domino server:
This should be a joint effort between the Domino and iSeries administration groups. In
case a Domino server is not functioning properly, the Domino group investigates the
problem and notifies the iSeries group. If the Domino group identifies that the Domino
server requires a restart, the iSeries administrators should be the ones to issue the
commands to stop and start the server (for example at the iSeries system console). Even
General recommendations
A written agreement should be drawn up between the groups, specifying exactly who can do
what. This agreement should not be static, but evaluated from time to time. Changes may be
required if things work a little differently from what you planned.
Exchange knowledge between the groups. The Domino group should have an adequate
understanding of what iSeries is all about. The iSeries group should have an adequate
understanding of what Domino administration is all about. The physical locations of the
Domino and iSeries groups should not be too far apart, to ensure there is good
communication between the two groups. Usually communication improves when people
actually know each other and are not talking to an anonymous voice at the other end of a
phone line.
To avoid conflicts of interest, both groups should be part of the same department. This can
reduce issues about budget, personnel, and so forth. Synchronize the change processes.
The two groups should make use of the same resources for entering and approving changes
to their environment. When this proves impossible, both groups should at least give each
other access to their individual change processes and make them part of the approval cycle.
Domino SLA
In this section we state the subjects to cover in an Domino-only SLA with the end user.
However, the details are very much dependent on your organization, and general guidelines
are difficult to establish. Note that only parameters which can be measured should be
incorporated in an SLA.
End user
Perform their primary job function
Report Notes-related problems to on-site support or a help desk
Cooperate with support to resolve problems
Participate in desktop upgrades, hardware and software
Be aware of scheduled Notes server outages or upgrades
Application developer
Develop new applications at request of application business owner
Modify existing applications at request of applications business owner
Desktop support
Provide first level support for all desktop applications
Provide first level support for network file and print servers
Backup local file and print servers
Provide first level support for Notes problems
Escalate problems to second level desktop support
IS Management
Work with Notes program management to allocate resources
(hardware, software, people) to Notes operations and support
Support the organization’s Notes program
Ensure support contracts are current and reflect specified service levels
Provide administrative support to Notes program
Information Security
Random audit of Notes servers for compliance with customer Information Security Policy
Provide guidance to Notes developers and administrators on security issues and
exposures
Jointly develop remediation plans for security exposures
Assess network security vulnerabilities
Develop policy on use of encryption
Be aware that the first few times you run this checklist, it may take more than ten minutes. It
takes a while to get familiar with the commands and their implications.
Note: Prior to OS/400 V5R1, pools were always called storage pools. The iSeries
Navigator started using the term memory pool in V5R1. Since most CL commands and the
IBM documentation still refers to them as storage pools, we use that term in this book.
For a quick check, run the following commands and write down the output/results:
1. DSPSYSVAL SYSVAL(QMODEL)
– Write down the model number of your iSeries.
See Chapter 11, “Using the IBM Eserver Workload Estimator” on page 463 for MCU
ratings.
2. WRKHDWRSC TYPE(*PRC)
– Write down the Processor Capacity Card and the Interactive Card information.
See Chapter 11, “Using the IBM Eserver Workload Estimator” on page 463 for MCU
ratings.
3. DSPSYSVAL SYSVAL(QMAXACTLVL)
– Make sure that this system value is set to *NOMAX.
See “QMAXACTLVL” on page 212 for information on this system value.
4. WRKACTJOB
– Write down the system CPU and CPU of individual Domino jobs.
See “Work with Active Jobs (WRKACTJOB)” on page 185 for information on CPU.
– Write down the run priority of the Domino jobs.
See “Run priority” on page 192 for information on job run priorities.
– Write down the storage pool the Domino jobs are running in.
See “Work with Active Jobs (WRKACTJOB)” on page 185 to identify a storage pool.
5. WRKSYSSTS
– Write down the paging/faulting in the *MACHINE pool.
See “Main memory” on page 172 for information on paging/faulting.
– Write down the paging/faulting in the storage pool where Domino is running.
See “Main memory” on page 172 for information on paging/faulting.
– Write down any ineligible jobs in the storage pool where Domino is running.
See “Job activity levels” on page 183 for information on jobs going ineligible.
– Write down the % System ASP used and Current unprotect used values.
See “Disk space” on page 175 for information on disk space for the iSeries.
6. WRKDSKSTS
– Write down the % busy for the disk units in the ASP where Domino is running.
See “Work with disk status (WRKDSKSTS)” on page 197 for information on disk units.
– Write down any disk units that have a % Busy significantly higher than other units.
See “Work with disk status (WRKDSKSTS)” on page 197 for information on disk units.
7. NETSTAT *CNN
– Check port 1352 connections for any retransmissions.
See “Work with TCP/IP Connection Status (NETSTAT *CNN)” on page 201 for
information on retransmissions.
8. WRKDOMCSL SERVER(<ServerName>)
– Run the Domino command: SHOW STAT SEM
• A few semaphore timeouts is okay. More then 10 a day and you should call Support.
– Run the Domino command: SHOW SERVER
• Check Peak # of sessions. Too many sessions may indicate network issues.
• Check Transactions: Last minute. No transactions might mean a server hang.
Management Central lets you perform various system management tasks on multiple
systems as quickly and efficiently as you would on a single system. Management Central
makes system administration even easier by allowing you to use sharing. Sharing lets you
give other users permission to view or work with your tasks. Use Management Central to do
all your system administration tasks, including:
Collect inventory
Manage fixes
Packaging and sending data
Run commands
Schedule tasks and jobs
Work with system performance
Once you have finished this preliminary work with Management Central, you’re ready to begin
managing your iSeries systems. For more details about installing and configuring
Management Central, refer to the “Getting Started with Management Central” Web page at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm?info/rzaih/rzaih1b.htm
If you want to collect historical performance data for later analysis, find information about
using Collection Services in “Using Collection Services to monitor Domino and iSeries
performance” on page 134.
Management Central monitors gather and present real-time performance data for your iSeries
systems. You can use monitors to see your system performance as it happens across multiple
systems and groups of systems. The monitors allow you to collect performance data
simultaneously for a wide variety of system metrics, for any system or system group, and for
any length of time. Once you start a monitor, you are free to do other tasks on your iSeries, in
iSeries Navigator, or on your PC. To effectively monitor real-time iSeries system performance,
create a Management Central monitor.
Create a monitor
Creating a new monitor is a quick and easy process that begins at the New Monitor window.
In Management Central, follow these steps:
1. Click Monitors. The available monitor types are displayed in the right pane. Your choices
are System, File, Job, Message or B2B Activity monitors.
Tip: You can also use the Work with Monitors in the Management Central tasks section at
the bottom right hand corner of iSeries Navigator to perform common monitor
administration tasks.
3. Key in a name and a description for the monitor on the General tab. The description
displays in the monitor list. We called the new monitor “Our first monitor”.
4. View and change your metric information.
Use the New Monitor - Metrics tab to select each metric you want to monitor. You can
edit the collection interval, retention period, maximum graphing value, and display time for
each metric you select. We used the default values for the CPU Utilization (Average)
metric in Figure 3-2.
6. Use the default settings on the Actions tab for our example. Refer to the iSeries Navigator
Help for more information about the logging and alarm options on the Actions tab.
7. On the Systems and Groups tab select the system or systems where you want to run this
monitor. Click Browse to select from a list of systems or groups. We selected the AS25
server for our example.
8. Click OK to save the monitor.
Once the monitor has successfully started, the Stop option becomes available on the context
menu. To stop a monitor, right-click your monitor entry and select Stop. You should see a
confirmation message in the status bar confirming that the monitor stopped. The status field
changes to Stopped.
To create a monitor for Domino servers, follow the steps from the System monitor example
(see “Create a monitor” on page 125), except that this time you have to create a Job monitor.
1. Click Monitors. Select Job.
2. Right-click Job. Click New Monitor as shown in the example in Figure 3-5.
5. Click the Metrics tab to set the same threshold settings as in our system monitor example
(80% and 60% for the reset value). However, when defining a job monitor you first have to
select the metric from the Available metrics field. The CPU Percent Utilization metric can
be found under the Job Numeric Values. This is shown in Figure 3-7.
6. Click the Collection Interval tab. Use the default value of 15 minutes for all metrics. You
can customize this setting later if you need to.
7. Click the Actions tab. Use the default values for logging the event. You can customize this
setting later if you want.
8. Click the Systems and Groups tab. Click Browse to select the appropriate endpoint
systems or system group from the list of available systems.
9. Click the Sharing tab if you want to share this monitor with another administrator. The
default setting for sharing is none.
10.Click OK to save your new monitor.
11.The Job Monitor view displays the new monitor in the list. Right-click on the new monitor,
then select Start to enable the monitor.
We customized the view to display columns in the order of Subsystem, Job Name and
CPU %. To customize the view, drag and drop the columns to position them in the desired
order. We sorted by subsystem name by clicking on the title of the Subsystem column.
Alternatively, you can click Options -> Columns or press the F11 key to customize this view.
iSeries Navigator retains the columns and sorting you selected. We recommend customizing
this window to best suit the way you work.
To view the event log for all monitors of a particular type of monitor, follow these steps:
1. In iSeries Navigator, expand Management Central.
2. Expand Monitors.
3. Right-click the type of monitor (System, File, Job, etc.) you want and select Event Log.
Figure 3-9 shows the event log for the AS25 system. You can also view the event log
across all your systems.
Administrators running Domino 6 for iSeries on an iSeries with OS/400 V5R2 can use the
Collection Services of OS/400 to collect performance data about their Domino servers. When
Collection Services is configured to collect Domino data, each interval contains statistics for
all active Domino servers that are running the COLSRV400 add-in task. Collection Services
are based on Domino statistics. That is, the statistics displayed when issuing the Domino
console command SHOW STAT. However, Collection Services store only a subset of the data
provided by SHOW STAT. This data is stored in the Management Collection Object (MCO).
We recommend that you perform the following steps when collecting and reporting
performance data about Domino servers:
1. Designing a data collection
2. Starting and stopping a data collection
3. Using Collection Services data
We also include examples and sample reports to help you begin using Collection Services
data in your organization.
The Collection Services store performance data in an object, which has a type of *MGTCOL.
This object contains an entire life cycle (usually one day) of Collection Services data, for all
collection categories in one place. If Collection Services is started by iSeries Navigator or
PM/400, then by default, these *MGTCOL objects are stored in library QMPGDATA. If
Performance Tools starts the Collection Services, then the default library for *MGTCOL
objects is QPFRDATA. You can also specify your own library to contain the collection object, if
you prefer.
You cannot access a MGTCOL object directly; only system tools, such as iSeries Navigator,
can do so. However, this data is also exported to DB/2 files for the current collection. The
DB/2 files are stored in the same library as your MGTCOL object and have files names such
as QAPMDOMINO (contains Domino data), QAPMDISK (disk data), and so on. If these DB2
files do not exist or you want to use data from previous days, they can be created by
right-clicking a MGTCOL object in iSeries Navigator and choosing “Create Database File
Now...”. You can then use any database query tool on this data (as explained in 3.3.3, “Using
Collection Services data” on page 139). The format of Domino's DB2 table (QAPMDOMINO)
can be found in 3.3.5, “QAPMDOMINO database reference” on page 167.
The QDOMINO job is a collection task from the integration of iSeries Collection Services
with Domino. It runs as a single job per iSeries server or LPAR in the QSYSWRK subsystem.
Like the QYPSPFRCOL job, this service can run continuously and store Domino statistics in
the *MGTCOL object. The QDOMINO job polls all active Domino servers on an iSeries server
or LPAR running the Domino add-in task called COLSRV400.
Domino 6 for iSeries automatically adds the COLSRV400 add-in task to the ServerTasks
entry in each Domino server’s NOTES.INI file when you upgrade or install the server
software. This means that you see one COLSVR400 job on in the WRKACTJOB display for
each active Domino server (under each Domino server’s subsystem).
When Collection Services is not running or is not set up to collect Domino statistics, the
COLSRV400 add-in task on a Domino server does nothing. You can remove the COLSRV400
task from the ServerTasks entry in the Notes.ini file for each Domino server, but we
recommend that you leave it in.
For illustration purposes let's assume that Collection Services is used daily and cycles at
midnight, causing each MGTCOL object to contain one day's worth (approximately 24 hours)
of data collection. Let's next establish a base size for one day's worth of data collection using
the default properties for Collection Services. Using the Standard plus protocol profile with an
interval value of 15 minutes will collect approximately 500 MB of data in one MGTCOL object.
The size actually collected per day using the default properties can vary greatly depending on
system size, usage, and interval value. The 500 MB example typically represents a higher
end system that is heavily used.
Note: Collection Services can alternatively be accessed from the Management Central
section in iSeries Navigator. Choose Management Central -> Endpoint Systems ->
<SystemName> -> Configuration and Service -> Collection Services.
2. Run Collection Services for three prime shift days to get an understanding of your
environment. Monitor the disk space consumed by the data files in the Collection Services
section in iSeries Navigator. The size column on the far right of the window displays disk
space used in MB.
3. Reconfigure the Collection Services as needed.
– Collection Services Properties -> General tab
If the data files consume too much disk space, consider changing the Default collection
interval for detail data and Collection retention period. Increasing the Default collection
interval results in lower disk consumption due to fewer collections run during the
period. Changing the Collection retention period settings reduces disk consumption by
expiring data more quickly so it is deleted from disk. We recommend using a 15 minute
collection interval. If you change the collection interval to 60 minutes or more, please
be aware that the data may not be useful.
– Collection Services Properties -> Data to Collect tab
We recommend using the default Collection profile with the setting “Standard plus
protocol”. This profile includes most of the iSeries performance data and the Domino
performance data as you can see in Figure 3-10. However, you can also create a
custom profile that only includes the specific iSeries performance data you want to
reference in the data files. Be sure to include the Domino performance data if you
create a custom profile. Reducing the number of statistics categories reduces disk
consumption.
This section showcases the use of iSeries Navigator to start and stop data collections.
In addition, we include resources that reference other available options for using Collection
Services data at the end of this section.
We recommend using the Graph History feature in iSeries Navigator for quick snapshots of
small to medium sized data sets such as one day or one week of data. This is useful, for
example, when you are researching performance issues or monitoring specific Domino jobs
on your system. Though the OS/400 object used by the Collection Services job is capable of
retaining large data sets, we recommend exporting the data to DB2 files for more thorough
analysis, such as trending, using PC workstation tools.
Important: You can only view iSeries performance data using the Graph History feature.
You cannot view Domino performance data using this feature. Please see “Viewing the
data using PC workstation tools” on page 142 for instructions for viewing Domino
performance data.
The amount of data that is available to be graphed is determined by the settings that you
selected from the Collection Services properties, specifically the collection retention period.
Use iSeries Navigator to activate PM/400 over multiple systems. When you activate PM/400,
you can use the Graph History function to see data that was collected days ago, weeks ago,
or months ago. You go beyond the real-time monitor capabilities, and have access to
summary or detailed data. Without PM/400 enabled, the graph data field supports 1 to 7 days.
With PM/400 enabled, you define how long your management collection objects remain on
the system, categorized as follows:
Detailed data: The length of time that management collection objects remain in the
system before they are deleted. You can select a specific time period in hours or days, or
you can select Permanent. If you select Permanent, the management collection objects
will not be automatically deleted.
Graph data: The length of time that the details and properties data that is shown in the
Graph History window remains in the system before it is deleted. If you do not start
PM/400, you can specify one to seven days. If you do start PM/400, you can specify 1 to
30 days. The default is one hour.
Summary data: The length of time that the data collection points of a graph can be
displayed in the Graph History window or remain in the system before they are deleted.
No details or properties data is available. You must start PM/400 to enable the summary
data fields. The default is one month.
Important: Graph History includes all available data in the MCO. If data does not exist for
the entire date range you selected, Graph History reports on the data available in the MCO.
Once you have launched a Graph History, a window displays a series of graphed collection
points. These collection points on the graph line are identified by three different graphics that
correspond to the three levels of data that are available:
A square collection point represents data that includes both the detailed information and
properties information.
A triangular collection point represents summarized data that contains detailed
information.
A circular collection point represents data that contains no detailed information or
properties information.
Figure 3-12 displays the average CPU utilization at 15 minute intervals for the AS25 server
from August 23, 2003 to August 29, 2003 with a maximum graphing value of 100 percent
busy.
Another useful feature of the Graph History is the ability to export Graph History to a PC file
for analysis with PC based software. From the Graph History window, click File -> Export.
This gives you the opportunity to save the Graph History data as a file on your PC in any of
the following formats:
ASCII Tab Delimited Text (*.txt)
Comma Separated Variable (*.CSV)
Web Page (*.html)
Microsoft Excel 97 (*.xls)
Lotus 123 Compatible (*.csv)
Create database files on the You can report on data This method can be
iSeries from the MCO data, collected for days, weeks, complicated because there are
query the database files, then months or even years. several steps involved.
download the data to a PC
workstation for additional You can create trending The database files can get very
manipulation. reports. large.
Create database files on the Fewer steps involved for this ODBC connectivity is
iSeries from the MCO data, method. sometimes slow and unstable.
query the database files, then
use a PC-based query tool to You can create custom reports You have to thoroughly
create reports. whenever you want. understand the data set to get
accurate reports.
Query the MCO data directly, You can create reusable You can only report on one
then download the file from the queries to summarize the data. collection interval at a time,
iSeries using the Data Transfer usually one day at a time.
utility from IBM iSeries Access Works well for short term
for Windows. monitoring reports.
Create database files on the Very flexible option for reporting Requires additional software
iSeries from the MCO data. and monitoring. license for LEI.
Use a product such as LEI 6 for
iSeries to connect a Lotus Requires Lotus Notes
Notes database application to programming expertise.
the database files.
No charting capabilities in Lotus
Notes.
We recommend that you determine the best method for your environment and organization
based on the skill set and experience of your staff.
In the following example, we query the MCO data directly, then download the data to a PC
workstation for additional manipulation, which is the first option detailed in Table 3-1. There
are three steps involved in doing this:
“Find MCO data to query” on page 143
“Use Query/400 to create a report” on page 144
“Display the results using the RUNQRY command” on page 151, or
“Download the data to Lotus 1-2-3 (or Excel) and display the spreadsheet” on page 151
Use the GO PERFORM command, select option 3 - Performance Report, then view the
member name for the date you want to query. The Print Performance Report screen in
Figure 3-14 shows the list of objects created by Collection Services, sorted by date. We
use the member Q240000021 dated 08/28/03 (August 28, 2003) in library QMPGDATA in
this example as well.
Library . . . . . . QMPGDATA
5. Key in the name, library and member of the MCO as shown in the example in Figure 3-17.
The format is *FIRST. You determined the appropriate values for your environment in “Find
MCO data to query” on page 143.
Press Enter to continue to the next screen.
Type definitions using field names or constants and operators, press Enter.
Operators: +, -, *, /, SUBSTR, ||, DATE...
Bottom
Figure 3-18 Define the TOTALPER field in the Define Result Fields screen
7. Select and sequence the fields in the report. Figure 3-19 shows the fields you need to
select and the order to sequence them in. Press Enter twice to confirm the selections and
continue to the next screen. Select the fields in this order:
10 DTETIM
20 JBSSYS
30 JBNAME
40 JBCPU
50 TOTALPER
More...
F3=Exit F5=Report F11=Display text F12=Cancel
F13=Layout F20=Renumber F21=Select all F24=More keys
8. Select the records and intervals you want to gather and analyze, as shown in Figure 3-20.
Press Enter to continue to the next screen.
– JBUSER: Enter QNOTES, which is the user for all Domino jobs on your system.
– JBCPU: Select jobs using more than 0 % CPU (= GT 0).
– INTNUM: We are looking for the prime shift intervals in our example, that is, 7 am to
5 pm. 7 am would be the 24th interval in the collection. It is selected by specifying the
value GT 23. The last interval we need is the 72nd, so enter LT 73 for the last interval.
Bottom
9. Select the report summary functions as shown in Figure 3-21. We summarize the JBCPU
and TOTALPER fields in our report.
Bottom
F3=Exit F5=Report F10=Process/previous F11=Display names only
F12=Cancel F13=Layout F18=Files F23=Long comment
Figure 3-21 Select JBCPU and TOTALPER fields for Query report
10.We define the report breaks next. The example in Figure 3-22 shows that we set the Break
Level at 1 for the JBSSYS field and 2 for the JBNAME field.
Break Sort
Level Prty Field Text Len Dec
1 10 JBSSYS Subsystem Name 10
2 20 JBNAME Job Name 10
JBCPU CPU Milliseconds 11 0
TOTALPER ((jbcpu/(900*9000))/49)*100 6 4
Bottom
F3=Exit F5=Report F10=Process/previous F11=Display names only
F12=Cancel F13=Layout F18=Files F23=Long comment
11.Press the Enter key four times to accept your entries and the default values on the next
three screens.
12.Select the output type and output form. We recommend selecting the options in
Figure 3-23. Press Enter to continue to the next screen.
Figure 3-23 Settings for the Select Output Type and Output Form screen
13.Define a database output file. The example in Figure 3-24 sends the output to the
DOMACT file in the QGPL library.
For this type of performance snapshot, we recommend replacing the member if it already
exists. Or, you can customize this query each time you run it to send the output to a
different file. We named the file by the month and year we ran the query. Naturally, you can
create your own naming standard.
Display Report
Report width . . . . . : 2199
Position to line . . . . . Shift to column . . . . . .
Line ....+....1....+....2....+....3....+....4....+....5....+....6....+....7..
Interval Elapsed
Interval Date Interval Subsystem Library Job
Number Time Seconds Name Name Name
000001 24 030828015537 2 DOMBRMS QUSRNOTES CHRONOS
000002 24 030828020000 301 QSYSWRK QSYS QDOMINO
000003 24 030828020000 301 DOMREST QUSRNOTES AMGR
000004 24 030828020000 301 DOMREST QUSRNOTES AMGR
000005 24 030828020000 301 DOMREST QUSRNOTES UPDATE
000006 24 030828020000 301 DOMREST QUSRNOTES COLSRV400
000007 24 030828020000 301 DOMREST QUSRNOTES SCHED
000008 24 030828020000 301 DOMREST QUSRNOTES CALCONN
000009 24 030828020000 301 DOMREST QUSRNOTES ADMINP
000010 24 030828020000 301 DOMREST QUSRNOTES AMGR
000011 24 030828020000 301 DOMREST QUSRNOTES EVENT
000012 24 030828020000 301 DOMREST QUSRNOTES LOGASIO
000013 24 030828020000 301 DOMREST QUSRNOTES SERVER
000014 24 030828020000 301 DOMAV QUSRNOTES AMGR
More...
F3=Exit F12=Cancel F19=Left F20=Right F21=Split
Download the data to Lotus 1-2-3 (or Excel) and display the spreadsheet
To download the information into a Lotus 1-2-3 spreadsheet use the Data Transfer From
iSeries Server application (which is part of IBM iSeries Access for Windows). You may also
download the file in Microsoft Excel format if you wish. To do so:
1. Start the data transfer program by selecting Start -> Programs -> IBM iSeries Access
for Windows -> Data Transfer From iSeries Server.
2. Enter your system, library, file and member names where you placed your output file. In
Figure 3-27, we entered AS25 as the server name and QGPL/DOMACT as the library, file
and member names.
3. In the PC section, select File as the Output device, then enter a file name such as
domact.123.
4. Click Details in the PC pane. Make your selections regarding your download file. We
chose to create a new WK4 file as shown in Figure 3-28.
5. Click OK to save your selections.
6. Select File -> Properties in the Data Transfer from iSeries Server window. Select Convert
CCSID 65535 as shown in Figure 3-29. Click OK to save your selection.
Tip: If you receive an error message like the one in Figure 3-30, click OK. The transfer
should still work.
8. Open the spreadsheet in Lotus 1-2-3. The spreadsheet lists the Domino servers broken
down by subsystem with totals by subsystem and entire system at the bottom.
The Lotus 1-2-3 spreadsheet looks like the example in Figure 3-31 when you open the file.
The spreadsheet includes totals by subsystem and by system. We added the borders
around the subsystem and system totals to bring these cells to your attention. If you
decide to further use this information by creating charts or graphs, we recommend saving
the file in the most recent file format of Lotus 1-2-3.
Resources
For a complete list of the Domino statistics collected by Collection Services, please refer to
Chapter 19, “Integrating iSeries Collection Services with Domino”, starting at page 147 in
Installing and Managing Domino 6 for iSeries (I400HELP.PDF).
Collection Services section on the iSeries Information Center Web site at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/info/rzahx/rzahxcollectdatacs.htm
Chapter 4, section “Using the Management Collection Object API to read Domino
collection data” in the Domino 6 for iSeries Application Development Guide
(apdev400.pdf).
We made some assumptions when creating these reports. Please make the appropriate
changes when creating reports in your environment. The assumptions are:
Microsoft Excel 2002 SP-2 with Microsoft Query option is installed
You need to have at least intermediate level Microsoft Excel skills
iSeries Access for Windows V5R2 with ODBC drivers is installed
We generated the data files from the MGTCOL object to the QMPGDATA library
You need appropriate security access to the iSeries objects in the QMPGDATA library
Domino transactions
Here are the instructions for the Domino transactions report using a pivot table in Microsoft
Excel 2002. This report enables you to view the trends in the number of transactions
processed by your Domino server(s) for a specific period of time. We will look at the number
of Domino transactions during a two hour period from Noon until 2:00 PM for the three
Domino servers on the AS25 iSeries system.
4. On the Create New Data Source window, key in the name of your new data source. Select
the iSeries Access ODBC Driver. We used the name bpdomcol4 in the example in
Figure 3-33.
Figure 3-34 General tab of the iSeries ODBC Driver Connect window
Figure 3-35 Server tab of the iSeries ODBC Driver Connect window
8. You can now select a default table, but you are not required to do so. We selected
QAPMDOMINO as the default table in our example in Figure 3-36 since we want to pull all
the data for this report from that table. Click OK.
9. Select the data source you just created in the Choose Data Source window, then click OK.
We selected the data source bpdomcol4 in Figure 3-37.
10.The Microsoft Query Wizard connects to the AS25 server, then displays a list of fields in
the QAPMDOMINO table since we specified it as the default table.
If you did not select a default table, then you need to select the QAPMDOMINO table from
the list of tables now.
Select the DTETIM column in the Available tables and columns box, then click > to add it
to the Columns in your query box on the right side of the window shown in Figure 3-38.
Repeat this process for the DMSRVN and DMTRNS columns. After adding the three
columns to the query, click Next. Note that you can reorder the columns in your query by
using the up and down arrows.
11.In our example, we filter the data to the two hour window we want to include on the report.
See Figure 3-39 for an example of how to filter your data using the DTETIM field. Click
Next to continue to the next window.
12.We want to sort by the DTETIM and DMSRVN fields on the Sort Order window. See
Figure 3-40. Click Next to continue.
13.Save your query by clicking Save Query. We named the query 12-2frombpdomcol4 in
Figure 3-41. We recommend giving your queries meaningful names.
14.We selected the Return Data to Microsoft Excel option on the Query Wizard - Finish
window in Figure 3-42. You can also view the data or edit the query in Microsoft Query or
build an OLAP Cube if you prefer. Click Finish.
15.You should see the Import Data window now. In the example in Figure 3-43, we selected
the New worksheet option. Click OK.
16.Microsoft Query dumps the query data into your worksheet. The result is shown in
Figure 3-44.
17.Click Data -> PivotTable and PivotChart Report. We used the PivotTable and PivotChart
Wizard to create our report. Use the default value of Microsoft Excel list or database at the
top of the window, then click PivotChart Report (with PivotTable report) at the bottom
part of the window as can be seen in Figure 3-45. Click Next.
18.On the Step 2 window, accept the default setting for the data range by clicking Next. See
Figure 3-46.
19.Click Finish on the Step 3 window to put the PivotTable report on a new worksheet like the
example in Figure 3-47.
20.Excel displays the PivotTable Field list window with the fields we selected on the query as
can be seen in Figure 3-48.
Figure 3-49 Drop the DTETIM field on the Drop Category Fields Here section of the PivotChart
22.Next drag the DMSRVN field to the Drop Series Field Here section on the right side (series
axis) of the PivotChart like the example in Figure 3-50.
Figure 3-50 Drop the DMSRVN field on the Drop Series Field Here section of the PivotChart
Figure 3-51 Drop the DMTRNS field on the Drop Data Items Here section of the PivotChart
24.Close the PivotTable Field list by clicking the X in the upper right corner of the window. The
chart now looks like the example in Figure 3-52.
Mail delivered
To get the combined number of inbound and outbound mail messages placed into a server's
MAIL.BOX, select the DMMLBX field instead of selecting the DMTRNS field in step 10 on
page 158 (Figure 3-38 on page 159).
For information about how Collection Services generates this file and where the data comes
from, refer to the section called “Performance data files: Collection Services system category
and file relationships” in the iSeries Information Center at
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm?info/rzahx/rzahxcatfilerelat
ion.htm
Note: These are the data types (attributes) used in Table 3-2:
C(x) = Character (characters)
B(x,y) = Binary (Digits, Decimal Places)
PD(x,y) = Packed Decimal (Digits, Decimal Places)
INTNUM Interval number: The nth sample database interval based on PD (5,0)
the start time specified in the Create Performance Data
(CRTPFRDTA) command.
DTETIM Interval date (yymmdd) and time (hhmmss): The date and C (12)
time of the sample interval.
INTSEC Elapsed interval seconds: The number of seconds since the PD (7,0)
last sample interval.
DTECEN Century digit: where 0 indicates 19XX and 1 indicates 20XX. C (1)
DMSRVN Server name (first 25 characters if the name is longer than C (25)
this field).
DMNPT1 NET.*: Domino port (1 of 4) for which data is being reported. C (32)
Note: The asterisk (*) in the node name indicates the name of
the port.
DMNBS1 NET.*.BytesSent: Number of network bytes sent for this port. B (18,0)
Note: The asterisk (*) in the node name indicates the name of
the port.
The first section contains information on tuning the OS/400 for a Domino server. It discusses
memory management, direct access storage device (DASD), communications (TCP/IP), and
other operating system concepts.
The second section contains information on configuring a Domino server to run on an iSeries.
It discusses Domino memory management, transaction logging, indexing large files, and
other Domino configuration options.
Important: Turning on the iSeries performance adjuster (see “QPFRADJ” on page 215)
will not tune all aspects of your iSeries OS/400. There are some options that you have to
configure manually.
Tuning the iSeries means that you try to allocate the available system resources to users or
batch jobs that are in most need of those resources. Remember, there is an absolute and
finite limit to the number of resources in the system, and all jobs in the system compete for the
available resources. Once all the resources have been used up, all that tuning really achieves
is to take resources away from one job and give them to another. You cannot increase
available resources, but only reallocate them.
We cover resources, tuning, and allocation, such as memory, DASD, job attributes, CPU, disk
arms, system values, and the integrated file system (IFS) in these sections:
“Work with System Status (WRKSYSSTS)” on page 172
“Work with Active Jobs and Work with System Activity” on page 184
“Run priority” on page 192
“Work with disk status (WRKDSKSTS)” on page 197
“Network Status (NETSTAT) and other communication information” on page 200
“System values” on page 209
“Integrated File System (IFS)” on page 218
“Authority lookups” on page 224.
Main memory
A storage pool is a logical division of main memory that is reserved for processing a group of
jobs. In the OS/400, all main storage is divided into logical allocations called storage pools. If
you enable the iSeries performance adjuster, then the system can manage most aspects of
the storage pools. For information on the iSeries performance adjuster, please refer to
“QPFRADJ” on page 215.
By default, all Domino partitions run in the base (*BASE) storage pool. This is pool number 2
on the Work with System status (WRKSYSSTS) screen. You can manually change a Domino
partition to run in a different storage pool. The purpose of separate storage pools is to
guarantee a certain amount of memory to a group of jobs which will not be paged out by other
jobs that need memory.
There are two storage pools that you need to focus on when tuning an iSeries for Domino.
Those two pools are the machine (*MACHINE) storage pool and whichever storage pool the
Domino partition is running in. The *MACHINE storage pool is pool number 1 on the Work
with System Status (WRKSYSSTS) screen. As previously stated, Domino servers runs in the
*BASE storage pool by default, however, you can configure a Domino server/partition to run in
another shared pool or private pool.
For suggestions on deciding which storage pool to run a Domino partition in and how to
change the Domino configuration so it runs in another storage pool, see section 6.3 of the
IBM redbook Domino for iSeries Sizing and Performance Tuning, SG24-5162.
Important: You should apply OS/400 V5R2 PTF MF30750. It can help reduce the faulting
levels in the *MACHINE pool when a Domino server is configured on the iSeries.
Domino performance will be negatively impacted if the paging and faulting for the storage
pool Domino is running in or for the *MACHINE storage pool gets too high. Domino is
concerned with the values in the Non-DB Paging and Faulting columns. Table 4-1 tells you
what paging and faulting values are considered too high.
Note: Please keep in mind that the response time on your system is the real determining
factor of performance. The faulting/paging values listed in Table 4-1 are good guidelines.
However, there are other factors that influence the performance of your system. For
example, if your system has adequate disk, it can likely sustain higher fault rates than
these guidelines and still have good response times.
*MACHINE 10 NA
Storage Pool where Domino 100 per physical processor 300 per physical processor
runs (*BASE by default)
Please note that, if the paging and faulting increases at night when no one is signed on, it still
affects performance. However, since no one is signed on to notice, it may not be necessary to
change memory allocations.
Important: Keep an eye on the Elapsed time field of the WRKSYSSTS screen. Keep the
time frame of the observation period between 5 and 30 minutes. If the observation period
is less than 5 minutes, then occasional peak loads tend to skew the data. If the time period
is over 30 minutes, then important data may be lost because counters holding some of the
data may get wrapped.
To refresh the WRKSYSSTS screen and keep the Elapsed time incrementing, use the F5
key. To reset the WRKSYSSTS screen and set the Elapsed time back to zero, use the F10
key.
Disk space
As stated previously, there is a finite number of resources on any system. This limit changes
from system to system, but it is finite. There is a limited amount of disk space (DASD) on the
iSeries and if you hit the limit, the iSeries will IPL itself. This is bad! You do not want an
unplanned IPL. Therefore, you need to keep an eye on the DASD. If you are getting close to
the limit (100% used), then you have to get rid of some of the objects taking up disk space.
The Work with System Status (WRKSYSSTS) screen allows you to monitor the amount of
DASD used on your system. The fields on the upper right-hand side of the screen provide
information on DASD.
The System ASP field shows the amount of DASD configured in the system auxiliary storage
pool (ASP). The % system ASP used field shows how much of the DASD in the system ASP
has been used to this point. So, if the system ASP has 87 GB and 51% has been used, that
means there is about 42.6 GB of DASD left to be used in the system ASP before it is full.
The Total field shows how much DASD is available to the entire iSeries. This includes the
system ASP, any configured user ASPs, and any configured independent ASPs. If the Total
field and the System ASP field are the same, then there are no user or independent ASPs
configured on this system.
The Current unprotect used field shows how much temporary storage is currently in use on
the iSeries. Temporary storage is included in the % system ASP used field. Temporary
storage is released when the job using that storage ends. The Maximum unprotect field
shows the maximum amount of temporary storage in use on the iSeries at one point in time.
The Maximum unprotect field is the maximum since the last IPL.
If the storage on your system is quickly approaching 100%, you need to figure out where that
storage is being used.
The first thing you need to do is decide if the storage being used is temporary storage - is the
Current unprotect used field increasing rapidly? Or is the storage being used permanent
storage - is Current unprotect used field not increasing as fast as the % system ASP used
field? (Permanent storage is not released when the job that used it ends.)
If most of the storage driving the iSeries to 100% DASD utilization is temporary storage, then
you need to figure out which job is using the temporary storage and why. See “Finding the
root cause behind rapidly increasing temporary storage” on page 176.
If most of the storage driving the iSeries to 100% DASD utilization is permanent storage, then
you need to figure out what new objects are taking up space on your system. See “Finding
objects taking up permanent storage” on page 180.
Tip: Make sure you have the latest OS/400 PTFs related to temporary storage applied to
your system. To find the list of OS400 PTFs relating to temporary storage, go to the
following Web site and search for a document called Temporary Storage PTFs:
http://www-912.ibm.com/s_dir/slkbase.nsf/slkbase
The first step to find the root cause behind rapidly increasing temporary storage is to identify
the job using all the temporary storage. There are two parts to this process.
The first part is to identify a list of likely jobs. To generate that list, use the TASKINFO
advanced analysis macro in the iSeries System Service Tools.
Important: You need to be careful when you access the iSeries System Service Tools. The
tools that are pointed to in this chapter are not dangerous and will not break anything on
your iSeries as long as you follow the instructions carefully. However, there are other tools
in the System Service Tools that can alter or damage your operating system if you do not
use them correctly.
Note: To get the correct output, it is important to get the spaces in this string in the
correct places. The Options string is -ALL <space> -F <space> 5 <space> -TF <space>
2 <space> -SORT <space> 7.
Where:
– -ALL means output all active jobs and tasks on the iSeries.
– -F 5 means output the first five frames of the call stack for each job/task.
– -TF 2 means timestamps will be output in a date/time format rather than an 8 byte
timestamp.
– -SORT 7 means that all the jobs/tasks will be sorted in descending order by the delta
temporary auxiliary storage used. (This is the total temporary storage allocated minus
the temporary storage deallocated.)
If you need help on this macro or if you want to see other options, place -H in the Options
field and press Enter.
Even though the temporary storage output from the TASKINFO macro is not perfect, it is
still the fastest way to find out which jobs are allocating a lot of temporary storage. Once
you have that information, you can check each job one at a time and see how much
temporary storage it really has allocated.
10.Write down the first 15 jobs listed in the output from the TASKINFO macro.
This list of likely jobs gives you a starting point. See Figure 4-1 for an example of the output
from the TASKINFO advanced analysis macro. Notice that each job and task starts with the
work Task and then the task number. Also notice that the AuxStgDelta is the number of pages
allocated in Hex (a page is 4 KB.)
Note: In Figure 4-1 above, notice that Task #1 is a LIC task. We know that
MASOSERVICETASK is a LIC talk because there is no job user or job number listed.
Task #2 is a job. It lists a job name (SERVER), job user (QNOTES), and job number
(021960).
The TASKINFO macro breaks up multi-threaded jobs like SERVER. Each thread has its
own task dispatching element (TDE) and is listed separately in this output. Therefore, it
would be normal to see SERVER job 021960 again in this list.
Example
Your iSeries has 100 GB of main memory. Yesterday evening your system was only 50% used
(the % System ASP used field was only 50% and the Current unprotect used was only 5 GB
when you went home last night). You noticed this morning, that your storage space was
rapidly increasing. The % System ASP used now reads 85%, the Current unprotect used now
reads 40 GB, and both values are rising. This means that a job on your system is currently
using around 35 GB of temporary storage and not releasing it. Perform these steps to find the
job that is using too much temporary storage:
1. Follow steps 1 to 10 on page 177 to make a list of the 15 jobs that have allocated the most
temporary storage. Here is a partial list for the sake of this example:
ROUTER/QNOTES/022012
QPADEV002F/BOBBY/346852
HTTP/QNOTES/022120
ADMINP/QNOTES/021996
SERVER/QNOTES/021960
2. Now start ending the jobs one at a time while watching the Current unprotect used field on
the WRKSYSSTS screen.
Figure 4-2 shows the WRKSYSSTS screen before you end any jobs.
The first job on the list is a Domino job. Domino jobs do not handle the ENDJOB command
correctly (see “Domino server crashes” on page 581 for more information), so you must
access the Domino console (using the WRKDOMCSL SERVER(<ServerName>) command) and
issue the command TELL ROUTER QUIT to end the ROUTER job. Once ROUTER ends,
check the WRKSYSSTS screen again. Remember to press the F10 key to reset the
statistics and get the latest information for the Current unprotect used field.
Figure 4-3 shows the WRKSYSSTS screen after you end the ROUTER job from your list.
Figure 4-3 Top of the WRKSYSSTS screen after ending the ROUTER job.
Figure 4-4 Top of the WRKSYSSTS screen after ending the QPADEV002F job.
Notice that the Current unprotect used field only decreased by about 300 MB. This means
that the QPADEV002F job from your list was not responsible for the large amount of
temporary storage allocated on your iSeries.
4. The next job on your list is another Domino job. Access the Domino console again
(WRKDOMCSL SERVER(<ServerName>)) and issue the command TELL HTTP QUIT to end the
HTTP job. Once HTTP ends, check the WRKSYSSTS screen again. Remember to press
the F10 key to reset the statistics and get the latest information for the Current unprotect
used field.
Figure 4-5 shows the WRKSYSSTS screen after you end the HTTP job from your list.
Figure 4-5 Top of the WRKSYSSTS screen after ending the HTTP job.
Notice that the % System ASP used dropped down to 51% and the Current unprotect
used is down to about 5.8 GB. This is just about where the system was when you went
home last night. This means that the HTTP job was responsible for the large amount of
temporary storage allocated.
If you cannot figure out what caused the extra memory allocation, restart the jobs you ended.
Monitor the % System ASP used field and Current unprotect used field on the WRKSYSSTS
screen closely. See if this problem happens again. If it does, you have two options:
1. Try to figure out, by yourself, what is causing the problem.
Assume it is the same job taking the excessive temporary storage as the last time. To
confirm that assumption, use the WRKJOB command and menu option 3 to see
approximately how much temporary storage is currently allocated to the job.
If the temporary storage allocation is very high for that job, then you must identify which
thread is taking the bulk of that storage. (The information in “High CPU utilization in
Domino job(s)” on page 583 in the appendixes can help you.)
Once you identify the thread taking the bulk of the temporary storage for the job, then you
must figure out what that thread is doing. Check the call stack for the thread or run Domino
commands like TELL HTTP SHOW THREAD STATE.
This can be a very complex issue. It could be a problem with OS/400, Java, Domino, a
third party application, or an application you coded. Complete instructions for debugging
this issue could fill another entire redbook. It is outside the scope for this redbook.
2. Contact IBM Support for assistance in finding the root cause of the problem.
Call Lotus Support if a Domino job is responsible for the excessive temporary storage
allocation. Call IBM SupportLine if a non-Domino job is responsible for the excessive
temporary storage allocation.
The Disk Space Tasks menu (GO DISKTASKS) provides the option for collecting disk space
information. This helps in showing how storage is being used on your system. After collecting
the information, you can specify what information to include in a report and then print the
report.
Information on the Disk Space Tasks menu and how to use it is located in an IBM Knowledge
Base document called ‘Go DISKTASKS Overview’. It can be found on the following Web site:
http://www-912.ibm.com/s_dir/slkbase.nsf/slkbase
Once you gather the information, we suggest that you start by printing out a System
Summary Information report. This gives you a basic overview of all the storage space in use
on the iSeries. The output looks like Figure 4-6.
The reports are always printed from the most recent data collected. Make sure that the
collection you ran completed successfully by checking the Information collected data and
time field. Notice that Figure 4-6 has a date of August 4th, 2003 and a time of 11:01 PM.
Figure 4-6 System Summary Information report example from GO DISKTASKS menu
There are many permanent objects on the iSeries that may be taking storage. The three most
common objects that we see related to Domino and permanent storage are:
1. Spooled files:
You should regularly delete spooled files on your iSeries. The OS/400 Operational
Assistant menu allows you to schedule regular cleanup of objects such as spooled files. It
is recommended that you enable the cleanup feature of the OS/400 Operational Assistant.
To enable this feature and configure it, use the GO CLEANUP menu and option 1. The
default number of days to keep spooled files is seven days. This means that spooled files
that are older than seven days will be deleted when the night cleanup task runs if you do
not change the defaults.
2. Temporary Domino files:
Domino creates many temporary files when it runs. We call them temporary files because
they are not required for Domino and they are usually deleted automatically. The list below
gives you a few of the most common temporary files. They can all be deleted manually
using the RMVLNK command when the Domino server is ended. In general, you should
not delete these files when the Domino server is active.
Note: It is a good idea to periodically end the Domino server and delete the files listed
below. We recommend doing this at least once a month:
By default, the Domino server must touch every stream file in the Domino data
directory during startup. So the more files you have in the data directory, the longer
it takes to start the server.
By default, the Domino server function DbDirMan runs every minute in the SERVER
job. DbDirMan touches all of the stream files in the Domino data directory. So the
more files you have in the data directory, the longer DbDirMan runs and the more
CPU the SERVER job takes.
The columns you want to look at are entitled Max Active, Active->Inel, and Wait->Inel. Inel
stands for ineligible.
An ineligible job has work to do, but the iSeries is unable to accept more work at the present
time.
If a job goes ineligible, the things it needs to run that were in main memory or cache will
probably be paged out before the job gets back to the processor. This means that the job will
have to spend time getting the things it needs back into main memory or cache before it can
do its actual work. Therefore, the job will run longer and slow down performance. Remember,
cache is faster than main memory which is faster than disk I/O.
During normal system operations, you want zero jobs to be going ineligible. Be aware, jobs
going from the active state to the ineligible state (Active->Inel) will affect performance faster
than jobs going from a wait state to the ineligible state (Wait->Inel). However, both state
transitions are bad for performance. How much work an iSeries can handle is controlled by a
concept called activity levels.
4.1.2 Work with Active Jobs and Work with System Activity
There are two commands that allow you to monitor the CPU utilization on the iSeries. Those
commands are Work with Active Jobs (WRKACTJOB) and Work with System Activity
(WRKSYSACT). While these commands show similar information, they are not exactly the
same.
As you can see from this list, the WRKACTJOB and WRKSYSACT commands show a lot
more than just the CPU utilization. Next we discuss the information these commands provide
that relates to Domino and performance.
CPU
The primary use for the Work with Active Jobs command is to view the CPU in use on the
system. WRKACTJOB can display the total CPU in use on the system. It also displays the
CPU used by each job. The data can represent a snapshot of what the CPU looks like right
now or an average of what the CPU has looked like over the past few hours. If you know what
the CPU on your system normally looks like, you can use this command to find possible
problems relating to performance or looping jobs. (To know what your system looks like, you
should be monitoring the performance on your system. See Chapter 3, “Monitoring Domino
performance on the iSeries” on page 121.)
You can display the CPU data in a couple of ways. The default is to sort the jobs by name in
their respective subsystems. This allows you to see all the Domino jobs for one server
grouped together under their subsystem. You can also sort the jobs by the percentage of CPU
they are using. To sort the jobs by CPU, place your cursor on the CPU % column and press
F16. This will sort the jobs in descending order by the CPU percentage they are using.
For an example of how the WRKACTJOB output looks by default, see Figure 4-7. Notice the
CPU % field at the top left. This is the CPU for the entire system. There is also a column
called CPU %. That column shows the CPU percentage in use for a single job.
An elapsed time of 2 to 30 minutes is a good time span to look at. When the elapsed time
is less than two minutes, the data may be skewed by a sudden spike of activity. When the
elapsed time is greater than 30 minutes, the data you are looking at may be too general to
spot any problems. If you are trying to debug a performance problem that started 20
minutes ago and you are looking at an elapsed time of 4 hours, then the performance
problem will be hidden by the 3 hours and 40 minutes where the system was running fine.
For an example of how WRKACTJOB looks when you sort the jobs by CPU, see Figure 4-8.
Notice that the CPU % field in the top right corner shows that the system is running at 72%.
However, the jobs listed only show about 47%. In this situation, it is likely that a LIC task is
generating the missing 25% of CPU utilization. To find out which LIC task is taking 25% of the
CPU, use the WRKSYSACT command. See “Work with System Activity (WRKSYSACT)” on
page 190.
For examples of using CPU values to identify a problem, see “Daylight Savings Time” on
page 600 and “Server based mail rules” on page 606.
For example, if you are having problems with response times from a Web browser, you should
look at the run priority of the HTTP job. By default, the Domino HTTP job has a run priority
of 20. Once you know the run priority of the job having problems (HTTP), then you look at
other jobs that are taking a lot of CPU in your system and check their run priorities. If you
have another job taking 40% of the CPU and it has a better run priority (like 15), then that job
will get to use the system resources before the HTTP job.
For more information on what a job run priority is and how to change it, see “Run priority” on
page 192.
Important: The run priority displayed on the WRKACTJOB screen is the run priority that a
job started with or the run priority you changed the job to with the Change Job (CHGJOB)
command. If you have QDYNPTYADJ enabled (see “QDYNPTYADJ and QDYNPTYSCD”
on page 217), then the system may be changing the job’s run priority. That dynamic run
priority change is not displayed on the WRKACTJOB screen.
The QDYNPTYADJ changed run priority is displayed on the Work with System Activity
(WRKSYSACT) screen. This command is part of the iSeries Performance tools
(5722-PT1).
The Work with Active Jobs screen can show you the run priority of any job in the system,
including Domino jobs. To view this data, do the following steps:
1. Enter the WRKACTJOB command:
WRKACTJOB
2. Press F11 until you see a column called Pty.
The Pty column shows the run priority of a job. See Figure 4-9.
Notice that all Domino jobs have a run priority of 20. That is the default run priority for all
Domino jobs.
Also notice that there are now two CPU columns. One column is CPU % and the other
column is CPU. The CPU % column is the same one we discussed above in “CPU” on
page 185. The new CPU column shows the total processing unit time used by the job,
expressed in seconds. That is, it shows how many seconds the job has been in the processor.
Storage pools
When reviewing job and system performance, there are times when you need to know which
storage pool a job is running in. By default, Domino jobs run in the *BASE storage pool. The
*BASE pool is pool number 2. Since Domino jobs can be configured to run in other shared or
private pools on the iSeries, you need a way to check which storage pool a job is actually
using.
To determine in which storage pool a job is running, use the WRKACTJOB screen.
1. Enter the Work with Active Jobs command:
WRKACTJOB
2. Page down and find the job you want to look at.
3. Press F11 until you see a column called Pool.
This column shows you which storage pool a particular job is running in.
See Figure 4-9 to view the Pool column. Notice that all of the Domino jobs shown are running
in the default *BASE pool which is pool number 2.
For information on what to do with the storage pool data once you find it, refer to “Work with
System Status (WRKSYSSTS)” on page 172.
Threads
OS/400 V4R2M0 introduced the concept of threads to the iSeries.
Each piece of work on the iSeries is performed in a job and each job has a unique name to
identify it within the system. All jobs, with the exception of system jobs, run in a subsystem. A
job is a collection of one or more threads. Each job has at least one thread which is referred to
as the initial thread. The initial thread is created when the job starts. Some jobs on the iSeries
A thread represents an independent unit of execution within a program. Each thread has its
own run environment, such as a call stack. However, a thread shares many of the resources
that are assigned to the job to which the thread belongs.
Many Domino jobs are multithreaded. For instance, the SERVER, HTTP, and UPDATE jobs
are all multithreaded at Domino 6.
There are a two things you need to be aware of on the WRKACTJOB screen that relate to
threads and Domino performance. The first thing is how the information displayed on the
WRKACTJOB screen relates to threads. The second thing is how to display the number of
threads currently running in a job. We now discuss some of the details:
The WRKACTJOB command groups all threads together under their related job.
This means that some statistics that you see on the WRKACTJOB screen relate to only
the initial thread in the job and some statistics relate to all the threads in a job (initial and
secondary).
These are some of the statistics that relate to only the initial thread in the jobs:
– Status:
The job’s status that is listed on the WRKACTJOB screen under the Status column
represents the current status of the initial thread. The secondary threads will have their
own status independent of the initial thread.
To view a secondary thread’s status, use the WRKJOB command (with the appropriate
job information) and then option 20 on the Work with Job screen.
Note: If you make a change to the status of a job (for instance, if you hold a job
using option 3 on the WRKACTJOB screen), then you will be changing the status of
all the threads in that job — not just the initial thread.
– Function:
The function that the job is currently running is listed on the WRKACTJOB screen
under the Function column. The Function represents the current function that the initial
thread is running.
– Call Stack:
Option number 10 on the WRKACTJOB screen allows you to display the call stack for
the initial thread of a particular job. Remember, each thread has its own call stack.
To view the call stack of a secondary thread, use the WRKJOB command (with the
appropriate job information), menu option 20 on the Work with Job screen, and then
option 10 to display the call stack of the thread you select.
Here are some of the statistics that relate to all of the threads in a job:
– CPU %:
The CPU percentage for a job is listed on the WRKACTJOB screen under the CPU %
column. The CPU percentage is the combined CPU used by all the threads in the job,
not just the initial thread.
CPU
Just like the WRKACTJOB command, WRKSYSACT shows CPU information. It shows both
the system CPU (although it is broken up into maximum CPU, minimum CPU, and average
CPU) and individual process CPU. We use the term process here because WRKSYSACT
shows both jobs and LIC tasks.
In Figure 4-10 on page 191, there are both jobs (threads) and LIC tasks. You can identify a
LIC task by the lack of a job user (the User column) and a job number (the Number column).
RMTMSAFETA is a LIC task, as is CFINT01.
In the past, this task was also used to throttle back interactive work in iSeries Server
models. The Server models were designed for batch work, not interactive. If too much
interactive work was run on a Server model, the CFINTxx task took CPU to slow down the
interactive work.
This means that it used to be very common to see the CFINTxx task listed on the
WRKSYSACT screen taking a lot of CPU on Server models. CFINTxx is no longer used for
this purpose, however, it still moves processes from the TDE queue to the processor, so it
will still show up in WRKSYSACT. The difference is that CFINTxx is usually taking less
than 1% of the CPU on new systems.
Unlike the WRKACTJOB command, WRKSYSACT only shows the processes actively taking
CPU on the system. It does not list processes that are inactive. To be considered active, a job
or task must use at least one-tenth of 1% (.1%) of the processing unit or perform one I/O
operation.
Also, the WRKSYSACT command does not show all the threads grouped together under the
job that started them. Instead, each individual thread is considered a separate process. This
can be useful when you are trying to identify which thread(s) is generating excessive CPU in
a multithreaded job. Notice the SERVER job in Figure 4-10. The job name (SERVER), user
(QNOTES), and number (021960) are all the same, so this is the same job. However, the
thread number is different. One is thread 0000001B and one is thread 00000014.
Figure 4-10 Work with System Activity command showing jobs and LIC tasks
For an example of how WRKSYSACT and CPU information can help identify problems, see
“High CPU utilization in Domino job(s)” on page 583.
The CPU time reported for HVLPTASK is a function of the processing capacity assigned to
the partition. The CPU time charged to HVLPTASK scales with the amount of work being
done by real jobs — thus making the system CPU percent utilization behave appropriately
— going from 0 to 100 in direct proportion to the amount of real work going on.
For example: LPAR A has a capacity of 0.9 processor units and it is defined to use one
virtual processor. When the partition is idle, HVLPTASK is consuming 0% of the CPU time.
As the CPU time consumed by real jobs in the partition goes from 0 to 0.9 processor units
(that is the maximum CPU resource allowed), reported system CPU utilization for the
partition will go from 0% to 100% . Reported CPU utilization for HVLPTASK will go from 0%
to 10% and reported CPU utilization by real jobs will go from 0 to 90%.
The morale of this story is, if you are using LPARs with shared processors, do not panic if
you see a task called HVLPTASK taking a lot of CPU on the WRKSYSACT screen. This is
normal for that kind of LPAR configuration.
Run priority
The Work with System Activity screen shows the current run priority for the process. As
stated in the WRKACTJOB section, if you have QDYNPTYADJ enabled (see “QDYNPTYADJ
and QDYNPTYSCD” on page 217), then WRKACTJOB may not show the current run priority.
The WRKSYSACT screen will always show the current run priority, even if QDYNPTYADJ has
changed the run priority.
The WRKSYSACT screen will also show the true run priority of the SERVER threads. As
stated previously in the WRKACTJOB section, the SERVER job is hardcoded so its threads
can change run priority to improve performance. So you should not be surprised if you see
one thread in the SERVER job with a run priority of 20 and another thread in the same
SERVER job with a run priority of 21.
The current processing capacity specifies the percentage of the current capacity that is being
used in the LPAR. For an LPAR sharing physical processors, the current processing capacity
represents the share of the physical processors in the pool it is running. For an LPAR using
dedicated processors, the current processing capacity represents the number of virtual
processors that are currently active in the LPAR.
Note: Changing the run priority of a Domino job can help improve response time if the
system CPU is high and the change is made wisely. If the system CPU is low, changing a
job’s run priority does not usually improve response time or performance.
Some of the different job types are interactive, batch, and batch immediate. The term
interactive has a very specific meaning in OS/400. It refers to a 5250 emulation session with
some strong performance implications. An interactive job becomes active for a short period of
time and then waits for the user’s next request. A batch job runs for long periods of time. A
batch job runs in the background and usually does not require user interaction.
Jobs have several attributes such as run priority, time slice, language feature, CCSID (Coded
Character Set Identifier), and date format/separators.
The run priority is used when a job competes against other jobs for system resources like
CPU. Run priority is a value that ranges from 0 (highest priority) to 99 (lowest priority). So the
smaller the value for the run priority, the better the job's chance of getting system resources.
For example, there are two jobs that want to use the CPU. One job has a run priority of 20, the
other job has a run priority of 50. The job with the run priority of 20 gets to use the CPU first.
The other job has to wait.
When enabled, the dynamic priority scheduler (see “QDYNPTYADJ and QDYNPTYSCD” on
page 217) will adjust job priorities within priority bands, depending on each job's use of
system resources. The priority bands are as follows:
Priorities 10-16 are in band 1
17-22 are in band 2
23-35 are in band 3
36-46 are in band 4
47-51 are in band 5
52-89 are in band 6
Attention: You should never set a Domino job’s run priority to less than 10. Any jobs that
are given a priority of 0 through 9 are put in the high-priority band 0. By default, only
system jobs and subsystems get these priorities.
This band is always checked first by the task dispatcher before any other dynamic priority
bands are checked. If a job in this band becomes processor bound (by looping), the job
can lock the system.
By default, an interactive job has a run priority of 20, a batch job has a run priority of 50, and
a Domino batch immediate job has a run priority of 20 on the iSeries.
First you need to decide if changing the run priorities will help performance. Changing the
priority of a job does not necessarily slow down or speed up a job. Only on a busy system,
where jobs are constantly fighting for resources, will the run priority change the amount of
time it takes for a job to run.
For example, if eight jobs want to use the system processors at the same time and your
iSeries has eight processors, then it does not matter if one job has a higher run priority than
the other jobs. All eight jobs can use the eight processors at the same time. However, take
that same example and substitute an iSeries that only has one processor. Now you can see a
The second step is to break the Domino jobs up into two different groups. One group will
include the Domino jobs that behave like interactive jobs. The other group will include Domino
jobs that act like batch jobs:
HTTP and SERVER act like interactive jobs. Users issue requests from clients and wait for
the results. When the user issues the request, one of the job’s threads becomes active.
After the request has been processed, the thread waits for the user’s next request which
may not occur for a few minutes. If the user’s request takes a long time to process, then
the user experiences poor response time and complains about performance.
AMGR, UPDATE, and REPLICA act like batch jobs. They handle activities that the server
requests (not the user). Once they start processing an activity, they could run for a long
period of time. End users are not waiting for a response to their requests, so the amount of
time it takes to complete the activity is not as important as for other jobs.
The third step is to decide what your goal in changing the run priorities is. If your goal is to get
faster response time for your users that access Domino via a Web browser, then you have to
figure out how to make the HTTP job’s run priority higher than the other jobs that are taking
CPU on the system. This does not necessarily mean that you need to change the HTTP run
priority from 20 to 15.
This leads us to the final step, which is to plan your changes and look at the possible
consequences. In the HTTP example from the previous step, we said that you do not
necessarily want to change the HTTP run priority to 15. Changing the HTTP run priority to 15
may be the simplest solution, but it may not be the right solution. You need to look at your
system and see what is preventing HTTP from getting time in the processor(s). Maybe the
UPDATE task is constantly running and is taking all the CPU. In that situation you can change
the UPDATE job’s run priority from 20 to 25. This still has the desired effect of making the
HTTP run priority higher than other jobs (UPDATE) that are taking CPU, but it will not hurt
jobs like SERVER or 5250 interactive sessions. If you had changed the HTTP job to 15, then
the SERVER job may start experiencing problems with response time because HTTP has a
higher run priority. So you could end up with a different set of users complaining about
performance which does not solve your problem.
Tip: When changing run priorities, change the priority to a different band. If you want to
change UPDATE so it does not compete with HTTP, change UPDATE from 20 (which is
band 2 with run priorities 17-22) to 25 (which is band 3 with run priorities 23-35).
Be careful when changing the run priorities of certain jobs critical to your server. If your
server primarily handles SMTP mail, do not lower the run priority of ROUTER or SMTP.
Even though ROUTER and SMTP act more like batch jobs than interactive jobs, they are
critical for SMTP mail. If you lower the run priority, you could end up with a lot of mail stuck
in MAIL.BOX waiting for processor time so it can be delivered.
Changing the run priority for a job affects all the threads within the job.
The first way is dynamic using iSeries Navigator. The second way is static using a 5250
emulation session.
Modifying a run priority dynamically is a good way to test your changes. You can alter the run
priority of a job and see what kind of effect it has on the rest of the system. If you do not like
the effect, you can easily change the run priority back to the original value.
To change a job’s run priority dynamically with iSeries Navigator, follow these steps:
1. Start iSeries Navigator.
2. Connect to the system where Domino is running.
3. Select Work Management -> Active Jobs.
4. Scroll down until you find the job for which you want to change the run priority.
5. Right-click that job and select Properties.
6. Click the Performance tab.
7. Change the Run Priority field (see Figure 4-11).
8. Click OK.
Figure 4-11 Changing the run priority of a job via iSeries Navigator
To change a Domino job’s run priority statically via a 5250 emulation, follow these steps:
1. Create a class that defines the new run priority you want to use:
CRTCLS CLS(QUSRNOTES/PRIORITY25) RUNPTY(25)
The new class must be in the QUSRNOTES library.
2. Change the owner of the new class to QNOTES:
CHGOBJOWN OBJ(QUSRNOTES/PRIORITY25) OBJTYPE(*CLS) NEWOWN(QNOTES)
3. Create an empty stream file in the /QIBM/UserData/LOTUS/NOTES directory called
domino_classes. Use the Edit File (EDTF) command to create the file with the correct
code page.:
EDTF STMF('/QIBM/UserData/LOTUS/NOTES/domino_classes')
4. Populate the new stream file with the following information:
Note: The servername is the common name, not the hierarchical server name.
SERVER=servername
CLASS=classname
TASKS=taskname
To change the run priority of a Domino job in a specific Domino partition, specify the
server with the keyword SERVER and then reference the class and tasks that you want
to use the new run priority. See Figure 4-12.
Notice that the UPDATE job and REPLICA jobs in server DOMPERF will start with the
run priority defined in the PRIORITY25 class. The CLREPL job in server DOMCLUS1
will start with the run priority defined in the PRIORITY36 class.
5. Once you finished populating the domino_classes file, save the information and exit the
Edit File screen by pressing F3 twice.
6. Change the owner of the new domino_classes stream file to QNOTES:
CHGOWN OBJ('/QIBM/UserData/LOTUS/NOTES/domino_classes') NEWOWN(QNOTES)
7. End and restart your Domino server(s) to pick up the changes:
ENDDOMSVR SERVER(<ServerName>)
STRDOMSVR SERVER(<ServerName>)
CMD ....+....1....+....2....+....3....+....4....+....5....+....6....+....7....+
************Beginning of data**************
___ SERVER=DOMPERF
___ CLASS=PRIORITY25
___ TASKS=UPDATE,REPLICA
___ SERVER=DOMCLUS1
___ CLASS=PRIORITY36
___ TASKS=CLREPL
************End of Data********************
Figure 4-12 The domino_classes stream file to alter the run priorities of Domino jobs
Restriction: All Domino jobs/tasks can have their run priority changed with this method
with the exception of the QNNINSTS and the SERVER jobs. These jobs are hardcoded to
pick up their run priority from the class who’s name matches the name of the subsystem for
the Domino server. It is strongly recommended that you do not change the run priority in
the base (DOMINO02) class for two different reasons:
QNNINSTS does most of its work when the Domino server is starting/stopping. You do
not want to negatively impact your Domino server when it is starting or stopping by
changing the run priority of a job responsible for starts/stops.
SERVER is designed so that secondary threads’ run priority can change dynamically
while the Domino server is running. Development designed it this way for better
response times. Even if you modify the run priority of SERVER, the code design will
change your modification.
The two aspects that affect Domino performance the most are how busy the disk arms are
and if any disk arms are significantly busier than the other disk arms in the ASP.
Note: Each individual disk unit has a single disk arm. So if you have 12 disk units, you
have 12 disk arms.
When a disk arm becomes more than 30% busy, you may start to notice performance issues
with a Domino server. When a disk arm becomes more than 40% busy, you will notice
performance issues with your Domino server.
Before you look at the statistics on the WRKDSKSTS screen, you must know which ASP your
Domino server is configured in. The quickest way to check this is to use the Display Link
(DSPLNK) command.
1. Find the path name of your Domino data directory. Use the WRKDOMSVR command. On
the Work with Domino servers menu press F11 twice for the Path column. This displays
the path of your Domino data directory.
2. Use the Display Link command to output data on the files in the Domino data directory:
DSPLNK OBJ('/LOTUS/DATA/DOMPERF/*') OUTPUT(*PRINT) DETAIL(*EXTENDED) DSPOPT(*ALL)
This command will create a spooled file called QSYSPRT.
3. Search the spooled file for the word Auxiliary.
Auxiliary storage pool number 1 is the system ASP. See Figure 4-13 for an example of the
output from the DSPLNK command.
Figure 4-13 DSPLNK output used for finding the ASP that Domino is running in
Now that you know which ASP your Domino server is running in, you can use the
WRKDSKSTS command to see how busy the disk arms in your ASP are. Follow the steps
listed below to see how busy the disk arms are:
1. Use the Work with Disk Status command to access information on internal disk units:
WRKDSKSTS
2. Press F11 to see which ASP the disk units are configured to run in.
3. Find the disk units configured in the ASP where Domino is running. So if your Domino
data directory is in ASP number 1, then look for the disk units in ASP 1.
As stated previously, when disk units become more than 30% busy, you may start to notice
performance problems.
If the disk units in the ASP where Domino runs are averaging more than 30% busy on a
typical work day, then you may want to consider buying additional disk units or moving some
workload out of that ASP. See Figure 4-14 for an example of such a system.
Adding disk units would probably improve Domino performance. (This example is a close call.
Performance may be okay, but you should closely monitor the % Busy for any increases.)
Another important thing to check on the WRKDSKSTS screen is how busy the disk arms are
in relation to other disk arms in the same ASP. If one or two disk arms are significantly busier
than the other disk arms in the same ASP, then you may have a problem with how the data is
distributed on the disk units.
Important: When you are looking for problems with disk units balancing, you must have an
elapsed time greater than 10 minutes. Anything under 10 minutes could be skewed by a
spike in usage and should be ignored.
If this happens, you should attempt to redistribute the data across other disk units in the ASP.
For information on how to do this, you can either contact the IBM iSeries SupportLine or
search the iSeries Information Center for the Trace ASP Balance® (TRCASPBAL) and Start
ASP Balance (STRASPBAL) commands at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
See Figure 4-15 for an example of a single disk unit (#6) being accessed too often. In this
situation, you should consider redistributing the data to other disk units in the ASP.
Ports are analogous to network and system addresses. Just as an internet address identifies
a system on a network, a port identifies a destination on a system. An application (such as a
Domino server) may wait for incoming service requests on a port. A client application (such
as a Lotus Notes client) sends requests to a specific iSeries and port. Ports numbered less
than or equal to 1023 are generally reserved for use by standard TCP and User Datagram
Protocol (UDP) application programs such as Simple Mail Transfer Protocol (SMTP) on
port 25, TELNET on port 23, and Post Office Protocol (POP3) on port 110.
For a Domino server to work properly, the correct ports must be in a LISTEN state on the
iSeries. When a port is in LISTEN status, it is listening for new connection requests from a
client. If a Lotus Notes client attempts to connect to a Domino server on port 1352 and there
is no port 1352 in a LISTEN state, then the Lotus Notes client gets an error that the server is
not responding.
To check your ports, use the NETSTAT *CNN command. All the ports in LISTEN status are
listed at the beginning. See Figure 4-16 for an example of the NETSTAT *CNN command.
Notice the local port 1352 in a LISTEN state. This is a Domino server listening for new
connection requests.
Tip: The NETSTAT *CNN screen also has a column called Idle Time. This column is very
useful when debugging a Domino server hang. Every time a client attempts to connect to a
port in a LISTEN state, it resets the Idle Time. In Figure 4-16, you can see that the idle time
is 1 second.
If you were experiencing a server hang related to a network or DNS problem, you may see
a very large idle time for port 1352. This would tell you that even though a Lotus Notes
client is attempting to connect to the Domino server, it is never making it to the iSeries.
Something in the network is preventing it from getting to the iSeries.
Retransmissions
A retransmission occurs when a data packet (like a TCP packet) must be resent. A
retransmission can occur if the local system does not receive an acknowledgement for a
packet it sent. A retransmission can also occur if the data in the checksum does not equal the
number of bits in the TCP packet.
Retransmissions are not supposed to be common. If you see a lot of retransmissions, then
you are having a problem and it can affect performance.
To identify if Domino is having a problem with retransmissions, you can use the information on
the NETSTAT *CNN screen by doing the following steps:
1. Run the NETSTAT *CNN command to access the data:
NETSTAT *CNN
2. Press the F15 key to display a subset of the data on the Work with TCP/IP Connection
Status screen.
3. Type 1352 on the Local port range: Lower value field and press Enter twice.
See Figure 4-17 for an example of the screen you should now have displayed.
4. Place a 5 in front of a connection and press Enter.
Pick any connection other than the ones in a LISTEN state.
5. Page down and look for the retransmission information as shown in Figure 4-18.
Make note of how many retransmissions this conversation has had.
6. Press the F12 key to return to the Subset of TCP/IP Connections screen and display
another connection. Repeat steps 4 and 5 for several connections.
The retransmission problem could also be related to an issue with checksums. See
“Checksum” on page 590 for more details.
Bottom
F3=Exit F5=Refresh F9=Command line F11=Display byte counts F12=Cancel
F15=Subset F22=Display entire field F24=More keys
Figure 4-17 Subset of TCP/IP Connections screen - accessed with F15 from NETSTAT *CNN
Bottom
Press Enter to continue.
F3=Exit F5=Refresh F6=Print F8=Display jobs F9=Command line
F12=Cancel F14=Display port numbers F24=More keys
Unfortunately, some network switches cannot handle this configuration. Some switches
generate a route table that include the IP address of the host and the MAC address of the
adapter that owns the IP address. When the adapter used for incoming traffic is different from
the adapter used for outgoing traffic, this can confuse the switch and cause it to send out ARP
broadcasts to build a new route table. If this happens often, then you can experience
performance problems related to this.
Use CFGTCP menu options 1 and 2 to determine if you could be experiencing this problem.
1. By looking at the CFGTCP menu option 1, you can identify if your system has multiple
adapters. Menu option 1 is the Work with TCP/IP Interfaces screen. Count the number of
active line descriptions on that screen. To see if a line description/interface is active, press
the F11 key to display the Interface status column. Do not count the *LOOPBACK line.
See Figure 4-19 for an example of a system with multiple adapters (ETHLINE and
ETHLIN2).
Bottom
F3=Exit F5=Refresh F6=Print list F11=Display interface status
F12=Cancel F17=Top F18=Bottom
Bottom
F3=Exit F5=Refresh F6=Print list F11=Display type of service
F12=Cancel F17=Top F18=Bottom
For complete information on route binding and the problems it can cause, see “Network
routing - ARP storms” on page 593.
If the Domino server has to go to an external DNS to resolve its name, then it is sending a
packet out on the network and it has to wait for a response to come back on the network. This
takes time and increases the traffic on the network. Thus it is quicker to allow the Domino
server to resolve its name in the local host table. Use menu options 10 and 12 on the
CFGTCP menu to configure this.
Menu option number 10 on the CFGTCP menu is the local host table. Just like a host table on
a PC, this local host table contains a list of names and their corresponding IP addresses. It is
recommended that you list the Domino server name in this table. List both the common name
and the fully qualified TCP/IP name. For an example of how this is defined, see Figure 4-21
and look at the entry for the Domino server called DOMPERF.
Internet Host
Opt Address Name
10.1.92.12 DOMSMTP
DOMSMTP.ACME.COM
10.1.92.14 DOMPERF
DOMPERF.ACME.COM
10.1.122.16 DOMCLUS1
DOMCLUS1.ACME.COM
10.1.122.35 AS09
AS09.ACME.COM
127.0.0.1 LOOPBACK
LOCALHOST
Bottom
F3=Exit F5=Refresh F6=Print list F12=Cancel F17=Position to
Menu option number 12 on the CFGTCP menu contains information on your domain and
Domain Name Server (DNS). In general, you will get better performance with a Domino
server by making the iSeries check its local host table before doing a DNS query.
To make the iSeries check its local host table before querying the DNS, set the Host name
search priority field to *LOCAL. However, do not set this field to local if you have a DNS
configured on the local iSeries. It will not function correctly. See Figure 4-22 for an example of
an iSeries configured to check its local host table first.
Bottom
F3=Exit F4=Prompt F5=Refresh F10=Additional parameters F12=Cancel
F13=How to use this display F24=More keys
Important: The only comment we make about the Duplex configuration parameter is that
the Duplex setting on the line description must match the Duplex setting on the switch. If
your switch is set to *HALF, do not set the line description to use *FULL Duplex.
The MTU is usually configured at the line description level. To confirm that is true for your
system, check the TCP/IP route (CFGTCP option 2) and TCP/IP interface (CFGTCP
option 1).
1. Access the Configure TCP/IP menu:
CFGTCP
2. Select menu option 2.
3. Use option 5 to display the routes.
4. Check the Maximum transmission unit field.
If the value in that field is *IFC, then you must check the TCP/IP interfaces.
5. Press F12 to get back to the Configure TCP/IP menu.
6. Select menu option 1.
Make note of the active line descriptions on this screen.
7. Use option 5 to display the interfaces.
8. Check the Maximum transmission unit field.
If the value in that field is *LIND, then the MTU size is set at the line description level.
To check the MTU on the line description, enter the Work with Line Descriptions (WRKLIND)
command. Find the line descriptions you wrote down in step 6, place a 5 in front of the line
and press Enter to display its configuration. Look at the Maximum frame size field. This field
shows the MTU size for the line.
A lot of customers configure the MTU size large when using fiber or copper. Since the iSeries
and the lines can handle 8 KB, it is believed that a setting of 8 KB will make conversations
faster. The problem is that most switches will not transfer an 8 KB frame/packet. Most
switches will break the frame up into smaller frames. This takes time. The more frames that
need to be broken up into smaller frames, the more time it takes. This can severely impact
your network performance and thus your Domino performance.
We have found that an MTU of 1496 bytes is a good size for most Domino servers. Consult
your network administrator for more information on MTUs and your switch’s ability to handle
large frames.
We are discussing communication resets in this section. There is a known problem that can
affect Domino server performance that is identified by resets (RST) in a communications
trace.
There are many reasons why a reset can occur during a TCP/IP conversation - none of the
reasons are good. A reset is always a bad thing and if you are seeing lots of resets in an
iSeries communications trace, you should try to find the underlying problem causing them.
One of the possible underlying problems relates to a concept called a linger value. Linger
refers to how long a socket/session waits to close. The Domino server has a linger value
of 20. The OS/400 will reset (RST) any TCP conversation in a TIMEWAIT state which has not
closed. The default close time for TCP on the iSeries is 120 seconds. Due to this
configuration, when the Domino linger pops after 20 seconds a RST is sent because TCP has
not closed the session. This results in a lot of resets and can affect performance.
To see if you might be experiencing this linger problem, do the following steps:
1. Identify the active lines on your system that Domino could be using:
CFGTCP option 1
2. Start a communications trace against one of the lines. You may have to trace all lines.
STRCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN) MAXSTG(16M) USRDTA(*CALC)
The CFGOBJ parameter is the name of one of the active lines you found in step 1.
3. Let the trace run for a few minutes and then end it using the following command:
ENDCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN)
4. Print the communications trace with the PRTCMNTRC command:
PRTCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN) CODE(*ASCII) SLTCTLD(*ALL) FMTTCP(*YES)
FMTBCD(*YES)
This creates a spooled file called QPCSMPRT.
5. Review the communications trace and search for RST.
You can use the WRKJOB OPTION(*SPLF) command and option 5 to display the
QPCSMPRT file that contains the trace data.
Use the Find field and the F16 key to search the spooled file for RST.
See Figure 4-23 for an example of an RST.
Count the number of times a RST occurs against a Domino conversation. A Domino
conversation can be identified by its ports. A Domino conversation will occur on ports like
1352 - for Lotus Notes clients and the SERVER job, 80 - if running the Domino HTTP job,
25 - if running the Domino SMTP job, etc.
You must use your own judgement to determine if you are seeing too many RST packets.
As an example, if you ran a 5 minute trace and count 60 RST packets, then you should
consider investigating your network configuration to fix this problem.
One of the reasons that may be causing the problem of too many RST packets is the linger
issue. To fix the linger issue, change the TCP closed timewait timeout attribute. To change the
TCP closed timewait timeout attribute to a value that will avoid this problem, use the following
command:
CHGTCPA TCPCLOTIMO(18)
Note: There is a PTF available to fix this problem. The APAR number is MA27594. The
related PTF number is MF31068.
The QTOTJOB system value specifies how much auxiliary storage should be allocated for
jobs during the Initial Program Load (IPL). The term jobs, for this system value, includes
active jobs, jobs on a job queue, and jobs having output on an output queue.
The QADLTOTJ specifies the additional number of jobs that need storage allocated when the
initial number of jobs (the system value QTOTJOB) is reached. Auxiliary storage is allocated
whenever the number of jobs in the system exceeds the number for which storage has been
allocated.
The QADLTOTJ default value is shipped as 10. This setting usually does not need to be
changed. A change to this system value takes effect immediately.
To figure out what the QTOTJOB system value should be set to, use the WRKSYSSTS
command. On the Work with System Status screen, there is a field called Jobs in system. The
value for that field represents the total number of user and system jobs that are currently in
the system. The total includes jobs on job queues waiting to be processed, jobs currently
active, and jobs that have completed running but still have output on output queues to be
produced. Be aware, if you start a multithreaded Domino job like HTTP, the Jobs in system
value will increase by 1. The Jobs in system field on the Work with System Status screen and
the QTOTJOB system value both represent jobs, not threads.
Important: Clear output queues regularly. The OS/400 reserves auxiliary storage for a job
as long as there is at least one spooled output file for that job (even though the job may be
inactive). The more files there are in the output queues, the more jobs you see on the Work
with System Status screen.
The iSeries allows you to schedule cleanup tasks such as deleting spooled files from
output queues using the OS/400 Operational Assistant. It is recommended that you enable
the cleanup features of the OS/400 Operational Assistant. To enable this feature and
configure it, use the Cleanup Tasks menu and option number 1.
The default deletion interval for spooled files is 7 days. This means that spooled files that
are older than 7 days will be deleted when the night cleanup task runs if you do not change
the defaults.
Setting QTOTJOB
In general, you do not want the number of jobs in the system to be greater than the
QTOTJOB system value. Therefore, monitor the Jobs in system field on the Work with
System Status screen for a few days. Take the greatest value in that field and multiply it by
1.1. This increases the value by 10%. Take the result of this equation and use that as the
value for QTOTJOB.
For instance, if the greatest value you saw in the Jobs in system field was 220, then you
would take 220 times 1.1:
220 x 1.1 = 242
Take the result of that equation and set the QTOTJOB system value to that number:
CHGSYSVAL SYSVAL(QTOTJOB) VALUE(242)
Tip: Use common sense when setting QTOTJOB. If the total number of jobs in the system
is greater than 1000, then a 10% buffer is probably too large. You do not need 100 or more
extra job structures with nothing in them. Use a smaller percentage like 3% - 5%.
For example, if you set QTOTJOB to 100 and QADLTOTJ to 10, then when job number 101
wants to start (or is scheduled on a job queue) on your system there is a pause. The pause is
the system allocating auxiliary storage for 10 new job structures. These new job structures
are used for the next 10 jobs that start on the system. Once those 10 job structures are used,
if job number 111 wants to start, then there is another pause while 10 more job structures are
allocated from auxiliary storage. These pauses keep happening as long as the number of jobs
in the system keeps increasing. This is why you have to set QTOTJOB correctly.
The QACTJOB system value specifies how much auxiliary storage should be allocated for
active jobs during the Initial Program Load (IPL). The term jobs, for this system value,
includes only active jobs. It does not include jobs on a job queue or jobs having output on an
output queue. Therefore, QTOTJOB should always be larger than QACTJOB.
The QADLACTJ specifies the additional number of jobs that need storage allocated when the
initial number of active jobs (the system value QACTJOB) is reached. Auxiliary storage is
allocated whenever the number of active jobs in the system exceeds the number for which
storage has been allocated.
The QACTJOB default value is shipped as 20. This is not large enough for any iSeries
running Domino. A change to this system value takes place at the next IPL.
The QADLTOTJ default value is shipped as 10. This setting usually does not need to be
changed. A change to this system value takes effect immediately.
To figure out what the QACTJOB system value should be set to, use the WRKACTJOB
command. On the Work with Active Jobs screen, there is a field called Active Jobs. The value
in that field represents the total number of user and system jobs currently active on the
system. These are jobs that have started processing and not yet ended. The jobs numbered
here do not include jobs waiting to run on job queues or jobs that have ended with output on
an output queue. Again, be aware, if you start a multithreaded Domino job like HTTP, the
Active Jobs value will increase by 1. The Active Jobs field on the Work with Active Jobs
screen and the QACTJOB system value both represent jobs, not threads.
Setting QACTJOB
In general, you do not want the number of active jobs in the system to be greater than the
QACTJOB system value. Therefore, monitor the Active Jobs field on the Work with Active
Jobs screen for a few days. Take the greatest value in that field and multiply it by 1.1. This
increases the value by 10%. Take the result of this equation and use that as the value for
QACTJOB.
For instance, if the greatest value you saw in the Active Jobs field was 180, then you would
take 180 times 1.1:
180 x 1.1 = 198
Take the result of that equation and set the QACTJOB system value to that number:
CHGSYSVAL SYSVAL(QACTJOB) VALUE(198)
If the number of active jobs in the system becomes larger than the QACTJOB system value,
then there is a slight system delay. The delay occurs because when the number of active jobs
in the system becomes greater than QACTJOB, then the system must allocate auxiliary
storage to carve out space for the number of jobs in the QADLACTJ system value.
For example, if you set QACTJOB to 80 and QADLTOTJ to 10, then when job number 81
wants to start on your system there is a pause. The pause is the system allocating auxiliary
storage for 10 new job structures. These new job structures are used for the next 10 jobs that
start on the system. Once those 10 job structures are used, if job number 91 wants to start,
then there is another pause while 10 more job structures are allocated from auxiliary storage.
These pauses keep happening as long as the number of jobs in the system keeps increasing.
This is why you have to set QACTJOB correctly.
QMAXACTLVL
The QMAXACTLVL system value sets the number of threads (not jobs) that can compete for
processor resources and main storage at the same time. For all active subsystems, the sum
of all threads running in all storage pools cannot exceed QMAXACTLVL. If a thread cannot be
processed because the activity level has been reached, then the thread is marked ineligible
until another thread reaches a time slice end or goes into a long wait.
Setting QMAXACTLVL
The default for QMAXACTLVL is *NOMAX. This system value should be left at *NOMAX and
the activity level on the system should be controlled at the storage pool level. A change to this
system value takes effect immediately.
QMCHPOOL
The QMCHPOOL system value sets the size of the *MACHINE storage pool. The *MACHINE
pool is storage pool number 1 on the Work with System Status (WRKSYSSTS) screen. The
machine pool does not process work from user jobs. The machine pool processes the work
from the Licensed Internal Code (LIC) and communications data (like TCP/IP).
You must be careful when changing the size of this storage pool because the entire system
performance can be impacted if the pool is too small.
The QMCHPOOL default value is shipped as 20000 KB. A change to this system value takes
effect immediately.
Note: This value can be changed by the iSeries performance adjuster. If you have the
QPFRADJ system value set to 1, 2, or 3 (0 means that the performance adjuster is turned
off), then this system value is dynamically changed by the iSeries. This means that you do
not have to worry about setting this value correctly if you have the performance adjuster
turned on.
Allow the iSeries to run with the Domino workload for a couple of days. Then pick a busy time
of day and check the Reserved Size column on the Work with System Status screen for the
*MACHINE pool. You can set the QMCHPOOL system value to a value of two times the
reserved size for the *MACHINE pool.
For example:
WRKSYSSTS
Check the Reserved Size column for pool number 1 on the Work with System Status screen.
(See Figure 4-24.)
Tip: When changing QMCHPOOL on the green screen, use Kilobytes. When changing
QMCHPOOL from the iSeries Navigator, use Megabytes.
Bottom
Command
===>
F3=Exit F4=Prompt F5=Refresh F9=Retrieve F10=Restart
F11=Display transition data F12=Cancel F24=More keys
Figure 4-24 Setting QMCHPOOL system value based on WRKSYSSTS/Reserved Size value
The QBASPOOL system value is set by default to 5% of the main storage with a minimum
value of 2000KB. A change to this system value takes effect immediately.
This system value is very important to Domino if you are running with the iSeries performance
adjustor enabled (QPFRADJ set to 2 or 3) and your Domino servers are running in the default
*BASE storage pool. The QBASPOOL system value is important because the performance
adjuster cannot decrease the *BASE pool to a value less than the QBASPOOL system value.
Therefore, if you set your QBASPOOL system value correctly, then performance adjuster
cannot starve your Domino servers of memory.
Setting QBASPOOL
To correctly set the QBASPOOL system value on an iSeries where Domino is the main
application and running in the *BASE storage pool do the following steps:
1. Add the NOTES.INI parameter settings for NSF_BUFFER_POOL_SIZE_MB of all Domino
partitions together.
2. Multiply that number by 2.666.
3. Convert that value from MB to KB by multiplying the number by 1024.
4. Set the QBASPOOL system value:
CHGSYSVAL SYSVAL(QBASPOOL) VALUE(xxxxxx)
Where xxxxxx is the number of KB you calculated using the steps listed above.
Note: Use common sense when setting QBASPOOL. If the number you calculated in the
steps listed above is greater then the amount of main storage available outside of the
*MACHINE storage pool on your iSeries, then you cannot set QBASPOOL to that value.
Either decrease the Domino servers NSF_BUFFER_POOL_SIZE_MB or increase the
amount of main storage on your iSeries. If you cannot do either, then just set QBASPOOL
as close to the number you calculated as possible.
QBASACTLVL
The QBASACTLVL system value sets the activity level for the *BASE storage pool. The
*BASE pool is storage pool number 2 on the Work with System Status (WRKSYSSTS)
screen. By default, all Domino servers run in the *BASE pool.
The QBASACTLVL system value is set by default to 6. This value is not large enough for any
iSeries running Domino in the *BASE storage pool. A change to this system value takes effect
immediately.
Setting QBASACTLVL
If you do not intend to enable the iSeries performance adjuster, then here is a general rule of
thumb for setting the QBASACTLVL system value:
So if you have four Domino partitions (4 x 120 = 480), then try setting QBASACTLVL to 480.
Once you set QBASACTLVL, monitor the Work with System Status (WRKSYSSTS) screen
for ineligible jobs in the *BASE storage pool. If you set QBASACTLVL too low, then you can
see jobs going ineligible on this screen. If jobs are going ineligible in the *BASE storage pool,
then increase the QBASACTLVL system value in small increments, like 50.
QPFRADJ
The QPFRADJ system value is the iSeries performance adjuster. This system value specifies
whether the system should adjust values during initial program load (IPL), at regular intervals
for system pool sizes and activity levels, or not make any automatic adjustments.
The QPFRADJ system value is set by default to 2. A change to this system value takes effect
immediately.
If you plan to enable performance adjuster on a system where Domino runs, then it is
recommended that you change QPFRADJ to 3.
Figure 4-25 Work with Shared Pools to set the minimum size for a shared storage pool
The QDYNPTYSCD system value allows you to turn on and off the dynamic priority
scheduler. The task scheduler uses this value to determine the algorithm for scheduling jobs
running on the system.
The QDYNPTYADJ system value controls whether the run priority of interactive jobs is
dynamically adjusted to maintain high performance of batch jobs processing on iSeries
Server models hardware. This value is only effective on systems that are rated for both
interactive and non-interactive throughput and have dynamic priority scheduling
(QDYNPTYSCD) enabled.
The QDYNPTYSCD system value is shipped with a default of 1 (which is enabled). A change
to this system value takes place at the next IPL.
The QDYNPTYADJ system value is shipped with a default of 1 (which is enabled). A change
to this system value takes place at the next IPL.
It is recommended that you leave these system values enabled. They are designed to help
performance on systems with a lot of batch jobs (like Domino) and few interactive jobs.
QPRCMLTTSK
The QPRCMLTTSK system value allows you to turn on and off the processor multi-tasking
capability if the iSeries supports this feature. If it is enabled, then each physical processor will
act like two separate processors. So a one-way system can act like a two-way with this
feature enabled.
On a Logically Partitioned (LPAR) system, this system value controls the behavior of all
partitions (LPARS). This change can only be made from the primary partition. Make sure that
all configured LPARS can support this feature before turning it on.
In each new release of the operating system, commands and features are added to the IFS.
OS/400 V5R2M0 has two new IFS items that relate to Domino on the iSeries.
The first new item is a command called Convert Directory (CVTDIR). This command
allows you to change your directory formats from *TYPE1 to *TYPE2. See “Convert
Directory (CVTDIR) command - *TYPE1 versus *TYPE2” on page 218.
Note: Directory format *TYPE2 is not new in OS/400 V5R2M0. The command CVTDIR
is the new item in V5R2M0.
OS/400 V5R1M0 had an API called Convert Directory (QP0FCVT2) which would
convert directory formats from *TYPE1 to *TYPE2. However, this API was only
available by PTF (it was not shipped with the operating system initially). This PTF is part
of CUM Package V05R01M00_GA_010 and higher. Refer to Info APAR II13161 for the
latest PTF numbers.
The second new item is an attribute for the Change Attribute (CHGATR) command. The
new attribute is used to configure the main storage option (*MAINSTGOPT) of stream
files. See “Change Attribute (CHGATR) command - main storage options” on page 219.
The *TYPE2 directory format only applies to the root, QOpenSys, or UDFS sections of the
IFS.
Important: *TYPE2 requires the names to be valid UTF-16 names. This differs from
*TYPE1, which have UCS2 Level 1 names. For this reason, invalid or duplicate names may
be found during a conversion. When a name is found to be invalid or a duplicate, the name
is changed to a unique, valid, UTF-16 name, and message CPIA08A is sent to the joblog
listing the original name and the new name. Combined characters or invalid surrogate
character pairs contained in a name may cause an object to be renamed. Surrogate
characters and combined characters include characters with umlauts and accented
characters, for example: ÅåÄäÖö.
For more information on this topic, refer to the iSeries Information Center for V5R2M0 at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
There are options with the CVTDIR command to estimate how long it will take to convert all
the files specified. It is suggested that you use the *ESTIMATE option before converting your
files systems so you know about how long the conversion operation will take. It is also
suggested that you save your entire IFS before running the conversion. (This is not because
the CVTDIR command has problems. This is a general recommendation whenever you are
changing large aspects of your iSeries system.)
For complete information on the CVTDIR command and its options, see the iSeries
Information Center for OS/400 V5R2M0 at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Important information for OS/400 V5R3: In OS/400 V5R3, the conversion from the
*TYPE1 to the *TYPE2 directory format occurs automatically, while the system is running.
You cannot use the CVTDIR command anymore to convert. Instead, you can use the
CVTDIR command to monitor the progress of the conversion that is going on in the
background.
To understand this new enhancement, you must understand how data in a stream file is
retrieved from disk when it is accessed by an application like Domino. The iSeries has a
concept called block transfer size. Block transfer size describes the number of bytes that are
paged into memory when a page fault occurs. A page fault occurs when a program tries to
access data that is not currently in memory. The new enhancement allows you to adjust the
block transfer size.
The command used to change the main storage behavior of an IFS stream file is Change
Attributes (CHGATR). The CHGATR command has existed in previous releases of OS/400.
In V5R2M0 there is a new attribute for the CHGATR command called *MAINSTGOPT (Main
Storage Option). The three possible values for *MAINSTGOPT are *NORMAL (which is the
default), *DYNAMIC, and *MINIMIZE.
Note: There is another new attribute for the CHGATR command in OS/400 V5R2M0. That
attribute is called *DISKSTGOPT (Disk Storage Option). The disk storage option is
available to further reduce the amount of DASD used by *TYPE2 stream files. The disk
storage option has the same three possible values: *NORMAL, *DYNAMIC, and
*MINIMIZE.
In general, the disk storage option does not affect performance. However, there are
exceptions. For example, the *MINIMIZE value will use less disk space, but you should
only set this on stream files that are rarely accessed. If you use the *MINIMIZE option on a
file that is frequently accessed, you will negatively impact performance.
*Normal
Use the default main storage option *NORMAL when there is low contention for main storage.
We refer to this kind of environment as a memory rich environment. In a memory rich
environment, performance is optimized by using a larger block transfer size. This option can
help to minimize the number of disk I/O operations.
The *NORMAL main storage option uses a block transfer size of 16 KB.
*Minimize
Use the *MINIMIZE main storage option when there is a limited amount of memory available
for the application which is accessing the stream file. We refer to this kind of environment as
a memory constrained environment. In a memory constrained environment it is appropriate to
only bring into memory the data which the application is sure to use, so a smaller block
transfer size is used.
Note: To identify if you are running Domino in a memory constrained environment, see the
section on Memory in “Work with System Status (WRKSYSSTS)” on page 172.
The *MINIMIZE main storage option uses a block transfer size of 8 KB.
*Dynamic
The *DYNAMIC main storage option attempts to provide the best of both types of memory
environments. In a memory rich environment, the algorithms associated with the *DYNAMIC
option work to behave as though the *NORMAL option was specified. And in cases when
main storage is constrained, the algorithms work to behave as though the *MINIMIZE option
was specified. This option utilizes system tuning information to help it determine whether the
current memory environment is constrained.
The *DYNAMIC main storage option uses a block transfer size of 12 KB.
The *DYNAMIC option only has an effect when the paging option for the storage pool is set to
*CALC. When the storage pool’s paging option is set to *FIXED, then the block transfer size
of 12 KB is still used, but the paging behavior is the same as the *NORMAL option.
Example
Here is an example of the CHGATR command to change a single Domino database:
CHGATR OBJ('/LOTUS/DATA/DOMPERF/mail/bob.nsf') ATR(*MAINSTGOPT) VALUE(*MINIMIZE)
Note: You do not need to end your Domino server before running the CHGATR command
to alter the main storage option of Domino files. It is safe to run this command with the
Domino server active.
Example of the CHGATR command to change all databases in a single Domino subdirectory:
CHGATR OBJ('/LOTUS/DATA/DOMPERF/mail/*') ATR(*MAINSTGOPT) VALUE(*MINIMIZE)
This attribute can also be set from iSeries Navigator. Simply right-click on the stream file you
wish to change and select Properties. In the Properties box, go to the Storage tab as shown
previously in Figure 4-28 on page 224.
The default block transfer size on OS/400 V5R2M0 and previous releases is 16 KB.
Object . . . . . . : /LOTUS/DATA/DOMPERF/mail/BOB.NSF
For complete information on the main storage option changes in V5R2M0 and for test results
run against Domino servers with *MINIMIZE, *DYNAMIC, and *NORMAL, see the IBM paper
entitled V5R2 Stream File Performance Enhancements by Dave Johnson and Mike
Nordstrom:
http://www.ibm.com/servers/eserver/iseries/perfmgmt/pdf/ifsperf.pdf
Note: The *TYPE1 format was the default format for releases prior to V4R4M0. All new
Domino servers created on OS/400 V4R4M0 or higher releases were automatically
created with the *TYPE2 file format. However, if you moved a server with SAV/RST or
upgraded the OS/400 release without changing the Domino server, then the file format for
the stream files may still be *TYPE1.
The fastest way to check your Domino stream files is to use the DSPLNK command:
DSPLNK OBJ('/LOTUS/DATA/DOMPERF/*') OUTPUT(*PRINT) OBJTYPE(*STMF)
DETAIL(*EXTENDED) DSPOPT(*ALL)
This command creates a spooled file called QSYSPRT that can be searched. See
Figure 4-27 to see what the output from this command looks like.
Figure 4-27 DSPLNK output showing the file format of a Domino template
You can also check stream files individually using the Display Attributes option (8) on the
Work with Object Links (WRKLNK) screen. There is no command for the Display Attributes
option, so this must be done one stream file at a time.
The file format can also be found using the iSeries Navigator (see Figure 4-28):
1. Go to the File Systems -> Integrated File System section.
2. Drill down into your Domino data directory.
3. Select a Domino database and right-click.
4. Select Properties.
5. Go to the Storage tab and look at the File Format field.
If you run a component report against the performance data you are gathering (see
Chapter 3, “Monitoring Domino performance on the iSeries” on page 121 for information on
how to gather performance data), there is a section that contains information on different
exceptions, such as authority lookup exceptions. Figure 4-29 on page 225 shows an example
of a component report and the exception data. Notice the authority lookup exceptions. While
the numbers seem large, they are probably not generating much CPU.
If you decide you want to get to the root cause behind the authority lookups on a system that
is primarily dedicated to Domino, then check the following conditions.
Make sure that all objects used by the Domino server are owned by QNOTES. The best
authority for a user profile to use is *PUBLIC or owner. This is because *PUBLIC and owner
authority information is stored in the object. When private authority is used, the system must
perform an authority lookup which causes an authority lookup exception.
Since most of the objects Domino uses are in the Domino data directory or in the QNOTES
library, those are the two places you should look.
To check ownership in the Domino data directory, use the EDTF command.
1. Find the Domino data directory for your server using the WRKDOMSVR command. Press
F11 until you see a column called Path.
Write down the value in the Path column. That is your Domino data directory.
2. Use the EDTF command to look at ownership.
EDTF STMF('/LOTUS/DATA/DOMPERF')
Where /LOTUS/DATA/DOMPERF is the name of the Domino data directory you
determined in step 1.
Directory: /LOTUS/DATA/DOMPERF
Position to : Record : 14 of
New File :
2=Edit 4=Delete File 5=Display 6=Path Size 9=Recursive Delete
There is no easy way to check the ownership of the objects in the QNOTES library. All of the
commands like WRKOBJOWN will show you what a profile does own, but not what it should
own. To check ownership in the QNOTES library, you can use the Work with Objects
(WRKOBJ) command.
1. Use the Work with Objects command to see all the objects in the QNOTES library:
WRKOBJ OBJ(QNOTES/*ALL) OBJTYPE(*ALL)
2. Use option 5 to display the ownership of each object on the Work with Objects screen.
The Owner field is in the top right of the Display Object Authority screen. See Figure 4-31
and notice that QNOTES is the owner of the object.
Object
User Group Authority
QNOTES *ALL
*PUBLIC *EXCLUDE
Bottom
Press Enter to continue.
Figure 4-31 Display Object Authority screen and the Owner field
If you confirm or fix the ownership of all the objects in the QNOTES library and the Domino
data directory, but the number of authority lookup exceptions is still higher than you want,
then contact IBM SupportLine for assistance in finding the cause behind the exceptions.
Remember though, this will probably not impact your performance greatly. The newer iSeries
models (7xx, 150, 170, 8xx, 250, and 270) handle thousands of authority lookup exceptions
with very little CPU used and very little impact to performance.
The topics covered include where to put your transaction logs for best performance, Domino
memory buffers, indexing large mail files and the impact on performance, and tips for tuning
the Domino HTTP job.
Important: Several papers and books have talked about placing the Domino transaction
logs on separate physical drives for performance reasons. This is not usually true on the
iSeries platform. This section contains information to help you decide where you should
place the Domino transaction logs on the iSeries platform.
The iSeries OS/400 takes responsibility for managing the information in auxiliary storage.
When you create a stream file (for example, a Domino database), an SQL table, or any other
OS/400 object, the system places it in the best location for good performance. In fact, it may
spread the data in the object across multiple disk units. When you add more data to the
object, the system assigns additional space on one or more disk units.
This unique architecture is referred to as single-level storage. It allows main storage, auxiliary
storage, and virtual storage to work together accurately and efficiently on the iSeries. With
single-level storage, applications ask for data by name, not by where the data is located.
An auxiliary storage pool (ASP) is a group of disk units on your iSeries. Conceptually, each
ASP on your system is a separate pool of disk units for single-level storage. The system
spreads data evenly across the disk units within an ASP. There are three types of ASPs:
System ASP: By default, that is where every object on the iSeries is placed.
User ASP: You must create the user ASP before you can place any objects in it.
Independent ASP: This is a relatively new concept to the iSeries. Like a user ASP, you
must create an independent ASP before you can place any data in it. However, unlike a
user ASP, an independent ASP can be dynamically changed to be used with a different
iSeries.
For more information on ASPs, see the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Now that you understand the basics of storage management on the iSeries, we can start to
discuss Domino transaction logging and performance.
Domino transaction logging was a new feature in Domino 5. It was originally touted as a
performance improvement. In general, it does not improve performance. However,
transaction logging is good to implement for other reasons. Transaction logging can decrease
the amount of time it takes to recover after a Domino server crash. It can also increase data
reliability. (Meaning it can help prevent databases from becoming corrupt.) Transaction
logging is also essential for running incremental saves. While transaction logging does not
improve performance on the iSeries, it can negatively impact performance on the iSeries if it
is implemented incorrectly.
There is a great deal of documentation (including technotes and white papers) regarding how
to configure Domino transaction logging. Several of these documentation sources make the
following recommendation:
“The transactional logs must be on a separate physical drive for there to be any
performance improvement.”
On the iSeries, this would translate to placing the transaction logs in a separate user auxiliary
storage pool (ASP).
What the paper does not say is that this information is only correct for an operating system
that is disk constrained.
When transaction logging is enabled on a server, the amount of I/O increases. This is due to
how transaction logging works. In a disk constrained environment, if you add the additional
I/O overhead from transaction logging, you will negatively impact performance. By placing the
transaction logs on separate physical drives, you do not add the extra I/O overhead to the
disks servicing the Domino server. In an environment that is not disk constrained, this is not
true.
To determine if your iSeries is disk constrained, you need to check how busy your disk units
are on a typical work day. To check your disk units, use the Work with Disk Status
(WRKDSKSTS) command.
1. Run the Work with Disk Status command:
WRKDSKSTS
2. Press the F5 key repeatedly to refresh the statistics.
3. Watch the Elapsed time field in the upper left-hand corner of the screen.
You want an elapsed time of 2 to 20 minutes. It is okay for a unit to be very busy for a
short period of time. If the elapsed time gets larger than 20 minutes, then press F10 to
reset the statistics.
4. Once the Elapsed time is between 2 and 20 minutes, check the % Busy column (the last
column on the right).
– You want the % Busy for all disk units to be below 30%.
– If any disk unit is averaging over 30%, then you are having a load balancing problem.
(See the section entitled “Work with disk status (WRKDSKSTS)” on page 197.)
– If most of the disk units are averaging over 30%, then you are disk constrained.
If your iSeries is disk constrained, you have three options for implementing transaction
logging without adversely affecting performance:
One option is to decrease the workload on the iSeries and thus lower the disk % Busy.
Once the disk % Busy is averaging under 30%, you should be able to configure
transaction logging in the ASP where Domino runs without impacting performance.
Another option is to add more disks to the ASP where Domino runs and balance the
existing data across the new disk units. Then you should be able to configure transaction
logging in the ASP where Domino runs without impacting performance.
The last option is to add more disks to your system and create a user ASP. Place the new
disk units into the new user ASP. Then you can configure the transaction logs to use the
new user ASP and avoid impacting performance on the ASP where Domino runs.
The latter two solutions require you to add more disk units. If you simply move existing disk
units into a user ASP for transaction logging, then you are reducing the number of disk units
(arms) to handle I/O for the Domino server and you negatively impact performance.
We discussed the iSeries work and memory management in “iSeries performance tuning for
Domino” on page 172. This section will discuss three different Domino memory management
values that can be altered by administrators to improve Domino performance and lower CPU:
“NSF_BUFFER_POOL_SIZE_MB” on page 230
“PercentAvailSysResources” on page 233
“Notes_SHARED_DPOOLSIZE” on page 234
NSF_BUFFER_POOL_SIZE_MB
NSF_BUFFER_POOL_SIZE_MB is a NOTES.INI parameter that allows an administrator to
specify the maximum size of the NSF Buffer pool. The NSF Buffer pool handles I/O transfers
between the Notes Index Facility (NIF) and disk storage. If this parameter is not set in the
NOTES.INI, then a Domino Server will allocate 3/8 of the memory (up to a default maximum
of 748 MB) available in the storage pool it is running in for the NSF Buffer pool. The 748 MB
maximum is only the default maximum. You can manually set the NSF Buffer pool to a value
larger than 748 MB.
There are two different reasons to want change the NSF Buffer pool size:
1. The NSF Buffer pool is attempting to allocate more memory than the iSeries storage pool
has available.
The iSeries uses single-level store. This means that you can run a Domino server with
NSF_BUFFER_POOL_SIZE_MB set to 300 in a storage pool that is set to 200 MB. In this
case, the iSeries simply treats DASD like memory and paging/faulting will increase to
cover the additional 100 MB the Domino server tried to allocate for memory. The Domino
server will run fine, but the CPU and performance could probably be better.
In general, you should try to make sure the combined total of all the NSF Buffer pools for
all Domino partitions running in a single storage pool does not exceed about 3/8 of the
memory in that storage pool.
For example, a Domino administrator configures two Domino 6 partitions on a single
OS/400 instance. The administrator sets NSF_BUFFER_POOL_SIZE_MB to 500 for each
server. The *BASE storage pool where the Domino partitions are running has 800 MB
allocated. The Domino partitions may try to allocate 1000 MB from a storage pool that only
has 800 MB. The paging/faulting for the *BASE storage pool will be higher than normal to
compensate for this. Both CPU and performance will be negatively impacted. The
administrator should either decrease the NSF_BUFFER_POOL_SIZE_MB for the Domino
partitions or increase the size of the *BASE storage pool.
Tip: The quickest way to set the NSF_BUFFER_POOL_SIZE_MB correctly is to use the
Database.DbCache.HighWaterMark parameter from the SHOW STAT DATABASE
command. If you divide the value of that parameter by 3, that is a good value for your NSF
Buffer pool. There are two things you need to keep in mind if you use this method to set the
NSF Buffer pool:
As stated previously, you still want to make sure that all the Domino partitions in a
single storage pool do not allocate more than about 3/8 of the available memory for that
storage pool.
The Database.DbCache.MaxEntries defaults to 3 times the value of the NSF Buffer
pool. So if you set the NSF Buffer pool to 25 MB, then the DbCache is 75 databases.
However, if you average 300 concurrent users and each user opens one database, then
a DbCache of 75 is probably too small.
If you set the NSF_BUFFER_POOL_SIZE_MB parameter under 100, you probably
should set the NSF_DBCACHE_MAXENTRIES parameter to the average number of
concurrent users. (You can use the Domino command SHOW STAT SERVER.USERS.*
to gather information on concurrent users.)
1. You can access the Domino console with the following command:
WRKDOMCSL SERVER(servername)
2. Once you are in the Domino console, issue the Domino command:
SHOW STAT DATABASE
3. Press the F5 key to refresh the screen and see the output.
4. Press the F6 key to print the output listed on the screen to a spooled file.
The spooled file will be called QSYSPRT
5. Run the SHOW STAT DATABASE command four or five times over the course of one
hour.
Important: You want to evaluate the size of the NSF Buffer pool when the Domino server
is being utilized by the end users, so do not run the SHOW STAT DATABASE command in
the middle of the night or during the weekend. Also make sure that the Domino server has
been running for at least two hours before using the output from that command.
OR
If Database.Database.BufferPool.PerCentReadsInBuffer is lower than 95% and
Database.DbCache.HighWaterMark is about equal to Database.DbCache.MaxEntries.
Important: Remember, you need to let the Domino server run for at least two hours before
you review this data again.
OR
If Database.Database.BufferPool.PerCentReadsInBuffer is between 94% and 99%, but
only if Database.DbCache.MaxEntries is about equal to
Database.DbCache.HighWaterMark.
If this is the case, then you do not have to change the NSF_BUFFER_POOL_SIZE_MB.
PercentAvailSysResources
Domino has a lot of different buffer pools. For example, there is the NSF Buffer pool, the
DPOOL, and the NIF pool. Some of these buffer pools you can control individually - like
NSF_BUFFER_POOL_SIZE_MB controls the NSF Buffer pool.
The NOTES.INI parameter PercentAvailSysResources allows you to control all of the buffer
pools. It does not override any buffer pool values that you set specifically. So if you set both
PercentAvailSysResources and NSF_BUFFER_POOL_SIZE_MB, then the NSF Buffer pool
will take its value from the NSF_BUFFER_POOL_SIZE_MB parameter and not from
PercentAvailSysResources.
By default, each Domino server assumes it has 100 percent of the system’s physical memory
available to it. This means if you have four Domino partitions, all four believe they have 100%
of the main memory. The iSeries allows this configuration to occur. However, it causes the
Domino servers to “steal” memory from each other which increases the paging and faulting
and negatively impacts performance.
There are no calculations to help you set the PercentAvailSysResources. The most important
thing to remember, is that you do not want your Domino partitions to attempt to allocate more
memory then the iSeries has available. If all of your Domino partitions run in the same
storage pool, then this means that the total of all the Domino partitions
PercentAvailSysResources should not be greater than 100.
Example
A user has four Domino servers configured in a single LPAR. The LPAR has 100 GB of main
memory. The *BASE storage pool has 70 GB of memory and shared storage pool number 5
has 5 GB of memory.
Three of the Domino partitions are configured to run in the *BASE storage pool. The fourth
Domino partition runs in shared storage pool number 5. Two of the Domino partitions running
in the *BASE pool are very busy mail servers. The third Domino partition in the *BASE pool is
a busy administration server. The fourth Domino partition running in shared storage pool
number 5 is a seldom used development server.
Notice that if you add all four Domino partitions PercentAvailSysResources values, you end
up with 120. This does not mean you are trying to allocating 120% of the memory on the
system. Remember, the fourth Domino partition was not running in the *BASE storage pool,
so it was only allocating 2.5 GB, not 50 GB.
In this example configuration, the Domino servers are allocating 72.5 GB out of a possible
100 GB.
Once you set the PercentAvailSysResources parameter, you must restart the Domino server
for the change to take effect. Once the change takes effect, you should monitor the Domino
server memory and the iSeries memory to see if you need to alter any parameters further. For
instance, if you notice problems with buffer pools like the DPOOL, you can either change
PercentAvailSysResources or add the parameter Notes_SHARED_DPOOLSIZE to change
the size of the DPOOL.
Notes_SHARED_DPOOLSIZE
The DPOOL is another piece of the Domino memory management puzzle. The DPOOL
memory is predominantly allocated for use as database buffers (to avoid reading from disk).
On the iSeries platform, the default shared DPOOL is 12000000 (which is 11719 KB). The
minimum value is 1000000. Individual Domino functions may override the default value.
On the iSeries, we have found that smaller DPOOL allocation sizes can help performance. It
can reduce the amount of fragmentation inside the DPOOLs. It can also reduce CPU,
because smaller pools mean less time spent searching an particular pool for free space.
You can control this DPOOL memory allocation with either an iSeries environment variable or
a NOTES.INI parameter.
Use the iSeries environment variable if you want all the Domino partitions on a single
OS/400 instance to use the same default DPOOL allocation size.
Use the NOTES.INI parameter if you want to set an individual Domino partition’s default
DPOOL allocation size without affecting other Domino partitions on the same OS/400
instance.
Both the NOTES.INI parameter and the environment variable are the same:
Notes_SHARED_DPOOLSIZE.
Important: The environment variable is case sensitive. Enter it exactly as it is listed in this
documentation. Also note, the value for this variable is in bytes.
So, how do you decide if you should change the DPOOL allocation size? And what should
you change the allocation size to?
There is no simple formula or rule to follow. To decide if you should change the DPOOL
allocation size, you must consider the following statistics:
What is the % used in each of the existing DPOOLs?
The higher the % used, the better the pool is being utilized. If the pool is being utilized
optimally, then the performance is better. (Optimal utilization would mean lower CPU and
better response times.)
How many searches did the Domino server have to make while looking for free space?
The higher the number of searches made, the longer it takes to find free space and the
worse the performance.
How many times did the Domino server fail to find free space in a single DPOOL?
Each time the Domino server fails to find free space for an allocation, it must check
another DPOOL. The more DPOOLs that Domino has to search, the longer it takes to find
free space and the worse the performance is.
To look at this information, use the SHOW MEMORY DUMP command in the Domino
console. This command will output information to a stream file about the memory in use on
your active Domino server. When you run this command, it gives you the name of the stream
file it created when it is done dumping the information. See Figure 4-32.
Note: You do not want to look at DPOOL allocation information immediately after starting a
server. Allow the Domino server to run for a couple of business days before reviewing this
information. Do not count holidays or weekends because you want to see how the Domino
server handles DPOOL allocations when the server is actively being used.
Figure 4-32 Domino console when issuing SHOW MEMORY DUMP command
The summary information contained in the output, shows how much space has been
allocated in each DPOOL and how many times the Domino server searched the DPOOL
looking for free space. See this information in Figure 4-33. It was displayed by using the
EDTF command, option 5 to display the memory dump, and then searching for the phrase
“Summary”.
EDTF STMF('/LOTUS/DATA/DOMPERF/IBM_TECHNICAL_SUPPORT')
...+....1....+....2....+....3....+....4....+....5....+....6....+....7....+....8....+....9....+....0....+....1....+....2....+....3.
Summary:
# Bytes
1196 35047858 Pool
0 0 Malloc
----------------
1196 35047858 Total
pool addr size used free total skip search failure success frees total alloc
1 F20789C777001000 11719K 11716K 99% 272b 2402 1576 826 39 787 620 6481 3715
s 2 D9956E99C2001000 256K 11K 4% 0b 564 0 564 0 564 478 1112 564
s 3 C123536C0D001000 256K 12K 4% 0b 571 0 571 0 571 484 1111 571
s 4 E8B1383E58001000 256K 10K 3% 0b 578 0 578 0 578 507 1139 578
s 5 D03F1D10A3001000 256K 11K 4% 0b 580 0 580 0 580 492 1121 580
s 6 F7CD01E2EE001000 256K 13K 4% 0b 565 0 565 0 565 474 1087 565
s 7 DF5AE6B539001000 256K 11K 4% 0b 552 0 552 0 552 463 1066 552
s 8 C6E8CB8784001000 256K 11K 4% 0b 593 0 593 0 593 522 1177 593
s 9 EE76B059CF001000 256K 11K 4% 0b 550 0 550 0 550 467 1060 550
10 E267E950FE001000 11719K 9888K 84% 658K 1011 3 1008 1 1007 745 3593 1731
11 C830F9A843001000 11719K 8715K 74% 2225K 795 1 794 1 793 696 1927 805
12 C4F4AD56AE001000 11719K 4009K 34% 0b 161 0 161 0 161 80 244 161
Figure 4-33 Stream file contents from the SHOW MEMORY DUMP command
Notice that the Summary has 12 pools and the average utilization is almost 70%. This is very
good. Also notice the low number of failures when searching for free space. For this example,
you do not have to alter the DPOOL allocation size.
If the utilization was smaller or if the number of failed searches was much higher, then you
might want to lower the DPOOL allocation size using the Notes_SHARED_DPOOLSIZE
parameter. We have found that 1048576 is a good value to lower the DPOOL to.
Once you change the size of the DPOOL allocation, you must restart Domino and gather the
same data (SHOW MEMORY DUMP) for review. (If the first data collection occurred after the
server ran for three days, then the next collection should probably occur after the server runs
for three days.
Table 4-2 Relationship between mail file size, document size, and number of documents
CPU Utilized Mail File Size Average Document Size Document Count
Another finding of these tests is, that in Domino 6.x, the number of documents in the INBOX
affects CPU as much as document count. The greater the number of documents in INBOX,
the higher the impact on CPU at session start. This means, that if you can limit the number of
documents in the INBOX to about 25% of the total documents in the mail file, then you will not
notice a high CPU utilization at session start.
Please keep in mind that these tests were done on a large iSeries system with thousands of
users, so the reported CPU utilization is not accurate for your system. However, the
relationship between the CPU utilization can be ported to your environment.
Details on this benchmarking study can be found in the IBM Redpaper, Sizing Large-Scale
Domino Workloads on iSeries, REDP-3802-00, available at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedpieceAbstracts/redp3802.html
The Domino 6 HTTP server no longer uses the command caching that existed in the
Domino 5 HTTP server. The command cache in Domino 5 was a special cache that cached
complete HTTP responses to NSF requests. This was removed from Domino 6 HTTP
because it was not significantly improving performance and it was occasionally causing
problems because old cached data could be shown rather than new data.
Likewise, consider using the new Entity tags (ETags) introduced in Domino 6.0.1 for cache
validation. ETags, which were introduced in HTTP/1.1, are server-defined tokens that
uniquely identify multiple instances or versions of the same resource. ETags can significantly
improve server performance by increasing the effectiveness of browser-side caching.
Information on these new items is discussed in the LDD article ‘A Preview of Browser-side
Caching Enhancements’ at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/89d4c3dd32c1773e8525
6c9300671756?OpenDocument&Highlight=0,http,cache
Also consider using HTTP rules (such as the HTTP response header rules) to improve
performance in your Web applications. Information on HTTP response header rules can be
found in the LDD article ‘Building Web Applications in Domino 6: Browser Caching and
Response Header Rules’ at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/2aa6ecf8f29501908525
6b9c006fd147?OpenDocument&Highlight=0,http,cache
That said, there are a couple of things you can do to improve the general performance of the
Domino 6 HTTP server.
One of the general performance improvements in the Domino 6 HTTP server is that the HTTP
server uses HTTP 1.1 specifications. HTTP 1.1 supports persistent connections. This means
that once a client and server open an HTTP connection, it remains open until the client or
server specifically requests the connection be closed. While the connection is open, the client
can send multiple (but separate) requests, and the server can respond to them in the order in
which they are received. Clients are also free to send multiple requests without waiting for the
responses, in effect, pipelining the requests. For example, a client may do this when
requesting all graphic images from a particular page. It can also make the requests
sequentially, then listen for responses from the server.
You can enable/disable this functionality in the Domino Directory Server document. The field
is called HTTP persistent connections and it is located under the Internet Protocols ->
HTTP tab. Persistent connections are enabled by default in Domino 6.
For clients, persistent connections can make a noticeable difference on slow networks (for
example, 56 KB modems) when rendering a page. On fast networks (especially
100 MB/second), persistent connections aren't as beneficial because the cost of establishing
a connection is very low compared to polling persistent connections.
Another option that can improve the performance of the Domino 6 HTTP server is allowing
your HTTP server to run Web agents concurrently. This can be enabled in the Domino
Directory Server document. The field is called Run web agents concurrently and it is located
under the Internet Protocol -> Domino Web Engine tab.
What kind of backup strategy will best fit your demands depends on your environment. If you
are already using special backup software, such as Backup, Recovery, and Media Services
for iSeries for your regular system backups, you can take full advantage of it. Or you may
have IBM Tivoli Storage Manager somewhere in your network to back up all kind of data
from different platforms. IBM Tivoli Storage Manager can also be utilized for your Domino
data backups. Or perhaps you don’t have any additional backup software, then you can use
OS/400 native commands.
In this chapter we show you how to develop and plan your backup strategy using either
OS/400 commands and iSeries devices (tapes and save files), or using backup software that
allows for online backups, such as Backup, Recovery, and Media Services for iSeries or IBM
Tivoli Storage Manager for Mail: Data Protection for Lotus Domino for OS/400, Version 5.2.0.
Note: Throughout this book we use the term BRMS for the Backup, Recovery, and Media
Services for iSeries software product. We use the term Data Protection for Domino for the
IBM Tivoli Storage Manager for Mail: Data Protection for Lotus Domino for OS/400,
Version 5.2.0 software.
The new objects, their purpose, and their locations are as follows:
The QNOTES user profile is created and will be used by Domino and Notes applications
running on the iSeries. This user profile is intended for system functions and for integration
with the underlying OS/400 security mechanisms only. Therefore, it does not have a
password and you cannot use the QNOTES user profile to sign on to the iSeries server.
Important: The QNOTES user profile MUST be the owner of all Domino objects.
Note: Depending on the Domino options and toolkits you install, more libraries will be
created. Please refer to Table 5-1 on page 246 for a complete list.
What does not happen during the installation process is the creation of the data directory for
the Domino server (in comparison to other platforms). The data directory for a Domino 6 for
iSeries server is created when the Domino server is configured (for example, using
CFGDOMSVR). During server configuration you have to specify an individual data directory
for each server. On other platforms, the Domino data directories use the default path of
/Domino/servername/Data, so you can keep this structure on iSeries too, but you are free to
specify any other path. So, if you have multiple Domino servers, you have multiple data
directories.
Each Domino for iSeries server runs as an application in its own subsystem. So if you have
multiple Domino servers you also have multiple subsystem descriptions in QUSRNOTES.
Attention: When setting up a Domino server, do not specify the Domino product directory
(/QIBM/ProdData/...) or the Domino user directory (/QIBM/UserData/...) for the location of
the server’s data directory. If you do so, the setup programs fails with message LNT0102 -
Path specified not valid. For more information see Chapter 3, “Installing Domino on your
iSeries Server” in the Domino 6 for iSeries Help database (I400HELP.NSF).
Tip: You can use the Work with Domino servers menu (accessed with the WRKDOMSVR
command) to display information about your Domino configuration:
Subsystem name and status is displayed first.
Press F11 once to see the library name and the Domino version.
Press F11 again to display the path of your Domino data directories.
Press F3 to exit.
For more information about Domino server configuration, please refer to the redbook IBM
Lotus Domino 6 for iSeries Implementation, SG24-6592.
Attention: When you install Domino 6 for iSeries, you can select to install the base code
only, or to install the base code and option 1, which is the C API Release 6 toolkit.
Since Domino 6 for iSeries, the C++ APIs and the Lotus Extension Toolkit are no longer
included with the software but are downloadable from the developerWorks : Lotus Web site
(formerly known as Lotus Developer Domain) at:
http://www.lotus.com/ldd/toolkits
For more information on Domino installation, please refer to Chapter 3 of the redbook IBM
Lotus Domino 6 for iSeries Implementation, SG24-6592.
Domino data directory, for example: Domino data directory Individual directory for each
/Domino/servername/Data server. Is chosen at
configuration time.
Important: The library names and IFS paths may change in future releases, so be sure
you carefully read the release notes of each new Domino release.
Attention: We don’t recommend using directory/database links outside your data directory
because these links are not saved when you save your Domino data directory. If you use
directory/database links, be sure you include the correct directory path in your backup
strategy. See “Backup of Domino objects outside of the Domino data directory” on
page 263 for how to back up databases outside your data directory.
In a multi-version capable environment, any number and mix of multi-version capable Domino
versions and releases can be installed at the same time. For example, you can install Domino
6.5, 6.5.1 and 6.0.4 on the same OS/400 partition. These releases and versions do not have
to be installed or removed in any particular order.
Note: Multi-version capable releases and non-multi-version capable releases are not
compatible and therefore cannot be installed on the same OS/400 partition. For example,
you cannot install a Domino 6.0.2 server on the same OS/400 partition as a Domino 6.0.3
or a Domino 6.5 server.
Each multi-version capable Domino release is installed into its own release-dependent library
and directory structure. For example, if you install Domino for iSeries 6.0.3, you install it to
library QDOMINO603. The release also has its own execution path
/QIBM/ProdData/LOTUS/DOMINO603. Domino for iSeries 6.5.0 uses the library
QDOMINO650 and the IFS file directory /QIBM/ProdData/LOTUS/DOMINO650. When
Domino for iSeries 6.0.4 becomes available, it will be installed into library QDOMINO604 and
to the IFS directory /QIBM/ProdData/LOTUS/DOMINO604, and so on.
To make sure that you save all necessary Domino product information of future releases you
must carefully read the release notes of every new release, as the appropriate library and
directory names will be specified there. You must then add these new libraries and IFS
directories to your backup routines.
However, if you already backup all your system data periodically, for example once a week,
using GO SAVE option 22 or equivalent commands, such as SAVLIB LIB(*IBM)
ACCPTH(*YES) for libraries and SAV OBJ(('/QIBM/ProdData')
('/QOpenSys/QIBM/ProdData')) UPDHST(*YES) for directories, the new objects are backed
up automatically.
For more information about the SAVE menu, please refer to 6.4, “OS/400 SAVE menu” on
page 266.
For more information about multi-versioning see the white paper at:
http://www.ibm.com/servers/enable/site/domino/downloads/multiversion.pdf
and the redbook Lotus Domino 6 for iSeries Multi-Versioning Support on the IBM eServer
iSeries Server, SG24-6940.
To recover from total disaster you must have a valid backup of your entire iSeries server. You
have to be able to restore the whole system from scratch, which means you need to have
backups of your Licensed Internal Code, configuration objects, operating system, licensed
programs, user libraries, folders and integrated file system (IFS). In this chapter we
concentrate on the IFS, where your Domino data resides, but we want to make sure you
understand the importance of full system backups.
As discussed earlier in “Domino objects on the iSeries” on page 244, there are Domino
related program and configuration objects (libraries and IFS directories/files) plus your
Domino data directories (in the IFS). The program objects don’t need to be saved as often as
your user data, although you should take a backup copy of your software product every time
you update to a new release or apply fixes. However the user data is the one changing all the
time and you should take good care of it.
After you have decided what you need to back up, you have to plan when to do it. What is the
size of your backup window? You may have an environment that needs to be up and running
24x7 (for 24 hours each and every day of the week), thus making it impossible to stop the
Domino server(s) for a backup. If so, you need a tool that allows you to back up your Domino
server(s) while they are active (so-called online backup). Or you can have servers running
just during normal office hours, giving you the opportunity to take the server down during the
night for backups, thus having no need for online backups.
Here are some more considerations you need to take into account when planning your
backup strategy:
Think about the way you handle your backup media. You may be saving to tapes, save
files or perhaps to another server. Be sure that you also have off-site storage in a safe
place.
How long do you need to retain tape cartridges before reusing them for new backups?
Are you saving full databases? Or are you planning for incremental backups (saving
changed objects)?
How many backup versions do you need?
You should consider activating transaction logging for better Domino data integrity and faster
startups after a server crash, but there is no advantage in transaction logging regarding
Domino backups unless you use BRMS or Data Protection for Domino.
Attention: User ASPs (Auxiliary Storage Pool) or Independent ASPs as well as LPARs
and IBM ClusterProven® are not covered within this book. For more information on these
topics, please refer to the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
In this section we show how you can manage your backups and backup storage and how
BRMS and Data Protection for Domino can help you to keep track of the media which
otherwise may be difficult to maintain.
See Chapter 6, “Backup and recovery using OS/400 commands” on page 257 for details on
this backup/restore option.
Backup window
If your backup window is not large enough to allow for the traditional Domino backup method
of shutting down the server(s) during backups, consider the following possibilities:
Your tape device may be a bottleneck. Consider replacing it with newer, faster technology.
If that is impossible but you have enough disk space, you can take advantage of OS/400
save files. Writing directly to disk is usually much faster than writing to tape. After the
“save-to-disk” is complete, you can restart the Domino server. Then you start the
“save-to-tape” process (backing up the save files), which can take place immediately
afterwards or at a later time, depending on your backup strategy (for example, you may
have other backups writing to tape at the same time you are saving your Domino data to
save files).
Use Domino replication or clustering to achieve increased availability as explained in
Domino replication and Domino clustering. You can use Domino clustering just for your
backups or for high availability and workload balancing. Remember that you need extra
disk space and the CPU load may increase when enabling replication or clustering.
If 24x7 availability is necessary for your environment, you can reduce the downtime of your
servers by utilizing Domino replication and clustering capabilities. The replicas can exist on
the same system on a partitioned Domino server or on a different server or even a different
platform with a different Domino version. You can consider the following possibilities:
Use clustered servers:
Servers in a Domino cluster replicate between each other in real-time to keep data
synchronized. Cluster replication ensures that all changes, whether to databases or to the
cluster membership itself, are immediately passed to the appropriate database on the
clustered server(s).
Attention: Remember that neither clustering nor replication protects your data from
human errors, such as deleting a wrong document. After the replication process is done
you will have an exact copy of the database and the document will still be deleted. In
addition, some critical files such as NOTES.INI and ID files, are not replicated.
The iSeries platform is known to be a very scalable and reliable platform but before
implementing partitioned servers please review Chapter 11, “Using the IBM Eserver
Workload Estimator” on page 463 and Chapter 10, “Sizing tips and techniques” on page 455.
More information about Domino clustering and replication can be found in the Lotus Domino
Administration 6 Help database.
Using BRMS
Backup, Recovery, and Media Services for iSeries, 5722-BR1 (BRMS), helps you to
implement a disciplined approach to managing your backups and provides you with an
orderly way to retrieve lost or damaged data. Using BRMS, you can manage your most
critical and complex backups, including online backups of various kinds of Lotus servers,
simply and easily. BRMS uses Lotus APIs for the online backup. You are also able to recover
your system fully in the event of a disaster or complete system failure.
In addition to the backup/restore functionality, BRMS also keeps information of your backup
media from creation to expiration and an inventory list of all your media.
Be aware that Data Protection for Domino is backing up Domino database files (*.nsf and
*.ntf) and transaction logs only and is not capable to save non-database Domino data, such
as Notes ID files, NOTES.INI or any other system configuration files. Therefore you need to
have other methods to back up the rest of the system. Perhaps you have BRMS or another
backup program installed on your iSeries that you can utilize to take care of your system data;
otherwise use iSeries native commands. Please refer to Chapter 6, “Backup and recovery
using OS/400 commands” on page 257 for more information of using OS/400 commands.See
Chapter 7, “Backup and recovery using BRMS/400” on page 293 for BRMS backups.
See Chapter 8, “Backup and recovery using Tivoli Data Protection for Domino” on page 353.
Important: Do not use online Lotus server backups in place of complete system backups.
Lotus server online backups only back up Lotus server databases. However, it is important
to also back up other important Lotus server and non-Lotus server system data on a
regular basis.
Each Domino Server partition uses its own dedicated transaction log, it consists of one or
more transaction log extents, binary files with a .TXN extension. A log extent is one of the log
files into which the transaction logs are written. Transaction log extent names are in the form
of Sxxxxxxx.TXN, where x represents a seven-digit number that is unique to that server.
Domino fills each extent sequentially before writing data to a new one. The log extent size is
64 MB. The default directory for transaction logs is /logdir in your Domino servers’ data
directory.
When transactions are written to the logs, an undo record and a redo record are usually
committed for each transaction. First an UNDO log record is generated in the event of a
system outage. This is done before a change is written to a database. Before committing a
transaction, a REDO record is also generated. It is used to re-apply a transaction from the
transactional log to the database in the event that it was not written (flushed) to the NSF
before a server outage. Undo and redo records ensure that if a change is half done it will be
fully undone, and if a change was completely done then it will be fully re-done to the NSF.
One exception to this is for attachments. It is important to note that attachments are logged as
redo only, so if the database is recovered using media recovery, you get back the last copy of
the attachment (once they are done, they stay done). If, however, the server crashes with
uncommitted attachment updates, they will not be undone, since an undo record is never
created for them.
New to Domino 6 (ODS 43) compared to Domino R5 (ODS 41) is that views and shared mail
(SCOS - Single Copy Object Store) can now also be logged.
Databases are cached in memory while they are open (in the UBM, the Unified Buffer
Manager). Writes to the database actually are written to the in-memory copy of the database.
They are then immediately sent to the transaction logs. Later, changes that were made to the
memory-cached version of the database are moved to the actual NSF file, thus updating the
database.
5.3.2 DBIID
When you enable transaction logging, Domino assigns a unique database instance ID
(DBIID) to each Domino database. When Domino records a transaction in the log, it includes
this DBIID. During recovery, Domino uses the DBIID to match transactions to databases. The
DBIID is stored in the file header, along with the Database ID and Replica ID, although there
is no relation between them.
New DBIIDs
Some database maintenance activities, such as using the COMPACT command with options,
cause Domino to reconstruct the database in a way that old transaction log records are no
longer valid. When this happens, a new DBIID is assigned to the database. Changing the log
path or maximum log size does not change the DBIID.
Every time a database receives a new DBIID, the following informational message is send to
the Domino console:
08/26/2003 21:22:20 Recovery Manager: Assigning new DBIID for
/Domino/siputest/Data/demo3.nsf (need new backup for media recovery)
After a new DBIID is assigned, all new transactions recorded in the log for that database use
the new DBIID. Therefore, you need to take a new full backup of the database. This full
backup captures the database in its current state with the new DBIID. Then, if you have to
restore the database, Domino applies only the new transactions related to the new DBIID.
The Data Protection for Domino incremental backup feature automatically recognizes a
DBIID change and runs a full backup of the database. For more information see 8.5.3,
“Backup strategies for Domino servers using Data Protection for Domino” on page 381.
It is not possible to automatically include new databases, or databases with a changed DBIID
in BRMS online incremental backups for Domino versions older than Domino 6.0.3 or 6.5.
However, Domino 6.0.3 and Domino 6.5 in addition with BRMS PTFs provide this function.
For additional information on this new feature, please refer to “Troubleshooting” on page 349.
More information about DBIID and COMPACT can be found in the Domino Administrator
Help database.
You should not move databases away from a server or copy them over from another server
before a recovery restart completed. Otherwise, the database may be missing a significant
amount of changes that are only stored in the transaction log and if the database is not found
during the restart, these changes are not restored.
Attention: Do not enable Domino BRMS incremental save with archive logging
(CFGDOMSVR/CHGDOMSVR) if you are not going to implement incremental backups
because this will cause the creation of extra log files and fill up your disk. More information
on this topic can be found in “When performing full online backups” on page 345.
Tip: “Determine Domino data directory size” on page 289 can help you determine the
usage and size of your transaction logs.
Although it is highly recommended by Lotus to put the transaction log on a separate disk drive
this is not true for the iSeries platform because of iSeries’ unique single-level storage (ASP)
concept.
Note: For information about transaction logging related performance issues, please refer
to Chapter 4, “Tuning Domino performance on the iSeries” on page 171.
You might have databases that are easily recreated, or that have frequent changes, such as
MAIL.BOX, causing a lot of transactions but with no need to recover them to a certain point in
time.
When you set up transaction logging all Domino R5 and higher databases (ODS 41 and
higher) are automatically logged. Then you disable transaction logging for databases not
requiring it on an individual basis:
When creating a new database, choose Disable transaction logging on the Advanced
Databases Options dialog.
For an existing database, choose Disable transaction logging on the Database
Properties, Advanced tab.
Using the Domino Administrator client, on the Files tab, you select the database, then
Tools -> Database -> Advanced Properties, then select Disable transaction logging.
Use COMPACT -t for the database.
Notice that there is a little trick when enabling archive style transaction logging. First choose
the circular logging style to be able to enter a maximum log size. Then choose Archived
logging style; you don’t have to save the document between the change.
Attention: The system will not stop creating new log extents if there is no backup program
cleaning the old ones. This might fill up all available disk space and finally crash the
iSeries! For more information, see IBM Lotus TechNote #1088895 at:
http://www.ibm.com/support/docview.wss?rs=0&uid=swg21088895
The next time you start your server, the transaction log is created. The message “Please wait,
creating new transaction logs in directory:” is displayed in the Domino console and a DBIID is
assigned to every database (unless specifically disabled).
Important: You should take a full backup after transaction logging is enabled.
For more information about transaction logging, please refer to the IBM Technical Support
Search site at:
http://www.ibm.com/support/search/index.html
Search for document number 7003410 (Commonly Asked Questions About Transaction
Logging), #7002566 (Knowledge Collection: Transaction Logging on a Domino R5.x Server),
and #7002802 (Transactional Logging and How it Operates).
Some additional information and references can also be found in “Transaction logging” on
page 16.
If you are new to iSeries and your environment allows you to restrict the server usage for
nightly backups, you may find the SAVE menu a good starting point for backing up your
Domino data. If you are an experienced iSeries user or if you have a complex environment,
you can use the examples given in this chapter to create your own CL programs to extend
your existing backup strategy with saving the Domino environment.
Starting with examples of daily backups, we explain how to save your Domino data directory
or individual databases, and how to check what has been saved. We also give you some
information on common problems and a few tips about system management — for example,
how to initialize tapes and create save files, and how to determine disk usage. Then we
explain which other important data needs to be saved to recover your iSeries system in case
of a complete data loss.
We are using both tape devices and iSeries save files. You may find a combination of these
methods also useful for your backup strategy.
If you need the ability to save and restore Domino databases from an active Domino
server, you MUST use Backup, Recovery, and Media Services for iSeries or Data
Protection for Domino. Both tools use Domino APIs to save and restore Domino
databases.
This restriction also includes copying new databases to an active Domino server using
OS/400 commands, like CPY or MOV.
If you need to copy new databases to an active Domino server, you can use Domino
functions. For more information, see “Save databases while Domino server is running” on
page 285.
After you have installed the Domino 6 for iSeries software and configured your Domino
servers, you need to set up the Domino server backup routines. You need to decide what
data is important for your business and how often you need to back it up. Is once a day
enough? Or do you need to schedule additional backups for specific databases or
subdirectories? We assume that you already have a backup plan for the Domino databases
that are critical for your environment. If you don’t have a plan yet, please review 5.2,
“Choosing the right backup strategy” on page 248 which is helpful in determining what data
you need to back up and where it resides.
After all necessary Domino fixes are installed, you should take a backup copy of the Domino
code, that is, the libraries and directories that contain your Domino information. You may
already have a scheduled backup routine that saves all system data periodically, which from
now on also includes Domino. To manually save it, you can use the iSeries SAVE menu or
equivalent commands.
Save your Domino data directory daily. When using iSeries commands, you have to shut
down the server before starting the backup. If you have critical databases that need to be
backed up more often than once a day, but you cannot shut down the Domino server, then it
is helpful to use additional Domino functions. For example, you can manually copy or
replicate Domino databases using the Lotus Notes client. Or set up an additional Domino
server and use it for clustering or scheduled replication of your critical databases. You can
prevent users from accessing the extra server and use it only for backup purposes, or you can
also utilize it for workload balancing. More information on this topic can be found in “Domino
replication and Domino clustering” on page 249.
If your environment allows you to shut down the whole iSeries system for the duration of the
backups, and your backup window is large enough, you can use the OS/400 SAVE menu. You
may find the combination of saving the entire system data (option 21 - Entire system backup)
and All user data backup (option 23) suitable to your environment to completely back up the
entire iSeries. For example, save your user data daily using option 23 and save the entire
system once a month using option 21. In addition, it is highly recommended to run an entire
system save also after system changes/upgrades, such as PTF installation.
To run large unattended backups you must have a tape device that can handle multiple tapes
without user intervention. Remember that the entire system backup can take hours,
depending on the amount of saved data and the tape device being used.
Tip: The maintenance tasks may have been customized on your Domino server. In
addition, there may also exist scheduled replications, program documents, etc. during the
night. Therefore you must verify your Domino environment with the Domino administrator
before shutting down the Domino server for the backup.
See 6.4, “OS/400 SAVE menu” on page 266 for more information about saving the entire
system and licensed programs.
We use the parameter OUTPUT(*PRINT) to produce a spool file. This allows you to verify
what exactly was backed up (or not). Please note that by default the printout produces a line
for each object that was saved or restored because it uses *ALL for the INFTYPE parameter
(type of output information). On a large Domino system this listing may be very large. In fact,
it may exceed the maximum size of an allowed printout. As an alternative you might want to
specify OUTPUT(*PRINT) in combination with INFTYPE(*SUMMARY) or INFTYPE(*ERR) to
get either just a summary of how many objects were saved/restored or just a listing of the
objects that failed to save or restore. Use the command Work with All Spooled Files
(WRKSPLF) to find the appropriate spool file.
Most of our examples are based on our test server called “DOMREST”. So whenever we
specify this name (as the server name or in a path), you need to replace it with your Domino
server name.
In our test environment, we saved 800 MB using the rather slow tape device QIC-2GB
(DC) and tape cartridges DC9250. This lasted over 23 minutes compared to less than
4 minutes when using save files.
In a second step, we then saved the save file to tape, and that again took over 23 minutes.
However, we could restart the Domino server immediately after saving the data to the save
file and thus experienced a much shorter downtime.
The disadvantage of this approach is that the save files need extra disk space, so
depending on your system, you may or may not be able to use this approach.
Daily backups
The daily backup routine should include:
Domino data directories
/QIBM/UserData/LOTUS/* directory
QUSRNOTES library
If this is not a new iSeries installation, you probably already have a daily backup routine for
user data. You should verify that the Domino data directory is included in it.
Weekly backups
In addition to the data saved on a daily base, you should save the following data weekly:
QNOTES* libraries
Entire IFS
End all applications that use integrated file system (IFS) data to avoid object locks.
Attention: If you cannot put your iSeries into restricted state, there may be objects that are
in use and therefore locked at the time of saving. Locked objects will not be saved. Check
the joblog or history log for unsaved objects.
Monthly backups
It is recommended to save the entire iSeries system monthly. This saves everything, including
Domino program objects and user databases.
In addition, save your entire system every time you update the system to a new release or
apply PTFs.
If you are developing and/or using programs that are accessed by a Domino server, you
should also plan to back up the /QIBM/UserData/Lotus directory. This directory contains
customization information such as symbolic links to your applications and information about
partitioned Domino servers. It is updated, for example, when you configure new Domino
servers.
Note: Substitute domrest with your server name throughout this example.
Before you continue, you should verify that no jobs related to this Domino server remained
active. If you have only one Domino server on your system, you can use the command:
WRKUSRJOB USER(QNOTES) STATUS(*ACTIVE)
This displays all active jobs running under the QNOTES user profile. Press F5 to refresh
the screen until no more active jobs are shown.
Alternatively, if you have more than one Domino server on your system, type:
WRKDOMSVR
Then press Enter. On the Work with Domino Servers menu, use option 9 (Work server
jobs) for the Domino server you just ended. Refresh the screen with the F5 key until there
are no more active jobs.
3. Use the Save Object (SAV) command to back up the Domino data directory and all
subdirectories.
To use tape device TAP01 type:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
Substitute TAP01 with your tape device (and don’t forget the extension) if necessary.
Using the OUTPUT(*PRINT) parameter gives you a detailed report of the saved objects by
directory.
4. After your backup has completed you can restart your Domino server. Type:
STRDOMSVR SERVER(domrest)
Tip: Once the backup is complete you see a message at the bottom of the screen that
states how many objects were saved. If you see a message that says “xxx object not
saved”, you should determine the reason for it. See 6.6, “Tips and techniques” on
page 279 for possible problems.
Important: Always end your Domino server before running OS/400 SAV/RST commands.
This section describes how to back up individual Domino databases or directories in case you
need to make extra backups in addition to your daily Domino data directory saves. For
example, you may want to create a backup copy before making programming changes or
before testing a new agent. Or you may want to make an archive copy at the end of an
accounting period.
Examples
To back up a specific database called CUSTINF.NSF in the Domino data directory
/lotus/data/domrest to tape device TAP01:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest/custinf.nsf')
To back up all Domino databases in subdirectory DEPT57 to tape device TAP01, type:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest/dept57/*.nsf')
To back up database HRINFO.NSF in the DEPT57 subdirectory, type:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest/dept57/hrinfo.nsf')
To back up all databases starting with “HR” in the Domino data directory, type:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest/hr*.nsf')
Be sure your Domino server is ended before issuing any of the following commands:
To back up all Domino files in the mail subdirectory, type:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest/mail/*.nsf')
To back up several individual mail files, type:
SAV DEV('/qsys.lib/tap01.devd') OBJ(('/lotus/data/domrest/mail/user1.nsf')
('/lotus/data/domrest/mail/user2.nsf') ('/lotus/data/domrest/mail/user3.nsf'))
Tip: If you need to save or restore databases while the Domino server is running, there are
additional steps involved. For more information, please refer to “Save databases while
Domino server is running” on page 285.
Attention: DO NOT place Domino databases outside of the Domino data directory. It may
make your backup planning difficult and, if you need to save the whole IFS, it could take a
long time. This is not a recommended scenario.
In this example we assume that some of your Domino databases may exist outside of the
Domino data directory. You may have directory/database links or other databases stored
somewhere in the IFS. Be aware that this is not a recommended scenario and that it is highly
recommended to store Domino databases only within the Domino data directory.
To back up the whole IFS except for the QSYS.LIB file system, the QDLS file system, and
directories that contain static program product information, use the following command:
SAV DEV('/qsys.lib/tap01.devd') OBJ(('/*') ('/qsys.lib' *OMIT) ('/qdls' *OMIT)
('/QIBM/ProdData' *OMIT) ('/QOpenSys/QIBM/ProdData' *OMIT)) OUTPUT(*print)
Or use the SAVE menu options 21 or 22 to run the backup, see “OS/400 SAVE menu” on
page 266 for more information.
You must end the Domino server before running this command. There might be also other
applications that should be ended before running the SAV.
Remember that this can take a long time depending on the size of your IFS and, if your
system is not in a restricted state, there will be objects that are locked and are therefore not
saved. You need to determine whether the save operation was successful or not. You can use
the printed output (parameter OUTPUT(*PRINT)) of the save operation or the joblog or
history log to do this.
It might be difficult to find out in which directories your Domino databases are located. If you
are using database/directory links, you can find their locations from the Domino Directory
(NAMES.NSF). If you don’t have any idea where the objects are, you have to search the
whole iSeries. More information on how to search for Domino objects can be found in “Find
Domino objects on the system” on page 291.
Note: When saving a Domino database, an incremental backup always saves the entire
database, not only changed documents.
.We explain the two most common strategies for incremental backups in this section:
Saving changes since the last full backup (cumulative)
Saving changes since the last incremental backup
Our examples assume a complete save of the Domino data directory every Sunday and then
incremental saves from Monday to Saturday.
Attention: Incremental backups reduce the backup time, but the restore needs longer
because you have to restore the complete Domino data directory first, then all changed
objects. Depending on your backup strategy and the day you have to recover, you may
need to restore the full backup plus up to six incremental backups.
The advantage of this strategy is that it makes your recovery simple. You only need to restore
the last full backup and the most recent incremental backup. The disadvantage of this
strategy is that your backups become larger (both in media usage and duration) every day
until your next complete backup.
.
Important: Your Domino servers must be ended before using OS/400 SAV or RST
commands! Do not start the server during backups.
To set up a nightly incremental backup of all databases that have changed since the last full
backup, do the following steps:
1. Set up a full backup to run every Sunday night. Be sure you specify the parameter
UPDHST(*YES) on the SAV command so the system updates the object information with
the date and time of the most recent backup.
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
UPDHST(*YES)
2. On Monday night use the following command:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
CHGPERIOD(*LASTSAVE)
3. On Tuesday night use the same command:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
CHGPERIOD(*LASTSAVE)
4. Run this command every night until Sunday when you perform the next full backup.
Note: By default, the printout produces a line for each object that was saved because it
uses *ALL for the INFTYPE parameter (type of output information). On a large Domino
system this listing may be very large. In fact it may exceed the maximum size of an allowed
printout.
To perform a nightly incremental backup of what has changed since the previous incremental
backup, you must adjust the CHGPERIOD parameter for EACH save operation. For example:
1. End your Domino server(s).
2. Perform a complete backup on Sunday, Aug. 24 at 22:00. Be sure you specify the
parameter UPDHST(*YES) on your SAV command so the system updates the object
information with the date and time of the most recent backup.
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
UPDHST(*YES)
3. On Monday, Aug. 25 at 21:00, use the command:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
CHGPERIOD(082403 220000) UPDHST(*YES)
4. On Tuesday, Aug. 26 at 20:00, use the command:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
CHGPERIOD(082503 210000) UPDHST(*YES)
5. And so on until Sunday when you perform the next full backup. Remember that every time
you run the SAV command you must edit the CHGPERIOD parameter to match the time
and date of the previous backup.
We give a short introduction to options 21, 22, and 23 from the SAVE menu in this section.
These options save your entire system, your system data, or your user data.
We do not go into much detail on the OS/400 SAVE menu because its options and how to use
them are very well explained in the iSeries Information Center available on the Web at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Choose Systems management -> Backup and recovery -> Back up your server ->
Save your server with the GO SAVE command
Or choose Systems management -> Backup and recovery -> Backup your server ->
Save your server with the GO SAVE command -> Use GO SAVE: Options 21, 22 and
23
Important: Before performing system backups see the manual Backup and Recovery
Version 5, SC41-5304 at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/sm04/c4153046.pdf
Performing an entire system backup using SAVE menu option 21 is one of these situations. It
must be started from the system console and the first task that is performed is to end all
active subsystems immediately. This is the reason why you must end your Domino servers
before starting the save procedure. As mentioned before, Domino servers need to be ended
in a controlled manner through the ENDDOMSVR command, do not use the ENDSBS
command to bring down your Domino servers!
If you are using the Java Server Controller, use the command:
ENDDOMSVR SERVER(MyServer) OPTION(*CNTRLD) JSC(*YES)
Another easy way to end your Domino server(s) manually is to use the Work with Domino
Servers (WRKDOMSVR) menu option 6.
Before you continue you should verify that no Domino 6 for iSeries related jobs are active any
more. Use the WRKUSRJOB USER(QNOTES) STATUS(*ACTIVE) command to see all
active jobs running under the QNOTES user profile. Press the F5 key to refresh the screen
until no jobs are shown.
You may also have other applications running on your iSeries server which need to be ended
in a certain way, such as Websphere Application Server, so please make sure you properly
shutdown any applications running on your system before continuing.
Attention: Before using SAVE menu options 21, 22 or 23 you must be familiar with your
iSeries environment. Some of the things you need to know are:
How to safely end your applications
How to use the tape device
How to answer QSYSOPR messages
Where your iSeries system console is
See Figure 6-1 for an overview of these SAVE menu options, the related commands, and
what objects are saved. If you are already using a CL program to perform your saves, then
this diagram could be helpful to verify that your backup program covers all necessary data.
Type GO SAVE on any iSeries command line and press Enter. Press the PageDown key to
see the second page as shown in Figure 6-2.
More...
Selection or command
===>
To save the entire system you need to put your system into restricted state which means no
users can access the server and all applications must be closed. The backup is the only job
running on your system, so before the backup starts, the command ENDSBS *ALL *IMMED is
automatically executed as explained in the previous section. Therefore you should carefully
schedule your full backup to weekends or other possible time frames - depending on your
environment. The backup may last several hours. The duration depends on your system, the
amount of data that needs to be backed up, and the tape device you are using.
To save the entire iSeries system you must sign on to the system console with a user profile
that has at least *SAVSYS and *JOBCTL special authorities. The QSECOFR user profile has
all the needed authorities but you may use another profile with adequate authorities.
Use this option only if your backup window is large enough, meaning that you can restrict
access to the iSeries server and shutdown all applications for the duration of the backup.
To save all your user data, including your Domino data directory, you can also use the OS/400
SAVE menu. This option is a very easy and safe way to back up all your user data. The
drawback is that your system needs to be in restricted state when running this and depending
on the amount of user data you need to save, this might take a long time. So use this option
only if your backup window is large enough.
You may need to recover Domino for a variety of reasons, for example:
User or operator error, such as deleting a database or running a month-end procedure
twice
Damage to your server, such as fire or flood
Hardware problems, such as a disk failure
Attention: The iSeries system provides disk protection options (mirrored protection and
device parity protection) to increase availability and to ensure that a failure of a single disk
unit does not cause loss of data. You can find more information about disk protection in the
manual OS/400 Backup and Recovery, Version 5, SC41-5304 at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/sm04/c4153046.pdf
Sometimes you must recover your entire server. At other times, you must restore a specific
directory or a single database. This section provides general information and step-by-step
instruction for the following situations:
Recover an entire iSeries server
Recover Domino data directory
Recover Domino mail files
Recover individual Domino databases
Recover changed objects (from an incremental backup)
Recover Domino program code
Recreate a Domino server configuration
Important: Your Domino server(s) must be ended before using any iSeries SAV or RST
commands! Do not start the server during backup or restore operations.
Attention: This is NOT an instruction for disaster recovery! For complete instructions on
performing a full system recovery, see the manual iSeries Backup and Recovery, Version
5, SC41-5304-06 at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/sm04/c4153046.pdf
Start with reading Chapter 4. “Selecting the Right Recovery Strategy” and Appendix D,
“Recovering your server”.
You start with installing the Licensed Internal Code from your SAVSYS media. Then you
install the Operating System, also from your SAVSYS media.
After the Operating System is installed, you have to recover the following items, using the
commands specified:
User profiles, using RSTUSRPRF
Configuration objects, using RSTCFG OBJ(*ALL)
All *IBM and user libraries, using RSTLIB SAVLIB(*NONSYS)
All folders, using RSTDLO DLO(*ALL) SAVFLR(*ANY)
The entire IFS, using command RST OBJ(('/*') ('/QSYS.LIB' *OMIT) ('/QDLS' *OMIT))
The authorities, using RSTAUT USRPRF(*ALL)
Examples
The name of a user's mail database is usually the user's ID (short name). However, the
Domino administrator has the option to use different names for mail database files.
To recover a specific user's mail database, such as the mail database for user GNELSON,
use the RST command and specify the database name:
RST DEV('/qsys.lib/tap01.devd') OBJ('/domino/data/mail/gnelson.nsf')
You can specify more than one file on the RST command. To recover the mail databases
for GNELSON, LSMITH, and JPETERS, use the following command:
RST DEV('/qsys.lib/tap01.devd') OBJ(('/domino/data/mail/gnelson.nsf')
('/domino/data/mail/lsmith.nsf') ('/domino/data/mail/jpeters.nsf'))
Examples
Substitute your server’s data directory for /DOMINO/DATA and your tape device or save file
name for TAP01 in the following examples.
To recover the database called HRINFO to the HRDPT subdirectory (folder), use this
command:
RST DEV('/qsys.lib/tap01.devd') OBJ('/domino/data/hrdpt/hrinfo.nsf')
To recover all Domino databases to the CUSTSVC subdirectory, use this command:
rst dev('/qsys.lib/tap01.devd') obj('/domino/data/custsvc/*.nsf')
Note: When a database has not changed since the last full backup, or between
incremental backups, it is not saved on any following incremental backup. The database is
only saved after it has changed again or when a full backup is run.
Depending on the backup strategy that was used, there are differences in how you need: to
restore your Domino data:
Restore full Domino data directory or entire subdirectory (such as the mail directory):
– From a cumulative backup:
When you used this strategy, you must first restore the last full backup, then the latest
backup that contains the changed objects. See “Recover Domino data directory from a
cumulative backup” on page 274 and “Recover all changed objects to a specific
Domino subdirectory” on page 275 for instructions.
– From an incremental backup:
When you used this strategy, you first need to restore the last full backup, then you
must restore each incremental backup up to the day you need to recover. See
“Recover Domino directory from a daily incremental backup” on page 274 and
“Recover all changed objects to a specific Domino subdirectory” on page 275 for
instructions.
Restore a single Domino database:
When performing an incremental backup you always save the full Domino database and
not only changed documents. So an incremental backup of a database contains the
complete database with the latest changes. Therefore, it does not matter which
incremental backup strategy was used, you always restore the most recent backup of the
database. The difference is which tape you need to use for the restore operation:
– If the database has not changed since the last full backup, you need to restore the
database from the full backup (because this is actually the most recent backup of the
database).
– If the last change was on Tuesday, then the most recent backup of that database is on
the Tuesday tapes. So if you need to restore the database on Friday, then you restore
the database from the Tuesday tapes.
See “Recover a specific Domino database from an incremental backup” on page 275 for
instructions.
So when you need to recover data from an incremental backup, you must first determine the
recovery sequence and the location of the needed copy (or copies) of each database, based
on your backup strategy.
Note: By default, the printout produces a line for each object that was restored because
it uses *ALL for the INFTYPE parameter (type of output information). On a large
Domino system this listing may be very large. In fact it may exceed the maximum size of
an allowed printout.
5. Locate and mount your most recent backup tapes (containing the changed objects).
6. To recover all the changed objects on the tape (everything that has changed since your full
backup), use the following command:
rst dev('/qsys.lib/tap01.devd') obj('/domino/data/<ServerName>') OUTPUT(*print)
Depending on your problem, you may only have to re-install the Domino program code
without having to reload Domino server data directories.
See the Lotus Knowledge Base document 1093944 at the Lotus Domino Support site
http://www.ibm.com/support/docview.wss?rs=463&context=SSKTMJ&q=%2bdomino+%2bptf+%2bho
tfix&uid=swg21093944&loc=en_US&cs=ISO-8859-1&lang=en+en
Note that this document is for Domino R5 and identifying SAxxxxx as a HotFix. However, in
Domino R6 HotFixes are named SExxxxxx, so you should review any PTF installed to
product 5733LD6.
More information on PTFs can be found on the Domino for iSeries Web site at:
http://www.ibm.com/servers/eserver/iseries/domino/domptfgi.htm
Before you start the installation, it is recommended to print the list of installed licensed
programs to verify that you are installing the correct Domino version and options. Only the
Domino options *BASE and 1 are installable from CD, all other options are downloadable from
the developerWorks : Lotus site at:
http://www.lotus.com/ldd/toolkits
Note: The installable options change with the introduction of multi-version capable
releases (Domino 6.0.3, Domino 6.5, and higher). Please refer to the release notes of
these releases for additional install options.
Attention: 5733LD6 (or 5733L65) shows the status *NOPRIMARY if your OS/400
primary language is not English (=2924). This is not an error!
If the status is *ERROR you should remove the Domino 6 for iSeries product and then
start the recovery again from step 10. To remove 5733LD6, type:
DLTLICPGM LICPGM(5733LD6)
Display the joblog to see that the job completed normally, use the command:
DSPJOBLOG OUTPUT(*PRINT)
Start over with step 10 to reinstall the code.
13.Re-install Critical FixPacks and/or HotFixes if you had any. Follow the instructions that
came with the fix.
In a situation like that you have to recreate the server configuration and the associated
objects using the command CFGDOMSVR with parameter RPLCFG(*NO).
Important: Follow these instructions only if you know how the Domino server was
previously configured!
1. Sign on to the iSeries with a user profile that has at least *ALLOBJ, *SECADM, *JOBCTL,
and *IOSYSCFG special authorities.
2. End the Domino server.
3. Verify the Domino data directory name and path by issuing the command WRKDOMSVR.
On the Work with Domino Servers menu press F11 twice to display the Domino data
directories. Write down the directory and path information.
4. Backup the Domino data directory if you don't have a valid copy. You can back up your
data directory to either a tape device or a save file. Refer to 6.2.1, “Backup of entire
Domino data directory” on page 261 and 6.6.1, “Save files” on page 280 for detailed
instructions.
5. After verifying that you have a complete backup of your Domino data directory, remove
your Domino server. The Domino servers’ subsystem must be ended or you are not able
to remove the server (ENDSBS). Enter the following command to remove the Domino
server:
CFGDOMSVR SERVER(<ServerName>) OPTION(*REMOVE)
6. You might need to recreate parts of the Domino data directory path before you are able to
continue. Verify which parts of the path still exist using the WRKLNK command. You need
all directories in the path except for the Domino data directory itself (for example, if your
path is /domino/data/<ServerName> you need to make sure that /domino/data exists. To
recreate the data directory path, use the following commands:
MD DIR('/domino')
MD DIR('/domino/data')
Use the path and directory information you have written down in step 3 on page 278.
7. Change the ownership of the directories to QNOTES by issuing the commands:
CHGOWN OBJ('/domino') NEWOWN(QNOTES)
CHGOWN OBJ('/domino/data') NEWOWN(QNOTES)
More detailed instructions on how to restore a Domino data directory can be found in
6.5.2, “Recover Domino data directory” on page 271.
9. Copy the NOTES.INI file to another directory. The CFGDOMSVR command replaces the
existing NOTES.INI and you need to replace the newly created NOTES.INI by the original
file later. In our example we copy the NOTES.INI to the root directory:
CPY OBJ('/domino/data/<ServerName>/notes.ini') TODIR('/')
10.Reconfigure the Domino server using your original configuration files. A very important
parameter on this command is RPLCFG(*NO) - using this parameter makes sure that the
existing Domino configuration files are used (ID files and NAMES.NSF).
Replace all path information with the correct values for your configuration. Our example
uses /DOMINO/DATA/<ServerName> for the data directory (DTADIR) and
/DOMINO/DATA/ID/ as the path for the Domino ID files (CERTID, ADMID, SVRID).
CFGDOMSVR SERVER(<ServerName>) OPTION(*FIRST) DTADIR('/domino/data/<ServerName>')
RPLCFG(*NO) CERTID('/DOMINO/DATA/ID/CERT.ID') ADMID('/DOMINO/DATA/ID/USER.ID')
SVRID('/DOMINO/DATA/ID/SERVER.ID')
Press F4 and verify the user ID and password parameters.
Make any changes needed to comply with the previous Domino server configuration, for
example to the Server Name (SERVER), Organization (ORG), Administrator's
Name/Password/Length (ADM), Timezone (TIMEZONE), the TCP/IP port options
(TCPOPT), and Advanced Services (ADVSRV) parameters.
Please refer to Chapter 4 of the redbook IBM Lotus Domino 6 for iSeries Implementation,
SG24-6592 for a detailed description of the CFGDOMSVR command and its parameters.
11.Delete the new NOTES.INI that was created during the CFGDOMSVR command:
RMVLNK OBJLNK('/domino/data/<ServerName>/notes.ini')
12.Move the previously saved NOTES.INI back to the data directory:
MOV OBJ('/NOTES.INI') TOOBJ('/domino/data/<ServerName>/NOTES.INI')
13.Change the object ownership of the NOTES.INI file:
CHGOWN OBJ('/domino/data/<ServerName>/NOTES.INI') NEWOWN(QNOTES)
14.Restart your Domino server.
It is recommended to back up your save files to a location outside of your server for
disaster/recovery reasons in a second step. For example, you can save them to tape or you
can send them to another iSeries system where you may have a faster tape device.
Because save files reside on your disk you need to make sure that you don’t exceed or fill up
your available disk space. In our examples, to save disk space, we reuse the save files every
time we run the SAV command, using parameter CLEAR(*ALL). This allows the backup
command to overwrite existing data. If you want to follow this example, you need to make sure
that you back up the save file to tape or move it to another system before reusing it.
Use the Create Save File (CRTSAVF) command to create a new save file called WEEKLY1 in
library DOMINOSAVE:
CRTSAVF FILE(DOMINOSAVE/WEEKLY1) TEXT('SAVF for DominoServer data directory')
The user profile you are using for backing up the Domino server data needs to have *ALL
authority to the save file (to be able to overwrite the existing data). To give *ALL authority to
user profile SAVDOMINO for save file WEEKLY1 in library DOMINOSAVE type:
GRTOBJAUT OBJ(DOMINOSAVE/WEEKLY1) OBJTYPE(*FILE) USER(SAVDOMINO) AUT(*ALL)
For example, to save the Domino data directory /lotus/data/domrest to tape device TAP01 you
use the command:
SAV DEV('/qsys.lib/tap01.devd') OBJ('/lotus/data/domrest') OUTPUT(*print)
To save to save file WEEKLY1 in library DOMINOSAVE you use the command:
SAV DEV('/qsys.lib/dominosave.lib/weekly1.file') OBJ('/lotus/data/domrest')
OUTPUT(*print)
Note: This example restores the Domino directory from the save file on disk. In real life you
are probably restoring from the backup copy of the save file on tape. See “Restore data
from save file that was saved to tape” on page 281 for details.
For example, to save the save file WEEKLY1 in library DOMINOSAVE to tape device TAP01,
type the following statement:
SAVSAVFDTA SAVF(DOMINOSAVE/WEEKLY1) DEV(TAP01) OUTPUT(*PRINT)
Note: When using the parameter OUTPUT(*PRINT) a spooled file of saved objects in the
save file WEEKLY1 is produced. By default one line for each object that was saved is
produced. On a large Domino system this listing may be very large.
Note that the save file object itself is not backed up, only the content of the save file. You can
print out the content of the tape using the command:
DSPTAP DEV(TAP01) OUTPUT(*PRINT)
When doing this, you will not see an indication of WEEKLY1 but the label reads “SAV + the
date you saved the file”, for example, SAV20030824. Note also the sequence number (for
example 00008) if you have multiple saves on one tape. A good practice would be to print out
the content of the tape and keep it in a secure place, together with the tape.
Attention: Using save files requires additional disk space! Remember to clear the save file
after you have saved it to tape, otherwise you may be filling up your disk space.
Tip: Use either the LABEL name (SAVxxxxxxxx) or the sequence number SEQNBR to
restore the correct file, if you have multiple saves on the tape.
Also, Part 8, Backup and Recovery Tools and Techniques of the manual Backup and
Recovery, Version 5, SC41-5304 contains information on this topic. See:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/sm04/c4153046.pdf
For more information about CL programming, go to the iSeries Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Choose Programming -> CL -> Related information and see the manual CL Programming
Version 5, SC41-5721.
Sample program
The following program saves our Domino data directory to tape device TAP01. In our example
we:
First end the Domino server in a controlled manner, then we wait 10 minutes before
ending the server immediately. Ending the server immediately ends the Domino
subsystem. Normally, there should be no Domino jobs remaining active when ending the
Domino server immediately, otherwise the controlled shutdown of the Domino server has
not yet finished or some of your jobs are hanging.
Attention: We found that sometimes the Domino for iSeries “watchdog” job restarts the
Domino server when the server is ended immediately while jobs are still active -
because the “watchdog” thinks the Domino server ended in error. Which means, that
the Domino server will be active again when you start the backup and thus the backup
might not be complete and valid.
It is therefore highly recommended to use the Domino APIs to retrieve the server status
instead of ending the server immediately after a hardcoded timeframe. An example of
such a CL program can be downloaded from the Additional materials directory of this
redbook. See Appendix D, “Additional material” on page 611 for instructions on how to
download the code example.
In our example we have a 10 minute wait before ending the server immediately. This may
not be enough for your environment and you should test manually how long it normally
takes to bring your server down if you want to pursue this approach. End the Domino
server manually at the time you plan to schedule your backup for and record the time. Test
this at least two times on different days, check the time needed and change the DLYJOB
value in the CL program if needed. Note that the delay is in seconds. Recreate the
program after changing it.
As an alternative to the hard-coded 10 minute wait you could change the program to use a
loop with a short delay and a check to see if the server has ended. For example, loop
15 times with a one minute delay each time through the loop. By doing that, the backup
begins as soon as the server has ended rather than always having to wait 10 minutes.
You would also have an additional time buffer in case a server shutdown takes longer than
normal.
Clear the tape before using it (parameter CLEAR(*ALL)) so any existing data on the tape
is overwritten.
Do not use the CLEAR(*ALL) parameter if you are using this program as part of a
backup routine where you save other data before the Domino data directory!
Update the history information (parameter UPDHST(*YES)) so, if we like, we can run
incremental backups after this full backup.
Use the parameters OUTPUT(*print) and INFTYPE(*ALL). This prints a detailed report of
saved objects. If you have a large Domino environment and the detailed report is too large,
use INFTYPE(*SUMMARY) or INFTYPE(*ERR) instead.
Restart the Domino server after the save operation.
Before the job ends, we also print the joblog. This helps to diagnose what happened when
the program run.
0001.00 PGM
0002.00 MONMSG MSGID(CPF0000)
0003.00 ENDDOMSVR SERVER(DOMREST) /* End the Domino Server +
0004.00 normally */
0005.00 DLYJOB DLY(600) /* Wait 10 minutes for the Domino +
0006.00 Server to end , increase time if it's not +
0007.00 enough */
0008.00 ENDDOMSVR SERVER(DOMREST) OPTION(*IMMED) /* This will +
0009.00 end the subsystem monitor job */
0010.00 ALCOBJ OBJ((QUSRNOTES/DOMREST *SBSD *EXCL)) +
0011.00 WAIT(120) /* Check if the subsystem is +
0012.00 still active */
0013.00 MONMSG MSGID(CPF1002) EXEC(GOTO CMDLBL(NOSAVE)) /* +
0014.00 Server did not end normally */
0015.00 SAV DEV('/qsys.lib/tap01.devd') +
0016.00 OBJ(('/lotus/data/domrest')) +
0017.00 OUTPUT(*print) ENDOPT(*REWIND) +
0018.00 INFTYPE(*ALL) UPDHST(*YES) CLEAR(*ALL) /* +
0019.00 Save Domino data directory and all +
0020.00 subdirectories to tape device TAP01 */
0021.00 NOSAVE: DLCOBJ OBJ((QUSRNOTES/DOMREST *SBSD *EXCL))
0022.00 STRDOMSVR SERVER(domrest) /* Start the Domino server */
0023.00 DSPJOBLOG OUTPUT(*PRINT)
0024.00 ENDPGM: ENDPGM
****************** End of data ***************************************
Bottom
F3=Exit F4=Prompt F5=Refresh F10=Additional parameters F12=Cancel
F13=How to use this display F24=More keys
3. We want this job to run from the QBATCH job queue and we use the user profile
SAVDOMINO which will be the actual user in the submitted job. See Figure 6-5 for the
additional parameters.
Additional Parameters
Bottom
F3=Exit F4=Prompt F5=Refresh F12=Cancel F13=How to use this display
F24=More keys
Next
-----Schedule------ Recovery Submit
Opt Job Status Date Time Frequency Action Date
SAVDOMTAPF SAV 08/25/03 14:33:54 *ONCE *SBMRLS
SAVDOMWEEK SCD *SUN 22:00:00 *WEEKLY *SBMRLS 08/31/03
SAVESAVF SAV 08/25/03 15:44:07 *ONCE *SBMRLS
STRTCP SAV 05/17/02 07:45:00 *ONCE *SBMRLS
TTLCHGJRNR SCD *ALL 00:05:00 *WEEKLY *SBMRLS 08/28/03
TTLMOM SCD *ALL 00:05:00 *WEEKLY *SBMRLS 08/28/03
ZONDAG HLD *ALL 00:01:00 *WEEKLY *SBMRLS 08/28/03
Bottom
Parameters or command
===>
F3=Exit F4=Prompt F5=Refresh F6=Add F9=Retrieve
F11=Display job queue data F12=Cancel F17=Top F18=Bottom
To make a new copy of a database using the Lotus Notes client, choose File -> Database ->
New Copy, or for a new replica, choose File -> Replication -> New Replica.
You can place the new database on your local workstation and then copy and paste it to a
shared drive on the iSeries IFS (or use FTP if you prefer). Or you can map a directory outside
the Domino data directory first and create the copy/replica directly on this shared drive.
Choose Networking -> TCP/IP -> iSeries NetServer to display the appropriate information.
To copy a Domino database called “SAVETEST.NSF” from the local workstation (C:\Program
Files\Lotus\notes\data) to the iSeries system (AS25) directory called “/transfer/dominodb”
using the MS-DOS Prompt, do the following steps:
1. On the MS-DOS Prompt window change the current directory to the directory where
SAVETEST.NSF resides:
cd program files\lotus\notes\data
2. Start an FTP connection to the iSeries system where you want to copy the file:
ftp as25
If you receive a “Connection refused” message, this means that the FTP server is not
started on your iSeries system. Ask your system administrator to start the FTP server.
3. Enter your iSeries user ID and password when prompted, press Enter after each entry.
4. Change to binary format, type bin and press Enter.
5. Change to the target directory:
cd /transfer/dominodb
Press Enter.
6. Copy the file, type:
put savetest.nsf
Press Enter.
7. Type quit to exit the FTP session and press Enter.
8. To exit the MS-DOS prompt, type exit and press Enter.
9. Make sure QNOTES is the owner of the database you just FTPed to the system:
CHGOWN OBJ(’/transfer/dominodb/savetest.nsf’) NEWOWN(QNOTES)
Once the database is open in your Lotus Notes client, you can either replicate the entire
database or use the copy-and-paste function to copy the missing documents from the
restored database to the original database.
Important: To prevent unwanted replication between the databases you should check
the Temporarily disable replication box in the database’s Replication Settings.
3. After you have copied/replicated the needed data you can delete the restored database
using Domino functions or using iSeries commands. Use iSeries operating system
commands only if the restored file is not under the Domino data directory.
The minimum authority requirements are *SAVSYS and *JOBCTL special authorities, and
*USE object authority to the QUSRNOTES library.
This user profile also needs *USE authority to the SAV and RST commands.
If you use save files, the user profile needs to have *ALL authority to the save files to overwrite
existing data.
To prevent authority issues we recommend that you also grant *ALLOBJ special authority to
this user profile. However, this special authority is not required.
Use the Work with System Status (WRKSYSSTS) command to display the overall disk usage
as shown in Figure 6-8.
Bottom
Command
===>
F3=Exit F4=Prompt F5=Refresh F9=Retrieve F10=Restart
F11=Display transition data F12=Cancel F24=More keys
Verify the System ASP value and the % system ASP used value. In our example the total
amount of disk space in the system ASP is 171,7 GB of which 50.58% are used
(171,7 GB x 0,506 = 86.8 GB).
Important: Be vary careful when using the EDTF command. Do not use EDTF to edit
Domino databases, that may cause database corruption.
We found that using the EDTF command is an easy way to determine the size of a
directory. However, the command is not really intended to do this.
To see how much storage is occupied by your Domino server use the command:
edtf '/lotus/data/'
Our example assumes that all partitioned Domino server directories are under the /lotus/data/
directory. This allows us to display all Domino server data directories at once.
Enter the number 6 in front of the desired Domino server and press the Enter key. This
displays the size of that data directory as shown in Figure 6-9.
Directory: /lotus/data/
Position to : Record : 1 of 6
New File :
2=Edit 4=Delete File 5=Display 6=Path Size 9=Recursive Delete
Bottom
Directory: /lotus/data/DOMREST
Position to : Record : 1 of 142
New File :
2=Edit 4=Delete File 5=Display 6=Path Size 9=Recursive Delete
Tip: You can determine transaction log usage by displaying the contents of the transaction
log directory. In our case these files are located in the /logdir directory under the Domino
server’s data directory. To display the size of the transaction log files, enter 2 in front of the
appropriate subdirectory. See Figure 6-10 for an example.
Directory: /lotus/data/domrest/logdir
Position to : Record : 1 of 4
New File :
2=Edit 4=Delete File 5=Display 6=Path Size 9=Recursive Delete
Bottom
Note the Changed date in Figure 6-10. This value gives you the date and time when the log
extent was last changed.
This command initializes the tape in device TAP01 using Volume identifier DOMINO (every
volume needs to have a name). The parameter CHECK(*NO) must be used when you are
initializing a new tape.
Before starting a backup, make sure you have enough initialized tapes for the amount of data.
After a while all objects owned by QNOTES are displayed and you can copy this list for
example to a Microsoft Exel file (.xls) by selecting File -> Export.
In the first section we describe backing up your Domino environment using the functions
provided by the BRMS plug-in provided in iSeries Navigator. The second section offers a
quickstart method for backing up your Domino environment with BRMS using OS/400
commands.
We also discuss why you would choose to use one of the backup scenarios, or a combination
of them, for your backup strategy. The chapter contains tips for setting up and using your
Domino backups as well as troubleshooting information. We show where BRMS stores
temporary data when backing up Domino servers, and what you can do, and must not do,
with that data.
Note: For simplicity, we are using the term BRMS throughout this chapter for the Backup,
Recovery, and Media Services for iSeries (5722-BR) product.
The most important step to begin with, when implementing BRMS on your system, is a review
of your business needs related to the backup and recovery strategy. Dedicated Domino
backups may be possible, or, in a 24x7 environment, you may need to perform Domino online
backups. In addition, other restrictions may require online incremental backups. Using
clustered Domino servers, to back up one and leave the other running may also be a solution.
There is a lot of information available on the Backup, Recovery, and Media Services Web site
at:
http://www.ibm.com/servers/eserver/iseries/service/brms/
This information is kept up-to-date as new versions of the OS/400 operating system, of
BRMS/400, of Domino for iSeries, or iSeries Navigator are released. New functions may be
added or existing functions may (and will) be enhanced in new versions of the products or by
installing Program Temporary Fixes (PTFs). Therefore it is always a good practice to first
reference the latest information provided on this Web site before you configure changes to
your current backup procedures or start to implement a new backup environment. Pay special
attention to the Support section to make sure that you installed the latest available PTFs for
the different OS/400, Domino for iSeries, and BRMS versions. An example of very useful
information on this Web site is the News section where you not only find information on V5R2
enhancements, but also on upgrading BRMS to V5R2.
Backup, Recovery, and Media Services for iSeries (BRMS/400) provides just what its name
says, a solid program that you can use to back up and restore iSeries data. The product
keeps track of where the saved information resides and for what period this data should be
retained. With the use of the iSeries Job Scheduler, which is part of the iSeries operating
system, BRMS can be fully automated to back up your Domino environment (and naturally
also the rest of your iSeries data) without user intervention. After installing the licensed
program, you run a command to initially set up your BRMS environment.
This command analyzes the available resources on the system to be used for BRMS and
creates a set of default backup objects. You can use these objects to run your backups
manually or schedule backups with the iSeries Job Scheduler. After completing a backup,
you run a command to generate BRMS reports that contain information about which data was
saved and to which location. In addition, reports are generated that tell you exactly which
steps to take for restoring your system and user data in case of a disaster recovery. You must
print these reports daily, as they are the starting point for restoring your complete system. The
reports are not needed when the system is still running and you only want to restore Domino
databases. In this case you can use the recovery information from the BRMS screen options.
There are many parameters you can use to alter the default setup of BRMS. In this chapter
we show you how to set up BRMS for Domino using the iSeries Navigator. As setting up
BRMS using OS/400 green screen commands is explained thoroughly in several other
places, we only discuss the most important parameters in this publication. For detailed
information on fine tuning BRMS backups, refer to Backup, Recovery and Media Services
Version 5, SC41-5345-03.
No matter which method you choose to use, the resulting backup strategy should be the
same, as it must be based on the requirements that are set by your company’s environment.
Attention: It is critical that you do not replace your complete system backup with online
Lotus Server backups. Only Domino databases are backed up using the online Lotus
Server backups. Other important Domino data, including libraries, files in the Lotus Server
IFS directories, and other non-Lotus Server system data, should also be backed up on a
regular basis (such as QUSRSYS, QGPL, etc.).
A dedicated backup is typically run once a month on an iSeries system mainly running
Domino servers or once a week when you run additional applications on your iSeries system.
If you have the possibility to perform full dedicated backups, this may be the best backup
method for you. A full dedicated save, with the Domino server ended, will generally be faster
than an online full backup (where the Domino server stays active). Recovery of a database
will generally also be faster when restoring a Domino database from a full dedicated backup.
A full online backup can be run daily. In addition, a weekly or monthly full dedicated backup is
recommended to save all objects in the Domino data directory, including those not saved by
the full online backup, such as ID files and configuration files.
Selective backups
The easiest way to perform a selective backup of a specific database is to end the Domino
server and use the OS/400 SAV command (see Chapter 6, “Backup and recovery using
OS/400 commands” on page 257 for information on this). This makes sure that the database
is not locked and the backup runs error free.
When you want to save multiple databases, you can create a link list containing those
databases and run it in a BRMS backup policy (or a backup control group in OS/400 green
screen terms) that you specifically create for selective backups. The Domino server must be
ended for this kind of backup, as you are not using SAVDOMBRM, which is intended for
online backups of Domino databases. Note that SAVDOMBRM should not be run from a
command line, it must be used from within a control group.
You may choose to use selective backups when not all Domino data needs to be saved on a
daily basis. Other reasons for performing selective backups are in situations when you need
to keep a copy of the database for later use or to copy the database to a Domino server in a
network that is not connected to the local Notes Named Network.
Setting up online incremental backups for Domino requires some additional configuration
steps, however, it has many advantages over the previous methods. Your users can continue
to work while the backups run. In addition, the amount of data saved is less compared to
backing up the full server data so the backup is faster and less backup storage capacity is
needed. A second advantage of online incremental backups is the possibility to restore a
database to a point in time.
Note: Although you generally have less data to save with an incremental backup approach
there may be cases where you may have more data to save, compared to a full online
backup. This may occur at very busy Domino servers where for example large attachments
are sent while the backup is running.
Incremental backups require the setup of transaction logging on the Domino server. Although
transaction logging is needed for online incremental backups it also offers the advantage of a
faster restart after a Domino server ended in error. For information on transaction logging and
how to set it up for BRMS, please refer to 5.3, “Transaction logging” on page 252.
More disk space is required compared to full backups when performing online incremental
backups because of the archival logs. Archival logs are copied when they are full. These
copied archival logs remain on the iSeries system until an incremental backup is run, then
they are deleted. So on a busy Domino server your disk usage will increase because of these
archival log files until the next incremental backup has run.
Where applicable, we discuss the naming and functional differences between iSeries
Navigator and the OS/400 5250 emulation environment. See Table 7-1 for the object
differences that have to be considered.
Important: It is recommended not to switch between the iSeries Navigator and the OS/400
approach. Once you started using iSeries Navigator, you should stay with this interface,
because changing backup control groups or other configuration changes in the OS/400
environment while having scheduled backups in iSeries Navigator is confusing and might
cause errors.
Before you start using BRMS you should review the objects that are created by the product.
You can use the default objects created by BRMS or alter some of them to meet your desired
situation. Note that several items, such as some backup link lists, cannot be changed in the
iSeries Navigator client interface. In addition, you can create similar objects of your own and
only use those objects for your backups. The following objects are to be considered:
Backup policy/Backup control group:
The backup policy in the OS/400 command environment and the backup policy in iSeries
Navigator are two different entities. They have little in common and it is important to
understand the differences.
A backup policy in iSeries Navigator is a set of rules that controls what is backed up and
where it is backed up. It contains information about actions to perform before, during, and
after the backup.
In OS/400, a backup policy defines attributes such as the media policy, the backup device,
the default weekly activity, and much more. The items to be backed up are defined and
listed in the backup control group.
However, in the OS/400 environment, you do not need to use a backup policy as you could
also define these values directly in the control group attributes.
So a backup policy in iSeries Navigator combines the settings that are separately defined
in the backup control group and in the media policy, and, if used, in the backup policy or
system policy in an OS/400 environment.
System policy:
In the OS/400 environment you can use the system policy to define global settings for your
backups. Control groups and the backup policy can use nested settings for several
parameters. For example, in a control group you can enter the value *SYSPCY to point to
the appropriate value for that parameter in the system policy. In addition, when you use the
value *BKUPCY for a parameter in a control group, and use *SYSPCY for that parameter
in the backup policy, then again the actual value used is the global setting taken from the
system policy.
So you could use the system policy for global settings, the backup policy for most backups,
or use a control group with the actual values entered for specific backups. It is also
possible to use a mixture of actual and nested settings in a control group or the backup
policy.
Media policy:
The media policy contains information about where your media is located, for how long the
backups should be retained, and if save files should be used.
Important: Using move policies and storage locations implies that you follow the BRMS
information and move the media to the different locations. The actual location of tape
media should match the information kept in BRMS. For that reason it is strongly advised to
configure BRMS for manual movements, so you are sure the tape media information in
BRMS matches the actual location of the media.
iSeries Navigator allows you to install the BRMS plug-in. Note that you do not need to have
the iSeries Navigator Domino plug-in installed to run Domino backups with BRMS.
You can use the BRMS iSeries Navigator client to back up and restore Domino objects and
recover your Domino servers. It is best practice to use the iSeries Navigator client to
configure and maintain your backup environment if you never worked with BRMS in an
OS/400 environment. The iSeries Navigator windows are easy to understand and follow.
Thorough online help is provided to guide you through the setup and maintenance.
This product is constantly enhanced and maintained. Make sure you check the IBM Web
sites on a regular basis to stay up-to-date with the product. For information about the latest
enhancements, see the Overview and what’s new section on the IBM eServer iSeries
Information Center at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
For information on the latest BRMS and iSeries Navigator PTFs, see the following URL:
http://www.ibm.com/servers/eserver/iseries/service/brms/support.htm
You can read or download the BRMS iSeries Navigator client student guide at:
http://www.ibm.com/servers/eserver/iseries/service/brms/pluginguide.htm
Figure 7-1 on page 301 shows all default backup policies (created during the installation of
BRMS) and entries for the existing Domino servers on this system.
Note: The BRMS maintenance task will create default backup policies for all Domino
servers that are configured on a system when the BRMS maintenance task runs. You are
not able to delete these backup policies using iSeries Navigator as iSeries Navigator
considers that they might be needed in scheduled backups. You need to use OS/400
commands to delete backup policies that are created by the maintenance task.
Also be aware that running the maintenance task again (which should run daily), will again
recreate default backup policy entries for existing Domino servers.
7.2.2 Moving from OS/400 BRMS commands to BRMS iSeries Navigator client
If you start using the BRMS iSeries Navigator client after you have used/configured BRMS in
the OS/400 command environment all previously configured BRMS objects will automatically
be added to the iSeries Navigator client and show up on the respective windows. You also
find any previously scheduled BRMS backup jobs in the Job Scheduler or the Advanced Job
Scheduler when used.
When opening or starting a backup policy that was previously created as a control group in
the OS/400 environment for the first time in iSeries Navigator, it must first be formatted for
iSeries Navigator.
As explained in “BRMS/400 entities” on page 297, in the OS/400 environment you have the
backup control group and the media policy as separately configurable objects while in iSeries
Navigator you have the backup policy which combines the settings of these two. Also, you
might use an OS/400 backup policy and/or system policy.
The reformatting is needed because this works differently in iSeries Navigator, that is, the
values for the media policies are set directly in the backup policy and they do not point to a
value anywhere else (such as the backup policy or the system policy in the OS/400
environment).
So when you use iSeries Navigator to start or open a backup policy that was previously
created in OS/400 as a control group, you will be asked to review and set these values. The
values that are shown by default are the resolved values from the settings in the OS/400
control group. The message shown in Figure 7-2 is displayed when you select the backup
policy for the first time.
Clicking Close launches the policy properties window which is shown in Figure 7-3. Here you
are able to review and set the values for this backup policy. Clicking the OK button activates
the backup in iSeries Navigator.
In addition to backing up your Domino environment, you can also save system and user data
using the iSeries Navigator client.
Next, we discuss how to configure the following backup strategy for the Domino environment:
Daily online incremental Domino server backup
Weekly full online Domino server backup
Weekly backup of entire IFS except online Lotus data
Monthly full iSeries system backup
Yearly full iSeries system backup
Note that we explain the set up and show the appropriate windows only for a daily backup
policy. The iSeries Navigator windows that you use when setting up a weekly, monthly or
yearly backup are the same as for a daily backup. What is different are the selections you
make on these windows, the naming of the objects, or the retention periods.
Retention schedule
To make sure that all data is available long enough and overlaps the following backup period
we chose the following retention schedule:
35 days for daily backups
42 days for weekly backups
365 days for monthly backups
1825 days for yearly backups
Attention: You may need to use different retention periods for your backup media,
according to any legal rules that may apply for your country or company.
Do not extensively click iSeries Navigator items while you are waiting for a response as this
will slow down the response time and may even cause hangs in the application (so you
might have to restart the iSeries Navigator client).
Follow these instructions to configure a backup policy from the iSeries Navigator client:
1. From the iSeries Navigator window shown in Figure 7-1 on page 301, click Create a
backup policy under the Backup tasks in the Backup, Recovery, and Media Services
Tasks pane (bottom right pane). This starts the New Backup Policy wizard.
It is recommended to use the Help option to inform yourself about this function if this is the
first time you are creating a backup policy using iSeries Navigator.
2. Click Next when you are ready to continue. This displays the window shown in Figure 7-4.
Here you fill in the name of the backup policy and, if desired, a description of the new
policy.
3. Click Next to Select a Backup Strategy as shown in Figure 7-5. As explained earlier, we
chose the online incremental backup strategy for the daily backups. Therefore select Back
up Lotus server data online.
Notice the Help button, which explains the four choices available on this window.
4. Click Next to display a list of Domino servers on the iSeries system. See Figure 7-6.
Select the Domino servers you wish to save. All Domino servers are checked by default.
For our example we want to save all Domino servers on the system, so we leave all
servers checked. Click Next to continue.
Figure 7-6 All Domino servers selected for the daily backup
6. The following windows depend on your system configuration. For example, if you are using
user-defined file systems, you are asked whether you want to unmount them. Or there
might be a window regarding your LPAR configuration. Use the help function if you are not
sure about what to select on these windows. Step through these windows until you arrive
at the Backup Activity window shown in Figure 7-8.
7. On the Backup Activity window you select whether you want to run a full backup or
whether to save changes only. Select the Changes only and Changes since last backup
(incremental) radio buttons to save only the changes. Note that the backup change type
(cumulative or incremental) does not apply to Domino backups. Click Next to continue to
the Media Retention window in Figure 7-9.
9. We selected TAP01 for the backup tape device. After selecting the tape device click Next
to proceed to the Add Media window, as shown in Figure 7-11.
Note: You must select one of the devices that are available on your system and appear
in the selection box on the Select Backup Devices window (Figure 7-10).
You can change this selection to use a save file or an IBM Tivoli Storage Manager
server later in the configuration process. This procedure is explained in “Backup to a
save file or an IBM Tivoli Storage Manager server” on page 323.
10.You are asked whether you want to add the media that you are about to use for the
backup. You can also choose to add it later. Or you might already have added the needed
media to the media pool.
In this example we choose to add the media to the BRMS configuration. Click Next to
continue.
11.On the following window, see Figure 7-12, tape volumes can be added. You can either
enter the volume names one by one. Or you can add several tape volumes at a time,
which is very convenient when adding a group of new tapes to the media pool.
In this example we fill in the number 3 for the amount of Volumes to add, starting with the
Volume name MED100. The iSeries Navigator client will then automatically add 3 tape
volumes named MED100, MED101, and MED102.
Note that the text on the window provides extra help information about the task you are
performing.
12.After adding the volumes you are asked where the tapes should be located; see
Figure 7-13. In addition, you can add new locations.
In our example we used the Home location for the new tapes. Click Next to continue to
the Initialize Volumes window as shown in Figure 7-14.
13.On the Initialize Volumes window, you have the option to initialize individual tape volumes
and check for active files. In addition, there is the choice to unload, rewind, or leave the
tape media at its position after the initialization.
Click Next to continue to the Summary window as shown in Figure 7-15.
Note: BRMS automatically protects data that is written on previously used tape volumes.
So when a tape volume is already registered in BRMS and you try to change the volume
name or to initialize the tape volume an error message is displayed. You are then asked to
cancel the operation or to ignore the warning and continue without initializing or renaming
the tape volume.
15.Once the configuration has finished you receive a completion message where you are
asked whether you want to run the backup policy immediately, schedule it for later, or end
the configuration without further action. See Figure 7-17 for this message.
It is recommended to schedule the daily backup policy to run on different dates. This
avoids starting the backups manually every day.
These are the options you can configure for the Management Central Scheduler:
Run the backup policy only once. You also select the date and time for the backup job.
Run the backup policy daily. You have to select the time when you want the job to run.
Run a weekly backup. You select the day of week and time you want the job to run.
Run a monthly backup. You select the day of the month when you want it to run. Note that
you can either select the number of the day or the first or last day of the month.
The Summary information is updated every time you change an entry on the window.
For our example of a daily backup, check the Daily box and fill in the time of day when you
want the backups to run.
In this case, the New Scheduled Job window is displayed when you click the Schedule button
on the New Backup Policy - Policy Created window (shown previously in Figure 7-17 on
page 313).
Enter a name for the job on the General tab. Then select the Schedule tab to schedule your
daily backup, as can be seen in Figure 7-19.
Here you have check boxes for the days of week and you can enter the time when you want
the job to run. You can run the backup once or schedule it periodically. In addition you can
select specific days for the backups which is needed for quarterly or yearly backups.
For a daily backup schedule, choose the days Monday through Saturday
For a weekly (full) backup choose Sunday
Note that selected dates are automatically highlighted in the calendar pane.
All other tabs are not specific to Domino backups, they control the job attributes, where
notification messages are sent, settings for automated recovery, and communications
settings that can be used to schedule the job remotely.
It is recommended to create default schedules for daily, weekly, monthly and yearly backups.
These schedules can then be used in the future for all scheduling tasks, such as Domino
backup policy tasks or other jobs that you would like to run with the same schedule. See
Figure 7-20 for an example of the New Schedule window.
7.3.3 Create backup policies for weekly, monthly, and yearly backups
As you know, a solid backup strategy consists not only of daily online incremental backups.
The next step is to create weekly, monthly, and yearly backup policies and schedule them to
run automatically.
Do not forget to also schedule the BRMS maintenance job to run daily, and print the BRMS
reports so you are prepared in case of a disaster. These jobs can also be scheduled from
iSeries Navigator.
Note that there is no backup strategy that fits all situations, so you must work out a strategy
that is best for the situation in your business. However, you can use our example as the basis
for setting up your own backup strategy.
Weekly backups
It is recommended to run full backups weekly when you run online incremental backups on a
daily base.
When setting up a weekly full backup policy you need to make the following changes from the
setup of the daily backup policy explained in “Creating a backup policy for daily online
incremental backups” on page 304:
1. The first change is in step 7 on page 308. Select Full backup instead of Changes since
last backup (see Figure 7-8 on page 308).
You can use the default backup policy *System for the full backups or create your own. You
are not able to change the policy when using the default *System backup policy. Therefore, if
you want to run additional tasks before or after the full system backup, you should create your
own backup policy. It is best practice to use the New Based on option from the original
backup policy and only change the settings you require.
Note: Be aware that performing the Domino backup policies does not save all your system
data. You must also perform full system backups on a regular basis to be able to recover in
case of data loss.
It is important to understand that in this strategy, not all data that belongs to the Domino
environment is saved daily or weekly, such as the NOTES.INI file and the Domino program
files.
Therefore, if you want to save this additional Domino data more often or if you run additional
iSeries applications, you may want to create backup policies that run link list backups, that
save user and system libraries, or IFS objects.
You can create a backup policy that combines several iSeries objects. To do so:
1. On the select a Backup Strategy window, shown in Figure 7-5 on page 306, select Back
up a customized set of objects (see step 3 on page 305) and click Next.
2. On the following window you can choose between IBM-supplied data or User data. Select
User data and click Next to continue.
3. Now, in the Customize User Data window, as shown in Figure 7-21, you are able to select
the objects that you want to include in the backup policy.
Note that you can select All directories which then makes the Select Lotus servers for
online backup selection unavailable. This is because the Lotus servers will automatically
be included in the All directories backup. If you select to Exclude Lotus server online
backup items under All directories, you can again select Select Lotus servers for online
backup check box.
More configuration windows are presented when clicking Next, depending on the choices
you make on this window.
Most information in this section is again based on the iSeries Navigator interface.
The fact that some of these link lists are checked by other link lists during execution allows
users to add their own omit entries to the dynamic lists. For instance, any entry in
QLNKOMTONL will be omitted from the backup when the QLTSEXCL list is executed. An
example of a file to include in QLNKOMTONL is the NOTES.INI file. This provides the
possibility to run the QLTSEXCL list with the Domino servers up and running. Note that the
dynamic lists are updated by BRMS when the Domino configuration has changed and the
maintenance job runs.
The new lists must not be added to any other list, they are static, and any omit entries are
automatically picked up by the dynamic lists:
The entries in the QLNKOMTLTS list are added to the QIFSXCLLTS list
The entries in the QLTSOMTONL list are added to the QLTSXCLONL list
The entries in the QLNKOMTONL list are added to the QLTSEXCL list
For more information about what is included and excluded in the omit lists, see “How to
initialize BRMS” at:
http://www.ibm.com/servers/eserver/iseries/service/brms/dominitbrm.htm
To start or schedule the BRMS maintenance task in iSeries Navigator, select Perform
maintenance and cleanup from the Backup, Recovery and Media Services Tasks pane
(right bottom section) on the Series Navigator window shown in Figure 7-1 on page 301.
Figure 7-23 shows the Run Maintenance Options - Media tab.
As you can see, the maintenance task also takes care of expiring media, running move
policies, etc. In addition, the backup history and backup log entries are deleted, and several
reports are created, including the disaster recovery report.
Select Print reports from the Backup, Recovery, and Media Services Tasks pane (right
bottom section) on the Series Navigator window shown in Figure 7-1 on page 301. You can
then select which reports to print, as shown in Figure 7-24.
When you select to print the Disaster recovery report, BRMS creates a recovery list that
guides you through all steps needed to perform a full system recovery. Make sure that you
obtain the printout of this list daily. In addition, if you have a network printer connected, or a
remote system, we advise to send the output to a remote printer. It is best practice to
schedule the print jobs to run on a daily basis, so you will have the necessary information
available, in case disaster recovery might be needed.
Note: The Disaster recovery report does not show the steps needed for recovering a
system when you used save files or to an IBM Tivoli Storage Manager server. This is so
because you cannot back up an entire system to save files or an IBM Tivoli Storage
Manager server. Refer to the redbook iSeries Tivoli Storage Manager and Backup
Recovery and Media Services Integration: a Unique Combination, SG24-7031 for more
information.
To access the Move Policies, select My Connections -> Your_System -> Backup,
Recovery and Media Services -> Move Policies or expand the Movement tasks in the
Backup, Recovery and Media Services Tasks pane. See Figure 7-25 for an example of the
move policies properties.
To create a new media pool manually, select My Connections -> Your_System -> Backup,
Recovery and Media Services -> Media -> Media Pools. Right-click an existing media pool
and select New based on. This results in the window shown in Figure 7-26.
Enter a name for the pool and select the desired Density from the drop-down box. Note that
you can also select whether to use the media capacity that is associated with the density of
the media in this pool or you can type in the maximum capacity manually.
Clicking the Advanced box allows you to (optionally) store additional information for this
media pool, such as the manufacturer, part number of the media type, and information on
where the tape media was obtained from.
Right-clicking Tape Volumes allows you to add media to any media pool. Select Add to
launch the Add Media wizard. All available media pools are displayed as can be seen in
Figure 7-27.
After selecting a media pool you are able to add the tape volumes. This involves exactly the
same tasks as when adding tape volumes to a media pool during the creation of a backup
policy. Therefore, please refer to steps 11, 12, and 13 on page 312 and the related figures.
To change a backup policy, double-click it in the Backup Policies pane (upper right in the
iSeries Navigator window) which opens the Backup Policy properties. Then click the During
button. This displays the During Backup window. Select the Where tab to select the backup
media. The Where tab is shown in Figure 7-28.
In addition, you can find tabs for the Media, Save File, and TSM Server Retention settings as
well as the Activity tab.
You can now select a Save file or a TSM server from the Where to back up drop-down menu
for this backup policy. The configurable settings change depending on your selection:
When you select to back up to a save file you also have the option to specify the storage
pool where the data should be stored and disk pool storage limits. In addition, if you
decide to allow the backup of save files to tape media, you can also configure the Media
Devices Settings for saving the save files to tape.
If you select to use an IBM Tivoli Storage Manager server for the backups, you can select
the server name, connection names, and storage locations. In addition, you can use the
Manage TSM Servers button and edit information for configured servers or add
configurations for additional IBM Tivoli Storage Manager servers.
See the help text for more information on the different objects and choices.
4. Once you have selected the path click Next to select the version of the data you want to
restore. You can restore the most current version, select a date and time, or choose just a
date. First you select a date to restore then you can choose the time. See Figure 7-31.
Clicking the Details button displays the release of the objects to be restored, the backup
policy used, the size of the objects, and a lot more information about the objects.
6. Choose Select files in the directory to restore and click Next. You are now able to
select the database file(s) from a list as shown in Figure 7-33. After selecting the
appropriate file(s) click Next once again.
7. The following two windows provide the possibility to restore the file with a different name,
or to a different location, or both.
Note that in this example there are no Volumes needed for the restore operation. This is
due to the fact that this backup was performed to an IBM Tivoli Storage Manager server.
If the data would reside on a tape rather than on an IBM Tivoli Storage Manager server,
the volume(s) to be loaded would be listed in the Volume box.
The policies are very important, as they describe the way how BRMS will act on the objects
that the specific policy is used for. As an example, let us look at the backup control group
level, where you can see the control group attributes. You can choose to point to the backup
policy (*BKUPCY), or to the system policy (*SYSPCY), or you can choose a policy you
created yourself for the Media policy parameter in the control group attributes.
When browsing through the options and parameters you will notice that many of them have
the backup policy (*BKUPCY) as the default setting. This means, that when you use this
control group for your backups, the settings in the backup policy define which value is really
used for that parameter. However, the value for that parameter in the backup policy may well
be *SYSPCY, so BRMS takes the value from the system policy instead.
If BRMS is new for you, you definitively want to keep a clear overview of the configuration. In
this case, it is best practice to not leave the defaults in the parameters referring to the backup
or system policies, but to alter the values to actual objects of your own choice.
BRMS does not check for typing errors for all parameters and as typing errors might cause
your backups to fail, it is recommended to use the F4 key to prompt for available values
whenever possible.
If you want to automate a backup process for which you created a control group, add the
control group to the iSeries Job Scheduler. You can use option 6 (Add to schedule) on the
Work with Backup Control Groups (WRKCTLGBRM) screen to do this. Again, to avoid typing
errors, we advise not to add the backup job to the job scheduler manually.
In addition to the backup jobs, we advise you also schedule the BRMS maintenance job and
the Print BRMS reports job on a daily basis. The maintenance job must not run while backups
are running, so it is good practice to schedule it after the daily backups have finished. This job
cleans up old BRMS logs and keeps the BRMS configuration up-to-date with any changes. In
addition, this job creates BRMS information data in several databases that can be printed
using the Start Recovery using BRM (STRRCYBRM) command with parameter
ACTION(*REPORT) - which is the default setting for this parameter.
Notes:
To start working with BRMS, type GO BRMS.
To find all commands related to BRMS, type GO CMDBRM.
The first thing to do is to initialize BRMS. Initializing BRMS automatically finds the available
system resources, such as tape devices, for the BRMS environment and creates the default
BMRS objects. Control groups for Domino backups are automatically generated if Domino
servers exist on the system when BRMS is initialized.
After adding or removing one or more Domino servers, the BRMS configuration needs to be
updated by running one of the initialization commands. To perform the initialization again
after you changed your Domino server configuration, enter one of the following commands:
Running either one of these commands automatically detects the Domino servers and
creates the necessary objects in BRMS that allow you to set up a backup strategy for your
Domino environment.
Selection or command
===>
Note: The BRMS system policy has the following default settings that should be
checked and changed if necessary before you start using BRMS for backups:
Output queue: If possible, it is better to send the BRMS reports to a remote output
queue at a secure location.
Day start time: This value also affects the media and control groups.
Change presentation controls (option 5): Make sure the presentation controls are
equal to your defaults.
Change IPL controls (option 7): Check the earliest and latest time to allow an IPL. If
set incorrectly, your system may not perform an IPL when you planned it to happen.
Note: V5R2M0 PTF SI07016 (or later) provided additional exclude lists. The list above
is based on this PTF level.
We now explain how to configure the following backup strategy as an example of a possible
solution:
The Domino servers are saved daily through online incremental backups. This means that
the Domino servers stay active during the backups, the users can continue working, and
only changes are saved.
Then, during the weekends, a full online backup of the Domino servers is performed. This
again means that the Domino servers are active and the users can continue working.
Once a month the entire OS/400 system is backed up in a restricted state, so all Domino
servers are ended, and, in addition to the weekly backup, also the operating system and
all licensed programs are saved.
The yearly backup is equal to the monthly backup, that is, all data from the system is
saved. The difference is that the retention period for the tape media is five years.
Additionally, a control group is created that allows to perform an operating system backup
just before any change is done to the iSeries operating system, such as installing PTFs or
a new OS/400 release.
You can schedule the control group entry backups in the iSeries Job Scheduler, or, when
available, in the Advanced Job Scheduler (5722-JS1).
After configuring BRMS according to your needs, the first thing you should do is to perform a
full backup of your system. Use the STRBKUBRM CTLGRP(*SYSTEM) command to let
BRMS know that all objects were saved once.
The second important step is to make sure that all backup control groups run error free. You
rely on the automated backups in the future so it is important that you make sure that all data
is saved and that you are able to restore the saved objects and recover the Domino
environment. Make sure you test all control groups before going into production.
To check if a BRMS backup procedure has completed successfully, use the Display Log for
BRM (DSPLOGBRM) command to display the BRMS job log. Note that by default you only
see the messages of the current date displayed. However, you can change the date to display
BRMS logs from other days.
See Backup, Recovery and Media Services Version 5, SC41-5345-03 for more information on
backing up system and user data.
Note: It is important that you do not replace your full system backups with only Domino
server backups.
Apart from the Domino server databases, there are other important Domino server objects,
such as libraries, Domino server data in the IFS, and other system data that should be
saved on a regular basis.
When a full disaster recovery of your iSeries system is required, you absolutely need a
recent full system backup to start rebuilding the system.
More...
F3=Exit F12=Cancel
Important: Make sure you never end a Domino server subsystem when the server is
still active when configuring a control group to include the ending of subsystems.
Ending the subsystem of an active Domino server is equal to a forced power down on
other platforms and may cause database corruptions on your Domino server.
Note: You may choose to perform an online incremental backup of the Domino servers
daily, and an equal but full online backup during the weekends. In this case it is not
needed to use separate control groups, as the weekly backups can be added to the
daily backups with an F entry in the Weekly Activity parameter. You may want to change
the name of the control group to something like DOMBCKUP to reflect its purpose.
Table 7-2 shows the backup schedule. F stands for a full backup and I for an incremental
backup in the Weekly Activity column.
Group . . . . . . . . . . : BRMSDAY
Default activity . . . . . IIIIII
Text . . . . . . . . . . . Incremental online backup of all Lotus servers
Backup
Seq Items Exit command
10 *EXIT
20 *EXIT QNOTES/SAVDOMBRM SERVER('PROJECTS') CTLGRP(BRMSDAY)
30 *EXIT QNOTES/SAVDOMBRM SERVER('DOMAV') CTLGRP(BRMSDAY)
40 *EXIT QNOTES/SAVDOMBRM SERVER('DOMBRMS') CTLGRP(BRMSDAY)
50 *EXIT QNOTES/SAVDOMBRM SERVER('DOMCLUS2') CTLGRP(BRMSDAY
60 *EXIT QNOTES/SAVDOMBRM SERVER('DOMTDP') CTLGRP(BRMSDAY)
70 *EXIT
Bottom
– BRMSWEEK:
In our example the BRMSWEEK control group runs an incremental online backup,
followed by a full online backup of all Domino servers on Sundays. The control group is
basically equal to the daily backup. The difference is in the Default activity parameter
where you only configure the F for the full backup on Sundays. See Figure 7-38.
Group . . . . . . . . . . : BRMSWEEK
Default activity . . . . . F
Text . . . . . . . . . . . Full online backup of all Lotus servers
Important: When performing daily online incremental backups and weekly full backups,
you need to be aware of the following considerations.
There is no possibility to restore to a point in time that lies between the last incremental
backup and the next full backup. So to make sure you can restore to a point in time also for
the day that lies between the last incremental and the full backup, it is recommended to
take an additional incremental backup just before the full backup. The reason for this is that
the transaction logs are “attached” to the full backup.
We recommend that you create one control group entry per Domino server with all I’s for a
daily incremental backup, and a second line for the same Domino servers with an F for a
full backup on the days you want a full backup taken. An example of this is shown in
Figure 7-39. Note that the exits at lines 10 and 40 are empty, and the exits at lines 20 and
30 apply to the same Domino server. The Default activity (F) is ignored when actual values
are filled in for the Weekly Activity.
Group . . . . . . . . . . : ALLDAYS
Default activity . . . . : F
Text . . . . . . . . . . : Backup user data except online Domino data
Bottom
Press Enter to continue.
Figure 7-39 Control group for full backup after incremental backup
– BRMSMONTH:
The BRMSMONTH control group first ends the Domino servers, then makes a full
backup of all iSeries system data followed by an IPL.
One of the first jobs during a full system backup is to end all subsystems on the iSeries
system. As mentioned earlier, ending the subsystem of an active Domino server may
result in corrupted databases.
BRMS assists you to fully automate your backups, so you probably don’t want to end
the Domino servers manually before a monthly backup. Therefore you can add an
entry to the control group where a program is started to end the Domino servers
gracefully. It is strongly advised to do so!
Ending Domino servers with the default ENDDOMSVR *CNTRLD command does not
always immediately end the servers. For example, a server is not ended as long as a
replication (which could be a nightly maintenance task) runs. For that reason, you
should create a program that ends all servers gracefully. Such a program ends the
servers in a controlled parameter, checks for active jobs in the Domino subsystems,
and ends the Domino subsystems after all jobs in the appropriate subsystems have
ended. To avoid that a backup cannot run because of a Domino server shutdown
problem you can add the command to immediately end the Domino servers after a
certain wait time to this program. It is recommended to perform several shutdown tests
at the time when the backup normally runs to find out the correct wait time. Make sure
that you test the program before using it in a production environment.
An example of a Control Language (CL) program that ends all servers gracefully is the
EndDominoServers.txt file provided in Appendix D, “Additional material” on page 611 .
Such an exit in the control group looks as follows:
20 *EXIT CALL PGM(QGPL/ENDDOMINO)
The monthly and yearly backup also includes the sign off of interactive users.
You can use the appropriate parameter in the control group attributes to send a
warning message to interactive users so they know that the backup is about to start.
See Figure 7-40 where the Sign off interactive users parameter is set to *YES, and the
Sign off limit is set to 15 minutes.
Group . . . . . . . . . . . . . . . . : BRMSMONTH
More...
F3=Exit F4=Prompt F12=Cancel
The users will receive a message that tells them that the backup is about to begin. The
message is sent every five minutes, where the timer is counted back to zero, and when
a user is still signed on at that time, the system ends the user job.
You receive the following message:
Please sign off within 05 minutes to allow backups to process.
Figure 7-41 shows the entries in the BRMSMONTH control group. Note the *EXIT
entry on position 20, where the Domino servers are ended with a CL program.
Apart from this *EXIT entry, the control group is equal to the automatically generated
*SYSTEM control group.
Group . . . . . . . . . . : BRMSMONTH
Default activity . . . . : F
Text . . . . . . . . . . : Backs up the entire system
– BRMSYEAR:
The BRMSYEAR control group is equal to the BRMSMONTH control group, only the
retention period of the media policy BRMSYEAR is set to 1825 days.
– BRMSSYS:
Figure 7-42 shows the control group BRMSSYS, where the system data is saved, and
which may be used before and after applying PTFs. Again, note the *EXIT entry at
position 20 where the Domino servers are ended gracefully, this is needed as a
SAVSYS operation ends all subsystems.
Group . . . . . . . . . . : BRMSSYS
Default activity . . . . . *BKUPCY
Text . . . . . . . . . . . Backs up all system data
10 *EXIT *DFTACT
20 *EXIT *DFTACT
30 *SAVSYS *DFTACT
40 *IBM *DFTACT *NO *NO
50 *EXIT *DFTACT
Bottom
F3=Exit F5=Refresh F10=Change item
F11=Display exits F12=Cancel F24=More keys
There are a lot more possibilities to implement a backup strategy. For example, if you also
run other applications next to Domino on your iSeries server, you may need to perform a
backup of your system and user data periodically. When you decide to run a user data
backup during the weekends with the Domino servers ended, you should back up the
following objects:
– User profiles
– System configuration
– All user libraries
– DLOs
– The IFS without online Domino data
– The NOTES.INI files of all Domino servers
Note: The following example is just for your reference. It shows a possible weekly
backup. It would fit together with a daily full online Domino backup, which is not
discussed in this chapter. However, depending on your business environment, it may
well be the best solution for your backup requirements.
See Figure 7-43 for an example of a control group that ends all Domino servers and saves
all user data except Domino data (which was saved during the daily backups).
Group . . . . . . . . . . : BRMWEEK
Default activity . . . . : F
Text . . . . . . . . . . : Backup user data except online Domino data
Bottom
Press Enter to continue.
Therefore, it is good practice to initialize your tapes to be used for BRMS backups with the
ADDMEDBRM command and use the INZ(*YES) parameter to make sure the tapes are
added to BRMS and initialized with the correct name.
On an iSeries system dedicated to Domino, you can choose to end the Domino servers on a
monthly basis. Then the monthly backup consists only of a *SAVSYS, together with the items
that were omitted from the daily and weekly backups. During the daily backups you can
perform online incremental backups, and run full online backups during the weekends. The
QLTSEXCL list (which includes all IFS data except online Lotus data), is used to back up all
IFS data other than the online Domino data. Note that any entries in the QLNKOMTONL list
are considered automatically when running the QLTSEXCL list. Entries in the QLNKOMTONL
list should be the NOTES.INI files of all Domino servers.
In addition, when a system is mainly used for Domino, you can choose to only back up the
*ALLUSR objects, with the Save While Active possibility, and keep the Domino servers active.
When you have other applications running next to Domino, depending on your situation, you
can shut down all applications during the backup but keep Domino active. The QLTSXCLONL
list can be run daily to back up all but the online data from Domino. This makes sure that the
Domino directory structure is saved, which is essential for any future restore operation. The
QLTSXCLONL list can be added to the control groups that are used for daily backups. Note
that the QLTSOMTONL list must contain the entries for the user omits, such as all NOTES.INI
files.
Make sure you check the backup log files to see if the backups run without errors.
Use the WRKMEDIBRM command to find out on which tape your data from a certain backup
job resides. Enter option 9 (Work with saved objects) on the line with the date and the *LINK
you want the information for and you see the saved directories. Continue entering option 9
until you see the list of objects that are on that tape media. See “Restoring individual Domino
databases” on page 347 for the options to restore the database.
A full online backup consists of two files. First the database files, and secondly the changed
files, which contain the changes that were performed on the databases while they were
saved. Databases are locked for the time of the backup procedure by BRMS. Therefore, when
running online backups, the database updates that are performed during the backup are
stored in temporary directories. After the backup has ended, this data is saved as a separate
backup item.
To bind the backup of the databases to the changed files and associated transaction log files,
BRMS uses a concept called a package. When a full online backup is run, the package ID
(PKGID) parameter from the SAVBRM command is used to specify whether a new package is
saved or a subsequent package with changes belonging to a previous package is saved.
When restoring the data later, it is also restored in two parts, first the database, and then the
changes to that database. During the backup, the RCYEXITPGM parameter is used to
specify a Domino server exit program. The exit program binds the packages together and is
called before the restore and after the recovery of the object.
When you use the WRKMEDIBRM command to look at the saved information, the numbering
of the saved items may be somewhat confusing. Only the initial element (*LINK) is shown in
the saved items list. The number of elements in the package is shown just right of the Saved
Items column. After performing a full online Domino server backup, the number is a 2, as the
databases and the changes to those databases were saved as separate items. Each time an
incremental online backup is run, the number is increased by 1. The maximum number of
packages is 99, so you can run one full online backup followed by 97 incremental backups.
When you look at the online Domino recovery reports from BRMS, all items of a package are
listed, as a package with the databases and one with the changes may exist on different
media volumes.
Note: The following information was correct at the time this redbook was written. It may be
subject to change in the future, with new releases of the OS/400 operating system, Lotus
Domino, or PTFs. This information is provided to help you understand what is done on the
system during Domino backups, so use it only as a reference.
The first group of (50) databases is saved, followed by the changes that were created during
that save, then the next group is saved, again followed by its changes. When the full save has
completed, all directories are cleared. There may be data left in those directories when a
backup operation was cancelled while running. This data is never cleared automatically.
Depending on the configured value for transaction logging in the Domino server document,
several transaction log files are automatically created. One file is created for each 64 MB, so
you would see 10 files when you configured a transaction log size of 600 MB. When a
directory name (such as logdir) is entered in the server document, it will be created in the
Domino server’s data directory by default. By filling in the full path of the directory you can
create the transaction log file anywhere else in the IFS. An example of a place and naming for
those files is
/<DATADIR>/logdir/S0000003.TXN
During normal operation, with transaction logging active, the transaction log files are filled
with changes that occur on Domino databases. When a log file runs full, then the QNNINBRM
job takes care of copying the log file to the /DATADIR/BRMS directory. When an incremental
save occurs, the log files from this subdirectory are moved to the /DATADIR/INCRSAVE
subdirectory. The full moved log files in that subdirectory are then saved.
There is always a partially filled (that is, not yet full) active transaction log file that the server is
currently using. At the time of the incremental backup this active log file is copied to two
places, /DATADIR/BRMS/COPIEDLOG and /DATADIR/BRMS/INCRSAVE. The log files are
deleted from the INCRSAVE directory after a successful backup. The logdir subdirectory is
not cleared and the COPIEDLOG directory is cleared just before copying in the current partial
log file, at the start of an incremental backup.
So, the following events occur before or during the backup operation:
1. A user space, such as servername_02QUSRNOTES is created.
2. The names of the databases to be copied and saved are put in the user space.
3. The currently active (partially filled) transaction log extent is copied to the
/BRMS/COPIEDLOG and the /BRMS/INCRSAVE directories.
4. The full, copied transaction logs that need to be saved during the backup are moved to the
/BRMS/INCRSAVE directory.
5. The /BRMS/INCRSAVE directory is saved.
6. The /BRMS/INCRSAVE directory is cleared.
As Domino databases are stored in the Integrated File System (IFS) you can also use the
WRKLNKBRM command to display all the data paths that were saved by BRMS.
If you have worked with BRMS before, you may have used the WRKMEDIBRM command to
find an object on media and restore it from that screen. This is also possible for Domino
databases, however the WRKMEDIBRM command shows only the groups (*LINK) in which
the Domino databases were saved, and not the individual databases. This means, that you
have to search all *LINK items at a particular date (option 9) for the actual Domino database
you want to restore. If you have many Domino databases, this might not be very efficient and
take some time. It is much better to use the BRMS recovery screens instead (GO BRMS
option 4 or the WRKLNKBRM command).
It is best practice, to let BRMS handle the restore and just select the objects you want to
restore starting from the BRMS recovery screens.
Best practice for restoring databases to a point in time is to use the iSeries Navigator client as
shown in 7.6, “Restoring Domino databases with iSeries Navigator” on page 326.
Performing online incremental backups and restoring databases when using the OS/400
command environment is explained in detail on the Online Lotus Server backup Web site at:
http://www.ibm.com/servers/eserver/iseries/service/brms/domino.htm
Tips
You should check the BRMS Web site on a regular basis for the latest information about
program temporary fixes (for both individual PTFs and Group PTFs). You can find this
information under the Support link. We recommend that you review the Web site at least
once every two weeks:
http://www.ibm.com/servers/eserver/iseries/service/brms/
In addition, we recommend that you regularly check the Recommended Fixes Web site,
which holds information for all iSeries products and is also updated on a regular basis:
http://www-912.ibm.com/s_dir/slkbase.nsf/recommendedfixes
Perform full online or dedicated backups daily if you have the possibility to do so. The
availability of a full backup of your Domino server data allows for faster recovery in case of
an emergency. Whether you have this possibility depends on factors such as the available
time frame, the amount of data to save, the backup device, and, if using a network
connection, the network.
Do not set up transaction logging for online incremental backups while performing only full
backups. BRMS does not clean up and save full transaction log files during full backups
and your system disks will fill up with data.
When starting to use BRMS for your backups, first perform an initial full save of the system
with BRMS. This provides a recovery starting point for BRMS.
Create a dedicated OS/400 user profile that is used to run the backups with BRMS.
Change the job scheduler job entries to use this user profile when running BRMS backup
jobs. Grant sufficient authority to this user and make sure this user is not able to log on to
the iSeries system. We advise to create a user profile with user class *SYSOPR (with its
special authorities *JOBCTL and *SAVSYS) and to add the *ALLOBJ special authority.
It is better not to run the BRMS backup jobs with the user profile of an actual user, as the
settings of that user profile may be subject to change later, which can affect the BRMS
backups. It is also easier to separate between user messages and BRMS messages when
a special BRMS user is used for backups.
Test all your configured BRMS backups before going into production with BRMS and avoid
unattended (for example nightly) backups before they were tested. You may return to the
office the next morning and nothing or only parts are saved because a scheduled BRMS
job did not run error free.
When you see that a scheduled nightly backup did not complete successfully pay special
attention to any message that a control group is waiting for to be answered (such as a tape
error message in the QSYSOPR message queue). When you resolve the error, the control
group entries will resume to run. However, you might have entries in the control group that
you do not want to run in the morning. For example, you might have implemented a
system IPL to be run after the backup which is launched by resolving the error message.
Use DSPLOGBRM to check the BRMS log information messages. Check the job log of the
user that ran the BRMS backup when the BRMS log shows that not all databases have
been saved. If you find a database that was not saved, it might have been in use at the
time the backup was running. Check that there is no Domino agent running, or if the
database is damaged. Check if it is saved correctly the next day if the database seems to
be OK.
Troubleshooting
When you are not familiar with BRMS, or if you are configuring it for the first time on your
system, your backups may not run as expected. Following are some troubleshooting tips for
this situation:
When you receive a message that no tape drive could be assigned for the backup but you
are sure that there is a device available, check the storage location entry in the BRMS
device description and the storage location field in the media policy. You may have used
*MEDCLS for the backup device in the control group to indicate that BRMS must look for a
device that supports the density for the media class specified in the media policy. When
you use only one tape unit for the backups, we recommend that you put the device name
for that tape drive in the backup device field in the control group.
Important: The BRMS online incremental backup support for Domino databases was
extended for Domino 6.0.3 and Domino 6.5.
If any of these conditions are found for a Domino database, then an online full save of
just that database will be done automatically.
Prerequisites:
Domino 6.0.3 or 6.5
BRMS PTFs SI10612 (OS/400 V5R1) or SI10615 (OS/400 V5R2)
When the backup job is submitted from the job scheduler, but does not seems to end,
check the job queue QBATCH in library QGPL. Use the command WRKJOBQ QBATCH.
The subsystem QBATCH may not be active if the backup job is still there. The reason may
be that you added the subsystem to the Subsystems to process list in the control group.
Important: Remember to remove the debugging *EXIT after the debug is done. If you
keep the entry in the control group, the directory with the debug data will grow
extensively and fill up your iSeries disks.
Note: Throughout this book, we use the term Data Protection for Domino for the IBM
Tivoli Storage Manager for Mail: Data Protection for Lotus Domino for OS/400, Version
5.2.0 software.
Data Protection for Domino is an IBM Tivoli software module that provides online “hot”
backups and restores of Lotus Domino databases to an IBM Tivoli Storage Manager server.
Clients (nodes) connect through the network to the central server to store and retrieve saved
data. IBM provides client software for 19 different operating systems. There is an additional
product available, IBM Tivoli Storage Manager for Storage Area Networks, which allows for
backup/restore and archive/retrieve data transfer over a Storage Area Network (SAN) instead
of the LAN. OS/400 client support is limited to the Tivoli Storage Manager API client, which
can be used together with Backup, Recovery, and Media Services for iSeries to back up
OS/400 user data.
In addition to the IBM Tivoli Storage Manager client software, IBM also provides Tivoli
Storage Manager for Data Protection modules. These specialized clients facilitate backup and
recovery for application servers, databases, ERP systems, network attached storage, mail
and groupware servers. IBM Tivoli Storage Manager for Mail Data Protection for Lotus
Domino protects Lotus Domino data using Domino APIs for the backup.
All IBM Tivoli Storage Manager managed client data is stored in the IBM Tivoli Storage
Manager storage repository, which can consist of different storage devices, such as disk,
tape, or optical devices, and is controlled by the IBM Tivoli Storage Manager server. IBM
Tivoli Storage Manager concentrates on managing data objects instead of managing and
controlling backup tapes. Data objects can be files, directories, or raw logical volumes that
are backed up from the client systems; they can be objects such as tables or records from
database applications, or simply a block of data that a client system wants to store on the
server storage.
An IBM Tivoli Storage Manager system usually consists of a dedicated server with attached
tape storage and clients connected to the server through the network.
For more information on IBM Tivoli Storage Manager visit the IBM Tivoli Storage Manager
Web site at:
http://www.ibm.com/software/tivoli/products/storage-mgr
For detailed technical information see the redbook IBM Tivoli Storage Management
Concepts, SG24-4877, which can be found at:
http://www.redbooks.ibm.com/redbooks/pdfs/sg244877.pdf
Data Protection for Domino provides the following functions to Domino for iSeries:
Centralized, online, incremental backup of Lotus Domino databases
Storage for multiple backup versions of Domino databases
Archival of Lotus Domino transaction log files, when archival logging is in use
Archival of the currently used (write to) transaction log file
Restore of a Lotus Domino database from a backup and subsequent application of
changes made since the backup from the transaction log
Restore of Domino databases to a specific point in time
Recovery of one or more archived transaction logs independent of a database recovery
Recovery from the loss of the transaction log
Automatic expiration of database backups based on version limit and retention period
Expiration of archived transaction logs when no longer needed for restore
Attention: Data Protection for Domino on OS/400 provides backup and recovery only for
Domino databases, templates and transaction logs. Periodically you must also backup
other files in the Domino data directory (for example NOTES.INI, ID files, etc.), libraries
containing the Lotus Domino binary files, and system data. This can be achieved with
OS/400 save commands or using Backup, Recovery, and Media Services for iSeries.
Data Protection for Domino provides two types of database backups: Incremental and
selective. In addition to these database backups, there is also a log archive function.
The incremental backup provides a conditional backup function that creates a full online
backup of Domino databases, when necessary. The specific conditions that determine
when a new backup is necessary vary depending on whether the database is logged or
not. Details can be found in Table 8-1 on page 376.
The selective backup unconditionally backs up the specified databases, unless they are
explicitly excluded from the backup procedure through exclude statements.
When archival logging is in effect, changes to logged databases can be captured in
between full backups, by archiving the transaction log.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 355
OS/400 Domino Server
IBM Tivoli
Transaction Logs Storage
Manager
Lotus Data Tivoli Server
Domino Protection Storage backup
for Manager
APIs on restore
OS/400 Domino APIs for
OS/400
Domino databases
on OS/400
Data Protection for Domino is available for all operating systems supported by Lotus
Domino 6. It offers the same functionality on all supported platforms and provides the same
configuration options and user interface (except for Microsoft Windows platforms where Data
Protection for Domino uses a graphical user interface). Thus, system administrators used to
working with IBM Tivoli Storage Manager products find a familiar environment on all
platforms.
On iSeries, Data Protection for Domino is a standard licensed program. The user interface for
Data Protection for Domino is implemented in the QShell environment and all configuration is
performed using text files which are stored in the “root” file system of the OS/400 IFS. There
is no graphical user interface for Data Protection for Domino on OS/400.
Commands can be a single or multiple word(s), for example restore or query domino. All
commands have abbreviations, they are indicated by upper case letters in IBM Tivoli
manuals.
If a command requires specification of (a) Domino database(s), the full database name can
be passed to the command or you can use wildcards (* and ?). Wildcards cannot be used for
directory names. We advise that you always use double quotes around database
specifications.
All optional parameters start with a forward slash (“/”), values are passed to the parameters
using the equal sign (“=”). There are also abbreviations available for all optional parameters.
The following command is an example for a QShell Data Protection for Domino command:
domdsmc restore “doclib*.nsf” /pit=08/15/2003,10:00 /activate=yes
Online help is provided for all domdsmc commands with the help command. The help
command without parameters displays all available help. To display online help for a specific
command, add the command name as a parameter, for example:
domdsmc help restore
A description of all Data Protection for Domino commands and parameters can be found in
the IBM Tivoli Storage Manager for Mail 5.2, Data Protection for Lotus Domino for UNIX and
OS/400, Installation and User’s Guide. This manual is available with the product and can also
be downloaded from the Tivoli Web site at:
http://publib.boulder.ibm.com/tividd/td/ITSMFM/SC32-9056-01/en_US/PDF/c3290561.pdf
The Data Protection for Domino code must be installed on the iSeries server running the
Domino server(s).
Important: Due to restrictions with the usage of the QOpenSys file system, you must
follow special installation instructions if you wish to install the IBM Tivoli Storage Manager
API 5.2.0 (5733-197) on the same iSeries system as the IBM Tivoli Storage Manager
server for PASE OS/400 (5698-ISX). For these instructions, please refer to the Redbooks
Technote called Installing Tivoli Storage Manager and Tivoli Storage Manager APIs on the
Same IBM iSeries Server, Technote 0293, at:
http://publib-b.boulder.ibm.com/redbooks.nsf/RedbookAbstracts/tips0293.html?Open
The installation media for Data Protection for Domino on OS/400 includes both products that
have to be installed on the iSeries server:
Tivoli Data Protection for Domino (5698-DPD)
Tivoli Storage Manager APIs (5733-197)
Important: Before performing the installation of 5733-197 (Tivoli Storage Manager APIs)
you must check if there is a previous version of this product installed and in use. You
should verify that all programs that use Tivoli Storage Manager APIs (for example Backup,
Recovery, and Media Services for iSeries connected to an IBM Tivoli Storage Manager
server) are compatible with version 5.2.0 before installing the Tivoli Storage Manager
APIs 5.2.0.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 357
The user performing the installation of Data Protection for Domino needs *ALLOBJ and
*JOBCTL special authorities to use the RSTLICPGM (Restore Licensed Program) command.
The installation can be performed from CD ROM or from a save file.
These are the steps to install Data Protection for Domino on OS/400 using an installation CD:
1. Sign on to OS/400. Use a user profile with *ALLOBJ and *JOBCTL special authorities (for
example, QSECOFR).
2. Insert the installation media into the iSeries CD ROM drive.
3. Enter RSTLICPGM on an OS/400 command line and press F4.
4. On the next screen you must enter the product ID and the location of the installation files:
a. Enter 5698DPD for the Data Protection for Domino product.
b. Enter the device name OPT01 (you need to check which device you are using for
installation).
c. Enter 2924 as the Language for the licensed program, regardless of your locale setting
or primary language.
You do not need to customize any other options on the Restore Licensed Program
screen.
d. Press Enter to start the installation.
5. Repeat installation steps 1 to 4 to install the Tivoli Storage Manager APIs. Use 5733197
for the Product parameter in step 4a.
Bottom
F3=Exit F4=Prompt F5=Refresh F10=Additional parameters F12=Cancel
F13=How to use this display F24=More keys
For more information and installation instructions see Chapter 2 “Installing Data Protection for
Domino” of the IBM Tivoli Storage Manager for Mail 5.2, Data Protection for Lotus Domino for
UNIX and OS/400, Installation and User’s Guide.
We provide only brief information about the configuration needed on the IBM Tivoli Storage
Manager server side. If you are not familiar with IBM Tivoli Storage Manager you should read
the IBM Tivoli Storage Manager Administrator’s Guide. The IBM Tivoli Storage Manager for
OS/400 PASE, Administrator’s Guide, Version 5.2 can be obtained from the Internet at:
http://publib.boulder.ibm.com/tividd/td/ITSM400/GC23-4694-01/en_US/PDF/anrpgd51.pdf
More information on IBM Tivoli Storage Manager concepts and architecture can also be found
in the redbook IBM Tivoli Storage Management Concepts, SG24-4877.
The definition of an IBM Tivoli Storage Manager node for Data Protection for Domino on
OS/400 includes:
Node name: We recommend using the Domino server name.
Password: This is an initial password to access the IBM Tivoli Storage Manager server.
Policy Domain: All Data Protection for Domino nodes should be using this special Policy
Domain.
Backup Delete Allowed: This must be set to “no” to allow expiration of archived transaction
log extents.
Node name and password are required for the configuration of a Data Protection for Domino
instance on OS/400.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 359
8.3.2 IBM Tivoli Storage Manager Policy Domain
A Policy Domain defines rules for storage and retention of data backed up by nodes to an
IBM Tivoli Storage Manager server. A Policy Domain contains more layers of subordinate
entities, which provide configuration and operation flexibility. The most important
configuration concepts of Policy Domains are the Management Class and the Backup Copy
Group.
The Backup Copy Group contains definitions where to store data and data retention rules.
The IBM Tivoli Storage Manager server provides hierarchical storage management, so you
can store data first on disk and migrate it later to tape or optical media. Data retention rules
define how long data will be kept on the IBM Tivoli Storage Manager server or how many
versions of that data will be stored. The IBM Tivoli Storage Manager server provides
automatic management of storage and expiration of data.
The Management Class contains Backup Copy and Archive Copy groups and associates
data with them. Each node is connected to one Management Class defined as the default in
the Policy Domain. You can override the Management Class definition for files on the client
by explicitly defining INCLUDE statements. Data Protection for Domino stores all objects as
backup objects on the Storage Manager so an Archive Copy Group is not required, although
it can exist. For more information on include/exclude options see Chapter 9, ”Policy
Management” in the redbook IBM Tivoli Storage Management Concepts, SG24-4877.
Tip: We recommend that you define a separate Policy Domain for your Data Protection for
Domino nodes. Use the default Management Class with the settings required for your
Domino data.
All database backup objects are complete file backups so the normal version controls
available through IBM Tivoli Storage Manager server policies apply. According to your needs
for the number of backup versions to be kept, and the retention period of these backup
versions, set the following parameters in the Backup Copy Group:
Versions Data Exists: Specifies the number of versions (full backups) of Domino
databases and transaction logs that are being kept on the IBM Tivoli Storage Manager
server.
Versions Data Deleted: Specifies the number of versions (full backups) of Domino
databases and transaction logs that are being kept on the IBM Tivoli Storage Manager
server after a database or transaction log has been deleted from the Lotus Domino server.
Retain Only Version: Specifies the number of days to retain the last backup version of a
file that has been deleted from the client file system.
Retain Extra Versions: Specifies the number of days to retain a backup version after that
version becomes inactive. A version of a file becomes inactive when the client stores a
more recent backup version, or when the client deletes the file from the workstation and
then runs a full incremental backup. The server deletes inactive versions based on
retention time.
You can use the default values for the Backup Copy Group parameters “Copy Frequency”,
“Copy Mode” and “Copy Serialization” because they are not applicable to Data Protection for
Domino.
Be sure to set the retention period for inactive transaction log files to be equal to or greater
than the retention period of the database backup objects. This ensures the files are available
as long as any inactive database file may need them, so a point in time recovery of an inactive
database backup version can be accomplished. This can be done by using the same
Management Class for the transaction log files and for the database files.
Before configuring Data Protection for Domino, you must check if Tivoli Data Protection for
Domino (5698-DPD) and the Tivoli Storage Manager APIs (5733-197) are installed on your
iSeries system. Use the Display Software Resources (DSPSFWRSC) command or the GO
LICPGM menu.
Configuration of Data Protection for Domino must be performed using an OS/400 user ID
having *ALLOBJ special authority.
Tip: Throughout this chapter we use OS/400 file manipulation commands to configure
Data Protection for Domino. If you are more familiar with UNIX style commands, you can
use those in QShell to configure the product.
These are the steps needed to configure Data Protection for Domino on OS/400:
1. Run dominstall to configure the basic parameters and setup object permissions for Data
Protection for Domino objects. This is explained in “Running the dominstall program” on
page 362.
2. Create the IFS directory for the Data Protection for Domino configuration files and logs
and copy the provided sample configuration files to this directory. See “Creating directory
and configuration files: Data Protection for Domino instances” on page 363 for details.
3. Set QShell environment variables. Refer to 8.4.5, “Setting QShell environment variables
for Data Protection for Domino” on page 368.
4. Configure the options files (dsm.opt and dsm.sys) for Data Protection for Domino. Refer to
“Modifying Data Protection for Domino configuration files” on page 364.
5. Configure the preferences file (domdsm.cfg) for Data Protection for Domino as explained
in “Modifying Data Protection for Domino configuration files” on page 364.
After setting up the initial configuration you have the possibility to check the connection to the
IBM Tivoli Storage Manager server and to the Lotus Domino server to verify that Data
Protection for Domino is configured correctly.
Configuration of Data Protection for Domino is performed using text files and through the
QShell environment. For administrators familiar with the product from other platforms this
provides a familiar environment.
For OS/400 administrators not used to UNIX style configurations and commands we provide
basic instructions for configuration and operation in the following sections of this chapter. If
you would like to learn more about QShell, please see the QShell reference on the Web at:
http://publib.boulder.ibm.com/iseries/v5r1/ic2924/info/rzahz/rzahz.pdf
For further information on configuring Data Protection for Domino on OS/400 see the IBM
Tivoli Storage Manager for Mail 5.2, Data Protection for Lotus Domino for UNIX and OS/400,
Installation and User’s Guide.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 361
New to QShell?
To start a QShell session, enter the QSH command in an 5250 emulation session.
In QShell, you enter commands after the “===>” sign. The response to a command is
displayed in the area above this line.
When a command finished processing, a $ sign appears and you can enter the next
command. You can use all standard POSIX (UNIX style) commands in QShell.
To quit a QShell session, press the F3 key.
You can temporarily leave QShell by pressing the F12 key. Then, when you later return
to QShell (using the QSH command again), all shell parameters and current directory
are preserved.
It is possible to enter OS/400 commands without leaving the QShell environment by
pressing the F21 key (press F12 to return to QShell).
$
> cd /usr/tivoli/tsm/client/domino/bin
$
> dominstall
===>
You have now finished the dominstall program. dominstall will display a message stating
successful installation at the end of the configuration:
return code from system is 0
Data Protection for Domino installation process has successfully completed
$
8.4.2 Creating directory and configuration files: Data Protection for Domino
instances
By default, the configuration files are stored in /usr/tivoli/tsm/clients/domino/bin, but we
recommend using a special directory for each Data Protection for Domino instance. This way
you can easily add new instances to back up additional Domino servers. For further
information see 8.4.7, “Configuring Data Protection for Domino for partitioned Domino
servers” on page 372.
In addition to the configuration files, the directory can also contain log files and QShell scripts
for scheduled jobs for this instance of Data Protection for Domino.
Attention: If you are storing Data Protection for Domino logs in this directory, you have to
grant *RWX data authority to user QNOTES for the directory. For example:
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 363
Data Protection for Domino configuration files
Data Protection for Domino on OS/400 uses the following files to store its configuration data:
domdsm.cfg: The Data Protection for Domino preferences file:
This file contains preferences specific to Data Protection for Domino such as which Lotus
Domino server this instance will backup, date/time format and logging options.
Important: The domdsm.cfg file should not be edited manually. All parameters in this
file must be set using the domdsmc set command.
The domdsm.cfg and dsm.opt files should be stored in the appropriate Data Protection for
Domino instance directory of each Domino server while dsm.sys in located in the
/usr/tivoli/tsm/client/api/bin directory.
CPY OBJ('/usr/tivoli/tsm/client/domino/bin/dsm.opt.smp')
TOOBJ('/usr/tivoli/tsm/<your_instance_directory>/dsm.opt')
CPY OBJ('/usr/tivoli/tsm/client/api/bin/dsm.sys.smp')
TOOBJ('/usr/tivoli/tsm/client/api/bin/dsm.sys')
You can edit the dsm.sys file using the Edit File (EDTF) command:
EDTF STMF('/usr/tivoli/tsm/client/api/bin/dsm.sys')
You must enter information about the IBM Tivoli Storage Manager server this client will
connect to. This includes the following information:
servername is the name for this IBM Tivoli Storage Manager server configuration.
The servername does not have to match the IBM Tivoli Storage Manager server name.
This name is used to define all configured parameters of this server for the Data
Protection for Domino instance. If you have more instances of Data Protection for Domino
running on the same iSeries server, you should use the different instance names for this
parameter. For more information see “Configuring Data Protection for Domino for
partitioned Domino servers” on page 372.
commmethod defines the communication method for the connection to the IBM Tivoli
Storage Manager server. The only supported communication method is tcpip.
tcpport defines the TCP port number for the communication with the IBM Tivoli Storage
Manager server. The default port is 1500.
tcpserveraddress is the TCP/IP address or DNS name of the IBM Tivoli Storage Manger
server.
nodename is the name of the Data Protection for Domino node as specified in the IBM
Tivoli Storage Manager configuration.
You can obtain the correct information for your environment from your IBM Tivoli Storage
Manager server administrator.
If you do not set the password handling to GENERATE, you will have to enter a password
each time you start Data Protection for Domino. You can also provide the password to the
domdsmc program with the ADSMPWD=password parameter.
Password handling options are set with the following two parameters:
PASSWORDACCESS GENERATE: This option sets the password handling to automatic
generation.
PASSWORDDIR: This defines the directory where the tsm.pwd file containing the
passwords will be stored. The default directory for tsm.pwd is /usr/tivoli/tsm/client/api/bin.
For more information on the different client authentication options, see section 6.10.3 “Client
authentication” in the redbook IBM Tivoli Storage Management Concepts, SG24-4877.
Attention: When using the current version (Version 5.2.0) of Data Protection for Domino
with OS/400 you have to create a blank tsm.pwd file manually before using the
PASSWORDACCESS GENERATE option. You can create this file using the EDTF
command, for example:
EDTF STMF('/usr/tivoli/tsm/client/api/bin/tsm.pwd')
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 365
You can see an extract from the sample dsm.sys file in Example 8-1. We also provide the full
dsm.sys file for our environment in 8.8.1, “Sample configuration files for Data Protection for
Domino” on page 399.
Example 8-1 Sample dsm.sys file for Data Protection for Domino on OS/400
SErvername ITSOBPTSM
COMMmethod TCPip
TCPPort 1500
TCPServeraddress itsobptsm.itsobp.com
NODENAME DOMTDP
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
If your Data Protection for Domino instances will be accessing different IBM Tivoli Storage
Manager servers, you can specify more servers in one dsm.sys file. For more information see
8.4.7, “Configuring Data Protection for Domino for partitioned Domino servers” on page 372.
The only parameter you have to modify in this file is SErvername — the name of your IBM
Tivoli Storage Manager server. The SErvername parameter has to match the server name
you entered in the dsm.sys file. The example configuration for our environment is:
servername ITSOBPTSM
You can see the dsm.opt file for our environment (server DOMAV) in Example 8-6 on
page 400.
Attention: If you are modifying the supplied sample configuration files, many of the lines
start with an asterisk (“*”), that means, they are marked as comments. If you modify any of
these lines, please make sure you delete the leading “*”.
You should not use the EDTF command to change the domdsm.cfg configuration file. Data
Protection for Domino provides a special set command for changing parameters in the
domdsm.cfg. For example, you can set the date format to the American style using:
domdsmc set dateformat=1
For the basic configuration of Data Protection for Domino, you have to modify:
The path to the NOTES.INI file with the parameter notesinipath:
This parameter specifies which Lotus Domino server this Data Protection for Domino
backs up and restores, for example:
domdsmc set notesinipath=/lotus/data/domtdp
Since Data Protection for Domino on OS/400 deals only with Domino databases and
transaction log files (if archival logging is enabled on the Domino server), you do not need to
exclude any non-Domino files from the backup. You can use include/exclude options to limit
backups to a subset of the Domino databases.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 367
In this file (in our example, /usr/tivoli/tsm/domtdp/inclexcl), all include/exclude processing
options are defined.
For more information on this topic see Appendix D of the IBM Tivoli Storage Manager for
Mail 5.2, Data Protection for Lotus Domino for UNIX and OS/400, Installation and User’s
Guide and Chapter 6, “Backup-archive client” in the redbook IBM Tivoli Storage Management
Concepts, SG24-4877.
8.4.5 Setting QShell environment variables for Data Protection for Domino
Data Protection for Domino uses environment variables to determine where the installation
directories are, which configuration files to use, and where to write log files. If you are using
Data Protection for Domino on OS/400 interactively in QShell, you have to set these variables
before using the product. If you are scheduling backup jobs with scripts, you set the
environment variables in the script. Variables are set with the export command in QShell.
Tip: This is easiest when you use different users for different Lotus Domino server
partitions, that is Data Protection for Domino instances. You can also use scripts to set
environment variables before working interactively with different instances.
QShell environment variables are stored in the .profile file in the user’s /home/username
directory, for example in the /home/tdpuser/.profile file. If the /home/<username> directory
does not exist for the user that will be using Data Protection for Domino, you must create it
first:
CRTDIR DIR(‘/home/<username>’)
Data Protection for Domino provides an example file called sample.profile.smp which can be
modified for your system. This file is located in the /usr/tivoli/tsm/client/domino/bin directory.
EDTF STMF('/home/<username>/.profile')
Attention: If this user already has a .profile file with modifications, you must edit the file
and merge changes from the sample.profile.smp file manually!
Note: The DOMI_CONFIG and DSMI_CONFIG variables must point to the files you
created in 8.4.2, “Creating directory and configuration files: Data Protection for Domino
instances” on page 363. DOMI_LOG should point to the same directory, if you want to
store log files there.
PATH:
At the end of the PATH variable you must append the path to the data directory of the
Lotus Domino server and the path to the Data Protection for Domino installation directory.
A sample path statement is shown below:
PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domtdp:
/usr/tivoli/tsm/client/domino/bin
QIBM_MULTI_THREADED:
For Data Protection for Domino to work correctly you must set the
QIBM_MULTI_THREADED variable to YES before using the product
(QIBM_MULTI_THREADED=Y).
LANG:
The language that Data Protection for Domino uses is controlled by the OS/400 user's
locale setting. Therefore you should add the LANG variable to .profile. Its value
determines the language of Data Protection for Domino messages and outputs. If LANG is
not specified, EN_US is used. For example, to set the locale to German:
LANG=/QSYS.LIB/DE_DE.LOCALE
Important: In the supplied sample.profile.smp file, long entries (for example path or export
statements) are broken into multiple lines using the \ character.
You must write each entry in the .profile file on a single line in OS/400 (use F19 and F20 to
move left and right), otherwise it will not work.
You must also correct the export line in the supplied sample file and put
QIBM_MULTI_THREADED on the same line as all other exports for it to work correctly.
Example 8-2 shows a changed .profile file. Please refer to Example 8-7 on page 400 for the
.profile used for our environment.
Please note that the PATH statement is broken into two lines because of space restrictions.
Example 8-2 Sample .profile file for QShell Data Protection for Domino environment
DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
DOMI_LOG=/usr/tivoli/tsm/domtdp
DOMI_CONFIG=/usr/tivoli/tsm/client/domino/bin/domdsm.cfg
DSMI_DIR=/usr/tivoli/tsm/client/api/bin
DSMI_LOG=/usr/tivoli/tsm/domtdp
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 369
DSMI_CONFIG=/usr/tivoli/tsm/domtdp/dsm.opt
PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domtdp:/usr/ti
voli/tsm/client/domino/bin
QIBM_MULTI_THREADED=Y
LANG=/QSYS.LIB/EN_US.LOCALE
export DOMI_DIR DOMI_CONFIG DOMI_LOG DSMI_DIR DSMI_CONFIG DSMI_LOG PATH QIBM_MULTI_THREADED
To see if Data Protection for Domino is configured properly, you must do the following steps:
1. Check environment variables in QShell.
2. Verify access from Data Protection for Domino to the Lotus Domino server.
3. Verify access from Data Protection for Domino to the IBM Tivoli Storage Manager server.
All configured environment variables will be displayed in the QShell session. Verify if all
variables set in the .profile file are exported and have correct values. You can see the result of
running the export command on our test system in Figure 8-4. For information on the required
environment variables, please refer to 8.4.5, “Setting QShell environment variables for Data
Protection for Domino” on page 368.
If you do not see Data Protection for Domino environment variables listed in the result of the
export command, you have to check the .profile file in the /home/username directory for
errors.
$
> export
DOMI_CONFIG=/usr/tivoli/tsm/domav/domdsm.cfg
DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
DOMI_LOG=/usr/tivoli/tsm/domav
DSMI_CONFIG=/usr/tivoli/tsm/domav/dsm.opt
DSMI_DIR=/usr/tivoli/tsm/client/api/bin
DSMI_LOG=/usr/tivoli/tsm/domav
HOME=/home/TDPUSER
HOSTID=10.1.92.31
HOSTNAME=AS25.itsobp.com
HOSTTYPE=powerpc
ICU_DATA=/QIBM/ProdData/OS400/icu/data
LOGNAME=TDPUSER
===>
If Data Protection for Domino can connect to your Lotus Domino server, the command will
result in displaying basic information about this server (name, version, and transaction
logging style). An example of running this command on our test system is provided in
Figure 8-5.
If you get an error message running the domdsmc query domino command, you have to check
the path to NOTES.INI in the domdsm.cfg file.
===>
Figure 8-5 Result of querying access to Lotus Domino server with domdsmc
You must provide your IBM Tivoli Storage Manager node password on the command.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 371
This command will access the IBM Tivoli Storage Manager server configured in the dsm.sys
file and display information about the server (server name, TCP/IP address, version, etc.) as
well as basic configuration parameters for this Data Protection for Domino node (node name,
Policy Domain, active policy set, default management class). You can see the results of
running this command on our test system in Figure 8-6.
If you get an error querying the IBM Tivoli Storage Manager server, you have to check the
password supplied with the admspwd option and the dsm.sys and dsm.opt files for correct
configuration parameters.
===>
Figure 8-6 Result of querying access to IBM Tivoli Storage Manager server using domdsmc
After running all three verifications successfully, you can start using Data Protection for
Domino for the backup and recovery of your Lotus Domino server.
8.4.7 Configuring Data Protection for Domino for partitioned Domino servers
Lotus Domino server partitioning lets you run multiple Domino servers on a single iSeries
system without using OS/400 logical partitioning (LPAR). Each partitioned Domino server has
its own Domino data directory and NOTES.INI file, but all partitioned servers share the same
code base and libraries.
Each Domino server requires a separate Data Protection for Domino instance for backup and
recovery. We also suggest that you create and use separate user IDs for different instances
of Data Protection for Domino.
The best way to set up additional Data Protection for Domino instances after the first instance
has been configured (see 8.4, “Data Protection for Domino on OS/400 configuration” on
page 361) is:
1. For each additional instance, create a new directory for the configuration and log files.
2. Copy the content of the first Data Protection for Domino instance directory into the new
directory(ies).
See “Creating directory and configuration files: Data Protection for Domino instances” on
page 363.
3. Create new OS/400 user ID(s).
The new user ID(s) must have *ALLOBJ special authority.
4. Copy the .profile file of the original user into the .profile file(s) of the new user(s).
The .profile file is located in the /home/<username> directory.
5. Modify the new .profile file(s).
You must change the following parameters in the new .profile file(s) to point to the different
instance directory(ies) and the respective configuration files:
– DOMI_LOG: new instance directory
– DOMI_CONFIG: domdsm.cfg file in new instance directory
– DSMI_LOG: new instance directory
– DSMI_CONFIG: dsm.opt file in new instance directory
You must also change the PATH variable to include the appropriate data directory for this
Domino server partition.
See 8.4.5, “Setting QShell environment variables for Data Protection for Domino” on
page 368
6. Modify the dsm.sys configuration file.
Change the dsm.sys file (located in /usr/tivolitsm/client/api/bin) and add all parameters
describing the connection to the IBM Tivoli Storage Manager server for each instance (see
Example 8-3 for a dsm.sys file containing entries for multiple Domino servers). Even if all
partitions will connect to the same IBM Tivoli Storage Manager server you must have
different configuration parameters for each Data Protection for Domino instance. You
must define all parameters for each instance as described in “Modifying Data Protection
for Domino configuration files” on page 364. If you have more than one Domino partition
on the same iSeries system, we recommend that you use the Domino server partition
name for the servername parameter instead of the name of the IBM Tivoli Storage
Manager server.
In Example 8-3 we have created three connections to the same IBM Tivoli Storage
Manager server for three different instances of Data Protection for Domino. As suggested,
the connections are using the Domino server name for the SErvername parameter.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 373
Example 8-3 dsm.sys file containing configuration for multiple Domino server partitions
SErvername DOMAV
COMMmethod TCPip
TCPPort 1500
TCPServeraddress itsobptsm.itsobp.com
NODENAME DOMAV
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
SErvername DOMCLUS2
COMMmethod TCPip
TCPPort 1500
TCPServeraddress itsobptsm.itsobp.com
NODENAME DOMCLUS2
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
SErvername DOMTDP
COMMmethod TCPip
TCPPort 1500
TCPServeraddress itsobptsm.itsobp.com
NODENAME DOMTDP
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
EXCLUDE *.BOX
EXCLUDE LOG.NSF
After you have created new Data Protection for Domino instances you should verify if
everything is configured correctly by logging on to OS/400 with the new user ID(s) and
running the tests described in 8.4.6, “Verifying Data Protection for Domino configuration” on
page 370.
You will also have to create or modify scheduled scripts (see “Backup strategies for Domino
servers using Data Protection for Domino” on page 381) with correct parameters before you
will be able to schedule backup and archival operations.
Each time you want to use a certain Data Protection for Domino instance, you have to log on
to OS/400 with the appropriate instance user. You can then check whether you are accessing
the correct Domino server partition by running the following command in QShell:
domdsmc query domino
For more information on transaction logging and how to configure it, please refer to
Chapter 5.3, “Transaction logging” on page 252.
Important: For complete disaster recovery, you also need to back up other elements of
Domino and OS/400 on a regular basis (weekly or monthly, depending on your business
requirements). You can do this using the OS/400 save commands and iSeries tape or
DVD-RAM drives or using BRMS. For more information and detailed instructions on the
use of OS/400 save commands, see Chapter 6, “Backup and recovery using OS/400
commands” on page 257.
An online backup of Domino databases with Data Protection for Domino stores a snapshot of
this database on the IBM Tivoli Storage Manager server. Databases stored on an IBM Tivoli
Storage Manager server using Data Protection for Domino have full referential integrity, no
matter what type of transaction logging is used on the Domino server.
Archival of Domino transaction log extents with Data Protection for Domino stores full
transaction log files that are no longer used by the Domino server. The Domino server then
reuses archived log extents and overwrites them with new data.
When designing an appropriate Domino backup strategy for your organization, the main
considerations are as follows:
Business requirements and overall enterprise backup strategy
Backup window size
Storage capacity and network throughput
The backup strategy also determines the appropriate transaction logging style for your
environment. See 5.2, “Choosing the right backup strategy” on page 248 for more information
on this topic.
Data Protection for Domino always backs up the full Domino database(s) to the IBM Tivoli
Storage Manager server, not just changed documents, no matter what type of backup
(selective or incremental) has been chosen.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 375
Domino databases can be explicitly excluded or included in the backup processing using
include/exclude options. For more information, see 8.4.4, “Include/exclude processing
options” on page 367. This is a rarely used option, but it is important to remember it when
debugging why some databases are not backed up.
Table 8-1 details whether a Domino database will be saved by a selective or incremental
backup.
Table 8-1 Processing of Domino databases using selective and incremental backup
Database type / changes from last backup Selective backup Incremental backup
For both incremental and selective backups, it is required to specify which Domino
database(s) will be backed up. You can either use the database name(s) or wildcards. An
asterisk (“*”) can be used to select all databases. The database specification is relative to the
Domino data directory. Database selection is not case sensitive, "*" must always be in double
quotes, otherwise double quotes are optional.
Subdirectory processing can be optionally specified using the SUBDIR=YES option. If you
always want to include all subdirectories in your backup processing, you should specify this
option in the Data Protection for Domino preferences configuration (in the domdsm.cfg
configuration file, see “Modifying domdsm.cfg preferences file” on page 366).
The most common selection formulas for database processing using selective backup are:
Selection of all database files and all subdirectories in the Domino data directory:
domdsmc selective “*” /subdir=yes
Selection of a specific database, for example DOCLIB.NSF:
domdsmc selective “doclib.nsf”
Selection of all database files in a specific directory and its subdirectories, for example the
mail directory:
domdsmc selective “mail/*” /subdir=yes
Selection of all database files starting with “doc”:
domdsmc selective “doc*”
You can query the Domino server for a list of databases on the server. Use the query domino
command to do so. You can further refine your query by adding a selection parameter:
domdsmc query domino “*” /subdir=yes
domdsmc query domino “cust*” /subdir=yes
The first command will display a list of all databases on the Domino server. The second
command will list all databases starting with “cust”.
For example, the selective command for backing up all databases on the Domino server is:
domdsmc selective “*” /subdir=yes
To back up a specific Domino database (in our example, DOCLIBTDP.NSF) the command is:
domdsmc selective “doclibtdp.nsf”
You can see the results of running a selective backup for the single Domino database
DOCLIBTDP.NSF in Figure 8-7.
$
===>
Figure 8-7 Result of running the selective backup for a single Domino database
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 377
The selective backup command does not perform removal of deleted Domino databases from
the IBM Tivoli Storage Manager server.
The following command is an example of the incremental command to back up all changed
databases (see selection criteria above) on the Domino server:
domdsmc incremental “*” /subdir=yes
The results of executing the incremental backup command in our environment is shown in
Figure 8-8.
In our example, the Domino server is using transaction logging and only one non-logged
database was changed since the last backup (DBDIRMAN.NSF). Thus, this database was
saved.
===>
The Data Protection for Domino archivelog command queries the Domino server to find out
which transaction logs are eligible for archiving and stores these log extents on the IBM Tivoli
Storage Manager server. Once log extent files are archived, the Domino server is notified by
Data Protection for Domino that these log extent files can now be reused. Data Protection for
Domino 5.2.0 on OS/400 also archives the currently filling transaction log extent file which
can be used for disaster recovery purposes.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 379
The command for archiving logs from the Domino server is:
domdsmc archivelog
You can see the result of running this command in Figure 8-9. In our example, only one
transaction log extent file (currently filling) was saved to the IBM Tivoli Storage Manager
server.
===>
Figure 8-9 Transaction log archiving with Data Protection for Domino
Data Protection for Domino also provides an option for conditional archival of transaction log
extents by specifying a high and low threshold for space utilization. This condition enables the
administrator to specify when log archiving will start (for example, when 80% of the
transaction log space is reached), and when archiving will stop. For more information, see the
IBM Tivoli Storage Manager for Mail 5.2, Data Protection for Lotus Domino for UNIX and
OS/400, Installation and User’s Guide.
Expiration of Domino transaction log extents on the IBM Tivoli Storage Manager server is
performed through the inactivatelogs command. This command causes the expiration of a
log extent file when all transactions in this file are no longer needed. The transaction logs are
often shared among multiple databases and there may be references to many database
entries in the transaction log. When all databases associated with the transaction logs are no
longer active, then the transaction log entries are no longer needed, the log will be eligible for
expiration, and will be deleted on the IBM Tivoli Storage Manager server.
8.5.3 Backup strategies for Domino servers using Data Protection for Domino
The business requirements for your Domino server(s) regarding availability and operation
efficiency are the basis for your backup strategy. Data Protection for Domino provides flexible
options for backing up Domino databases, from daily full backups to incremental backups of
changes to databases.
Here are some important considerations to keep in mind when defining your backup strategy:
What is the amount of data to be saved from the Domino servers?
What is the length of the backup window on the IBM Tivoli Storage Manager server?
What is the available storage space for the backups?
What are the restore time requirements?
What are considerations for transaction logging on the Domino server?
These are the two most widely used backup strategies with Data Protection for Domino:
Full daily backups of all Domino databases:
Full daily backups require more storage space (amount of data on the Domino server
multiplied by the number of backup versions stored on the IBM Tivoli Storage Manager
server) but provide faster restore times. This backup type is possible on Domino servers
not using transaction logging at all or Domino servers using circular or linear transaction
logging. If transaction logging is in use on a Domino server, it is possible to do a point in
time recovery from the last backup of a Domino database.
A full backup is implemented using the selective and incremental commands, depending
on the type of transaction logging style being used. This is explained in more detail in “Full
daily backup strategy for the Domino server” on page 382.
Incremental daily backups of changes to Domino databases and weekly full backups:
Incremental backups require less storage space and allow for point in time restores.
However, restoring the data usually takes longer because the archived transaction logs
required for the activation of the database(s) must also be retrieved from the IBM Tivoli
Storage Manager server. Domino servers must use archive transaction logging for this
type of backup.
With this strategy, on a weekly basis, all databases are saved to the IBM Tivoli Storage
Manager server using the selective backup command. Then, on a daily basis, the
transaction log extent files are archived (using the archivelog command), new databases
(new DBIID) and changed non-logged databases are backed up using the incremental
command. For more information see “Incremental backup strategy for the Domino server”
on page 382.
Depending on the various transaction logging styles, there are differences in the backup
operations required for a complete backup protection of your Domino servers:
For Domino servers with no transaction logging, full daily backups must be performed.
For Domino servers using archive style transaction logging, full backups can be performed
weekly and only new databases and transaction logs are processed daily.
All backup strategies must also include the inactivation of deleted databases and transaction
logs if they are archived.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 381
Full daily backup strategy for the Domino server
A full backup of Domino databases saves all changed or new databases to the IBM Tivoli
Storage Manager server. The backup operation must also include expiration of deleted
databases (by using the weekly incremental backup command for Domino servers with
transaction logging enabled).
A full backup with Data Protection for Domino without transaction logging requires:
Daily incremental backups:
A Data Protection for Domino incremental backup for a Domino server without transaction
logging saves all databases that were changed since the last backup.
Domino servers without transaction logging require full backups daily!
A full backup with Data Protection for Domino with circular or linear transaction logging
enabled requires:
Daily selective backups:
The Data Protection for Domino selective backup performs a backup of all databases on
the Domino server.
Weekly incremental backups:
The incremental backup for a Domino server with circular transaction logging is used to
inactivate deleted Domino databases on the IBM Tivoli Storage Manager server. On the
day of the incremental backup you must also perform the daily selective backup.
Attention: It is very important that you archive your transaction logs regularly when
archive style transaction logging is enabled or your transaction log extents will fill up all
available disk space and the Domino server will eventually crash.
Note: Data Protection for Domino can also perform full daily backups of all databases
when archive style transaction logging is enabled. In this case, you must adjust the
operation frequency for your selective backups and inactivation of transaction logs from
weekly to daily.
Sample scripts for Data Protection for Domino operations on OS/400 are provided in the
installation directory of the product. We have modified these scripts for our Data Protection
for Domino environment. Please refer to 8.8.2, “Sample scripts for scheduled Data Protection
for Domino operations” on page 401 for more information on these modified scripts and to
Appendix D, “Additional material” on page 611 for information on how to download them.
The required scripts for Data Protection for Domino operations and their recommended
frequencies are listed in Table 8-2.
Table 8-2 Required scheduled scripts for Data Protection for Domino backups
Backup requirement / Transaction logging Hourly script Daily script Weekly script
These scripts must be stored in the respective directories of your Data Protection for Domino
instances.
A QShell script can be started manually within QShell by entering its name on the command
line. The more common method for running QShell scripts is to enter the QSH command and
add the script name as a parameter, for example:
QSH CMD('/usr/tivoli/tsm/domav/domarc')
On the iSeries, you can use the Job Scheduler for iSeries or the Advanced Job Scheduler to
schedule your Data Protection for Domino backup operations. Other Data Protection for
Domino platforms use the IBM Tivoli Storage Manager scheduler for centralized scheduling
and management, however there is no IBM Tivoli Storage Manager client scheduler available
for the iSeries platform.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 383
To schedule Data Protection for Domino operations on OS/400, add the appropriate QShell
script to the OS/400 Job Scheduler using the Add Job Schedule Entry (ADDJOBSCDE)
command.
The following example schedules script dominc (Data Protection for Domino incremental
backup) to run every day at 22:00 hours:
ADDJOBSCDE JOB(DOMTDPINC)
CMD(QSH CMD('/usr/tivoli/tsm/domtdp/dominc'))
FRQ(*WEEKLY)
SCDDAY(*ALL)
SCDTIME(‘22:00')
Scheduled jobs can be verified using the Work with Job Schedule Entries (WRKJOBSCDE)
command. Figure 8-10 shows the jobs scheduled for our Domino server. Alternatively you
can use iSeries Navigator to check for scheduled jobs.
Next
-----Schedule------ Recovery Submit
Opt Job Status Date Time Frequency Action Date
DOMTDPARC SCD *ALL 10:00:00 *WEEKLY *SBMRLS 08/13/03
DOMTDPARC SCD *ALL 16:00:00 *WEEKLY *SBMRLS 08/12/03
DOMTDPINA SCD *SUN 22:00:00 *WEEKLY *SBMRLS 08/17/03
DOMTDPINC Chg *ALL 22:00:00 *WEEKLY *SBMRLS 08/13/03
DOMTDPSEL SCD *SUN 22:00:00 *WEEKLY *SBMRLS 08/17/03
More...
Parameters or command
===>
F3=Exit F4=Prompt F5=Refresh F6=Add F9=Retrieve
F11=Display job queue data F12=Cancel F17=Top F18=Bottom
For more information on the OS/400 Job scheduler see Chapter 12, “Job Scheduling” in
AS/400e™ Work Management, SC41-5306-03. This book can be obtained from the Web at:
http://publib.boulder.ibm.com/iseries/v5r1/ic2924/books/c4153063.pdf
The Job scheduler is also covered in Chapter 6, “Backup and recovery using OS/400
commands” on page 257 and Chapter 7, “Backup and recovery using BRMS/400” on
page 293.
In conjunction with other OS/400 backup solutions (for example BRMS), you can use Data
Protection for Domino for disaster recovery.
You are also able to retrieve and activate (a) Domino database(s) in one step. However, if
doing so, you are not able to apply updates from the transaction log.
The main advantages of restoring databases in two steps are faster activation when restoring
multiple databases and the option to specify a point in time for application of transaction log
changes.
Important: After you restore and activate a Domino database you must perform a full
backup of this database because a restored database is new to the Domino server and
therefore gets a different DBIID than the original database assigned.
A restored database can be saved with either an incremental or selective Data Protection
for Domino backup. You will not be able to perform subsequent point in time restores until
a full backup has been performed.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 385
When retrieving Domino databases from the IBM Tivoli Storage Manager server, you have to
specify the following parameters:
The name(s) of the Domino database(s). On this parameter you can specify a single
Domino database or a group of databases using a wildcard (“*”). When using the wildcard
“*”, it must be enclosed in double quotes, otherwise double quotes are optional.
The command to restore the database called DOCLIB1.NSF is:
domdsmc restore “doclib1.nsf”
You can see result of running this command in Figure 8-11.
Optionally you can specify (a) new filename(s) for the restored database(s). To do so, use
the INTO=new_db_name.nsf parameter.
If you are restoring a database to the original file name and thus overwriting the original
database, the Domino server takes the original database offline before proceeding with
the retrieval from the IBM Tivoli Storage Manager server. If the original database is in use
when the restore process is started, the restore is canceled with the error “The database is
in use and cannot be taken offline”.
The command to restore DOCLIB.NSF to the new database name “RESTORE.NSF” is:
domdsmc restore “doclib.nsf” /into=restore.nsf
The database is restored to its original filename if you do not specify the INTO parameter.
When restoring multiple databases, using “/into=“ together with the equals sign (=)
restores the databases with the original names. For example:
domdsmc restore "*" /into=newdir/=
restores all databases into the newdir subdirectory, using their original names.
If you need to keep the existing subdirectory structure, use two equals signs (==). Issuing
domdsmc restore "*" /into=newdir/== /subdir=yes
restores all databases and their subdirectories in the newdir subdirectory.
To restore a specific version of a database, use the PIT=date,time parameter. When using
PIT, the restore command retrieves the most recent database backup image taken before
the specified point in time.
Note: The date format is set in the domdsm.cfg configuration file. Time is always in
24-hour format. If the DATEFORMAT parameter is not specified in domdsm.cfg, then
the OS/400 system date format is used.
The following command retrieves the most recent version of DOCLIB.NSF before
08/20/2003, 15:00 from the IBM Tivoli Storage Manager server:
domdsmc restore “doclib.nsf” /pit=08/20/2003,15:00
If there is no version of the database older than the specified date and time found on the
IBM Tivoli Storage Manager server, Data Protection for Domino will return an error stating
that no databases matching the criteria were found on the server.
===>
Figure 8-11 Restoring a Domino database with Data Protection for Domino
To activate a database as soon as it is retrieved from the IBM Tivoli Storage Manager
server, use the optional ACTIVATE=YES parameter. This brings the database online to
the Domino server immediately after the restore operation, but no changes from the
transaction logs are written to the restored database. The command to retrieve and
activate the database DOCLIB.NSF in one step is:
domdsmc restore “doclib.nsf” /activate=yes
To finish restoring databases, they are subsequently rolled forward (if selected to the
appropriate point in time) from the transaction logs through the use of the /applylogs option on
the activatedbs command (if ACTIVATE=YES has not been selected). For more information
see “Activation of databases” on page 389.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 387
Interactive selection of databases for restore — the PICK parameter
There is a user interface available with Data Protection for Domino to select restorable
Domino databases and database versions. The PICK parameter displays a list of all Domino
databases stored on the IBM Tivoli Storage Manager server and allows for interactive
selection of databases to be retrieved from the server. By default, the PICK parameter
displays only the most recent version of Domino databases on the IBM Tivoli Storage
Manager server.
To display a list of databases starting with “doc” (and subsequently select databases from the
list), issue the following command:
domdsmc restore “doc*” /pick
Figure 8-12 shows the result of this command. Please note the different options to scroll, to
select databases, and to start or cancel processing.
IBM Tivoli Storage Manager for Mail Scrollable PICK Window - Restore
# DB Backup Date Size A/I Logged Database File
---------------------------------------------------------------------
--
1. | 08/08/03 13:44:36 121.25MB A Yes doclibtdp.nsf
2. | 08/08/03 13:45:57 121.25MB A Yes doclibtdpr.nsf
3. | 08/08/03 15:55:14 15.00MB A Yes doclib1.nsf
|
|
0---------10--------20--------30--------40--------50--------60-------
-7
<U>=Up <D>=Down <T>=Top <B>=Bottom <R#>=Right <L#>=Left
<G#>=Goto Line # <#>=Toggle Entry <+>=Select All <->=Deselect All
<#:#+>=Select A Range <#:#->=Deselect A Range <O>=Ok <C>=Cancel
pick>
===>
This command displays all Domino databases that can be retrieved with Data Protection for
Domino. How many versions and how old the Domino databases can be is controlled by
settings in the Policy Domain (for more information see 8.3, “IBM Tivoli Storage Manager
server configuration” on page 359).
Activation of databases
The second step of database recovery is activation. In this step, the restored database is
brought online for use by the Domino server. Database activation is performed using the
activatedbs command.
If your Domino server is configured for transaction logging you can also apply changes from
the transaction logs to the restored database(s). Changes can be applied to any point in time
between the first available full backup and the current time and date. This is always possible
with archive style transaction logging (if you have valid backups). In case of circular logging,
point in time activation depends on the availability of transaction logs (with circular style
transaction logging, the transaction logs are regularly overwritten).
If you are restoring multiple databases to a Domino server that uses archive style transaction
logging, it is best to first retrieve all databases from the IBM Tivoli Storage Manager server
before running activation. This way the required archived transaction logs will be fetched from
the IBM Tivoli Storage Manager server only once. Also, application of changes to all restored
databases will be performed at once for all databases awaiting activation.
To check which databases are awaiting activation, use the query pendingdbs command:
domdsmc query pendingdbs
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 389
QSH Command Entry
> domdsmc query pending
$
===>
Figure 8-13 The query pending command - show restored databases awaiting activation
See Figure 8-14 for the result of running this command in our environment with one database
awaiting activation.
===>
Figure 8-14 Activation of restored Domino databases without applying transaction log changes
Provided that your Domino server uses transaction logging (archive, linear or circular style),
the activation process can also apply changes from the transaction log(s) to the database(s)
using the APPLYLOGS parameter. If you specify this parameter without a date and time, the
changes are applied up to the current date and time, otherwise they are applied to the
specified point in time.
Applying changes to the current date and time allows you to recover a database to the last
known good state, that is before it was deleted or corrupted. To activate a database and apply
changes to the current date and time (that is, to the last data written into the transaction log),
issue the following command:
domdsmc activatedbs /applylogs
More often you will be restoring a database to a certain point in time, for example before
some documents were accidentally deleted or modified. In this case you must specify the
desired date and time on the APPLYLOGS parameter, for example:
domdsmc activatedbs /applylogs=08/15/2003,10:00
The date format is set in the domdsm.cfg configuration file; time is always in 24-hour format. If
the DATEFORMAT parameter is not specified in domdsm.cfg, then OS/400 system formatting
is used.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 391
Figure 8-15 shows the results of a point in time database activation with Data Protection for
Domino.
The Domino console will also display transaction log messages when restoring a database to
a point in time. Refer to Figure 8-16 for an example.
===>
Figure 8-16 Domino console messages - transaction log operations during database activation
Disaster recovery of a Domino server on iSeries might involve doing the following steps:
1. Verify that the Lotus Domino prerequisites are met on the iSeries system which will host
the Domino server.
For information on Lotus Domino prerequisites see “Software installation guidelines and
resources” on page 20.
2. Install Lotus Domino on OS/400.
The Lotus Domino server code must be same version and hotfix level as the server you
are restoring. For more information on installing Lotus Domino on OS/400 see “Installation
best practices” on page 23 and the redbook IBM Lotus Domino 6 for iSeries
Implementation, SG24-6592.
3. Restore the latest version of the SERVER.ID file for this Domino server from your OS/400
backup or other archive.
SERVER.ID is not backed up using Data Protection for Domino.
4. Configure the new Domino server using the same parameters as for the original Domino
server.
You can configure the Domino server either through iSeries Navigator or using the
Configure Domino Server (CFGDOMSVR) command. You should configure the new
server with the same parameters (directory, server tasks, etc.) as used for the original
server. If the original server was the only server in your organization, configure the new
server as “First server or stand-alone server”, otherwise configure the new server as an
“Additional Domino server”.
5. Turn on archive style transaction logging.
If you configured the Domino server as an additional server, just stop and restart the
Domino server. This will create the transaction logs based on the configuration of the
original server from the Domino Directory. If you have configured a stand-alone Domino
server, you must change the transaction log settings in the Server document in the
Domino Directory of the new server. After configuring archive logging you must restart the
Domino server to activate it.
Once archival logging is activated, you must stop the server once again before performing
the next step.
6. Install Data Protection for Domino.
For installation instructions please see 8.2, “Installation of Data Protection for Domino on
OS/400” on page 357.
7. Configure a Data Protection for Domino instance.
For configuration instructions please refer to 8.4, “Data Protection for Domino on OS/400
configuration” on page 361. You have to use the same nodename and configuration as for
the original server. If available, you can use your backup of the directory containing the
Data Protection for Domino configuration files.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 393
8. Restore all databases you want to recover using Data Protection for Domino.
The Domino server must be stopped during the restore operation. Restore the databases
with the appropriate Data Protection for Domino commands (refer to 8.6.1, “Recovering a
Domino database” on page 385 for details) but do not activate the restored databases. To
restore all Domino databases from the IBM Tivoli Storage Manager use the command:
domdsmc restore “*” /subdir=yes
9. Restore the transaction log extent to be used in the disaster recovery procedure.
In most cases this will be the last transaction log extent archived prior to the data loss.
This is done using the following command:
domdsmc restorelogarchive
This transaction log will be used to rebuild the transaction log control file. Write down the
name of this transaction log.
10.Delete the contents of the Domino transaction log directory except for the transaction log
extent you restored in step 9.
You can use the Work with Object Links (WRKLNK) command to display the transaction
log directory and delete all files, except the one noted in step 9 (use option 4 = Remove to
do so). The command is:
WRKLNK ‘/LOTUS/DATA/DOMTDP/LOGDIR/*.*’
11.Enable the recreation of the transaction log control file nlogctrl.lfh in NOTES.INI.
To do so, modify the NOTES.INI file of the new Domino server using option 13 on the
Work with Domino Servers (WRKDOMSVR) screen. Add the following setting:
TRANSLOG_Recreate_Logctrl=1
If this entry already exists in NOTES.INI, change the setting to 1.
12.Run fixup on a database you are not recovering (for example on LOG.NSF).
Issue the following command on an OS/400 command line to run fixup against LOG.NSF:
RUNDOMCMD SERVER(<servername>) CMD(CALL PGM(QNOTES/NFIXUP) PARM(LOG.NSF))
After fixup completes, the TRANSLOG_Recreate_Logctrl entry in NOTES.INI will
automatically be reset to 0.
13.Activate the databases.
See “Activation of databases” on page 389 for information. When you activate your
databases, all transactions will be applied to the current date and time. For disaster
recovery this represents the last archive of your transaction logs. Use the applylogs
parameter if you want to restore the databases to a different point in time. The command
to apply logs to the current date and time is:
domdsmc activatedbs
14.Start the Domino server using the Start Domino Server (STRDOMSVR) command:
STRDOMSVR SERVER(<servername>)
15.Install all Domino add-on programs and applications as used on the original server.
If this overwrites any of the recently restored databases, you should restore and activate
these databases again from the backup.
16.Modify NOTES.INI with any customizations that were in effect on the original server.
We recommend that you copy the modifications from a saved version of NOTES.INI to
NOTES.INI on the new server. It is not advisable to copy the whole original file over the
new one.
Tip: If you have a full backup of your entire system - including all Domino data - you can
restore the system and the Domino server from this backup first and then continue with
step 8 on page 394.
You can use the native OS/400 save and restore commands to back up this data. For more
information and recommendations on procedures and frequencies of these backup
operations, see Chapter 6, “Backup and recovery using OS/400 commands” on page 257.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 395
Such a project team should include people from these areas:
IT infrastructure planning
IBM Tivoli operations and administration
OS/400 operations and administration
Lotus Domino operations and administration
Network design and operations
When designing a Data Protection for Domino solution, you must take into consideration:
Business requirements for backup and disaster recovery
Amount of data in Domino databases — for full backup
Daily/weekly changes of data — for log sizes and log extent archival
Available network throughput
Available storage on IBM Tivoli Storage Manager server
These tips will help you managing your Data Protection for Domino environment:
We recommend that you create a separate Policy Domain for your Data Protection for
Domino nodes. For transaction log archiving, the log extents must be stored as long as the
full database backups are kept on the IBM Tivoli Storage Manager server. This is easily
achievable if you use the same Management Class for full backups and transaction log
archiving.
Each Domino partition requires its own Data Protection for Domino instance and each of
these instances is a node to the IBM Tivoli Storage Manager server. This means you must
create a separate node for each Data Protection for Domino instance.
To optimize the recovery process, use collocation for the file space containing the
transaction log files if they are stored on sequential media on the IBM Tivoli Storage
Manager server. The transaction log files are normally stored in a separate file space from
the database files on the IBM Tivoli Storage Manager server.
Network design
Data Protection for Domino transfers data to and from the IBM Tivoli Storage Manager server
over the TCP/IP network. The duration of backup and restore operations is therefore directly
correlated to the network throughput between the iSeries system running Data Protection for
Domino and the IBM Tivoli Storage Manager server. You must allocate appropriate network
bandwidth for backup and restore operations when you are designing your backup solution.
Data Protection for Domino uses the Tivoli Storage Manager APIs for communication with the
IBM Tivoli Storage Manager server and you can expect network performance to be similar to
Backup, Recovery, and Media Services for iSeries (which uses the same APIs). Please refer
to the BRMS application client performance Web site at:
http://www.ibm.com/servers/eserver/iseries/service/brms/adsmperf.htm
This Web site lists performance considerations and measurements for different iSeries
servers and network speeds for BRMS using the Tivoli Storage Manager APIs.
Here are some general observations, relevant to Data Protection for Domino, that can be
concluded from these tests:
Performance appears to be proportional to the CPW (Commercial Processing Workload)
available for the backup job.
Performance appears to be proportional to the available network bandwidth.
Performance on older iSeries models may be limited if the communications IOA is
attached to a shared multi-function IOP.
CPU utilization typically increases proportionally with the effective network data rate.
Performance when saving large objects is always better than saves of small objects.
Due to the increasing amounts of data held in Domino databases and mail files, we
recommend setting up a separate network for backup and recovery operations with the IBM
Tivoli Storage Manager server. This includes a separate network adapter on your iSeries and
a separate network backbone for connecting all nodes (including Data Protection for Domino)
to the IBM Tivoli Storage Manager server. Use a network speed of 1 GB/second or higher.
This design ensures very fast incremental and full backups. According to the performance
tests mentioned above, the network throughput can be as fast as 59 GB per hour on an
iSeries model 820 with 3200 CPW over a 1 GB Ethernet network. Restoring and recovering
databases over a separate backup/restore network does not significantly impact the
performance of the Domino server. Having a separate network also enables frequent log
archiving operations without impacting the users of this Domino server.
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 397
Note: The Data Protection for Domino iSeries job does not write messages to the OS/400
joblog.
Logging information can be found in the domdsm.log file (located in the Data Protection for
Domino instance directory). The domdsm.log file contains the following information:
Which Data Protection for Domino operation was started?
When was the operation started?
Basic configuration parameters for Data Protection for Domino preferences.
Summary results of running the operation, including statistical information.
The results of Data Protection for Domino operations are displayed in the console and can be
redirected to a test file. Use the “>>” operator in QShell to do so. This output includes
information on:
Each database being processed
Size of database
Network throughput and statistics
Information about objects stored on the IBM Tivoli Storage Manager server and session
statistics can also be found in the Activity Log of the IBM Tivoli Storage Manager server.
Our Data Protection for Domino environment consisted of three Domino server partitions on
two different iSeries servers:
System 1 - AS25:
– DOMAV/AV/ITSOBP - A Domino server with archival transaction logging enabled
– DOMCLUS2/SVR/ITSOBP - A Domino server not using transaction logging
System 2 - AS09:
– DOMTDP/SVR/ITSOBP - A Domino server with archival transaction logging enabled
This section shows the configuration files and scripts for the DOMAV Domino server. The files
for our other Data Protection for Domino instances are similar to these files and are not listed
here, in the interest of space limitations.
Attention: Due to space constraints, some of the lines are split into two lines in our sample
files. You must enter them on a single line in your files to work correctly.
Don’t forget to change the path information to your Data Protection for Domino instance
directory when using these files.
You need only one dsm.sys file per OS/400 instance (iSeries server or LPAR), but different
domdsm.cfg and dsm.opt files for each Data Protection for Domino instance.
In addition to the Data Protection for Domino configuration files, the user running the domdsmc
commands also needs a .profile file in his home directory (see Example 8-7). We recommend
that you use different OS/400 user IDs for different Data Protection for Domino instances.
SErvername DOMAV
COMMmethod TCPip
TCPPort 1500
TCPServeraddress ITSOBPTSM.ITSO.COM
NODENAME DOMTDP
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
TCPBUFFSIZE 512
SErvername DOMCLUS2
COMMmethod TCPip
TCPPort 1500
TCPServeraddress ITSOBPTSM.ITSO.COM
NODENAME DOMCLUS2
PASSWORDACCESS GENERATE
PASSWORDDIR /usr/tivoli/tsm/client/api/bin
TCPBUFFSIZE 512
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 399
Example 8-5 Sample domdsm.cfg preferences file
************************************************************************
* Data Protection for Lotus Domino Preferences File *
* Location: /usr/tivoli/tsm/domav/domdsm.cfg *
************************************************************************
BUFFers 3
BUFFERSIze 1024
LOGFile domdsm.log
LOGPrune 60
REPlace yes
SUBDir yes
MOUNTWait yes
NOTESIniPath /lotus/data/domav
LastPruneDate
Servername DOMAV
Example 8-7 Sample .profile file for Data Protection for Domino instance user
************************************************************************
* Profile file for Data Protection for Domino instance DOMAV user *
* Location: /home/domavbku/.profile *
************************************************************************
DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
DOMI_LOG=/usr/tivoli/tsm/domav
DOMI_CONFIG=/usr/tivoli/tsm/domav/domdsm.cfg
DSMI_DIR=/usr/tivoli/tsm/client/api/bin
DSMI_LOG=/usr/tivoli/tsm/domav
DSMI_CONFIG=/usr/tivoli/tsm/domav/dsm.opt
PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domav:/usr/tiv
oli/tsm/client/domino/bin
QIBM_MULTI_THREADED=Y
LANG=/QSYS.LIB/DE_DE.LOCALE
These are the sample scripts for scheduled Data Protection for Domino operations provided
in this section:
Domarc: Log archiving to the IBM Tivoli Storage Manager server (Example 8-8 below)
Domina: Log inactivation on the IBM Tivoli Storage Manager server (Example 8-9 on
page 402)
Dominc: Data Protection for Domino incremental backup (Example 8-10 on page 403)
Domsel: Data Protection for Domino selective backup (Example 8-11 on page 404)
The use of these sample scripts will result in multiple log files — one common log file
(domdsm.log) which is also used by the interactive domdsmc commands, and several log files
that use the respective script name plus the extension “.log” (for example dominc.log).
Again, when using these scripts, don’t forget to change the paths to your Data Protection for
Domino instance directory, configuration files, and log files.
Example 8-8 Sample domarc script for log archiving with Data Protection for Domino
#!/usr/bin/qsh
#
# ===================================================================
# Domarc file is used to do a scheduled archiving of transaction
# logs to IBM Tivoli Storage Manager server
# ===================================================================
export DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
export DOMI_CONFIG=/usr/tivoli/tsm/domav/domdsm.cfg
export DSMI_DIR=/usr/tivoli/tsm/client/api/bin
export DSMI_CONFIG=/usr/tivoli/tsm/domav/dsm.opt
export LOG_DIR=/usr/tivoli/tsm/domav
export QIBM_MULTI_THREADED=Y
# ===================================================================
# Update PATH with the Domino server data directory
# ===================================================================
export PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domav
# ===================================================================
# Put a date and time stamp in a log file for yourself.
# ===================================================================
# ===================================================================
# Now call the commandline to do the backups.
# ===================================================================
cd ${DOMI_DIR}
${DOMI_DIR}/domdsmc archivelog -adsmoptfile=${DSMI_CONFIG }-logfile=${LOG_DIR}/domdsm.lo g
>> ${LOG_DIR}/domarc.log
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 401
Example 8-9 Sample domina script for transaction log inactivation
#!/usr/bin/qsh
#
# ===================================================================
# Domina file is used to do a scheduled inactivation of transaction
# logs stored on IBM Tivoli Storage Manager server
# ===================================================================
export DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
export DOMI_CONFIG=/usr/tivoli/tsm/domav/domdsm.cfg
export DSMI_DIR=/usr/tivoli/tsm/client/api/bin
export DSMI_CONFIG=/usr/tivoli/tsm/domav/dsm.opt
export LOG_DIR=/usr/tivoli/tsm/domav
export QIBM_MULTI_THREADED=Y
# ===================================================================
# Update PATH with the Domino server data directory
# ===================================================================
export PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domav
# ===================================================================
# Put a date and time stamp in a log file for yourself.
# ===================================================================
# ===================================================================
# Now call the commandline to do the backups.
# ===================================================================
cd ${DOMI_DIR}
${DOMI_DIR}/domdsmc inactivatelogs -adsmoptfile=${DSMI_CONFIG}-logfile=${LOG_DIR}/domds
m.log >> ${LOG_DIR}/domina.log
# ===================================================================
# Update PATH with the Domino server data directory
# ===================================================================
export PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domav
# ===================================================================
# Put a date and time stamp in a log file for yourself.
# ===================================================================
# ===================================================================
# Now call the commandline to do the backups.
# ===================================================================
cd ${DOMI_DIR}
${DOMI_DIR}/domdsmc incremental "*" /subdir=yes -adsmoptfile=${DSMI_CONFIG} -logfile=${L
OG_DIR}/domdsm.log >> ${LOG_DIR}/dominc.log
Chapter 8. Backup and recovery using Tivoli Data Protection for Domino 403
Example 8-11 Sample domsel script for Data Protection for Domino selective backup
#!/usr/bin/qsh
#
# ===================================================================
# Domsel file is used to do a scheduled selective backup of all
# Domino databases including subdirectories
# ===================================================================
export DOMI_DIR=/usr/tivoli/tsm/client/domino/bin
export DOMI_CONFIG=/usr/tivoli/tsm/domav/domdsm.cfg
export DSMI_DIR=/usr/tivoli/tsm/client/api/bin
export DSMI_CONFIG=/usr/tivoli/tsm/domav/dsm.opt
export LOG_DIR=/usr/tivoli/tsm/domav
export QIBM_MULTI_THREADED=Y
# ===================================================================
# Update PATH with the Domino server data directory
# ===================================================================
export PATH=$PATH:/qibm/userdata/lotus/notes:/qibm/proddata/lotus/notes:/lotus/data/domav
# ===================================================================
# Put a date and time stamp in a log file for yourself.
# ===================================================================
# ===================================================================
# Now call the commandline to do the backups.
# ===================================================================
cd ${DOMI_DIR}
${DOMI_DIR}/domdsmc selective "*" /subdir=yes -adsmoptfile=${DSMI_CONFIG} -logfile=${LOG
_DIR}/domdsm.log >> ${LOG_DIR}/domsel.log
Important: Throughout this chapter you will find information and material from Symantec
Corporation and Trend Micro, Inc. This material was reprinted by permission of Symantec
Corporation and Trend Micro, Inc.
Note: We have described Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 in more
detail than Symantec AntiVirus/Filtering 3.0 for Domino on iSeries because of the available
skills in the team that wrote this redbook. This does not mean that we recommend one
product over the other.
Computer viruses and worms can spread through computer networks with lightning speed
using different points of entry (e-mail, network shares, peer-to-peer systems, etc.). The
payloads carried by these viruses are also getting more and more dangerous - from the ability
to take over control of the computer to the orchestrated distributed denial of service attacks
which can bring down the entire Internet.
Each organization must take the threats it is exposed to very seriously. The cleanup costs and
loss of productivity caused by each occurrence of malicious code can run into billions of
dollars. It is essential for every organization to design and implement an antivirus policy and
technologies as part of the overall IT security.
e-mail provides a new ubiquitous form of communication that is being used as the primary
channel in many organizations. Design and low cost of Internet e-mail allowed proliferation of
unwanted messages and mass mailings. This reception of unsolicited commercial e-mail is
often referred to as spam.
Spam is the only known form of advertising that is more expensive for its audience than for
the advertiser. Due to the significant loss of productivity, organizations all over the world are
spending large amounts of money combating spam.
The easy transfer of information and documents also carries new risks for organizations.
Nowadays it is very easy to transmit sensitive or inappropriate information undetected to
unauthorized recipients.
Spam and unauthorized transfer of sensitive information is being addressed using solutions
for content security. They provide filtering and journalling of e-mail messages using simple
rules or complex algorithms. Content security solutions can help organizations to drastically
decrease the amount of spam in user’s mailboxes and capture sensitive information being
transmitted.
The Domino server as an e-mail and groupware server is usually one of the first entry points
that has to be addressed for antivirus and content security in the organization. In this chapter
we provide an overview of the options available for antivirus protection of Domino servers
running on an iSeries system and content security of Domino e-mail messages.
Viruses
A computer virus is a program that has the ability to replicate and spread between different
computers. Viruses attach themselves to different types of computer files and are spread
when files are copied or distributed between individuals. Most computer viruses also cause
intentional damage, for example they destroy files, format the hard drive, or crash the
operating system. Viruses without damaging code (they might just display a message on the
Macro viruses
A special kind of computer viruses are macro viruses. They are written in the popular
programming language Visual Basic and usually infect word processing and spreadsheet
files. Macro viruses spread easily due to the ubiquity of Microsoft Office programs.
Worms
A computer worm is a self-contained program that is able to spread functional copies of itself
or its segments to other computer systems. The propagation usually takes place via network
connections or e-mail attachments.
Trojans
A trojan is malicious code that performs unexpected or unauthorized actions. A trojan
program preforms a malicious function in addition to regular operations of the program. The
main difference between a trojan and a virus is the inability to replicate.
Blended threats
Most new viruses today are a combination of different types, for example computer viruses
that are trojan, but with the virus-like or worm-like ability to replicate. So a blended threat
utilizes multiple methods and techniques to transmit and spread an attack. This type of
blended attack is also the most dangerous type. According to Symantec, blended threats
increased nearly 20% during the first half of 2003 over the last half of 2002.
For detailed information on blended threats, please refer to the article “The New Danger:
Blended Threats” on the Symantec Web site at:
http://enterprisesecurity.symantec.com/content.cfm?articleid=967&PID=9929124&EID=0
Viruses won't go away anytime soon: More than 60,000 have been identified, and, according
to the International Computer Security Association (ICSA, http://www.icsalabs.com),
400 new ones are created every month. With numbers like this, it's safe to say that most
organizations will regularly encounter virus outbreaks. No one who uses computers is
immune to viruses.
The life cycle of a virus begins when it is created, and basically never ends, because most
viruses are never completely eradicated. The following outline describes some stages in the
life of a virus:
Creation: Until recently, creating a virus required good knowledge of a computer
programming language. Today, anyone with a basic programming knowledge can create
a virus. Viruses can even be created using automated virus construction kits.
Discovery: There are several possibilities to discover a new virus, for example:
– The virus enters a site (via the e-mail system, downloaded files, etc.). Once the
infection is discovered by the user, the suspicious code is sent to the antivirus software
vendor for appropriate action.
– Antivirus software itself may discover it based on the used heuristic technology. For
example, the antivirus software detects suspicious code (possibly a new virus) in a mail
attachment. Depending on the antivirus configuration, the suspicious attachment might
be automatically send to the software vendor who will then take appropriate action.
Another configuration option offered by some vendors is to move suspicious mails into
the quarantine database/directory and to decide individually what to do with it, for
example, delete it or (better) send it manually to the antivirus software vendor.
Assimilation: When a new virus is discovered, antivirus software developers may need to
modify their virus pattern files so that it can detect the new virus. This can take anywhere
from a couple of minutes to some hours, depending on the methods used by the vendor,
and the virus type. Typically today the virus definition files are updated within minutes.
Therefore regular updates of virus pattern files are very important. As new viruses are
found often, ideally, the antivirus software should be configured to perform signature file
updating automatically.
Eradication: Because not all users use up-to-date virus protection software and patch
their operating systems as new vulnerabilities are discovered, it is hard to eradicate a
virus. However, if enough users take appropriate action, the threat imposed by a virus is
no longer major.
Important: Recent studies show that attacks are being released quicker.
Some years ago, when a new operating system vulnerability was discovered, it took
several months to years before somebody took advantage of that vulnerability. Now the
time from discovery to outbreak shortened greatly. For example, the Blaster worm, which
was one of the biggest threats in August 2003 (while we were writing this redbook), used a
well-known Microsoft security flaw that had been announced only 26 days before.
There are many things you can do to protect your environment against malicious software,
also called “malware”. At the top of the list is using a powerful antivirus product, and keeping
The solutions for spam prevention and content security are often separate from the Domino
environment, but they are getting more and more integrated in antivirus products running on
the Domino server.
Spam is designed to flood the Internet with mass mailings, attempting to reach the largest
audience possible. Most often spammers are merely trying to sell a dubious product, such as
diplomas of unaccredited universities, get-rich-quick schemes, or discounts on prescription
drugs. In a real world example, spam is the equivalent of receiving flyers, mailers, contest
entries, and other junk mail items routinely sent to thousands of households without the
residents having explicitly requested them. The difference, for the average spammer, is not
having to pay printing fees or postage, which makes spam infinitely less expensive than
traditional junk mail.
A very important aspect of what constitutes spam is that spam has negative effects on those
who receive it. Spam is the only form of advertising that is more expensive for its audience
than for the advertiser. It is not simply a case of getting a few extra mail messages a day and
taking a minute or two to delete them. Spam is not targeted at any specific group or person. It
is sent to everyone. Therefore, it can be a very expensive nuisance.
Advertisers pay very small sums of money to acquire huge spamming lists and lists of e-mail
addresses. These lists are gathered from various sources, often with questionable methods,
and sold to anyone who wishes to send out spam. Advertisers then use these lists for
spamming, trying to reach the broadest audience possible.
Spam prevention software solutions and services reduce the amount of spam delivered to the
users in the organization by checking the content of messages and the validity of the sender
or e-mail server.
The cost of leaked customer or confidential information can be huge. Customer lists, price
lists and internal memos can easily be forwarded out of the organization by any individual with
access to Internet e-mail. Corporations are also getting more concerned about privacy and
legal exposure, especially in the light of new regulations and legislation in this field.
E-mail content filtering products implement a set of rules that reflect the confidentiality policy
of a company and thus minimize accidental or careless communications by employees.
Complete antivirus and content security protection for your environment must include:
An overall IT security policy
Acceptable usage policies for e-mail, the Web, unauthorized files and content, other
Internet activity, etc.
Software solutions to protect all points of entry in your IT environment
– Firewall and intrusion detection systems for network level security
– Antivirus software for:
• Workstations and mobile devices
• Server systems
• E-mail and groupware systems
• Internet access systems (for example HTTP traffic)
• e-mail content security
Continuous policy monitoring and enforcement as well as end-user education
A more detailed discussion on the topic of comprehensive antivirus protection and content
security is out of the scope of this Redbook. A good starting point to find more information is
the CERT Coordination Center Web page at:
http://www.cert.org
Especially, Windows platforms running a Domino server also require antivirus protection for
the operating system itself. This is not necessary for the iSeries platform because until now
no viruses have been discovered for OS/400. This includes malicious code that could hide
inside RPG and CL programs (or any *PGM object), or inside physical and logical files (or any
*FILE object). Also, it is important to note that OS/400 cannot run .exe files, so viruses
contained in such files cannot affect the iSeries itself.
However, this does not mean that organizations running their Domino server(s) on iSeries are
immune to malicious code stored in the iSeries IFS (allowing for network shares through
Windows), Domino databases or transferred via Domino mail. In fact, the most prevalent ways
of spreading malicious code during the last years have been e-mail and Windows file shares.
These are the main steps to introduce an e-mail policy in your organization:
1. Obtain commitment and sponsorship from senior management for the antivirus and
content security implementation. The most important step is to ensure that the upper
management in an organization is aware and understands the technical and legal risks to
the organization. In addition to management, HR or Operations management must be
involved because an e-mail policy is primarily a behavioral issue rather than a technical
one.
2. Create an acceptable e-mail usage policy suitable for your organization. The e-mail usage
policy must be based on the corporate policies for handling sensitive information, privacy
and workplace conduct. The main foundations of the policy are risks and costs your
organization is exposed to by malicious code and unauthorized e-mail messages. This
policy should include attachment handling, procedures for sending sensitive information
and definition of inappropriate e-mail content.
3. Distribute your acceptable e-mail usage policy and introduce it to all e-mail users. Ensure
that all staff managers are aware and supportive of the initiative and the business reasons
driving it.
4. Educate your users on the policy with the focus on the acceptable business usage. As
privacy concerns are also strong among e-mail users, policy education should reinforce
that content filtering is an automated process and nobody has the time or inclination to sit
around looking at all messages.
5. Monitor the e-mail flow for policy compliance. The most effective content filtering is done
by the users themselves and not by an automated technology and it is therefore important
to monitor e-mail patterns and policy compliance. Useful reports include high impact users
(for example, users sending e-mails with large attachments) and the most common policy
deviations (for example multimedia attachments indicating non-business content).
The acceptable e-mail usage policy is an issue that all organizations must address. Its
realization includes organizational changes and implementation of appropriate technology.
Server side anti-spam features were introduced to Domino 6 due to large costs of managing
e-mail. They provide fine configuration granularity of the Domino SMTP server and e-mail
filtering options. These features alone do not constitute adequate protection from computer
viruses or provide satisfactory content security.
Specialized third-party products from vendors of antivirus and security software provide
pattern based antivirus protection, feature rich content security and spam protection.
At the time this redbook was written, there were two products available for antivirus protection
and content security for Domino on OS/400:
Symantec AntiVirus/Filtering for Domino 3.0 for OS/400 (details can be found in 9.3,
“Symantec AntiVirus/Filtering for Domino 3.0 for OS/400” on page 415).
Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 (details can be found in 9.4, “Trend
Micro ScanMail for Lotus Notes 2.6 for OS/400” on page 422).
Implementation of one of these products with proper configuration of the Domino anti-spam
features delivers adequate antivirus protection and e-mail content security for the Domino
server. It is important to note that protection of Domino server alone does not protect your
organization, you must also provide protection on all elements of your computing environment
(such as your user’s workstations).
From the perspective of e-mail content security, the first two sets of features are most useful.
However, it is important to note that you must also implement server relay controls in your
organization. This prevents the unauthorized usage of server resources and network
bandwidth for distribution of spam messages to other users on the Internet.
All of these SMTP connection controls prevent e-mail messages from being accepted on the
Domino server. Because unauthorized messages never enter your environment, this saves
network bandwidth and server resources.
For more information on the SMTP connection controls and configuration of the features see
Chapter 4, “Domino 6 Server anti-spam features” of the redbook Lotus Domino 6 spam
Survival Guide for IBM Eserver, SG24-6930.
Tip: One of the most powerful uses of server mail rules is the filtering of messages
containing a large number of recipients or attachments. Often this kind of messages is
questionable for the organization due to the impact on server resources and network
bandwidth. These messages can be moved to a database or held pending in MAIL.BOX for
further analysis.
The conditions define filters for which e-mail messages will be processed by the Domino
server mail rules. There are three parts to a condition:
1. The message item to examine. This is the particular field you want to specify (for example,
From, Subject, Body, and so on).
2. A logical operator or qualifier. Currently the following comparisons are supported:
– Contains <text> and does not contain <text>
– Is and is not
– Is less than <number> and is greater than <number>
3. The value to check for. This identifies the content to search for in the message item or the
comparison number.
You can have multiple conditions connected with Boolean operators (AND and OR) to form a
logical expression.
The following actions are available when a message matches the conditions:
Journal this message: This action copies the message to a journalling database and
then delivers the message.
Move to database: This action moves the message to a specified database (for example
quarantine).
Don't accept message: The message is not accepted by the Domino server and the
originator receives a rule violation report (for SMTP messages this depends on the
sending server).
Don't deliver message: The message is accepted in MAIL.BOX and silently deleted or a
non-delivery report is returned to the sender.
Change routing state: The routing state of the message is changed to “held” and the
administrator can manually deal with the messages.
Server mail rules are configured and enabled in the Server configuration document for each
Domino server. In Domino 6, up to 100 server mail rules can be specified. Active server mail
rules are registered as monitors for all MAIL.BOX files used on the server. For more
information on Domino server mail rules and a sample configuration see “Mail file
management” on page 57.
Symantec AntiVirus/Filtering for Domino secures your Lotus Domino environment against
virus attacks and unwanted content by protecting databases on Lotus Domino servers and
monitoring e-mail that is routed through the servers. Symantec AntiVirus/Filtering for Domino
operations are transparent to the users.
This section gives you an introduction into the functions and handling of the product. If you
need more information, please contact Symantec or refer to the Symantec product
documentation, for example the Symantec AntiVirus™/Filtering for Domino™ for OS/400
Implementation Guide.
Symantec AntiVirus/Filtering for Domino runs as a Domino server task. Every time that you
start the server, Symantec AntiVirus/Filtering for Domino protection begins. When viruses or
content violations are detected, you can have Symantec AntiVirus/Filtering for Domino send
e-mail notifications to specified administrators, document or e-mail authors, and to the
intended e-mail recipients.
Virus definition updates are retrieved from Symantec at predetermined times or regular
intervals, or can be downloaded from an internal, centralized server. Symantec also provides
regular updates to the antivirus scanning and repair engine. The engine updates are
automatically applied as new virus definitions are downloaded — without stopping the
real-time scanning or re-starting servers.
You can set up as many content filters (rules) as needed. Each rule specifies the e-mail
category to search (subject line, sender, or attachment size, for example), and defines the
condition that will trigger a content violation.
For example, you could set up a rule to filter e-mail with attachments that exceed 3 MB in size.
Symantec AntiVirus/Filtering for Domino would then catch any e-mail messages with
attachments that exceed 3 MB and, like other scans, would process the e-mail according to
your configuration settings. You can enable or disable content filtering at any time.
9.3.2 Prerequisites
The software requirements for Symantec AntiVirus/Filtering 3.0 for Domino on iSeries differ
for Domino R5.x and Domino 6. Table 9-1 lists these prerequisites.
Table 9-1 Software requirements for Symantec AntiVirus/Filtering 3.0 for Domino on iSeries
Domino R5.x Domino6
AS/400 Developer Kit for Java, 5769-JV1 AS/400 Developer Kit for Java, 5769-JV1
OS/400 QShell Interpreter (OS/400 Option 30) OS/400 QShell Interpreter (OS/400 Option 30)
Choose one of the following methods to install Symantec AntiVirus/Filtering for Domino:
Install from a CD (recommended)
Install from a save file
All scanning is configured and initiated from the Settings database (SAV.NSF). All reports and
virus dispositions are handled through the Log database (sAVLOG.NSF). Information about
the product and how to use it is provided in the Help database (sAVHELP.NSF). In addition, if
you plan to replicate updated virus definitions, you must create a Definitions database
(SAVDEFS.NSF) in which the updated virus definitions are stored.
In addition, you can view and manage some Symantec AntiVirus/Filtering for Domino
operations directly from the Domino server console window.
Configuring scans
Symantec AntiVirus/Filtering for Domino lets you set up scans to run immediately or on a
schedule, or to monitor in real time. You can choose from the following three types of scans,
depending on the type of protection that the server requires:
Real Time: Real Time scanning monitors database writes and e-mail as it is routed
through the server in real time. Real Time scanning is your best insurance to detect and
eliminate viruses before they can spread.
Scan Now: Scan Now scans are on-demand scans that you can invoke at any time. You
can include all databases in your default Data directory or select specific databases or
directories to scan. The scan begins when you click Start the Scan. You can also restrict
the scan to documents that have been modified before a specified date.
Scheduled Scans: Scheduled Scans run automatically and without administrator
intervention. Use Scheduled Scans to make sure that your databases remain virus-free.
You can also restrict the scan to documents that have been modified since the start time
of the last Scheduled Scan.
After creating a rule, you can enable or disable it. You can also enable or disable specific
Content Filtering Rules in the listing of rules. So when you are ready to process a rule, make
sure that it is enabled individually. Then enable Rules processing.
The Content Filtering Options apply to all content filtering scanning. They include processing
and content filtering violation notifications.
Symantec AntiVirus/Filtering for Domino handles e-mail with content violations according to
the action that you configure for the rule. You can choose one of the following actions (one
action per rule):
Log only: Logs the content violation in the Symantec AntiVirus/Filtering for Domino Log
database, but does nothing else.
Delete the offending attachments: Deletes only the attachment or attachments that
have violated (or matched) the rule. The condition or conditions of the rule itself must
specify the attachment name, size, extension, and so forth, or this action won't work.
Server messages and incidents are reported with the following severities:
Information (blue): No violation occurred with the event.
Warning (green): A violation occurred with the event, but was removed.
Critical (red): A violation occurred with the event, and remains.
To prevent the Log database from becoming too large, a purge agent runs every night at
1:00 AM when enabled. By default, virus incidents are purged after 365 days. Other Log
entries are purged after 30 days.
To prevent the Quarantine database from becoming too large, a purge agent runs every night
at 1:00 AM when enabled. By default, Symantec AntiVirus/Filtering for Domino purges entries
after 30 days. However, you can routinely purge quarantined documents from the Quarantine
and Backup document views.
You can take actions on an infected document, attachment, or content violation in any of the
following ways:
Save Attachments: Saves a copy of the attachment or attachments to a location that you
choose. Saving quarantined attachments provides the same safety measure as placing
them in the Backup Documents view.
Add Attachment: Adds the file that you select to the quarantined document. Before
releasing a document from the Quarantine, you can add a newly repaired compressed file,
replace an infected file with a known good copy, or add a procedural file with instructions
to scan a workstation.
Delete Attachments: Removes the attachments and prompts you before deleting each
one. When you delete attachments, the quarantined item remains in the Quarantine view
without the attachments.
Release: Releases the document from the Quarantine and restores it to its original
database. The quarantined item remains in the Quarantine until Symantec
AntiVirus/Filtering for Domino purges it or you delete it.
Backup documents
As a data safety precaution, administrators can configure Symantec AntiVirus/Filtering for
Domino to store a backup copy of any document that contains content violations or infected
attachments. That way a copy is available if anything happens to the original.
9.3.8 LiveUpdate
Symantec AntiVirus/Filtering for Domino relies on up-to-date information to detect and
eliminate viruses. One of the most common reasons you may have a virus problem is that you
have not updated your protection files since you installed the product. Symantec regularly
supplies updated virus definitions files, which contain information about all newly discovered
viruses.
If you do not want to permit direct access to the Internet from your Domino servers or you are
running proxy servers, you can set up an internal LiveUpdate server with LiveUpdate
Administrator and configure Symantec AntiVirus/Filtering for Domino to access the internal
LiveUpdate server instead.
9.4 Trend Micro ScanMail for Lotus Notes 2.6 for OS/400
Trend Micro is a global provider of comprehensive antivirus and Internet content security. Its
products and services deliver a framework for coordinated enterprise protection throughout
the virus outbreak life cycle. Trend Micro specializes in high-performance virus protection and
content security products and services, with advanced centralized management capabilities
that are scalable for any enterprise or desktop. Trend Micro's product and services categories
are designed to address all major areas of the enterprise including:
Desktop and client: Virus protection for the enterprise, end-user or home user.
e-mail and groupware: Virus protection for Lotus Notes or Microsoft Exchange.
Internet gateway: Stops viruses and spam at the SMTP, HTTP, and FTP server gateway.
File server and storage: Virus protection for multiple servers and domains.
Management: Centralized management of the antivirus strategy across the enterprise.
ScanMail for Lotus Notes offers comprehensive virus protection and content security for the
Lotus Domino environment. It scans viruses hidden in databases and e-mail attachments,
and it also protects collaboration tools such as Lotus Instant Messaging and Lotus Web
Conferencing (Sametime) and Lotus Team Workplace (QuickPlace). ScanMail is designed to
operate as a native Domino server application and thus provides administrators with a
familiar, intuitive interface. In addition to OS/400, it supports AIX, S/390®, Microsoft
Windows 2000, Sun Solaris, Red Hat and SuSE Linux.
ScanMail for Lotus Notes detects and removes viruses before infections can spread to the
desktop. It scans and cleans attachments and document content on all entry points, including:
e-mail attachments in real-time at the router.
Databases and modified data during replication.
Administrators can specify which databases are to be scanned, and users are prevented from
overwriting a clean document with an infected version. On-demand database scanning
cleans existing infections.
ScanMail helps administrators enforce company e-mail policies, increase overall server
efficiency and minimize virus outbreaks by blocking certain file types and e-mail.
Administrators can create rules to block, delay, and prioritize e-mail. A corporate policy can
be implemented to deal with virus incidents in several ways: alert the administrator, isolate
the infected file for later cleaning or other action, or delete the infected file.
The Trend Micro scanning engine uses both, rule-based and pattern recognition technologies
and includes MacroTrap technology, which detects and removes macro viruses. Frequent
virus pattern updates are accomplished through a Web-based download. This update
mechanism is used also for the scan engine download and update. The automatic update of
the pattern file and scan engine does not require to shutdown ScanMail.
The configuration interface for ScanMail is fully integrated with the Domino server and
supports remote management from any Lotus Notes workstation, Web browser, or Domino
R6 Administration Client.
ScanMail maintains a comprehensive activity log, detailing for each infected file, the origin,
name and destination of the file, date the file was received, identity of any virus found, and the
action taken. Java-based charts help administrators identify virus infections throughout the
enterprise environment. Reports from different servers can be consolidated through Notes
database replication.
By using a multi-threaded scan engine and memory scanning, ScanMail is able to maximize
efficiency and minimize impact on Lotus Notes servers. Administrators can also identify
servers that don’t require scanning, eliminating redundant scanning.
A trial version of Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 can be obtained from
the Trend Micro Web site:
http://www.trendmicro.com/en/products/email/smln/evaluate/trial.htm
This trial version is the full functional product and can be used for 30 days from the date of
installation. The only limitation of the trial version is that no automatic updates of the pattern
file and scan engine are possible. If you wish to continue using the product after the 30 days,
you can upgrade the trial version to the full version without reinstallation.
The basic installation and configuration steps when evaluating the product in your
environment are:
Installation of Trend Micro ScanMail for Lotus Notes 2.6 for OS/400
Basic Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 configuration
Scanning configuration
You can use the information in this chapter for the basic setup of the product in your
environment, for example when evaluating the product.
Detailed documentation for Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 is available
on the Trend Micro Web site:
http://www.trendmicro.com/download/product.asp?productid=10&show=doc
9.4.1 Installing Trend Micro ScanMail for Lotus Notes 2.6 for OS/400
This section describes the installation of Trend Micro ScanMail for Lotus Notes 2.6 for
OS/400 on your system and then adding ScanMail to the Domino server(s).
The licensed program identifier for Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 is
1TSMN99.
Note: Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 also supports the
multiversioning capable Domino releases 6.0.3 and 6.5.
Installing Trend Micro ScanMail for Lotus Notes 2.6 for OS/400
This section provides information only for the installation of Trend Micro ScanMail for Lotus
Notes 2.6 for OS/400 product but no information for the Trend Micro Control Manager Agent.
You can find more information about that product and installation instructions in the Trend
Micro documentation.
Installation of Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 is performed in two steps:
Installing Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 on the iSeries
Adding ScanMail to the Domino server
Installation and configuration of Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 must
be performed with the QSECOFR user ID or using a user ID with comparable security
authorization.
To install Trend Micro ScanMail for Lotus Notes 2.6 for OS/400, you first have to transfer the
save file to the target iSeries system. You can use FTP for this file transfer:
1. On the iSeries, create a save file called SMLN in library QGPL (or any other library) by
entering the following command:
CRTSAVF FILE(QGPL/SMLN)
2. Transfer the ScanMail installation file (smln.savf) from your PC to the QGPL library using
FTP in binary mode. Figure 9-1 shows the Windows Command Prompt FTP to transfer the
save file to the iSeries (the commands you need to enter are highlighted).
C:\smlninst>ftp
ftp> open as25
Connected to as25.
220-QTCP at RCHASM25.
220 Connection will close if idle more than 5 minutes.
User (as25:(none)): QSECOFR
331 Enter password.
Password:
230 QSECOFR logged on.
ftp> binary
200 Representation type is binary IMAGE.
ftp> put smln.savf qgpl/smln (replace
200 PORT subcommand request successful.
150 Sending file to member SMLN in file SMLN in library QGPL.
250 File transfer completed successfully.
ftp: 319297440 bytes sent in 62.01Seconds 5149.21Kbytes/sec.
ftp>
Figure 9-1 Sample FTP commands to transfer ScanMail installation file to the iSeries
3. Use the Restore Licensed Program (RSTLICPGM) command to install Trend Micro
ScanMail for Lotus Notes 2.6 for OS/400 after the FTP transfer has finished:
RSTLICPGM LICPGM(1TSMN99) DEV(*SAVF) SAVF(QGPL/SMLN)
4. To check if the installation of ScanMail was successful, use the Display Software
Resources (DSPSFWRSC) command. The OS/400 licensed product resource ID to look
for is 1TSMN99.
Important: If you do not press F4 but start the CFGSM command directly by pressing
Enter, Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 will be configured using the
default parameters and in trial mode for all Domino partitions on your system.
4. You must enter the following information about the Trend Micro ScanMail for Lotus Notes
2.6 for OS/400 environment in the configuration screen (see Figure 9-2):
– Server name is the name of the Domino server for which you are configuring ScanMail.
You must use the common name of your Domino server, for example DOMAV. You
can enter only one server name.
If you want to configure Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 for all
Domino partitions on your system, you can use the value *ALL for the Server name
parameter.
– Temporary directory specifies the location of the temporary directory or directories for
ScanMail tasks. These directories are used to detach files from e-mail messages and
Notes documents for on-disk scanning. The default location for the ScanMail
temporary directory is the SMLN\SMTEMP subdirectory in the Domino server’s data
directory. For more information on the temporary directories refer to “ScanMail
temporary directories” on page 428.
– ScanMail serial number specifies the license key for the product which enables the full
version.
– User profile specifies the user ID under which the Lotus Domino server runs, usually
QNOTES.
Bottom
F3=Exit F4=Prompt F5=Refresh F12=Cancel F13=How to use this display
F24=More keys
5. The output shown in Figure 9-3 is displayed when running the CFGSM command. It
informs you about the progress of the configuration. Once the configuration program
completed the setup, you receive the message “Press Enter to continue”.
This completes the configuration of ScanMail on the Domino server.
===>
9.4.2 Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 components
As mentioned earlier, the procedure of adding ScanMail to the Domino server
installs/updates several components, such as adding program files to the Domino library,
creating temporary directories for ScanMail operations, creating ScanMail Domino
databases, and adding NOTES.INI variables. This section describes these ScanMail
components in detail.
dbscan.pgm For manual database scanning. Scans the databases you specify on demand.
pupdate.pgm This update program downloads new pattern files and scan engines from the
Trend Micro Web site.
pscan.pgm Scheduled database scanning. Runs according to your configuration. You can
select the time the scan runs and which databases are scanned.
tmmscan.pgm Real-time e-mail scanning. Scans every e-mail message sent to the
MAIL.BOX database(s).
By default, the temporary directories location is in the SMLN\SMTEMP subdirectory under the
Domino data directory. For example:
\lotus\data\domav\smln\smtemp\...
All temporary directories and the processes that are using them are listed in Table 9-3.
Important: Every Domino server needs its own temporary directories, they cannot be
shared.
You can use the Domino Administrator Manage ACL tool to change the ACL of the ScanMail
databases:
1. From the Domino Administrator Server pane, select the server that stores the databases.
2. Click the Files tab and select the ScanMail databases from the Domino data directory (the
databases are listed in Table 9-4 on page 429).
3. Click Tools -> Database -> Manage ACL.
4. Define access to the ScanMail databases as needed for your environment. An example of
an ACL that suits most environments is shown in Table 9-5.
-Default- No Access
Anonymous No Access
Optionally you can set visibility and SSL options for all ScanMail databases in the ScanMail
configuration. Visibility allows to hide or display ScanMail databases in the Open Database
dialog box of the Lotus Notes client. The SSL option specifies whether SSL is required for
Web access to this database. For more information see the Trend Micro ScanMail for Lotus
Notes 2.6 for OS/400 documentation.
In order to use a Web client to access the SMCONF.NSF database, the HTTP task must be
started on the Domino server. Access the database by specifying the following URL:
http://yourdominoservername/smconf.nsf
In addition to a Notes or Web client, you can also use the Trend Micro Control Manager to
configure and manage ScanMail.
Tip: When using the evaluation version of Trend Micro ScanMail for Lotus Notes 2.6 for
OS/400, you can manually update the pattern file. To do so, first download the pattern file
from the Trend Micro Web site to your PC. The pattern file name for the iSeries does not
include a "$" sign in the name, so you have to rename the file from lpt$vpn.xxx to
lptvpn.xxx (xxx is the pattern file version). Then FTP this file to the Domino data directory
on the iSeries and change the owner of the file to QNOTES. The ScanMail tasks will
automatically load the new pattern file.
To enable the automatic download of pattern files and scan engines for a licensed version of
Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 you have to register the product first.
To register the product you have to enter your product’s serial number(s) in the Registration
form in the ScanMail configuration database (SMCONF.NSF). You can access this form by
clicking the Registration option in the navigation bar (see Figure 9-4 on page 431). A sample
registration form is provided in Figure 9-5.
Figure 9-5 The Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 registration form
The options for the pupdate task are specified in the Update Setting form. You can access this
form by selecting Update -> Update Setting from the SMCONF.NSF navigation bar.
Here you can specify what will be downloaded and the source for the updates. The default
settings are appropriate for most configurations. An example of the configuration document is
shown in Figure 9-6.
Important: If you are accessing the Internet through a proxy server, you must configure
this in the Proxy Server Settings section of the Update Setting configuration document.
As mentioned before, updates of the virus pattern file and the scan engine are performed by
running the pupdate Domino server task. You can schedule regular updates using a Server
Program document. See Figure 9-7 for an example. For additional information on Server
Program documents, please refer to the Lotus Domino 6 Administrator Help.
To check which version of the virus pattern file and the scan engine are running on the server,
do the following steps:
1. In the ScanMail main menu, click General Administration followed by Program Status.
2. Click the arrow next to the Domino server name or double-click the server name. The
program version, the scan engine version, and the virus pattern version are displayed.
For more information on this topic see the Trend Micro ScanMail for Lotus Notes 2.6 for
OS/400 documentation.
For performance considerations and configuration best practices see 9.4.5, “Best practices
for using ScanMail in your environment” on page 440. You can find detailed instructions and
best practices for ScanMail monitoring and logging in “Monitoring your ScanMail
environment” on page 447.
ScanMail tasks
ScanMail tasks are started in the same way as other Domino server tasks. You can use the
load Domino server command to manually load a task. For example, to load the manual
database scanning task, you enter:
load dbscan
You can stop ScanMail tasks by specifying the quit parameter, for example:
tell dbscan quit
To automatically load ScanMail tasks when the Domino server starts, you have to add the
tasks to the ServerTasks variable in NOTES.INI. The tmmscan and repscan ScanMail tasks
are automatically added to the ServerTasks variable by the ScanMail configuration program
(CFGSM). ScanMail checks the number of MAIL.BOX files on the Domino server and adds
(# of MAIL.BOX files + 1) tmmscan tasks to NOTES.INI, up to a maximum of four tmmscans.
You do not have to restart any ScanMail tasks when changing options in the ScanMail
configuration documents. Configuration update is performed automatically.
Real-time e-mail scanning is configured in the ScanMail for Lotus Notes (SMCONF.NSF)
database. The configuration document is accessed by clicking Scan Options -> Mail Scan in
the navigation tree.
For a complete description of all scanning options refer to the ScanMail documentation. You
can see the configuration for our test environment in Figure 9-8.
The example configuration for the virus incidents handling options in our environment is
shown in Figure 9-9.
In the Virus notification section you define the notification options and the text of the
messages informing administrators and users about the virus incident. You can configure
different messages for internal and external users.
For real-time e-mail scanning you are able to configure automatic notification of the following
users if a virus is detected in an e-mail message:
Administrators can receive information about all incidents or only about uncleanable files.
The sender can receive information that his e-mail contained a virus.
For more thorough information on virus incident notification see “Virus incident notification” on
page 442.
Logging options
The virus logging options are not selected by default. However, there are two options for
saving information in the Quarantine databases:
Save a copy of infected documents in Quarantine database.
When this option is selected, copies of infected documents are saved in the
SMQUAR.NSF database. If you do not select this option, infected attachments and
documents are deleted.
This completes the basic configuration of Trend Micro ScanMail for Lotus Notes 2.6 for
OS/400. For more information see the product documentation available on the Trend Micro
Web site at:
http://www.trendmicro.com/download/product.asp?productid=10&show=doc
Performance considerations and recommendations for real-time mail scanning can be found
in 9.4.5, “Best practices for using ScanMail in your environment” on page 440.
The European Institute for Computer Antivirus Research (EICAR) developed a test script that
can be used to test antivirus software. This script is an inert text file whose binary pattern is
included in the virus pattern file from most antivirus vendors. This script is not a virus and
does not contain any program code.
You can download the EICAR virus file either from the EICAR Web site or from the Trend
Micro Web site. Before you download the EICAR file, you must disable any antivirus software
running on your network or computer. Otherwise, the antivirus software will detect the EICAR
test file as a virus and prevent the download.
To download the EICAR virus file, visit one of the following URLs:
http://www.trendmicro.com/vinfo/testfiles/
http://www.eicar.org/anti_virus_test_file.htm
It is therefore very important to schedule regular updates to keep up with new threats. Trend
Micro allows for Internet download over HTTP, distribution through replication or distribution
using the Trend Micro Control Manager.
We recommend scheduling hourly updates of the pattern file and the scan engine.
Networking overhead for this operation is minimal and does not impact the Domino server or
the ScanMail operations.
For more information on configuring automatic updates to the ScanMail pattern file and scan
engine see “Automatic updates and registration” on page 431.
Trend Micro recommends that you change the order of tasks in NOTES.INI to launch
real-time e-mail (tmmscan) and real-time database (repscan) scanning before the Router task
or the Extension Manager is launched. This helps avoiding server operations (mail routing,
replication) without antivirus protection.
We also recommend that ScanMail performs a scan of all MAIL.BOX files before the router
and other ScanMail tasks are started. This setting allows to scan e-mail messages that were
left in MAIL.BOX files after a Domino server crash or abnormal shutdown. This is done using
the manual scanning program (dbscan).
Use the show server command to determine the number of MAIL.BOX files configured on
your Domino server. Number of Mailboxes: displays how many mailboxes have been
configured on your system. The naming conventions for Domino mailboxes are as follows: If
you have only one mailbox configured, then this file is named MAIL.BOX. If you have more
than one mailbox, then the files are named MAILx.BOX, for example MAIL1.BOX and
MAIL2.BOX.
Attention: You must enable and configure Manual scan in your ScanMail configuration for
dbscan to work.
To sum this up: When the Domino server is started, you first scan your MAIL.BOX files then
start the other ScanMail tasks. The following is an example of how the ServerTasks line in
NOTES.INI looks if you are following our recommendations:
ServerTasks=DBScan MAIL1.BOX MAIL2.BOX MAIL3.BOX,TmmScan,TmmScan,RepScan,Update,Replica,
Router,AMgr,AdminP,CalConn,Sched,HTTP,IMAP,LDAP,POP3
In our example, ScanMail will first scan the three MAIL.BOX files (MAIL1.BOX, MAIL2.BOX,
MAIL3.BOX). Then the ScanMail tasks tmmscan and repscan are launched before any other
Domino server tasks are loaded.
Key decision factors for selecting an appropriate ScanMail protection strategy are:
What is the overall corporate IT security strategy?
What are the available resources (processor, memory) on the Domino servers?
Where and how can malicious code enter the Domino environment (for example, e-mail
messages, attached file to a document in Domino databases, script bombs)?
Some recommended strategies for optimal antivirus protection for a Domino environment are:
Real-time e-mail scanning for all messages and attachments.
Implementation of filter rules for unauthorized attachment types and extensions (for a
recommended list see “Attachment blocking” on page 444).
Real-time database scanning for all databases, excluding user mail files, Domino system
databases and other databases that do not change often.
Scheduled hourly updates for the virus pattern file and scan engine (refer to “Scheduling
regular updates of the pattern file and scan engine” on page 441).
Scheduled weekly scan of all Domino databases.
Determine the appropriate number of tmmscan and repscan tasks on your system (for
more information see “Optimal number of scan tasks” on page 446).
This strategy provides very good antivirus protection, while also minimizing the system
resource usage.
The notification message contains details about the infection, such as the name of the
infected database, the name of the virus, and the action taken. This information is also
archived in the ScanMail log files.
Notification messages for real-time e-mail scanning can use either plain text messages, or
you can use rich text format to customize the background, graphics, and text style of
messages. Notification messages for database scanning can only consist of plain text
messages.
Because Lotus Domino uses the server name as the default name for program notification
messages, the server name is used as the return address for ScanMail notification
messages. You might want to change this default setting so that users can reply to ScanMail
notification messages. To select an administrator’s mail account as the default return address,
click the down arrow and select the appropriate user.
It is very important to design an appropriate notification policy for your organization as part of
your antivirus protection strategy. When designing the notification policy you have to consider:
Whether you want to send information to end users or only to administrators and IT
support staff.
Whether you want to send incident information to senders of infected mails outside of your
organization.
Will you send incident information also to the intended recipients of the infected e-mail
message that was stopped on the Domino server?
What information and instructions will you provide to the recipients of the notification
message?
What are the help desk procedures for dealing with users that have received a
notification?
To avoid this problem, ScanMail provides the SMStopMail variable that can be set in
NOTES.INI:
SMStopMail = 0
This setting means that the Domino server continues delivering e-mail without scanning.
SMStopMail = 1
This setting configures the Extension Manager to hold e-mail messages in the mailboxes
(MAILx.BOX) and the Domino server does not deliver mails to the recipients. The mails
are held until the real-time scanning task is restarted.
We recommend that you set the SMStopMail variable to 1 to prevent unscanned messages
being delivered to the users.
Attachment blocking
Most computer viruses and worms are spread using system files that are normally not sent by
e-mail. You can drastically reduce the possibility of virus spreading through your e-mail
system by blocking files with specific attachments.
We recommend that you block the following attachments on your ScanMail server:
.386 Windows Enhanced Mode Driver or Swap File
.ACM Audio Compression Manager Driver (Windows) and Windows System File
.ASP Active Server Page
.AVB Innoculan Anti-Virus Virus Infected File
.BAT Batch Processing
.BIN Binary File
.CLA Java Class File (usually .CLASS but can be shortened)
.CLASS Java Class File
.CMD OS/2®, WinNT Command File, DOS CP/M Command File, dBase II Program File
.CNV MS Word Data Conversion File
.COM Executable File
.CS* Corel Script
.DLL Dynamic Link Library
.DRV Device Driver
.EXE Executable File
.GMS Corel Global Macro Storage
.HLP Windows Help File
.HTA Hypertext Application (run apps from HTML doc)
.HTM,.HTML Hypertext Markup Language (HTML)
.HTT Hypertext Template
.INF Information or Setup File
.INI Initialization file (many)
.JS*, JS, JSE JavaScript Source Code
.LNK Linker File, Windows Shortcut File
.MHT* MS MHTML Document (Archived Web Page)
.MPD Mini Port Driver
.OCX Object Linking and Embedding (OLE) Control Extension
.OV* Program Overlay File (.OVL)
.PIF Windows Program Information File
.SCR Screen Saver Script
.SHS Shell Scrap Object File
.SYS System Device Driver
.TLB Remote Automation Truelib Files
.TSP Windows Telephony Service Provider
.VBS Visual Basic Script
.VBE Visual Basic Script Encrypted
.VXD Virtual Device Driver
.WBT WinBatch Script
.WIZ Wizard File
.WSH Windows Script Host Settings File
You can configure file blocking and true type file blocking in the eManager/Filter rules section
of the ScanMail configuration.
Performance optimization
Performance best practices for Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 include:
Memory-based scanning
Optimal number of scan tasks
Impact of real-time database scanning
Incremental scanning
Selecting which files to scan
Trusted servers
Memory-based scanning
Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 provides the option to perform a
memory-based scanning of attachments. This delivers vast performance improvements over
standard on-disk scanning and is the recommended option for all ScanMail installations.
The amount of memory used for memory-based scanning is configured separately for each
scanning type (Mail Scan, Real-time Scan, Manual Scan and Scheduled Scan). The memory
is individually allocated to each ScanMail task and is not shared between tasks. Even if you
run multiple instances of the same scanning task, each instance uses its own block of
memory.
Use the following guidelines as a starting point to determine the appropriate memory for
memory-based scanning:
Dedicate the amount of memory that is adequate for most e-mail messages and document
attachments in your environment. If you find that 90% of attachments in your organization
are below 2 MB, you can allocate only 2 MB to each memory-based scanning task.
Do not use the average message size for this sizing as you will not get optimal results.
If your organization is limiting the maximum attachment size, you can use this value.
Compressed files must be decompressed before scanning. You must dedicate an
appropriate amount of memory for the decompressed files, not the compressed
attachments.
Consider the total amount of memory that will be used by all ScanMail tasks on the
Domino server.
For example if you are running 3 tmmscan tasks with 5 MB dedicated memory and 2
repscan tasks with 10 MB dedicated memory, ScanMail is using 35 MB of memory. At the
time of scheduled scans (pscan) you must also add this memory to the total amount.
Check the size and utilization of memory on the Domino server (for more information on
how to determine memory utilization see “Domino memory management” on page 230). In
memory starved environments, the negative impact of dedicating memory for ScanMail
will be far greater than the performance improvement of memory-based scanning.
For most organizations the default value of 5 MB for each ScanMail task is suitable.
To enable memory-based scanning, enter the amount of memory (in megabytes) that you
wish to dedicate to each scanning task in the Scan Memory field of the respective ScanMail
As mentioned earlier, ScanMail automatically adds one more tmmscan task than there are
MAIL.BOX databases on the server. The extra real-time e-mail scanning task ensures that
the delivery of e-mail is not delayed by large attachments. In addition, you should observe the
amount of messages waiting to be processed. If there is a constant backlog of messages in
the MAIL.BOX files, you should increase the number of tmmscan tasks.
You can also increase the number of repscan tasks for Domino servers with a high number of
attachment updates in databases if you have memory and processor resources available.
Before you load multiple instances of a scanning task, you must ensure that the server has
enough memory and processing power to run the additional tasks. To load additional tasks,
simply add the task to the NOTES.INI file or load it from the Domino console. For example, to
load two real-time e-mail scans (tmmscan), change the ServerTasks line in NOTES.INI as
follows:
ServerTasks=dbscan MAIL.BOX,TmmScan,TmmScan,TmmScan,RepScan,Update,Replica,Router,AMgr,
AdminP,CalConn,Sched,HTTP,IMAP,LDAP,POP3
For example, user databases are probably more vulnerable to virus infections than Domino
program databases. Documents and attachments in user mail files are protected by real-time
e-mail scanning and do not need to be rescanned. To protect databases that are not modified
frequently, you should use manual or scheduled database scanning.
You can include or exclude databases from a real-time scan in the Real-time Scan
configuration document under the Databases to scan section. After you change the status of
Databases to Scan (by including or excluding different files), you do not need to restart the
ScanMail tasks.
Incremental scanning
If you select the Incremental Scan option for manual (dbscan) and scheduled (pscan)
scanning operations, ScanMail scans only documents that are new or have been modified
since the last manual or scheduled scan. By limiting the scan to these documents, you can
save server resources and time.
Attention: There is the slight possibility that a virus was not found by scheduled or manual
scans because the virus pattern file used at the time of scanning did not yet include this
virus. By using only incremental scans this document will never be rescanned and the virus
will not be caught.
You can choose one of the following options for each type of scanning:
Scan all files: All attachments or every document is scanned, regardless of the extension.
This option provides the best protection against virus infections, but it also uses the most
system resources. If performance is an issue, you may have to weigh the benefits of
safety against system resource usage.
Scan selected files or exclude selected files: By selecting this option, only the file types
you configured are scanned. The file types are recognized using true type matching
technology. This option provides protection against the sources that you think will most
likely be attacked by viruses. The level of protection depends on the files that you select or
exclude.
Exclude files by extension/name: This option provides less protection than selecting
files using true type technology. However, it is faster than true type exclusion because
ScanMail does not have to open all attachments, just the ones matching the specified
extension.
Scan and clean compressed files: Protects your network from viruses that are hidden in
compressed files. Because compressed files must be expanded before being scanned,
scanning and cleaning compressed files is resource intensive.
Even though most ScanMail installations use the Scan All Files option, which provides the
best protection, you must weigh performance implications against possible threats and select
the appropriate level of scanning for your environment.
Trusted servers
If messages traverse multiple e-mail servers with antivirus protection in your organization, you
can specify which servers are safe and e-mails from them should not be rescanned. This
configuration can save Domino server processor resources.
To define a trusted server, you must first check the Trusted AV Servers option in the Mail Scan
configuration document. You can then enter Domino or SMTP servers to be trusted in the
appropriate fields in the configuration document:
For SMTP Servers, enter the fully qualified domain name (FQDN), for example
mail-fw.itsobp.com. If you trust more than one server that receives e-mail from the
Internet, use a semicolon as the delimiter.
For Domino servers, you can either click the down arrow and select the servers to trust or
you can type the Domino server names in the text box. When you enter the server name
manually, use the fully qualified name, such as DOMAV/AV/ITSOBP.
We recommend that you optimize your antivirus architecture in a way that e-mail messages
are not rescanned at each Domino server on the route.
ScanMail creates reports about virus activity on Domino servers using this log data. Available
graphical (pie chart) reports are:
Top ten viruses detected
Top ten servers with the most infected files
Top ten databases with the most infected files
Top ten users who have the most infected files
The virus log statistics function can be used to create text reports based on querying the virus
logs. A “Virus Top Ten” report is shown in Figure 9-11.
Figure 9-11 Trend Micro ScanMail for Lotus Notes 2.6 for OS/400 - Virus Top Ten
We recommend that you store at least copies of infected and blocked messages and
attachments in the Quarantine database. This provides an easy recovery option in case
ScanMail damaged the attachment or improperly blocked a message.
You can access the log (SMVLOG.NSF) and Quarantine (SMQUAR.NSF) databases from
the ScanMail configuration database or by opening them directly in the Lotus Notes client or
Web browser. All reporting functionality is provided for the Lotus Notes client and Web
browser.
You must regularly (daily) review the ScanMail logs to find possible virus infection sources in
your organization. The logs also provide you with the insight into virus outbreak patterns in
your organization. In addition, you can use the logs to determine which computers are
infected and must be cleaned by the IT support staff.
Due to the potentially large amount of data stored in the log and quarantine databases,
ScanMail provides maintenance options for log and quarantine purging. You can set this
option by selecting Log Maintenance under the Log option or Database Maintenance under
the Quarantine Manager option in the SMCONF.NSF database.
We recommend that you define and configure the retention for logs and quarantined
documents in your organization. The interval for log files retention will probably be much
longer (for example one year) than for the quarantined documents (for example seven days).
Due to the more powerful options, we recommend the use of Trend Micro Control Manager
over the ScanMail features for logging and reporting.
You can adjust this value to record less or more detailed information. The following values are
possible:
SMOutputLevel=1 reports basic information.
SMOutputLevel=2 reports information about ScanMail tasks. This is the default value.
SMOutputLevel=3 reports detailed information about what ScanMail tasks do.
The default value of 2 is appropriate for most installations. A value of 3 is useful for problem
determination and analysis. You should not enable this option for longer periods of time as
much more information is displayed in the console and logged.
To enable debugging, use the -debug parameter after the name of the ScanMail task. Debug
logs are written to the SMLOG directory in the Domino data directory.
It is important for large organizations to use replication formulas to ensure that the whole log
is not replicated to all servers but only kept on one server.
When possible we recommend the use of Trend Micro Control Manager over the ScanMail
features for centralized reporting due to the more powerful options.
The Trend Micro Control Manager console is implemented using a Web browser, currently
only Internet Explorer is supported.
To install the Control Manager 2.5 Agent for Trend Micro ScanMail for Lotus Notes 2.6 for
OS/400, you need the following minimum hardware and software on your Domino server:
OS/400 V4R5M0 or later
128MB RAM minimum (256MB or more recommended)
50MB free disk space for the program files
Trend Micro ScanMail for Lotus Notes 2.6 for OS/400
Control Manager 2.5 Server (Build 1246 + Hotfix 1348)
Trend Micro Control Manager is a very useful tool for organizations with multiple Domino
servers or for organizations using other Trend Micro products in addition to ScanMail. The
main advantages of using Trend Micro Control Manager with Trend Micro ScanMail for Lotus
Notes 2.6 for OS/400 are:
Centralized virus logging
Powerful reporting and analysis options
Faster response to virus outbreaks prevention using Outbreak Prevention Services
Centralized configuration console
Centralized distribution of pattern files and scan engine
The content of this chapter is highly related to the input required by the IBM Eserver
Workload Estimator (also called WLE in this chapter).
Note: For your information, the MCU benchmark characteristics are planned to be
changed in the future for the next generation of iSeries hardware.
2. LPAR:
Understand any OS/400 LPAR (logical partitioning) plans which are being considered for
the Domino environment. It is important to understand that there is overhead associated
with implementing OS/400 logical partitioning. If LPAR is a possibility, be sure and do
Workload Estimator sizing estimates to reflect both an LPARed and a non-LPARed
environment. An example of adding LPAR in the Workload Estimator is provided in step
on page 554.
3. Registered Domino users versus concurrent (active) users:
Typically one of the first questions asked is “what is the total number of registered Domino
users?”. In addition to the number of current and planned future registered users, a more
critical question to ask is “what are the peak user concurrency rates, for both mail and
applications users?” If the performance of existing Domino servers is already being
monitored, then this information may already be known. However, it is recommended that
current Domino statrep (statistics reporting) data, which represents their peak period, be
obtained since it can also provide other useful information (see tip 14 on page 461).
Although, Domino statrep data includes a peak number of (Notes) users statistic, please
remember this statistic is the peak since that Domino server was last started. Also, this
peak number does not indicate the amount or complexity of the users’ work. Please read
the additional information on concurrency which is contained in 11.5.1, “Concurrent users”
on page 472.
4. Mail file sizes:
It is critical to obtain information on Domino users and their mail file sizes. Large mail file
sizes can have a significant impact on CPU utilization on any Domino server platform.
In addition, mail files containing larger numbers of documents will also impact CPU
utilization. For more information on mail file sizes and their impact on CPU, please see the
IBM Redpaper, Sizing Large-Scale Domino Workloads on iSeries, REDP-3802-00, at:
http://publib-b.boulder.ibm.com/Redbooks.nsf/RedpieceAbstracts/redp3802.html
Important: The WLE version available since October 2003 has been enhanced so that the
CPU resource requirements on the suggested systems are influenced by the size of the
mail file entered in the defined mail workload(s). Although WLE increases the CPU
requirements as the mail file size increases, it is still important to utilize user categories.
The rough guidelines shown in Table 10-2 may be used, however, it is important to ensure
that they are appropriate for your Domino environment.
Table 10-2 Rules of thumb: user types according to mail file sizes
Mail file size range User type (Casual/moderate/heavy/3x heavy %)
Note: If Domino servers from different geographies are being consolidated onto an
iSeries, consider that there may be large numbers of users in different time zones. As a
result, consider that the peak periods for the various Domino servers are most likely
occurring at different times. As a result, do not assume that the system would need to
handle the sum total of all of the peak period workloads. In other words, if the users are
in very different time zones, the peak periods of the various Domino servers being
consolidated onto a single system, for example, would typically be offset from each
other.
Characteristic:
Platform
Domino server
names
Location
#CPUs and
MHz per CPU
Total disk/
Used disk
Memory
installed
# of regis-
tered users
Client type
Avg/Peak User
Concurrency
Avg. mail file
size/# of users
# of Apps
Class of
applications
Important: While reading through this chapter, please remember that the Workload
Estimator results are only estimates and highly dependent on the input parameters.
There are various other 3rd party sizing and/or capacity planning products available; several
of these products include BMC Patrol Predict and MPG Performance Navigator. However,
prior to using any of them to estimate the size of a Domino for iSeries system, be sure to
confirm that the tool is not based only on CPW but uses a metric like MCU (Mail and
Calendaring users) for Domino workloads. This is especially critical if you will be upgrading to
an iSeries with POWER4 processors like an i825, i870, or i890. For more details on these
metrics, please refer to the V5R2 Performance Capabilities Reference which is online at:
http://www.ibm.com/servers/eserver/iseries/perfmgmt/resource.htm
Also, if an iSeries has been enabled for PM eServer iSeries, the data can be imported into the
Workload Estimator. More details on PM eServer iSeries is online at:
http://www.ibm.com/servers/eserver/iseries/pm/
There was an enhancement in July, 2003 which now allows PM data from an iSeries LPAR to
be imported into WLE. If doing this, do not forget to consider other LPARs’ workloads on that
iSeries as appropriate. For more details on this capability, please refer to the Workload
Estimator tutorials and help information which are available at the following URL:
http://www.ibm.com/eserver/iseries/support/wle/EstimatorServlet
Also, although WLE does not support the import of PM data from an iSeries Dedicated Server
for Domino (DSD) model, a workload reflecting an existing DSD can be manually entered into
WLE. Additional details on how to create an existing workload definition in WLE can also be
found in the online WLE help and tutorials.
As new versions of mail clients, Domino releases, OS/400 releases and iSeries models are
announced, measurements and analysis are done to keep WLE up-to-date with the latest
technology being deployed on the iSeries. Therefore, it is important to continue to use the
latest version of the WLE. Details on the most recent enhancements added to Workload
Estimator can be found in the “What’s New” section of the WLE online help at:
http://www-912.ibm.com/eserver/iseries/support/estimator/html/whatsNew.html
Important: Please note that the Workload Estimator windows shown in this redbook reflect
the WLE version available at the time of writing. Future WLE versions may have different
windows or results. Also, it is recommended to read through Chapter 10, “Sizing tips and
techniques” on page 455 prior to using the Workload Estimator.
Tip: Prior to using the Workload Estimator for the first time, we highly recommend that you
review the online WLE help and any appropriate WLE tutorials. Links to the WLE help and
tutorials appear on all WLE panels. For an example, see Figure 11-1, which shows the
terms and conditions for using the WLE.
Although the WLE is often used to estimate the size of a new iSeries, it can also be used to
estimate an appropriate upgrade for an existing iSeries or AS/400 system. There are two
ways to enter data about an existing system into the Workload Estimator:
1. You can select the Existing workload option on the Workload Selection page and complete
the questions asked about the existing resources of the system.
Important: If you are upgrading an existing system and will be running Domino R5, please
note that the Workload Estimator makes recommendations based on benchmarks run with
Domino 5.0.12. If you run an earlier release of Domino R5, particularly on a POWER4
based iSeries (i825, i870, i890), your CPU utilization could be 10% to 20% higher than if
you were running Domino 5.0.12. There were changes made to Domino 5.0.12 to optimize
performance with the POWER4 based iSeries.
The recommendation or Selected System reported by the Workload Estimator includes the
model, processor, interactive feature, CPW capacity, memory, number of disk arms and
capacity of disk storage (DASD) necessary to support the set of workloads defined by the
user. When providing the sizing recommendation, the Estimator always defaults to the most
recent iSeries models available.
Even though these detailed resource requirements for each WLE recommendation are given,
it is important to remember that just as with every performance estimate (whether a rule of
thumb or a sophisticated model), you always need to treat it as an estimate and not a detailed
capacity planner. This is particularly true with a robust system like the iSeries server that
offers so many different capabilities where each installation will have unique performance
characteristics and demands.
The sizing recommendations that are generated by the Workload Estimator began with
benchmark measurements and performance tests based on well-defined repeatable
workloads. For Domino, most of the measurements that were performed were the
NotesBench consortium benchmark tests. Through the experience of running these
measurements with large numbers of users, as well as feedback from internal and external
customers and business partners, certain performance projections for each resource have
been developed. These are used in the calculation for a recommended system.
Tip: Since the WLE provides estimates, consider running it several times with key input
parameters being 10% plus or minus the original set of parameters. These alternate WLE
sizing estimates allow you to see what the impact would be if the original parameters were
off by 10%. Also, depending on the level of confidence in the original input parameters, you
may want to use 20% instead of 10%.
The Workload Estimator is continually being updated to implement the latest iterations of
workloads as well as to reflect new hardware and/or software versions and releases. New
function is being added on a regular basis to keep the information and projections current.
Periodically review the Workload Estimator Web site to view the latest additions and
enhancements:
http://www.ibm.com/eserver/iseries/support/supporthome.nsf/document/16533356
11.3 Benchmarking
The factors needed to determine an applications’ overall impact on system resources include
the number of active or concurrent users, the type of work being performed, the frequency by
which transactions are performed by the users, and the complexity of applications being
deployed.
Although there are other factors to consider which affect the total impact on the system
(communication lines, I/O processors, bus speeds), the parameters mentioned in the previous
paragraph are the critical factors for the Workload Estimator. A series of questions are asked
in WLE to establish a base set of factors which are then used to determine the estimated
resources required to support the desired workloads for your solution.
Because of the diversity of business applications being deployed today, the best way to
appropriately size a system for a given application is to test the behavior of many system
configurations to see how they perform. However, testing or benchmarking would require
extensive hardware and people resources. Because of this, detailed testing is not typically
performed by customers or IBM Business Partners.
A practical alternative is to select a workload that defines the type and frequency of the
transactions performed by users and use this workload to estimate the load on a system.
After the workload is defined, you can then extrapolate the results to a real user environment
without having to run the test on many different system configurations.
This is only meaningful in conjunction with the well-defined workload for the benchmark. In
most cases, the benchmark result does not correlate to the exact type of “real” users working
in your organization. An example of this is the NotesBench workload which is an industry
recognized benchmark used to measure the impact of mail users on a Domino server.
The NotesBench consortium was established to define standard workloads for measuring
Lotus Domino and Notes Benchmarks on different platforms. One specific benchmark that is
of interest when using the Workload Estimator, especially for sizing a messaging workloads,
is the R5Mail workload. The R5Mail script is as follows:
Events occurring every 15 minutes
– Read five documents
– Update two documents
– Delete two documents
– Scroll a view once
– Open and close one database
– Open and close one view
– Send one memo to three recipients
– Do three lookups on the Domino Directory
Events occurring every 90 minutes
– Schedule one appointment
– Send one invitation
For example, if an iSeries Model 840-2461 was tested with 100,500 concurrent NotesBench
users, then that same system should be able to support 50,250 typical mail users. However, it
is important to remember that a benchmark is only that — and that your Domino users and
environment could be drastically different.
Important: Although the typical user is closer to an average “real” user than a NotesBench
R5Mail user, the workload generated by real users in your environment can be drastically
different. This is certainly true for mail, but it is especially true when referring to Domino
applications other than mail. For example, the design of a Domino application can greatly
impact its performance and affect on CPU utilization.
In addition, NotesBench has recently added mail benchmarks for Domino 6. You can find the
iSeries audited NotesBench results and other useful NotesBench information online at:
http://www.notesbench.org
Reviewing the published iSeries and AS/400 benchmarks can help give you an idea of the
data behind the Domino workload in the Estimator. These published reports are also a good
reference point to start with when investigating possible migrations from other platforms. It is
possible to compare the NotesBench results published from another platform for a specific
workload with the results of the same workload on the iSeries to understand how to use WLE
to simulate the existing workload from another platform.
11.4.1 Workload
On the Workload Selection page as shown in Figure 11-2, the term workload refers to the
entire set of parameters of the workload types defined within the WLE (for example, Domino,
or WebSphere). It is possible to select more than one workload of the same type. This allows
the user to size more than one Domino application per session. Also, if both mail and
applications, are selected within one workload, then the Estimator understands that
parameters need to be asked for mail as well as for applications, for that single workload.
Sometimes, since each Domino workload that is defined in the Workload Estimator can
contain both a mail profile and an application profile, it is possible to have only one Domino
workload defined. For example, you could either define one Domino workload that details
your messaging or mail solution and another Domino workload that details your end-to-end
business application like a Web shopper. Or you could combine both into a single workload.
Tip: It is normally recommended to define separate WLE workloads for Domino mail and
Domino applications. As a result, the WLE output will include separate utilization estimates
for each workload.
11.4.2 Instance
Some Domino administrators use the term instance or Domino partition to refer to a Domino
server. For example, you may have multiple Domino partitions or instances of Domino on a
single iSeries server or OS/400 logical partition (LPAR). In Workload Estimator, the term
instance in the phrase “the number of partitions being used by this instance of the Domino
workload” (as shown in item 9 in Figure 11-4) actually refers to a specific Domino workload
defined in the Workload Estimator such as “Domino #1” as illustrated in Figure 11-3 above.
In this context, “a Domino workload instance” may be one of multiple applications deployed
on the same Domino server or across multiple Domino servers. Therefore, given the use of
this term in the WLE, you should consider the specific usage type that is being defined, not
the instance of the Domino server.
Note: Normally, the terms Domino partition, Domino server, Domino instance, and Domino
subsystem (on the iSeries) are used interchangeably.
The Domino workload within the Workload Estimator has associated questions designed to
assess the planned Domino environment’s workloads. The default values within WLE are
suggested values for new Domino customers who do not yet know how their users will end up
using the application.
For those customers and business partners who are familiar with the characteristics of their
Domino applications and their users’ habits, this section offers some definitions and helpful
hints on how to interpret the Domino workload concepts used by WLE to estimate a
recommended system.
I
Important: If you select Domino R5 for your defined workloads in WLE, please be aware
that WLE currently makes recommendations based on benchmarks run with Domino
5.0.12. If you run an earlier release of Domino R5, particularly on a POWER4 based
iSeries (i825, i870, i890), your CPU utilization may be 10% to 20% higher than if you were
running Domino 5.0.12. There were changes made to Domino 5.0.12 to optimize
performance with the POWER4 based iSeries.
The number of active or concurrent users is very important when estimating a solution. There
are a couple of ways to report the total number of active users that a customer will be
deploying.
The mail workload defaults, such as concurrency, as shown in Figure 11-5 are values that are
suggested for new Domino customers who do not know the frequency at which their users will
use the application. Again, if you accept the defaults it is very unlikely that they will match the
actual environment. If you know the percentage of users that are active during peak times,
adjusting the concurrency rate for the application accordingly will result in a more accurate
sizing estimate.
When you adjust the concurrency ratings within WLE Domino workloads, it is important to
understand how the concurrency ratings are used. For example, if you select one Domino
workload for both mail and applications, and leave the Estimator defaults for concurrency, the
highest total concurrency rating for all of your users is 65%. This is due to the 50% default
mail concurrency and the 15% default application concurrency rating.
Tip: When using WLE, ensure that the concurrency rates used for each of the Domino
workloads make sense. For example, if there are 1000 Notes users accessing both mail
and applications, then the two defined WLE workloads should normally not have
concurrency rates which add up to more than 100%. Normally, there will be non-active
Notes users due to meetings, education, illness or vacation and so a real-life 100% user
concurrency is highly unlikely.
Table 11-1 shows the specific default values for concurrent users for each Domino usage
type. These default concurrency values are rough rules of thumb and are described in the
online WLE help. They are based on feedback from IBM representatives, Business Partners
and internal and external customers. Note, however, that these values may be significantly
different in your own environment.
Tip: If you have an existing Domino environment and are moving Lotus Notes users to
Domino Web Access (iNotes) or are perhaps adding new Domino Access for MS Outlook
or Domino Web Access users, then it is generally recommended to use the known, existing
Notes user concurrency rate for these new sets of users, assuming their work habits are
similar.
Domino Web Access (iNotes Web Access) 15% (see above Tip box)
Domino Access for Microsoft Outlook 15% (see above Tip box)
(iNotes Access for Microsoft Outlook)
WebMail 15%
Applications 15%
Use a 15 minute interval to determine the total number of concurrent users for each Domino
usage type. An active user is then any user who has performed an activity that made a
request to the server within this 15 minute interval. All users that were active at any time in
that 15 minute interval should be counted as concurrent users. Please note that this value
does not correspond to the default time-out (Server_Session_Timeout), where inactive users
are automatically disconnected after the specified time.
The peak number of concurrent mail users value is a great starting point. However, please
note that this statistic by default shows the peak number of users since the Domino server
was last started. Also, SH STAT SERVER does not show how much work the users are
generating. Therefore, this is not the place to determine users' complexity.
The 15 minute interval recommendation is a rule of thumb used to determine the number of
concurrent users of the Domino application being deployed. This rule of thumb also applies to
remote users. For example, if all of the remote users were replicating every 15 minutes, then
they would be 100% concurrent. It is important to note that a disconnected user doing
replication will typically place a somewhat lighter load on the system than a connected user
doing the same number and type of transactions.
By using the default of *CALC to determine the number of partitions, WLE uses a value of
3000 concurrently active users per Domino partition. Depending on the workload generated
by each user, it may be possible to support more ore less users per partition. The default of
3000 active users per Domino partition is a good starting point.
There are of course instances in which overriding the Estimator default is appropriate. For
example, in a case where you have 6000 total users with 50% concurrency, splitting them
across two Domino partitions would allow for easier management and flexibility of the servers.
Especially for an application like mail, where each user owns a particular database, a server
may become somewhat more difficult to manage if the number of databases grows
exceedingly large. In addition, the type of workload or applications being implemented may be
a reason to override the default of 3000 active users per partition.
For example, although IBM Lotus Instant Messaging (Sametime) can certainly run on the
same iSeries as other Domino applications like mail, the general recommendation is to run it
in its own Domino partition. One of the reasons to do this, is that this allows you to end the
Lotus Instant Messaging (Sametime) partition on the iSeries to apply Lotus Instant
Messaging (Sametime) fixes without impacting the other Domino servers on that same
iSeries (and vice versa).
Note: For your information, in Domino R4.6 and earlier releases, there was a certain
maximum workload which could be handled efficiently by each Domino server. This made
it necessary for many administrators to limit the number of mail users per server. At the
time, the recommendation was not to exceed 500 to 700 users per server. With Domino R5
and now Domino 6, the implementation was changed to allow each server to support a
much higher number of concurrent users’ workload.
When Domino databases are clustered, the server performs real-time replication for any
changes that occur to those databases. Therefore, clustering introduces additional processor
and disk space requirements that need to be included in any sizing estimate. For that reason,
and since there are many ways to configure clustering, it is important to interpret and specify
the appropriate information in WLE.
Attention: In reality, not all databases on clustered servers need to be enabled for cluster
replication. However, within WLE, if clustering is specified for a Domino workload instance
then it applies to all of the databases being defined in that instance. For example, if a
Domino workload is defined for 1000 mail users, the clustering configuration is applied to
the total number of all mail databases. Therefore, if 50% of the users are not being
clustered, two separate Domino mail workloads should be defined within WLE.
It is normally recommended to split your mail and applications into separate workloads. In
many cases, your solution may be designed in a way that clustering is deployed on a more
granular level such that not all mail and/or application databases are being clustered. In
addition, by defining separate workloads, the estimated CPU utilization for each workload will
be provided in the WLE results and therefore easier to understand.
The Workload Estimator allows you to indicate how Domino clustering will be used in several
different ways (inbound and/or outbound). Therefore it is important to understand how
Domino clustering is going to be implemented in your Domino for iSeries solution.
Inbound Cluster Replication indicates that databases from another system are clustered to a
Domino server on your system. Specifying Inbound Cluster Replication within WLE results in
an increase in resource requirements for the Selected System.
When the Next arrow button is clicked, another window like the one in Figure 11-7 appears.
Outbound clustering
Depending on the planned Domino clustering environment, you will most likely need to also
include outbound or outgoing Domino cluster replication workload when using WLE. Within
WLE, the outbound clustering options are the same when defining mail or applications
workloads. As shown in Figure 11-8, WLE asks “How are you implementing clustering for this
mail workload?”. The available options are:
None
To a different system
To the same system
If the databases in this workload are being clustered to a Domino server on a different system
then select “To a different system”. This option will increase the CPU requirements for the
Selected System.
In addition, the Estimator calculates the amount of disk storage needed for clustering by
adding the amount of disk storage required for the total number of mail databases or in the
case of an application workload, the amount of disk storage required for those applications.
Here is how WLE would calculate the resources needed for clustering based on the input to
the specific clustering questions. In the following example, there are 3000 mail users which
will be clustered on the same system:
1 partition (3000 concurrent users)
+ 1 partition (clustered on the same system)
______________________
2 total partitions
Tip: If you have some mail databases and/or Domino applications which will not be
clustered to a different or the same system, then you should define multiple WLE
workloads to reflect the appropriate clustered and non-clustered Domino mail and/or
application workloads.
However, not all of the users working with mail servers today are average or “typical”. As a
result, Workload Estimator provides the ability to further classify the mail users’ complexity by
using weighting factors with the casual, moderate, heavy and 3x heavy user types. Please
note that the 3x heavy user type will result in significant increased CPU resources and should
be used only when appropriate. The 3x heavy type of user workload is considered to consist
of approximately 60 transactions per minute. It is suggested that you check your server’s
collected statistics monitoring (STATREP.NSF) database or use the SH STAT command to
verify the number of transactions.
For example, within WLE, a mail workload with 100% heavy Lotus Notes client mail users
represents about the same load as an custom application workload with an application rating
of 1.5. This example assumes an average mail file size of 100 MB and it also assumes that
Lotus Notes clients and the same concurrency rates are selected. So if your mail user
workload or profile is very complex, with many views and agents deployed, it may be
appropriate to use the Domino Application profile.
Tip: The mail workload or profile should be used in most cases to estimate a mail
workload. You should only consider using the application profile in cases when you know
your Domino mail environment very well and understand the differences to a standard mail
environment. However, do not use the mail profile to estimate the load of a custom written
or purchased Domino application.
Casual users
Just as it is important to use caution when sizing very heavy mail users, it is also important to
avoid overestimating the number of casual users. As described in the WLE online help, the
casual user does e-mail only (no calendaring) and rarely sends or receives attachments. It is
important to note that new, at first casual users can quickly become more sophisticated and
complex. For example, a Notes user will most likely begin to use the calendaring and
scheduling features as soon as they become more experienced with Notes mail. When
performing a sizing estimate, consider that it is often typical for new Notes users to advance
from being casual users to moderate users in only a few months.
With the many mail client choices available, you could support multiple mail access types with
your Domino for iSeries solution. When using WLE for a Domino environment with many
different clients, you should use multiple Domino workloads to define each separate mail
access type.
Concurrent users
The number of concurrent mail users has a significant affect on the overall resource
requirements needed for a Domino mail workload. Based on internal and external feedback
from customers, the default concurrency ratings for each of the mail access types in WLE
have been set to represent a typical mail environment.
For a new Domino mail environment, it may be adequate to keep the defaults. However, if you
are familiar with the way your mail users work or have had Domino mail servers installed for
awhile, please see the discussion about “Concurrent users” on page 472.
The disk storage entered per registered user in WLE currently affects only the recommended
disk capacity. For extreme environments with very large mail databases (for example, over
500 MB) and a huge Domino Directory (for example, over 1 GB), it is possible to account for
the extra load by utilizing the 3x heavy user type and entering the appropriate mail file size in
the defined workload. Alternatively, you may also define a Generic workload or an Existing
workload with the processor resources deemed appropriate for the type of work being
deployed.
The Generic or Existing workloads within WLE are very versatile. They allow a user to enter
various raw parameters of a workload. These parameters include such things as the
interactive and non-interactive CPW processing requirements of a workload, CPU utilization
for an ‘existing’ workload, the amount of memory, the number of disk arms, and the amount of
disk storage for the workload.
When you define mail users with databases larger than 200 MB, it is recommended to specify
those users as heavy users in their own mail workload within WLE. Also, it is recommended
that you define multiple mail workloads in WLE to reflect different numbers of users and their
types with different average mail file size ranges. Please see the sizing tip item number 4 on
page 456 for more information on mail file sizes and item number 5 on page 457 for
suggested user types according to mail file size. However, please remember that these are
only guidelines and can be changed if a deeper understanding of the customer’s Domino
environment suggests the use of different settings.
Sizing Domino applications is a very complex task due to the numerous types of applications
as well as the varying ways in which applications can be designed. Because of these
variations, each application can place very different demands on system components such as
CPU, memory, and disk.
Example applications
There are no precise tools available on any Domino platform to simulate the load
characteristics of an application and map the performance to a specific configuration for a
desired number of users. As stated earlier, the most accurate way to size a system for a
specific application is to benchmark the application on a desired platform with the exact
planned resource configuration.
Since that option is not always feasible or available, Workload Estimator directs you to arrive
at a rough estimate of the iSeries capacity you will need by providing examples of several
applications and assisting you in comparing your application to one or more of those
examples.
At the time of writing, WLE utilized 12 example applications that represent typical Domino
applications as illustrated in Table 11-2. There are high level descriptions for each of these
application in the online WLE help text. In addition, more details on some of the applications
such as the workload composition can be found at the following Web site:
http://www.ibm.com/servers/eserver/iseries/domino/d4appsz.htm
The application rating found in Workload Estimator is a complexity rating of the entire
application. More specifically, the rating is used to determine resource requirement
projections for the different applications.
If that is not possible and you determine that your application places more or less demand on
the system resources than the example applications, you can select a custom application
rating. If you select the custom application type, it is up to you to specify the application rating
as shown in Figure 11-9. Using the custom application type with the default application rating
of 6.0 is a good starting point if you do not know how heavy the load is, that the application
will put on the system’s resources.
Although an application rating of 6.0 is a good starting point, in the case of commercial
Domino applications written by Independent Software Vendors (ISVs) and IBM and Lotus
Business Partners, experience shows that increasingly these applications exhibit the
characteristics of an 8 on the Application Rating scale of the Workload Estimator. However
this is a generalization and you cannot rely on this holding true for all ISV applications. So
again, to select a specific rating for your custom application, it is helpful to compare your
custom application with one of the example applications discussed earlier.
Here is an example of how to estimate your custom application’s rating by comparing it with
an example application. The first task is to figure out which application most closely
resembles your solution. After this is completed, there are several ways to proceed:
If it is determined that your application users will generate similar activities as the sample
application, but at different rate, then use an application rating that is proportionately more
or less in the same ratio as the rate difference.
For example, perhaps you are planning to implement a Web shopping application, so that
the users are completing a group of transactions similar to the one described for Web
Shopper, but are going to be completing the sequence at a rate of 180 seconds instead of
90 seconds. Then this application would use a rating that is approximately half the rating
of Web Shopper. Your application is half as heavy as the example.
It is also possible that the rate and sequence of transactions for the expected workload is
quite similar to an example in the Estimator, but the users will be completing heavier or
lighter transactions. There is a little more guess work that is required as you proceed with
this type of comparison.
It is important in this second way to have a good knowledge of the complexity of each of the
transactions that are completed. It is then up to you to decide how much of a difference the
transactions are compared to the example application script. See “Considerations for
characterizing existing applications” on page 487 for a list of questions and metrics that are
useful when trying to classify the complexity of an application.
From an HTTP standpoint, it is a bit easier to discuss hit rates. The HTTP protocol does not
have the concept of a session and, in many cases, the browser users don’t even need to
authenticate. The Web master knows how often a certain URL has been visited, but it is
difficult to find out whether 100 hits have been performed by a single person or by
100 different people.
When you use one of the example Web applications listed in Table 11-2 on page 483 to rate
the complexity of your own application, you also need to specify a number of concurrently
active users to determine how often they are called. These sample applications are described
in detail in the Domino for AS/400: Application Sizing Examples white paper at:
http://www.ibm.com/servers/eserver/iseries/domino/d4appsz.htm
The white paper can help you to calculate the active users even if you know only the HTTP hit
rate. Hit rate values, along with the equivalent number of concurrent users corresponding to
those hit rates, are included in the definition and description of the Web applications in the
white paper. Table 2, “Web Document Library Estimated Sizing” in the white paper (and
partially shown in Table 11-3), allows you to determine a ratio between concurrent users and
hits per second by dividing those two numbers. That way you can determine that (for this
model application) 1 hit per second is generated by 15 active users, or in other words,
100 active users produce 6.6 hits per second.
For example, assume you consider your own Web application to have the same complexity as
the Web Document Library sample application and you expect 120 hits per second. Applying
the ratio described above would result in 1800 (120 times 15) concurrently active users. So
you could specify 1800 registered users and a concurrency rate of 100% or 3600 registered
with 50% active users.
Table 11-3 Web Document Library Estimated Sizing
Model Processor feature # N-way # Concurrent users Hits per second Hits per day
Database capacity
In this context, database refers to a DB2 UDB database and its associated processes, not a
Domino database. Only the time spent in DB2 database code as well as access methods,
such as SQL and Query/400, is considered to be DB2 database processing. The majority of
database processing is therefore when database records are accessed through SQL, ODBC,
JDBC, Query/400, DRDA®, and other database access methods.
This metric is especially important when sizing a Dedicated Server for Domino (DSD) iSeries
model. For an in-depth discussion on the V5R1 Dedicated Server for Domino, refer to the
white paper at:
http://www.ibm.com/eserver/iseries/domino/dsd.htm
The rated DB2 capacity is equal to 15% of the CPU for Dedicated Server for Domino models.
For more information on optimizing an application's use of DB2 database processing, refer to
the iSeries Information Center for V5R1 at:
http://publib.boulder.ibm.com/html/as400/v5r1/ic2924/index.htm
Important: Please note that IBM recently announced that the Dedicated Server for
Domino iSeries models will be withdrawn from marketing effective November 21, 2003.
Please go to the following URL for details on the more recent Domino for iSeries models:
http://www.ibm.com/servers/eserver/iseries/domino/is4domino.html
If the answers to these questions lead to the observation that your solution is quite complex, it
is appropriate to use a fairly high application rating. The following sections offer some
examples of design metrics that may have an impact on the server load or capacity as well as
user response times and can help answer the questions above.
Some application characteristics do not necessarily add extra load to the server which affects
the total performance, but have an affect on the user response time.
After you determine if the application has any of these characteristics, and to what extent, you
can now select an appropriate application rating. There is no exact science to calculate an
application rating based on the design components of an application. However, having
knowledge of the metrics discussed here will help you to determine the appropriate input
values when using WLE.
Similarly, the number of agents in an application could cause a significant performance hit.
The number of add-in tasks that are active in the application also has a significant impact on
the server load.
To define the iSeries option, select Edit -> Options. On the next window click the “Go to
iSeries” link to review and update your iSeries options. The iSeries User Options window, like
the one shown in Figure 11-10 on page 491, appears; this is where you can change the
assumptions which affect the overall iSeries environment that you are estimating.
These options or assumptions affect both the size of the projected workload(s) and the
manner in which the Estimator combines multiple workloads.
In most cases, the Base Calculation Defaults for the OS/400 version, DBCS support and
RAID support will not need to be changed. Options that might need to be changed are:
Target Processor Utilization
Target Interactive Feature Utilization
Target LPAR Processor Utilization
Disk Storage Percent Full
Disk Attachment Type
Disk Storage Type
Target Family
You may change this value based on specific needs. However, we do not recommend setting
the default utilization for a particular system above its WLE default. For example, if the
70% default for a 2-way system was increased to 85%, it could result in performance
problems during peak usage times, when there are “spikes” in the system utilization. Please
remember that when you adjust this option, the recommendations of the WLE are estimates.
This means that some range (both plus and minus) should be allowed for any estimated
WLE’s selected system’s projected CPU utilization.
If your WLE scenario only includes Domino workloads, then the Interactive Feature Utilization
is not applicable.
If you want the Estimator to calculate extra disk storage as a percentage of the total required,
you can lower this parameter. This is because the parameter is defaulted to 85%. This means
that the Estimator assumes that the defined workload(s) can consume all but 15% of the disk
storage available for the selected system. In other words, the default of 85% means that at
initial installation the iSeries has only 15% of the total disk space free and available to meet
future growth. This should be clearly understood by anyone involved with the Domino for
iSeries solution.
If you lower this value, for example to 70%, then the Workload Estimator would reserve 30%
of the disk storage available and only 70% of the total disk storage is consumed by the
workload(s).
It is recommended to change this value if, for example, you are sizing a mail workload and
you know that your users' mail databases are projected to grow.
Tip: Ensure that it is clearly understood that any proposed solution based on WLE
estimates assumes a specific disk space full percentage. For example, when comparing
two solutions from different vendors be aware of potential differences in disk space full
assumptions. For example, one solution may reflect 70% disk space full while the other
may reflect 100% disk space full.
Target Family
The Workload Estimator defaults to the highest available iSeries technology. As new IBM
iSeries systems are announced, “family designations” will be included in the drop down list.
Unless there is a specific case in which you want to size your solution on a previous
technology system, we suggest that you leave this parameter with the default.
Tip: Although not shown in Figure 11-10, there are buttons at the bottom of the iSeries
User Options window which are helpful, particularly if you use the WLE extensively. For
example, if you have changed options here but would like to reset them back to the
defaults, then press the Load Standard Options button. If you have a favorite set of
options, then the Save My Options and Load My Options buttons can be useful.
The smallest system model capable of supporting the resources required for the defined
workload(s), as well as meeting the criteria specified in “iSeries options in WLE” on page 488
is presented as the recommended system.
Changing any of these options, for example lowering the Disk Storage Percent Full or the
Target Processor Utilization can change the results and thus allow for additional growth.
Alternatively, if you are confident that you understand your workloads completely and know
that there are no plans for growth, you may decide to set the target utilizations a bit higher.
The Selected System panel includes the specific processor model, interactive feature,
processor Commercial Processing Workload (CPW), interactive CPW, database capacity,
processor utilization, memory, and the required number of disks and disk capacity.
There are several resources that are reported in the Workload Estimator results (see
Figure 11-12) that need a bit of explanation on how they apply to a Domino solution:
Processor CPW
Database Capacity
Disk Drives
Capacity (GB)
Growth Solution
Processor CPW
The Processor CPW reported in the results of the Workload Estimator should not be treated
as the total CPW in all cases. In some instances, such as the Dedicated Server for Domino,
this metric is actually the non-Domino processor CPW. For a more detailed discussion on the
DSD models and the non-Domino processor CPW, see the white paper “Enhanced V5R1
Processing Capability for the iSeries Dedicated Server for Domino”, which is available on the
Web at:
http://www.ibm.com/servers/eserver/iseries/domino/pdf/dsdjavav5r1.pdf
Also, please refer to item 1 on page 456 for an important sizing tip regarding CPW, CIW and
MCU metrics.
Database Capacity
The Database Capacity metric reported for the Selected System shown in Figure 11-12 is a
measure of the percentage of the overall CPU that is used to perform the DB2 database (not
Domino database) processing. Database processing generally includes processing time in
SQL, ODBC, JDBC, Query/400, DRDA, and other database access methods.
If the database CPU is fully consumed, this does not mean that all of the capacity on the
system is being utilized. It is possible to add more work other than database processing to
take advantage of the remaining cycles.
Capacity (GB)
The Capacity shown in Figure 11-12 on page 493 is a separate calculation based on
The amount of disk storage defined for the mail databases
Plus the storage needed for any application databases
Plus disk space required for the operating system
Plus extra space for the target disk space full parameter specified in the WLE options
Plus disk space required for any other non-Domino defined workload(s)
The calculations for disk capacity and the number of disk drives are done separately. Only
taking one into consideration could result in a number that is too low for the other.
For example, by selecting large disk drives to satisfy the capacity requirements of WLE, there
may not be enough arms for the best performance. Therefore, be sure to obtain a system with
at least the number of disk arms estimated by WLE, even if it results in more disk capacity
than necessary.
It is also worth noting that the value reported for the Selected System requirements is a
minimum requirement. By including more drives, the system will have better parallel access to
the data, which may reduce the data access time significantly.
Growth Solution
A Growth Solution (Figure 11-13 on page 495) is also included in the Workload Estimator
results. It is selected by applying the growth rate, defaulted to 50%, to all of the system
resources used to determine the initial recommended system. It is possible, if the Immediate
Solution is capable of supporting the default 50% growth, to have a Growth Solution with the
same model/feature as that of the Immediate Solution.
Further information on both the Immediate and Growth Solutions is summarized in the WLE
results output as shown in Figure 11-14.
Tip: Before starting any sizing estimate effort, please refer also to Chapter 10, “Sizing tips
and techniques” on page 455. It contains a number of helpful, critical sizing tips gathered
from the experiences of a number of Domino for iSeries technical specialists.
The applications that follow the CPW patterns tend to have many jobs running short
transactions using relatively few CPU instructions and spending much time waiting for I/O to
complete. Usually this is an environment where more time is spent by system code
performing DB2 operations, rather than by the application executing processor instructions.
CPW ratings are best used when the application you are sizing is expected to be used for
traditional business uses such as order entry, billing, etc.
As mentioned in the sizing tip number 1 on page 456, Domino applications should not be
sized using CPW ratings.
One reason is that the ratio of processing time to I/O time for Domino is typically very different
from commercial processing workloads (CPW). More details on CPW and other metrics can
be found in the iSeries Performance Capabilities Reference Version 5 Release 2 manual at:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/as4ppcp8.pdf
Important: To compare Domino processing capabilities for various iSeries servers, you
should use the MCU metric. Although, both the MCU and CIW metrics may provide similar
comparisons for certain iSeries models, it is especially recommended to use MCU for
rough comparisons when the i825, i870 and/or i890 models are involved. Do not use CPW
metrics to compare Domino processing capabilities for iSeries systems.
When sizing a Domino application, it is more important to consider the necessary CPU cycles
per user per time versus the time waiting for I/O. For this reason, the Compute Intensive
Workload (CIW) metric was introduced. CIW ratings may be helpful when most of the work by
the application is done within the application code instead of system services. For example, a
Domino Mail and Calendar workload might spend 80% of the total processing time outside of
OS/400, while a CPW workload spends most of its time in OS/400 database code.
Some L2 cache is very important for Domino, especially for applications. That is why we
always recommend that you choose those iSeries or AS/400 models for Domino that have L2
cache (see Table 11-4 on page 501 and Table 11-5 on page 502). But Domino applications
that are more CPU-intensive and more comparable to CIW benefit more from additional
processor speed rather than a bigger cache. Also, because CIW-like applications spend more
time on individual processors, they tend to scale better on multiprocessor systems than mail
and/or CPW like workloads.
You can find further information on CIW in Appendix A of the iSeries Performance Capabilities
Reference Guide Version 5 Release 2. You can also see MCU, CIW (and CPW) ratings for
iSeries servers in Appendix C of the same manual.
We decided that these two scripts do not represent a typical mail workload. Therefore, as a
rough guideline, we have determined that a typical user is three times as heavy as an SMU
and twice as heavy as an MCU. This means that a given server that can support x number of
Typical users can support 3x SMU and 2x MCU. To translate these metrics into Workload
Estimator terminology, the equivalent of a typical user is a moderate mail user.
The number of registered users is the first question to be answered for each WLE workload.
However, this number alone cannot be used as a basis for sizing; you must answer other
questions like the ones posed by Workload Estimator. The more crucial question is: “What is
the percentage of concurrently active users?” Multiplying that value with the registered users
results in the number of active users.
For example, the Model 810-2469 (7428) is rated at 7900 MCU at 70% CPU utilization. If you
specify a single mail workload of 7900 users in WLE and leave all of the defaults such as 50%
user concurrency (except change the average mail file size to under 100 MB and the user
type to moderate), the Estimator will project a CPU utilization of about 70%. If the
concurrency rating is changed to 100%, and the number of users is changed to 3950 (one
half of the MCU), then the CPU utilization is still about 70%.
While these components can be set by the person who configures the hardware, there are
other factors depending on the internal architecture and design of the server. Such factors
include: bus speed, internal data transfer band width, multitasking overhead, and others.
Having said that, what can you do to estimate the appropriate size of an iSeries server, when
you already know what server is needed on a different platform? Similar to what was stated
for sizing a completely new server, you can use benchmark data to provide an order of
magnitude, as long as you are aware of the limitations of this method.
Tip: As described in the sizing tip number 9 on page 459, it is recommended to obtain a list
of the existing Domino servers’ characteristics (number of processors or CPUs, MHz per
processor, disk used) as well as their peak period CPU utilization.
When keeping the above points in mind, comparing the NotesBench and MCU ratings of
existing servers is still the most reliable method to estimate the appropriate configuration of
an iSeries server. In addition, the CPU clock rating, together with the actual CPU rating can
be used to verify the necessary number and type of iSeries processors.
In any case, the Workload Estimator should also be used to ensure a balanced system, as
described in the previous sections or this chapter.
“Capabilities of various iSeries and AS/400 models” will help you to gather some information
about the different iSeries models and compare it to benchmark data published by the
NotesBench consortium on the Web at:
http://www.notesbench.org
In addition, Table 11-4 and Table 11-6 show the Mail and Calendaring Users (estimated at
70% CPU capacity) for the 270 and 8xx Models announced in 2001. It is important to note
that the 270, 820, 830 and 840 models are being withdrawn from marketing effective
November 21, 2003. The other tables starting on page 502 show the SMU and MCU ratings
of older iSeries and AS/400 models. You may use the tables to compare the potential
capacities of the different iSeries models.
Although the ratings Mail and Calendaring Users and the earlier Simple Mail Users are not
officially the same as the NotesBench ratings, the tables can give you a very rough idea to
compare the capabilities of a certain iSeries model with another server which does have
published NotesBench ratings. When comparing models, it is important to consider the
characteristics of each such as L2 cache, processor speed and number of processors or
CPUs. For example, it is not recommended to run Domino (non-mail) applications on an
iSeries without L2 cache.
Table 11-4 and Table 11-5 describe performance capabilities of the earlier (2001) iSeries
models as they relate to MCU. Table 11-4 lists the DSD models.
Table 11-4 iSeries Dedicated Server for Domino performance details
Model Proc. feature CPUs Chip speed L2 Cache MCU rating Typical mail
Model Proc. feature CPUs Chip speed L2 Cache MCU rating Typical mail
Table 11-6 shows Domino mail workloads for the previous generation of the 270 and 8xx
models. MCU results are based on 70% CPU utilization and should not be compared to the
audited NotesBench numbers.
Table 11-6 Domino workloads on first generation of 270 and 8xx models
Model Proc. feature CPUs Chip L2 Cache MCU Typical Simple
speed rating Mail mail
Table 11-8 shows the performance capabilities on 6xx and Sxx models. These results are at
70% CPU utilization and should not be compared to the audited NotesBench results. Use
these figures when comparing AS/400 systems only.
Table 11-8 Simple mail users on 6xx and Sxx models
Model Proc. feature CPUs Typical mail Simple mail
2134 1 43 130
2135 1 66 200
Part 4 Appendixes
Part 4 of this book gives you a quickstart to use the Workload Estimator based on fictitious
customer environments. It also helps you to solve some Domino performance problems and
tells you what information you need to collect for Domino troubleshooting.
Important: While reading through this appendix, please remember that the Workload
Estimator results are only estimates and highly dependent on the input parameters. It is
recommended that you also read through the information in Chapter 10, “Sizing tips and
techniques” on page 455.
Important: Please note that the Workload Estimator windows shown in this appendix
reflect the WLE version available at the time of writing. Future WLE versions may have
different windows or results.
Next we must first accept the WLE terms and conditions if this window appears. For an
example of the terms and conditions window, please see Figure 11-1 on page 465. Now it is
time to use the collected customer information and WLE to create a sizing estimate by doing
the following steps:
1. Let’s first make the appropriate changes to the iSeries User Options. Click Edit ->
Options in the window which appears after accepting the terms and conditions (see
Figure A-1).
2. Click the Go to iSeries link in the Series Specific Settings section of the User Options
window. A panel like that shown in Figure A-2 appears. For more details on the User
Options, see “iSeries options in WLE” on page 488.
3. The defaults of OS/400 V5R2 and RAID support are applicable so scroll down to the Disk
Storage Percent Full parameter. Per the customer’s requirement discussed in the earlier
summary, move the sliding bar from the default of 85% to 70% as shown in Figure A-3.
Tip: A recent enhancement to WLE provides a choice between placing the estimation
identification on a separate page in the WLE output or at the top of the WLE results.
Figure A-8 WLE for PAG - changed Basic Workload Selection window
Important: Although the default of Domino 6 is used in this example, it is important to note
that WLE currently estimates any Domino R5 based recommendations according to data
derived from Domino 5.0.12 benchmarks. If you run an earlier release of Domino R5, your
CPU utilization may be 10% to 20% higher, particularly if you are running it on a POWER4
based iSeries (i825, i870, i890) system. Domino 5.0.12 has changes in it which optimize its
performance on a POWER4 processor.
Tip: In this example, leave the number of partitions set to *CALC. The WLE calculates the
number of Domino partitions for mail workloads using the guideline of 3000 concurrent
mail users per Domino partition. For more information on using and overriding this
guideline, please see 11.5.2, “Number of Domino partitions” on page 474.
Note: “Sametime - Chat” has been renamed to “Sametime Instant Messaging” in the
October 2003 update of WLE.
Tip: If this customer had planned on having a third Domino partition for development or
testing purposes, we could have accounted for it in WLE by specifying two partitions
instead of one in the “Sametime chat” (now: Sametime Instant Messaging) workload.
Currently, increasing the number of partitions for a workload in WLE will increase the
memory requirements. However, in this case, the customer has no such plans.
Figure A-15 WLE for PAG - Initial Immediate and Growth Solutions
Figure A-17 WLE for PAG - Selected Immediate and Growth Solutions
18.In the left frame, click File -> PDF and the WLE results appear in pdf format as shown in
Figure A-18. This pdf can be printed, saved and e-mailed as appropriate.
For information on interpreting the WLE output, please see “Understanding the WLE
results” on page 491 or go to the WLE online help at:
http://www.ibm.com/eserver/iseries/support/estimator/html/growthHelp.html
Click the Back button in your browser to return to the WLE Selected System window.
Important: In most cases, do not use your browser’s “back” button since doing so will
circumvent WLE’s built-in navigation. This prevents WLE from validating current data
entered in the panel and as a result, WLE may exhibit navigation or other error messages.
To prevent this behavior, always use the navigation arrows within WLE. An exception to this
rule is when you have created a pdf and need to return to WLE.
19.Since it is always possible that we may need to later revise one or more of the parameters
in this estimate, let’s save all of the workload definitions just created. In the left hand frame
of the window, as shown in Figure A-19, click File -> Save All Workloads. Click Save in
the File download window. In the resulting Save As window, enter a file name (like WLE for
PAG and Associates.xml) and then click Save once again.
Tip: At the time of writing, there is an intermittent problem with saving and restoring WLE
workloads. This problem may occur when you attempt to save WLE workloads and you
have entered an estimation identification. An indicator of the problem is a WLE saved file
which has a 0 KB size. As a result, it cannot be restored since no WLE data was actually
saved. However, this problem is planned to be fixed in the next version of WLE.
20.This saved WLE file may be restored later by going back into WLE and choosing the File
and then Restore options in the left hand navigation frame of WLE. Additional details on
saving and restoring WLE files are online at:
http://www.ibm.com/eserver/iseries/support/estimator/html/restorehelp.html
In addition, we have obtained their Domino statistics reporting (statrep) data and their Domino
servers network diagram. We also obtained data on their Intel servers, including number of
CPUs, MHz, disk used/total, and peak period CPU utilization. See Chapter 10, “Sizing tips
and techniques” on page 455 for critical sizing tips, particularly when working with more
complex Domino implementations.
Note: Mail file sizes can be found through various means; one way to view all database
sizes is to use the Domino Administrator Files tab. There may also be third party
products which can gather and provide this information.
2000 (planned new Domino Web 100 MB (planned) 80% moderate, 20% heavy
Access users)
Domino clustering is only done for a subset of the mail users. Namely for those with
600 MB mail file sizes — given that this group consists of employees who have higher
availability requirements.
Of the 10,000 Lotus Notes client users, 4,000 also access other Domino applications. The
customer estimates that on average, the majority of their applications are roughly
equivalent to the more complex Customer Relationship Management application example
in WLE; therefore, an application rating of 9.0 is agreed to be appropriate for the Domino
applications workload.
According to the representative Domino statrep data, peak application user concurrency is
20%. These Domino applications are not clustered.
The total disk used by the Domino applications today is about 150 GB.
Many of their Domino applications have “light” access to back end IBM DB2 data (light in
the way WLE defines it).
Transaction logging will be used since online incremental Domino backups using BRMS
are planned.
The customer will use antivirus software running on the iSeries to protect the Domino for
iSeries servers. The customer agreed to an antivirus protection factor of 15.
The customer is not planning on using Domino 6 functions such as Single Copy Template,
roaming users or network compression.
The customer wants RAID-5 disk protection and has requested a disk full target of 70%.
The customer has asked that any sizing estimate also include 20% growth on all Domino
workloads except for Domino Web Access (iNotes Web Access), which should have no
growth.
The customer indicated that the sizing does not need to reflect any test/development
Domino for iSeries servers/partitions.
iSeries #1 iSeries #2
Tip: In Domino server consolidation cases, several sizing estimates are typically needed
before any decision is reached. You may find that you are requested to provide estimates
for both a dual iSeries solution as well as one for multiple smaller iSeries. For example, the
diagram shown in Figure A-20 could be modified to reflect a four iSeries solution
alternative. Thus, if you get into the habit of saving your WLE estimates (as suggested in
step 30 on page 553), returning to WLE to do a different solution scenario is quicker and
easier.
we must first accept the WLE terms and conditions. For an example of the terms and
conditions window, please see Figure A-1 on page 509. Now it is time to use the collected
customer information and WLE to create a sizing estimate by following these steps:
1. Let’s first make the appropriate changes to the iSeries User Options. Click Edit ->
Options in the window (compare to Figure A-1 on page 509) which appears after
accepting the WLE terms and conditions.
2. In the User Options window, click the Go to iSeries link in the Series Specific Settings
section.
4. Click the Save My Options button, then click the Use This Time button. The Basic
Workload Selection window (see Figure A-4 on page 511) appears. From the high level
proposed solution diagram shown in Figure A-20 on page 529, we need to use WLE to
configure one of two “identical” iSeries, each having:
– Three Notes mail workloads (one with inbound cluster replication)
– One applications workload
– A new Domino Web Access (iNotes Web Access) mail workload
– A new Lotus Instant Messaging (Sametime) chat application workload
Click the Domino Workload button and then use the Add Workload button to add five
more Domino workloads.
6. Before going into each of the Domino workloads, let’s identify this estimate. If entered, an
estimate identification appears in the WLE results and makes it apparent at a glance
which key assumptions were used for this particular estimate. Click the MySolution link
(see Figure A-22 above). Then click MySolution again and a new window like the one in
Figure A-6 on page 513 appears. This new window allows for the entry of a description or
identification for this WLE estimate.
Tip: A recent enhancement to WLE provides a choice between placing the estimation
identification on a separate page in the WLE output or at the top of the WLE results.
Figure A-24 WLE for OSTI - changed Basic Workload Selection window
9. Click Domino #1. The Domino #1 workload window appears (compare to Figure A-9 on
page 516). Click Domino #1 again to change the Domino workload title to something
more descriptive.
Tip: Although the default of Domino 6 is used in this example, it is important to note that
WLE currently estimates any Domino R5 based recommendations according to data
derived from Domino 5.0.12 benchmarks. If you run an earlier release of Domino R5, your
CPU utilization may be 10% to 20% higher, particularly if you are running it on a POWER4
based iSeries (i825, i870, i890) system. Domino 5.0.12 has changes in it which optimize its
performance on a POWER4 processor.
Tip: As described in the WLE online help, transaction logging can be set to favor runtime,
favor restart recovery or standard, with each having its own impact on CPU. Online
incremental Domino server backups via BRMS require the use of transaction logging; in
addition, “favor runtime” is usually recommended. In this case, since the plan is to use
BRMS for online incremental Domino server backups, we’ve rounded up the transaction
logging factor to 15. As documented in the WLE online help, a general guideline for “favor
runtime” transaction logging is from 10 to 12. The online help also states that this factor
represents the relative amount of CPU resource to be added for transaction logging.
Figure A-28 WLE for OSTI - Mail workload with Inbound Cluster Replication
Important: Since this is the group of mail users who are currently using Domino clustering,
select To a different system for item 6 which asks “How are you implementing clustering
for this mail workload?”. See Figure A-29.
Tip: In item 2 of the Inbound Cluster Replication attributes (see Figure A-30), the “percent
of inbound cluster replication mail users active” refers to those clustered mail users on the
other system (iSeries #2) who are generating replication traffic coming into this system
(iSeries #1) during normal operations (both iSeries systems are available during normal
operations). Also, when WLE calculates its recommendations, it will include another
partition for the Domino server handling the incoming cluster replication workload.
Note: “Sametime - Chat” has been renamed to “Sametime Instant Messaging” in the
October 2003 update of WLE.
Given that this will be a new workload and the customer has estimated the concurrency at
about 15% for the new chat users, let’s leave the default of 15%. As described before in
the solution diagram (Figure A-20 on page 529), we also enter 3000 users and change the
number of partitions to 1 for this workload. Click Next.
Figure A-37 WLE for OSTI - Selected System Workload Growth Factors
24.At this point, we save the workloads defined and create a pdf of the WLE results which
reflect a normal operations scenario by using the options in the left hand navigation frame.
25.In addition to the initial estimate, we must use WLE to show the estimated resources
required when operating in a fail over mode, or when one of the iSeries systems is
unavailable due to an unplanned (or planned) downtime. Therefore we need to make an
adjustment to the clustered environment to depict what happens if all 2000 clustered mail
users (with 600 MB mail files) are being serviced by one of the two iSeries systems.
Note: Although an unplanned downtime may obviously occur at any time, a planned
downtime would normally be scheduled to occur during non-prime or non-peak periods.
Figure A-41 WLE for OSTI - changed Notes mail (600MB) workload
Figure A-42 WLE for OSTI - Selected System solutions (fail over mode)
Tip: In most cases, do not use your browser’s back button since doing so will circumvent
WLE’s built-in navigation. This prevents WLE from validating current data entered on the
window and as a result, WLE may exhibit navigation or other error messages. To prevent
this behavior, always use the navigation arrows within the WLE windows. An exception to
this rule is if a pdf of the results has just been created and a return to WLE is desired.
Figure A-43 WLE for OSTI - PDF of WLE results (fail over mode)
Tip: At the time of writing, there is an intermittent problem with saving and restoring WLE
workloads. This problem may occur when you attempt to save WLE workloads and you
have entered an estimation identification. An indicator of the problem is a WLE saved file
which has a 0 KB size. As a result, it cannot be restored since no WLE data was actually
saved. However, this problem is planned to be fixed in the next version of WLE.
iSeries #1 iSeries #2
LPAR 1 (Managing Partition)
LPAR 3
(Domino Development/Test)
3. The Restore Saved Estimation window appears (see Figure A-47). Click Browse.
Figure A-49 WLE for OSTI - Basic Workload Selection (after restoring saved WLE file)
6. Click the Expert View button and the Expert Workload Selection window (shown in
Figure A-50) appears. Since we need to add logical partitioning to this estimation, click the
System #1 link.
7. As shown in Figure A-51, change the LPAR status from “None” to “Shared”. Click Return.
Tip: It is helpful to read through the WLE online tutorial which discusses OS/400 logical
partitioning (LPAR). It can be opened by clicking File -> Tutorials -> Logical Partitioning
in the left hand navigation frame of WLE.
8. In the Expert Workload Selection window, click Add Partition for System #1. A new logical
partition, Main #3 is added as shown in Figure A-52. Let’s add a workload to this new
partition which reflects the customer’s desired Domino test and development environment.
Click Add Workload.
Figure A-54 WLE for OSTI - add new Domino workload to LPAR
13.As illustrated in Figure A-57, change the planned usage for this workload instance to
Applications only. Also, change the title from Domino #7 to “Domino dev/test”. Click Next.
Figure A-58 WLE for OSTI - define new Domino dev/test workload
Figure A-59 WLE for OSTI - initial results after adding LPAR
Figure A-61 WLE for OSTI - Selected System after changing growth rate
Figure A-62 WLE for OSTI - results with LPARs - pdf format
19.Click the Back button in your browser to return to the WLE Selected System window after
reviewing the results. For details on interpreting the WLE results, please see
“Understanding the WLE results” on page 491. Alternatively, click Help -> Estimator
Results in the WLE navigation frame.
Tip: In most cases, do not use your browser’s back button since doing so will circumvent
WLE’s built-in navigation. This prevents WLE from validating current data entered on the
window and as a result, WLE may exhibit navigation or other error messages. To prevent
this behavior, always use the navigation arrows within the WLE windows. An exception to
this rule is if a pdf has just been created and a return to WLE is desired.
This illustrates how easy it is to restore a saved WLE file and modify it to produce a sizing
estimate which reflects a different assumption or requirement such as logical partitioning.
Tip: As described in the sizing tip number 9 on page 459, it is recommended that a check
be done of the Workload Estimator’s recommended number of processors with the
customer’s existing Domino environment. Although there are no definitive ratio guidelines,
it is important to ensure that the WLE results make sense.
For example, if the Domino customer currently has 100 Intel processors and WLE is
recommending a single 8-way iSeries to replace 100 Intel processors, then it is advisable
to review the customer data and WLE workload definitions again. In addition, although
MHz are only part of a system’s overall performance capabilities, it is suggested that the
total number of MHz consumed during the representative peak period (from the created
server characteristics table) be compared with the WLE’s recommended systems’ total
MHz capability. Do not forget to factor in target processor utilization percentages.
It is recommended that you track any problems in your Domino environment. Create a
database or paper form that contains information like: Name of the Domino server that had a
problem, date that the problem occurred, time that the problem occurred, type of problem
(crash, hang, high CPU, etc.), number of incident opened with Lotus Support (if you open an
incident), data gathered, solution to the problem.You may also want to keep the information
listed in this appendix in the same place as your tracking data, that way you do not have to
refer back to this appendix when a problem occurs.
Note: Most of the commands listed in this appendix generate spooled files. Spooled files
can be located via several different methods. The two most common methods are the Work
Job (WRKJOB OPTION(*SPLF)) command from a 5250 emulation screen and the Basic
Operations section of the iSeries Navigator.
The iSeries Navigator allows you to drag and the spooled files from the iSeries to your PC.
However, you must sign on to iSeries Navigator using the same user profile you generated
the spooled files with in order to find the files under the Basic Operations section.
The spool files are located under Basic Operations -> Printer Output in iSeries
Navigator.
Notes:
Domino hangs are notoriously difficult to debug after the Domino server has been
restarted. When the Domino server is restarted, most of the data required to debug the
problem is gone. We strongly recommend that you report the problem to Lotus Support
while it is occurring. If you cannot, then gather the information listed in this section and
Lotus Support will attempt to debug the root cause from this data.
Occasionally, Lotus Support may require additional debug turned on to find the root
cause of a Domino server hang or Domino HTTP hang. If this is the case, you must set
the debug and wait for the next hang to occur to capture data. Listed below are some of
the most common debug parameters used. In general you should not set these
parameters without a Lotus Support analyst’s recommendation. Some of these
parameters output a lot of data and should only be enabled when debugging a specific
problem.
SERVER:
Debug_Capture_Timeout=10
Debug_Show_Timeout=1
DEBUG_THREADID=1
HTTP:
HTTPEnableThreadDebug=1 (for the default level)
HTTPEnablePostDataLogging=1 (for client POST data)
HTTPEnableResponseContentLogging=1 (for server response data)
AMGR:
Debug_AMGR=*
LDAP:
LDAPDebug=7
MAIL (both SMTP and NRPC):
DebugRouter=3
SMTPDebug=4
SMTPDebugIO=3 (for debugging inbound SMTP mail problems)
SMTPClientDebug=1 (for debugging outbound SMTP mail problems)
Log_MailRouting=40
We define a Domino Server hang as the situation when the Domino jobs are still running in
the Domino subsystem, but a Lotus Notes client(s) cannot connect to the Domino server. This
may encompass more than Lotus Notes clients, but the minimum is that Lotus Notes clients
cannot connect to the server.
Attention: The DMPSVRSTKS command is not shipped with Domino 6.0.2 CF1 or
OS/400 V5R2M0. To get this command, you must download the DMPSVRSTKS
application available at:
http://www.ibm.com/servers/eserver/iseries/domino/devtools/dmp/
and load it on your iSeries. This application will also function with earlier releases of
Domino.
Entry type:
Major code . . . . . . . . . . 0000 0000-FFFF
Minor code . . . . . . . . . . 0000 0000-FFFF
Starting:
Date . . . . . . . . . . . . . 08/04/03 MM/DD/YY
Time . . . . . . . . . . . . . 11:30:00 HH:MM:SS
Ending:
Date . . . . . . . . . . . . . 08/04/03 MM/DD/YY
Time . . . . . . . . . . . . . 15:00:00 HH:MM:SS
F3=Exit F12=Cancel
Figure B-1 Fields to fill in on Dump Entries to Printer from Licensed Internal Code Log Screen
Note: These parameters require a Domino server restart to take effect. These
parameters should not impact performance on your Domino server. Monitor the size
of the SEMDEBUG.TXT file and delete the file if it gets too large (you can delete the
file while the Domino server is active, but do not delete it if a Domino server hang is
currently occurring).
A Domino HTTP hang is when the Domino HTTP job is still running in the Domino subsystem,
but a Web browser cannot connect to the Domino server. Usually, this type of hang will only
affect Web browsers and other clients can connect fine. If the hang affects Lotus Notes
clients, then it is a Domino Server Hang, not a Domino HTTP hang.
and load it on your iSeries. This application will also function with earlier releases of
Domino.
6. Dump information about the Java Virtual Machine (JVM) for the HTTP job:
DMPJVM JOB(xxxxxx/QNOTES/HTTP)
Where xxxxxx is the six digit job number for the Domino HTTP job.
This command generates a spooled file called QDMPJVM.
Data to gather after the Domino server is restarted due to the hang
The information listed below can be gathered after you restart the Domino HTTP server.
1. Collect the iSeries system history log (QHST):
DSPLOG OUTPUT(*PRINT)
This command generates a spooled file called QPDSPLOG.
2. Gather the iSeries system operator message queue:
DSPMSG MSGQ(QSYSOPR) OUTPUT(*PRINT)
This command generates a spooled file called QPDSPMSG.
3. Generate a list of the program temporary fixes (PTFs) installed on the iSeries:
DSPPTF OUTPUT(*PRINT)
This command generates a spooled file called QSYSPRT.
4. Make a copy of LOG.NSF for the server that is hanging:
Open LOG.NSF of the Domino server that hung using a Lotus Notes client. Then issue
File -> Database -> New Copy (make sure you change the file name to something other
than LOG.NSF).
5. Make a copy of the NOTES.INI file for the server that is hanging:
Use the CPY command to make a copy of the NOTES.INI somewhere outside of the
Domino data directory. (Do not put the copy in the root ‘/’ of the IFS.)
6. Print out any licensed internal code logs (VLOGs) from the time of the hang:
a. Start the system service tools using the following command:
STRSST
b. Enter your SST user ID and password.
c. Select option 1 to Start a service tool.
d. Select option 5 for the Licensed Internal Code Log.
e. Select option 2 to Dump Entries to Printer from the Licensed Internal Code log.
i. Set Dump option to 3 for Header and entire entry.
ii. Leave the Entry ID and Entry type as the defaults.
iii. Change the Starting Date/Time to one hour before the hang started.
Note: These parameters require a Domino server restart to take effect. These
parameters should not impact performance on your Domino server. Monitor the size
of the SEMDEBUG.TXT file and delete the file if it gets too large. (You can delete the
file while the Domino server is active, but do not delete it if a Domino server hang is
currently occurring.)
A Domino server crash occurs when multiple Domino jobs end without a user issuing
ENDDOMSVR SERVER(servername) OPTION(*CNTRLD) on the iSeries command line or
QUIT in the Domino console. These two commands end the Domino server in a controlled
manner.
Note: The above commands can also be issued from a program without causing a Domino
server crash.
The following commands have been known to crash a Domino server if the proper steps have
not been taken:
ENDJOB
Domino jobs do not correctly process the signal from an End Job (ENDJOB) command. If
you issue an ENDJOB against a single Domino job, it can crash the entire Domino server.
To correctly end a single Domino job, you must use the Domino console command TELL
JOBNAME QUIT (for example: TELL ROUTER QUIT).
ENDSBS
The End Subsystem (ENDSBS SBS(sbsname)) command issues an ENDJOB command
against all the jobs running in the subsystem specified by the SBS parameter. As stated
previously, Domino jobs do not handle the ENDJOB command gracefully. You can safely
issue the ENDSBS command against a Domino subsystem if all the Domino jobs running
in that subsystem are already ended.
PWRDWNSYS
You must end the Domino server in a controlled manner before issuing the Power Down
System (PWRDWNSYS) command. One of the commands that a PWRDWNSYS runs is
the ENDSBS command. As stated previously, if the Domino server is not already ended,
this ENDSBS will crash Domino.
ENDDOMSVR with OPTION(*IMMED)
The *IMMED option should not be used unless the end Domino server (ENDDOMSVR
SERVER(servername) OPTION(*CNTRLD)) command failed to end the Domino server.
The reason for this is that the *IMMED option in the ENDDOMSVR command issues an
ENDSBS *IMMED. If the Domino jobs are still running, this ENDSBS *IMMED will crash
Domino.
GO SAVE option 21
To run a complete system save, you go to the SAVE menu and take option 21. This can be
referred to as a GO SAVE option 21. This option issues an ENDSBS SBS(*ALL)
OPTION(*IMMED). As mentioned earlier, an ENDSBS will crash the Domino server if the
Domino jobs are not already ended. Therefore, you should end the Domino server in a
controlled manner before issuing the GO SAVE option 21.
Important: You must use some judgement when trying to identify a problem job taking
too much CPU. For instance, if the UPDATE job always takes 25% of the CPU on your
system, it may be on the top of the list in WRKACTJOB or WRKSYSACT. But that may
be normal for your system. You may have to look at the second or third job in the list. If
the HTTP job is taking 20% of the CPU and it normally only takes 5%, then this might
be your problem job even though it is not the job with the highest CPU utilization on the
WRKACTJOB or WRKSYSACT screens.
2. Now that you have narrowed down the problem to a job(s), you must identify which
thread(s) in that job is generating the extra CPU:
a. Run the WRKACTJOB command and find the job you identified in step 1.
b. Enter 5 in front of that job and press Enter to work with the job information.
c. Take menu option 20 to display the threads in that job. If you are lucky, the job is single
threaded and you can continue with step 3. However, if there are multiple threads
running in this job, you must continue to check each individual thread to identify which
thread(s) is generating the extra CPU utilization.
i. Under normal conditions a thread can periodically be seen entering and exiting a
RUN status.
ii. The Total CPU column indicates how much time (in seconds) that particular thread
has been in the processor.
Note: The value in the Total CPU column does not directly relate to the CPU
percentage of the job.
iii. If a thread is generating most of the extra CPU utilization, then you may notice it has
a larger value in the Total CPU column than other threads. Or, you may notice that
the thread is constantly in a RUN status.
Remember, more than one thread may be responsible for the excess CPU.
iv. Write down the thread identifier for the thread(s) you believe may be responsible for
generating the extra CPU utilization.
Note: There are a few special things to be aware of when using the
CHGSYSLIBL command:
The CHGSYSLIBL command is shipped with a Public = *EXCLUDE authority.
Therefore, only the security officer or a user profile with *ALLOBJ special
authority can use this command.
The CHGSYSLIBL command only changes the system portion of the library
list for the job in which the command is entered - this will not change the
system portion of the library list for any other job on the iSeries.
The panel group that is used for this function only works well with Domino
jobs. If you attempt to display the call stacks of non-Domino jobs while using
this panel group, you will get incomplete information. You must signoff and
sign back on or run the following command to correct this issue:
CHGSYSLIBL LIB(NOTESSYS) OPTION(*REMOVE)
b. If you are not already on the Work with Threads screen from step 2, then you must get
back to that screen. Run the WRKACTJOB command and find the job that is
generating the extra CPU. Enter 5 in front of that job and press Enter. Take menu
option 20 on the Work with Job screen to list the threads. Now you are back on the
Work with Threads screen.
c. To display a call stack, enter 10 in front of the thread(s) you identified in step 2 and
press Enter.
d. Review the procedures in the call stack and try to identify what that thread is doing.
Thread: 00000084
ILE ILE
Procedure Statement Module program
NSFNoteUpdateExtended2 0000000043 NTUPWRAP LIBNOTES
DbMonitorEvalNote 0000000596 MONITORS LIBNOTES
MonitorEvalNote__FP16DBCONTEXT_STRUCTUiUl9 0000000730 MONITORS LIBNOTES
NSFComputeMainFormula2 0000001431 CNSFWRAP LIBNOTES
Eval__7ComputeFv 0000001764 COMPUTE LIBNOTES
ComputeVariants__8RootNodeFv 0000001397 COMPNODE LIBNOTES
ComputeVariants__14AtFunctionNodeFv 0000001171 COMPNODE LIBNOTES
Execute__10AtAbstractFv 0000001813 ATABSTRACT LIBNOTES
Abstract 0000000001 ABSTRACT LIBNOTES
AbstractInternal 0000000008 ABSTRACT LIBNOTES
DoChunks 0000000005 ABSTRACT LIBNOTES
FindChunksInText 0000000021 CHUNK LIBNOTES
FindEndOfTextChunk 0000000034 CHUNK LIBNOTES
NextLine CHUNK LIBNOTES
Cstrpbrk 0000000004 CSTR LIBNOTES
Bottom
F3=Exit F10=Update stack F11=Display instruction F12=Cancel
e. In the example call stack listed in Figure B-2, notice the DbMonitorEvalNote procedure
and the FindChunksInText procedure. Monitors are used for both kinds of mail rules -
mail rules that are set in an individuals’ mail file and mail rules that can be set for the
entire Domino server in the Domino 6 code. The procedure FindChunksInText sounds
like the thread is searching for something in the text of a document. This call stack is
telling you to look at mail rules (specifically, look for mail rules that may be searching
the body or subject of an e-mail for certain words or phrases).
Tip: Do not let call stacks scare you. Usually, some procedure in the call stack will tell
you what a particular thread is doing.
For example:
UpdateFullTextIndex and FTIndexExt are both doing indexing work.
ICConvertMIMEBody is converting a piece of e-mail.
DoFreeTimeLookup is doing a freetime lookup in a calendar.
4. If you cannot identify the issue causing the excessive CPU at this point, then you need to
gather some information/traces while the problem is occurring and contact Lotus Support.
Attention: The DMPCLLSTK command is not shipped with Domino 6.0.2 CF1 or
OS/400 V5R2M0. To get this command, you must download the DMPCLLSTK
application available at:
http://www.ibm.com/servers/eserver/iseries/domino/devtools/dmp/
and load it on your iSeries. This application will also function with earlier releases of
Domino.
Summary of problem
A checksum is a count of the number of bits in a TCP or UDP packet that is included in the
header of the packet. It is included so that the receiver can check to see whether the same
number of bits that were sent arrived at the destination. If the counts match, then it is
assumed that the complete transmission was received. If the counts do not match, then the
packet must be sent again.
The count is not sent as a simple number. The count is hashed into a value that must be
decoded on the receiving system. This adds an extra check to confirm that the complete
contents of the packet were received.
Different platforms can use different algorithms to hash the checksum number. If the sending
platform and the receiving platform use different algorithms, it is possible that the receiving
system believes the checksum is incorrect even if it is not. This incorrect checksum will cause
the sending system to retransmit the packet. If enough packets need to be retransmitted, it
can affect the performance of the iSeries.
Important: A problem with checksum is only one possible cause of retransmissions. There
are other network issues that can cause retransmissions.
Bottom
Press Enter to continue.
F3=Exit F5=Refresh F6=Print F8=Display jobs F9=Command line
F12=Cancel F14=Display port numbers F24=More keys
Notes:
The CFGOBJ parameter is the name of an active line - check CFGTCP option 1.
You may have to run a trace on each active line to look for this problem.
Do not trace the LOOPBACK line.
b. Let the trace run for a few minutes and then end it using:
ENDCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN)
c. Print the communications trace with the command:
PRTCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN) CODE(*ASCII) FMTTCP(*YES) SLTPORT(1352)
FMTBCD(*NO)
Notice that you are formatting the trace for TCP/IP data on port 1352.
d. Review the communications trace and look for retransmissions.
You can use the command WRKJOB OPTION(*SPLF) and option 5 to display the
QPCSMPRT spooled file that contains the communications trace data.
You must specify at least three components of the conversation to get accurate
retransmission information. For example, you can specify the Source IP Address,
Destination IP Address, and Source Port.
The IBM Support Library Tools for OS/400 can be ordered as a PTF. For V5R2M0
order PTF SE06946, for V5R1M0 order SE02231. Follow the instructions received
with the download to restore the library to your iSeries.
If you are not using the QSPTLIB tools, here are a few things you need to know to
identify a packet retransmission:
The retransmission must occur in a single conversation.
– A single conversation is defined by a unique port pair with the same
source/destination address pair.
A retransmission occurs when the network packet has a data length greater than
50 bytes and has the same sequence number (SEQ Number).
– For an example, please see the retransmission in Figure C-2:
• The port pair is 3855 and 1352.
• The source/destination addresses are 10.1.1.4 and 10.1.1.16.
• The data length is greater than 50 bytes.
• The SEQ Number is the same for both packets. It is 1277025586.
Note: One example of a function that requires checksum is Independent Auxiliary Storage
Pools (iASP). This is the function when a set of disks can be switched between two iSeries
systems or partitions.
If nothing else on the iSeries requires checksum, then disable it using the Change TCP/IP
Attributes command:
CHGTCPA UDPCKS(*NO)
CHGTCPA UDPCKS(*NO) is dynamic, so you do not need to restart TCP/IP for the change to
take effect.
Also, the parameter text for UDPCKS says it is the UDP checksum. But in fact, both TCP and
UDP checksums are controlled by this parameter. So changing this attribute to *NO disables
both UDP and TCP checksum on the iSeries.
Summary of problem
You can configure the iSeries to load balance network traffic across any number of network
interfaces that share a common route.
For example: ServerA has four network interfaces on four separate network adapters:
10.1.1.1
10.1.1.2
10.1.1.3
10.1.1.4
A single default route is defined to 10.1.1.5 as shown in the default route configuration in
Figure C-3.
Bottom
F3=Exit F5=Refresh F6=Print list F11=Display type of service
F12=Cancel F17=Top F18=Bottom
As a result, any adapter can be used to send data from the system. Requests received on
10.1.1.1 may be responded to from the network adapter with the 10.1.1.4 interface. The
response would carry the 10.1.1.1 return address and the 10.1.1.4 MAC address.
All TCP network traffic contains the IP address and the MAC address of the network adapter.
In this situation, the address 10.1.1.1 could be sent with the MAC address of any one of the
network adapters. This is a valid configuration on the iSeries.
Some intelligent switches, such as the Cisco 6509 series, dynamically generate a route table
which includes not only the IP address of each host but the MAC address of the adapter
which owns the IP address. As a result, when the iSeries sends a frame with the IP address
of 10.1.1.1 and the MAC address from the 10.1.1.4 adapter, the switch will purge the entries
for both adapters from it's internal table assuming both are in error. The switch then sends an
ARP broadcast to generate new table entries.
2. If there is more than one active NIC on the system, then you need to check the TCP/IP
routes and see if they are bound to specific interfaces. This issue cannot occur if each
active NIC has its own preferred route defined.
a. Enter the following command in a 5250 emulation session:
CFGTCP
b. Select menu option 2 to Work with TCP/IP Routes.
c. The problem described in this section can occur at your site if you have multiple active
NICs but only one configured route for all interfaces (compare to Figure C-3 on
page 594).
3. Find out if your hardware (router/switch) is configured to use dynamic route tables. Each
router/switch is different, so you may have to ask your network administrator. If the
router/switch is configured to use dynamic route tables, then you could be experiencing
this problem. If your router/switch is using static route tables or does not store the MAC
address, then this issue is not occurring.
4. Even if your configuration can experience this problem, it does not mean that you are
experiencing performance problems because of it. To see how much this type of
configuration is affecting your performance, take a communications trace and look for ARP
broadcasts and changing MAC addresses.
a. Start the communications trace using:
STRCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN) MAXSTG(16M) USRDTA(*CALC)
The CFGOBJ parameter is the name of one of the active lines you found in step 1.
b. Let the trace run for a few minutes and then end it using the following command:
ENDCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN)
c. Print the communications trace with the PRTCMNTRC command:
PRTCMNTRC CFGOBJ(ETHLINE) CFGTYPE(*LIN) CODE(*ASCII) SLTCTLD(*ALL) FMTTCP(*YES)
FMTBCD(*YES)
Notice that the data is formatted for TCP/IP and Broadcast data.
d. Review the communications trace and look for two things:
i. A high number of ARP broadcasts
ii. Changing MAC addresses in a single conversation
e. You can use the WRKJOB OPTION(*SPLF) and option 5 to display the QPCSMPRT file
that contains the communications trace data.
i. To find ARP broadcasts, search for the word ARP (all in capital letters).
Use the Find field and the F16 key to search the spooled file.
Count the number of times an ARP broadcast occurs in your trace.
You must use your own judgment to determine if you are seeing too many ARP
broadcasts.
For example, if you ran a 3 minute trace and count 50 ARP broadcasts, then you
should consider changing your TCP/IP configuration to fix this problem.
Figure C-5 shows an example of an ARP broadcast in an iSeries communications
trace.
The IBM Support Library Tools for OS/400 can be ordered as a PTF. For
V5R2M0 order PTF SE06946, for V5R1M0 order SE02231. Follow the
instructions received with the download to restore the library to your iSeries.
If you are not using the QSPTLIB tools, here are a few things you need to know:
A single conversation is defined by the port pair (that is the source port and
the destination port) and the source and destination addresses.
– In Figure C-6 the port pair is 1352 and 3853.
To determine if the MAC address is changing, you must find two packets sent
from the iSeries in a single conversation to the same destination that have
different source MAC addresses.
– In Figure C-6, notice that:
• The two packets in the screen capture are in the same conversation
(port pair: 1352/3853) and are both going in the same direction (source
address for both packets: 10.1.1.4 which is the iSeries in this example).
• Notice that the Source MAC Address for those two packets are
different, one is 000944AF54BC and one is 00000C07AC01.
There are two methods to correct this problem (you only need to use one method):
1. Change the router/switch to use static entries for the Domino system. By creating static
entries, the device never purges it's table, thus avoiding the performance issues.
2. Change the TCP/IP configuration on the iSeries so that each active NIC has its own
preferred route.
Run the Add TCP/IP Route (ADDTCPRTE) command to create a TCP/IP route for each
interface.
ADDTCPRTE RTEDEST(*DFTROUTE) SUBNETMASK(*NONE) NEXTHOP('10.1.1.5')
BINDIFC('10.1.1.2')
Please refer to Figure C-7 to see an example of preferred bindings on the Work with
TCP/IP Routes screen.
Bottom
F3=Exit F5=Refresh F6=Print list F11=Display type of service
F12=Cancel F17=Top F18=Bottom
Activity Level
This section describes an issue with the iSeries activity levels and jobs going ineligible.
Summary of problem
On the iSeries, activity level refers to how many processes can compete for the CPU(s) at the
same time. A process can be a licensed internal code (LIC) task or a thread in a job.
Here is a simple example: If the activity level is set to ten and there are eleven processes that
want to use the CPU(s) at the same time, then one process goes ineligible. There may be
more than eleven processes on the system, but only eleven of the processes want to use the
CPU(s) at the same time in our example. If thirteen processes wanted to use the CPU(s) at
the same time, then three processes would go ineligible.
During normal system operations, you want zero processes to be going ineligible.
Note: Each process running on the iSeries requires memory. The more processes
running, the more memory in use on the system. If more memory is required than the
amount of memory installed on the system, then the system experiences a high rate of
paging. This paging rate can become so high that the system does (relatively) little other
work. This situation is called page thrashing. The way to control thrashing is called
Multiprogramming Level (MPL).
MPL is a number. It defines the maximum number of processes which may be in RUN
status, per storage pool, at any given instance.
Each storage pool has its own MPL number. That number can be seen on the Work with
System Status (WRKSYSSTS) screen in the Max Active column.
The Max Active value controls the maximum number of processes which may be eligible
for the CPU(s), per storage pool, at any given instance. So, to keep the system from
thrashing (excessive paging and faulting), you must not set the Max Active value too high.
However, if you set Max Active too low, then jobs go ineligible and take longer to run, thus
slowing performance.
To identify a performance problem with the activity level on your iSeries, you need to check
the Work with System Status (WRKSYSSTS) screen. There are many possible causes for
high paging and faulting in the storage pools, however, this is beyond the scope of this
appendix. We are only covering the problem where the activity level is too small.
1. To check if any processes are going ineligible, use the following command:
WRKSYSSTS
2. Change to Assistance Level 2 (Intermediate) if you are not already using it:
– Press the F21 key to access different assistance levels.
– Select option 2 for the Intermediate level.
– Press Enter.
As stated previously, during normal system operations, you want zero processes to be going
ineligible.
If processes are repeatedly going ineligible, then you have problems with the activity level on
your system.
Summary of problem
OS/400 does not automatically adjust the operating system time settings for daylight savings.
This is done for a number of reasons. For instance, if you have an application that sorts
entries by timestamps, then there could be two sets of data with the same timestamps in the
fall when daylight savings ends. (When daylight savings ends in the fall, there will be two
hours that span the 1:00 AM to 2:00 AM time period.)
This means that you have to manually change the system time if your geography observes
daylight savings. The Domino server must be stopped before the system time is changed and
restarted after the change.
The easiest way is to check the iSeries system history log (QHST) for a message stating that
the time was changed on the iSeries and then checking the Domino server to see if the server
was restarted after the time setting was changed. This is explained in “Check QHST and
Domino server” on page 601.
If for some reason you cannot use the history log and Domino console to identify this
problem, then you need to examine the call stacks of the jobs with high CPU utilization. See
“Examine call stacks of jobs with high CPU utilization” on page 603 for information.
Bottom
Press Enter to continue.
Figure C-9 Example of the output from F9 when in the Additional Message Information screen
2. If you find that a time related system value was changed, check the Domino server to see
if the server was restarted after the change was made.
Issue the SHOW SERVER command in the Domino console and check the Elapsed time
value as shown in Figure C-10.
Lotus Domino (r) Server (Release 6.0.2CF1 for OS/400) 08/12/2003 18:33:09
Figure C-10 SHOW SERVER command to check the Elapsed time parameter
Note: The value in the Total CPU column does not directly relate to the CPU
percentage of the job.
• If a thread is generating most of the extra CPU utilization, then you may notice it has
a larger amount of Total CPU than the other threads. Or, you may also notice that
the thread is constantly in a RUN status.
b. Write down the thread identifier for the thread(s) you believe may be responsible for
generating the extra CPU utilization.
3. Once you find the thread(s) generating the extra CPU utilization, you need to look at the
call stack to find out what that thread is doing.
Domino call stacks usually contain very long procedure names that may not be easily
readable. To make these names easier to read, you can use a special panel group that is
Note: There are a few special things to be aware of when using the CHGSYSLIBL
command:
The CHGSYSLIBL command is shipped with public *EXCLUDE authority.
Therefore, only the security officer or a user profile with *ALLOBJ special
authority can use this command.
The CHGSYSLIBL command only changes the system portion of the library list
for the job in which the command is entered - this does not change the system
portion of the library list for any other jobs on the iSeries.
The panel group that is used for this function only works well with Domino jobs. If
you attempt to display the call stacks of non-Domino jobs while using this panel
group, you get incomplete information. You must sign off and sign back on or
issue the CHGSYSLIBL LIB(NOTESSYS) OPTION(*REMOVE) command to correct this
issue.
To display a call stack on the Work with Threads screen, place a 10 in front of the thread(s)
you identified as responsible for the extra CPU and press Enter.
Look at the procedures listed in the call stack and try to identify what that thread is doing.
If the GetTimeOfDay procedure appears repeatedly in the call stack, then you are most
likely having the Daylight Savings Time problem.
If you cannot use the history log and Domino console to identify this problem, then you can
use a Performance Explorer (PEX) trace, also called a TPROFS trace.
1. Find a Domino job utilizing a lot of CPU (use the WRKACTJOB command as described
earlier in this section).
Write down the job name, user name, and job number for the job taking the extra CPU.
2. Create a library to store the PEX data in using the following command:
CRTLIB LIB(PEXHOLD)
3. Next, create a PEX definition specific to the job you found in step 1:
ADDPEXDFN DFN(JOBCPU) TYPE(*TRACE) JOB((xxxxxx/QNOTES/jobname)) TASK(*ALL)
MAXSTG(100000) INTERVAL(5) TRCTYPE(*SLTEVT) SLTEVT(*YES) BASEVT(*PMCO)
Where xxxxxx is the six digit job number you wrote down in step 1.
4. Start the PEX trace:
STRPEX SSNID(CPU1) DFN(JOBCPU)
Let the trace run for 3 - 4 minutes while the CPU is high.
5. End the PEX trace:
SBMJOB CMD(ENDPEX SSNID(CPU1) DTALIB(PEXHOLD)) JOB(ENDPEX)
6. Wait for the ENDPEX batch job to end before printing out the PEX report. You can
check the status of this job using the command
WRKSBMJOB
Wait for the job called ENDPEX to have a status of OUTQ.
7. If you have the iSeries Performance Tools (5722-PT1) installed on your system, then
you can print out the PEX report using
SBMJOB CMD(PRTPEXRPT MBR(CPU1) LIB(PEXHOLD) TYPE(*PROFILE) PROFILEOPT(*SAMPLECOUNT
*PROCEDURE)) JOB(PRTPEX)
This command generates a spooled file called QPVPERPT in the batch job you
submitted. In this example, the batch job you submitted is called PRTPEX - use the
command WRKJOB JOB(PRTPEX) to find the spooled file.
8. Display the spooled file and search for the second Histogram section:
WRKJOB JOB(PRTPEX) OPTION(*SPLF)
Search on Histogram in the Find field using F16.
The first Histogram section contains information on libraries and LIC components.
The second Histogram section contains information on procedures and programs.
You are looking for procedures like masolockmutexbla and TimeOfDayClock with high
hit counts to identify if you are having this problem.
Summary of problem
In Domino 6, you have the ability to set up mail rules on your Domino server. Unlike the mail
rules in Domino R5 that ran in individual user’s mail files, these rules run against the
MAIL.BOX and affect all messages on the server (this includes SMTP and NRPC messages).
When MAIL.BOX receives a new message, the server evaluates the fields in the message
against the registered mail rules. If the message meets a defined condition, then Domino
takes the specified action for that message.
Important: Server based mail rules are not intended to serve as a complete antivirus
solution. Mail rules do allow you to quarantine a message with a known virus attachment,
but they do not have other features that are usually found in antivirus software.
Mail rules are meant to compliment your antivirus software. They can also help you limit
SPAM, control mass mailings, etc.
For more information on the use of antivirus software, please refer to Chapter 9, “Antivirus
protection” on page 405.
One of the conditions allowed in the Domino 6 mail rules is a scan of the Body field of an
e-mail. This means that you can setup a mail rule to search the body of an e-mail for a
particular word.
Once a rule is registered, it runs against all new mail. If you have rules configured to search
the body of a message for a particular word, then the CPU utilization of the SERVER task can
increase dramatically. (The Domino 6 mail rules run in the SERVER task.)
This CPU increase is true on all platforms, not just the iSeries.
There is an article on Domino 6 mail rules and performance at the developerWorks : Lotus
LDD Today Web site. The article is called Domino 6 server mail rules and can be found at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/8c486fc2ccc664e08525
6cbe004588f8?OpenDocument&Highlight=0,rules
This article mentions tests run on a Netfinity® system with four 700 MHz Xeon processors
and 2 GB of memory, running Windows 2000. The tests used an IBM EXP200 array,
configured for RAID0, for the data files. The workload simulated 3,000 Notes 6 mail users.
See Table C-1 for the results of those tests.
Notice that searching the body of e-mails caused the largest increase in CPU.
2. Confirm that the SERVER task is responsible for the high CPU on your system:
WRKACTJOB
Move the cursor onto the CPU% column.
Press the F16 key to sort the jobs by CPU.
Press the F10 key repeatedly to watch the CPU changing.
See if the SERVER job is taking a large amount of the CPU on the system.
Write down the job number for the SERVER job taking the CPU.
3. Check the threads in the SERVER job generating high CPU to see if they are processing
mail rules:
WRKJOB JOB(xxxxxx/QNOTES/SERVER)
Where xxxxxx is the six digit number of the SERVER job generating extra CPU.
As stated previously, Domino call stacks usually contain very long procedure names that
may not be easily readable. To make these names easier to read, you can use a special
panel group that is shipped with the Domino server product. This panel group displays
longer procedure names on the Display Call Stack screen. To use this panel group, follow
these steps:
– Use the Create Library (CRTLIB) command to create a new library:
CRTLIB LIB(NOTESSYS)
– Use the Create Duplicate Object (CRTDUPOBJ) command to make a copy of the
panel group in the new library you created:
CRTDUPOBJ OBJ(GWVJOB) FROMLIB(QNOTES) OBJTYPE(*PNLGRP) TOLIB(NOTESSYS)
NEWOBJ(QGWVJOB)
– Use the Change System Library List (CHGSYSLIBL) command to add the new library
to your library list (the new library must be listed before the QSYS library):
CHGSYSLIBL LIB(NOTESSYS)
(For more information about the CHGSYSLIBL command, see the Note on page 603.)
On the Work with Job screen, take option 20 to display the threads.
This parameter outputs information from both the execution and trigger of the system rules. If
a rule is triggered, then the Domino console shows the execution and the action immediately
after. If there is no action, then only the execution is shown.
To identify if your CPU/performance problems are related to this issue, you can enable this
debug parameter and watch the output in the Domino console. If the SERVER task CPU is
high and the console is constantly displaying messages about Monitor traces, then you are
probably experiencing this issue.
Select the Additional materials and open the directory that corresponds with the redbook
form number, SG246937.
The publications listed in this section are considered particularly suitable for a more detailed
discussion of the topics covered in this redbook.
IBM Redbooks
For information on ordering these publications, see “How to get IBM Redbooks” on page 615.
Note that some of the documents referenced here may be available in softcopy only.
IBM Lotus Domino 6 for iSeries Implementation, SG24-6592
Lotus Domino 6 for iSeries Multi-Versioning Support on the IBM eServer iSeries Server,
SG24-6940
Domino for iSeries Domino for iSeries Sizing and Performance Tuning, SG24-5162
Coexistence of Multiple Lotus Domino Releases in an LPAR Environment on the IBM
eServer iSeries Server, SG24-6593
iNotes Web Access on the IBM Server iSeries Server, SG24-6553
Lotus Domino for AS/400: Problem Determination Guide, SG24-6051
Lotus Domino for AS/400 R5 Implementation, SG24-5592
Upgrading to Lotus Notes and Domino 6, SG24-6889
Lotus Domino 6 spam Survival Guide for IBM eServer, SG24-6930
Domino Designer 6: A Developer’s Handbook, SG24-6854
Getting the Most From Your Domino Directory, SG24-5986
Distributing Notes Clients Automatically, REDP3693
New features of Domino 6.0.1: Single Copy Template, REDP3681
Installing Tivoli Storage Manager and Tivoli Storage Manager APIs on the Same IBM
iSeries Server, TIPS0293
Slicing the AS/400 with Logical Partitioning: A How to Guide, SG24-5439
LPAR Configuration and Management: Working with IBM eServer iSeries Logical
Partitions, SG24-6251
Managing OS/400 with Operations Navigator V5R1 Volume 5: Performance Management,
SG24-6565
IBM Content Manager CommonStore for Domino, Exchange, and SAP, SG24-6405
Implementing Windows Terminal Server and Citrix MetaFrame on IBM eServer xSeries
Servers, REDP-3629
IBM eServer iSeries in Storage Area Networks: Implementing Fibre Channel Disk and
Tape with iSeries, SG24-6220
Introduction to Storage Area Networks, SG24-5470
iSeries IP Networks: Dynamic!, SG24-6718
All You Need to Know When Migrating from IBM Firewall for AS/400, SG24-6152
Online resources
These Web sites and URLs are also relevant as further information sources:
iSeries Information Center:
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm
Lotus Software for iSeries Compatibility Guide:
http://www.ibm.com/servers/eserver/iseries/domino/domino6/releasesupport4up.pdf
Domino for AS/400: Application Sizing Examples:
http://www.ibm.com/servers/eserver/iseries/domino/d4appsz.htm
Lotus Notes, Domino, and Domino Designer Release Notes 6.0.2:
http://www.lotus.com/ldd/doc/domino_notes/6.0.2/readme.nsf
Installing and Managing Domino 6 for iSeries:
http://www.lotus.com/ldd/notesua.nsf/0b345eb9d127270b8525665d006bc355/505c677e79adb5
9100256c44003288ee?OpenDocument
Introduction to Multi-versioning Domino for iSeries:
http://www.ibm.com/servers/enable/site/domino/downloads/multiversion.pdf
Policy-based system administration with Domino 6:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/d78ede75b351cf81
00256be9005b7d35?OpenDocument&Highlight=0,internet,site
Installing and Managing Domino 6 for iSeries:
http://www.lotus.com/ldd/notesua.nsf/0b345eb9d127270b8525665d006bc355/505c677e79adb5
9100256c44003288ee?OpenDocument
Planning for Domino on iSeries: Resources, Subsystems, Partitioning, and Clustering
http://www.ibm.com/servers/esdd/articles/domino_iseries.html
Administering Domino Clusters:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
Domino 6 server mail rules and can be found at:
http://www.lotus.com/ldd/today.nsf/62f62847467a8f78052568a80055b380/8c486fc2ccc664e0
85256cbe004588f8?OpenDocument&Highlight=0,rules
Administering the Domino System, Volume 1:
http://www.lotus.com/ldd/notesua.nsf/ddaf2e7f76d2cfbf8525674b00508d2b/2f6cd8057c3602
bf85256b5800681d38?OpenDocument
Index 619
Caching server 108 Collect historical performance data 125
CALCONN task 88 Collection profile 136
Calendar connector 88 Collection retention period 136, 139
Call stack 180, 189 Collection task 135
Capacity planning 464 Configuration 136
CCSID 193 Configure data collection 136
Certificate 246 Data stored in QAPMDOMINO 170
Certification authority 39, 53 Default collection interval 136
Certifier ID files 53 Disk requirements 135
CFGDOMSVR 84, 279 Graph History 139
CFGDOMSVR RPLCFG(*NO) 278 Library QMPGDATA 135
CFGSM 426 Library QPFRDATA 135
CFINT 191 Number of transactions 155
Change Attribute command 218 QAPMDOMINO
Change Domino Server 84 DMSRVN field 170
Change Job 187 DMSSDT field 170
Change management process 70 DTETIM field 170
Backout plan 71 QAPMDOMINO file 167
Change control request form 70 Reports
Change requests 71 Create New Data Source 155
Checksum 202, 590 Domino transactions 155
CHGATR 218, 220 Filter data 159
CHGDOMSVR 84 Import Data 161
CHGSYSVAL 210–211, 600 Mail 166
CHGTCPA 593 Peak concurrent users 166
Cisco 6509 594 PivotTable 162
Citrix ICA Client 109 Save Query 160
Citrix Metaframe 109 Select columns 158
CIW 456, 497 Sort Order 159
CL commands 31 Sample reports 154
CL program 282, 339 Start 137
Schedule 283 From Performance Tools menu 137
CLADMIN task 88 Through PM/400 137
CLDBDIR task 88 Through System monitors 138
Client access methods 7 Using Collection Services APIs 137
Domino Access for Microsoft Outlook 8, 457 Using iSeries Navigator 137
Domino Web Access 8, 457 Statistics categories 136
IMAP 8, 457 Stop
Lotus Notes client 8, 457 Using iSeries Navigator 138
Multi-user workstation 8 View data
POP3 8, 457 As spreadsheet 151
Roaming user 8 Collection points 140
WebMail 8, 457 Display query results 151
Client conversion factor 4 Domino performance data 139
Client strategy 7 Download into spreadsheet 151
ClockType 25, 44 Export Graph History 141
CLREPL task 88, 90, 475 Graphical view 139
Cluster administration process 88 iSeries performance data 139
Cluster Analysis 67 Query/400 144
Cluster Database Directory Manager 88 Using iSeries Navigator 139
Cluster Manager 89 Using workstation tools 142
Cluster replication task 475 Collection Services APIs 137
Cluster Replicator 88, 90 Collection Services job 135
Cluster server 89 Collection Services properties 139
Clustered servers 249 Collection task 135
Clustering architecture 14 Collector task 112
COLLECT task 88 COLSRV400 task 88, 134–135
Collecting statistics 474 Command
Collection Services 27, 88, 129, 134 ADDENVVAR 235
*MGTCOL 135 ADDJOBSCDE 384
Index 621
Create CL program 87 Include/exclude processing options 367, 376
Create class 196 Incremental backup 253, 375, 378
Create Save File command 280 Incremental backup strategy 382
Critical Fixpack 277 Daily incremental backups 382
Cross-certification 40 Weekly inactivation of archived transaction logs
CRTSAVF 280 383
CVTDIR 218 Weekly selective backups 382
incremental command 381
Incremental daily backups 381
D Installation 357
DASD 175, 197, 227, 466 Instance 363
Permanent storage utilization 175 Logging information 397
Spooled files 181 Management Class 396
Temporary Domino files 181 Offline status 385
Transaction logs 183 Partitioned Domino servers 372
Temporary storage utilization 175 Performance
Data backup 109 Network 397
Data integrity 252 TCPBUFFSIZE 396
Data Protection for Domino 243, 249–250, 254, Point in time recovery 251, 382
257–258, 353 Preferences configuration 376
Activate databases restore command 385
activatedbs command 389–390 Restore databases
APPLYLOGS parameter 391 Activation 389
query pending command 389 Parameters 386
Apply updates from transaction logs 385 ACTIVATE 387
Architecture 356 INTO 386
archivelog command 379, 381 New filename 386
Backup strategy 381 PICK 388
Backups with circular or linear transaction logging PICK=SHOWALL 389
382 PIT 386
Backups without transaction logging 382 Restore a specific version 386
Commands 356 To point in time 391
Configuration 361 Restore Domino database 384
TCPBUFFSIZE 396 Sample configuration files 398
Configuration files 363–364 Scheduled operations 383
Database activation 385 Scripts 383
Database backup Incremental backup 401
Incremental/Selective 355 Log archiving 401
Disaster recovery 393 Log inactivation 401
domdsm.log file 398 Selective backup 401
domdsmc 356 scripts 398
domdsmc restorelogarchive command 394 Selection formulas 376
dominstall program 362 Selective backup 375, 377
Environment variables 368 selective command 381
.profile file 368 Set up additional instances 373
DOMI_CONFIG 368 Subdirectory processing 376
DOMI_LOG 368 Suffix .dad 385
DSMI_CONFIG 369 Weekly full backups 381
DSMI_LOG 369 Data protection for Domino
LANG 369 Incremental backups 251
PATH 369 Data Protection for Domino configuration 396
QIBM_MULTI_THREADED 369 Data Protection for Domino configuration files 399
export command 368 domdsm.cfg 364
set 368 dsm.opt 364
EXCLUDE statement 367 dsm.sys 364
Full daily backup strategy Preferences file 364
Daily incremental backups 382 Storage Manager client options file 364
Daily selective backups 382 Tivoli Storage Manager system options file 364
Weekly incremental backups 382 Data Protection for Domino instance 372
Full daily backups 381–382 Data Protection for Domino operations 396
INCLUDE statement 367
Index 623
Domino 6.0.3 247 Batch 25
Domino 6.5 247 Domino Server Installation wizard 24
Domino Access for Microsoft Outlook 8 LODRUN 24
Domino Access for MS Outlook 473 RSTLICPGM 24
Domino Administrator 8 Tips 25
Domino agents 103 Domino installation prerequisites
Domino anti-spam features 413 Authorization 23
Domino APIs 258 Domino instance 470
Domino application Domino jobs 77, 88, 189
Complexity rating 478 ADMINP 88
Domino application sizing 483 AMGR 88
Domino applications 468, 483, 528 BILLING 88
Domino backup strategy 375 CALCONN 88
Domino C API Toolkit 16 CLADMIN 88
Domino CA 53 CLDBDIR 88
Domino Change Manager 112 CLREPL 88
Domino cluster 89, 249, 344 COLLECT 88
Benefits 89 COLSRV400 88
Database replicas 90 COMPACT 88
Failover 89 CONTROLLER 88
Mail databases 90 DECS 88
Mail replicas 90 DESIGN 88
Performance impacts 90 EVENT 88
Workload balancing 89 FIXUP 88
Workload distribution 89 HTTP 88
Domino clustering 10, 34, 258, 475, 508, 528 LOGASIO 88
High availability 458 QNNINBRM 88
Load balancing 458 QNNINSTS 88
Domino console REPLICA 88
QUIT 267 REPORT 88
Domino console commands 71 ROUTER 88
Domino data directory 15, 223, 245, 248 Run priority 187
Ownership 278 SCHED 88
Domino data directory size 289 SERVER 88
Domino database size 290 SMTP 88
Domino Designer 8 STATLOG 88
Domino Directory STATS 88
$ServerAccess view 51 UPDALL 88
$Users view 51 UPDATE 88
Domino Directory maintenance 48 Domino libraries 245
Domino Directory management 48 QNOTES 244
Domino directory services 48 QNOTESAPI 244
Domino Document Manager 91 QUSRNOTES 244
Domino domain 71 Domino Mail Manager 64
Domino Enterprise Connection Services 88 Domino Mail Manager See ISSL Domino Mail Manager
Domino environment documentation 48 Asset
Domino files in IFS 246 Domino maintenance 103
Domino for iSeries models 487, 497 Domino maintenance schedule 65
DB2 processing 497 Daily tasks 65
Domino for iSeries server properties 28 Monthly tasks 68
Domino for iSeries Web site 276 Weekly tasks 67
Domino hangs 574 Domino Maintenance Updates See MU
Domino HTTP hang 578, 580 Domino memory management 230
Domino HTTP server 108 Domino multi-versioning 9
Domino IFS directories Domino multiversioning 25
/QIBM/ProdData/GUIplugin/LOTUS.DOMINO 244 Domino naming convention 11
/QIBM/ProdData/LOTUS/NOTES 244 Domino objects 244
/QIBM/UserData/LOTUS/NOTES 244 Data queues 244
Domino implementation 244 Job queues 244
Domino installation Subsystems 244
Index 625
Domino workloads 464 Attachment handling 411
Domino.Doc 58 Inappropriate e-mail content 411
Domino.Doc See Lotus Domino Document Manager Policy violations 412
Domino.Doc See Domino Document Manager Sensitive information 411
Domino.Doc See IBM Lotus Document Manager User education 411
domino_classes file 196 Encryption 118
dominstall 362 Encryption keys 39
DOMLOG.NSF 69 End communications trace 591, 596
DOS attack 406–407 End Domino server
Downtime 109 Wait time 282
DPAR See Domino partition End Subsystem 81
DPOOL 233–234 ENDCMNTRC 591, 596
Allocation size 234 ENDDOMSVR 74, 581
Fragmentation 234 ENDJOB 581
Memory allocation 234 ENDPEX 605
DRDA 486, 493 ENDSBS 81, 581
DSD 464, 486, 493, 496 Enterprise backup solution 64
DB2 capacity 487 Enterprise Document Management 64
dsm.opt 364, 366, 374, 399 Enterprise Mail Management policy 58
Configuration Parameters Enterprise Mail Management strategy 64
Servername 366 Entity tags 239
dsm.sys 364, 373, 399 Environment variable 234
Configuration Parameters 364 Environmental planning
COMMethod 365 Actual Bandwidth Requirement 6
NODEname 365 Effective Bandwidth Requirement 6
PASSWORDACCESS GENERATE 365 Network bandwidth 6
PASSWORDDIR 365 Peak user concurrency 6
Servername 365 Required Per-User Bandwidth 6
TCPPort 365 Server placement 5
TCPServeraddress 365 Site distribution 5
DSPDOMCSL 75 User distribution 4
DSPLNK 222 User topology 4
DSPLOG 575, 579, 582, 587 Workload balance 4
DSPMSG 575, 579, 582, 587 Environmental planning checklist 4
DSPPTF 277, 576, 579, 582, 587 ETags 239
DSPSFWRSC 276 Event Handler 38
DSPSYSVAL 600 EVENT task 88
DST_Begin_Date 44 Exception policy 17
DST_End_Date 44 Execution Control List 17
DSTLaw 44 Execution control list See ECL
Dynamic priority scheduler 193 export command 368, 370
Dynamic priority scheduler See System value Extended ACL 105
DYNPTYSCD Extended administration server
Dynamic route tables 595 Concept 104
DYS 65 Namespace 104
Extended Directory Catalog 99
Extended directory catalog See EDC
E
ECL 17, 41, 56
Consistent 41 F
ECL settings 108 Fail over mode 547
EDC Fail over mode scenario 480
Edit File 83 Failover 34, 89
Edit NOTES.INI 83 Fault tolerance 14
EDTF 83, 289 Faulting 122, 173
Effective Bandwidth Requirement 6 Fax for Domino See IBM Integrated Domino Fax for
EICAR virus file 440 iSeries
e-mail Fibre channel 110
Content filtering 409 File directory structure 15
e-mail journaling 406 File Protection document 42
e-mail usage policy 411 Files preferences 71
Index 627
5.2.0 243 Ineligible 212, 598
IBM Tivoli Storage Manager for Mail 5.2 Data Protection Ineligible jobs 122, 183, 598
for Lotus Domino 355 Information Security Policy 118
IBM Tivoli Storage Manager for Storage Area Networks Initialize tapes
354 Volume identifier 291
IBM Tivoli Storage Manager scheduler 383 iNotes Web Access
IBM Tivoli Storage Manager server 299–300, 309, 320, Storing ID file 54
323, 329, 343 iNotes Web Access See Domino Web Access
Activity Log 398 Install Shield 277
File space 396 Installation
Password access option 365 Domino code 277
IBM Tivoli Storage Manager system 395 Installation methods 24
IBM Workload Estimator See WLE Installation recommendations 24
IBM_TECHNICAL_SUPPORT subdirectory 182 Instance 470
ICA client 109 Integrated file system 270
ICM 89 Integrated servers 307
ID file 52 Intellectual capital 57
ID file location 246 Intended Recipient Controls 413
ID file naming standards 52 Interactive Card 122
ID files Interactive workload 191, 217
Manage 54 Internal data transfer band width 499
Recover 55 Internet Authentication 42
Store 54 Internet certificate 39
ID recovery 55 Internet client authentication 42
IFS 27, 107, 218, 244, 246, 270, 285–286 Internet Cluster Manager See ICM
OS/400 V5R2 changes 218 Internet content security 422
QDLS 218 Internet Information Services 108
QOpenSys 218 Internet keys 55
QSYS.LIB 218 Internet Mail Router 88
root 218 Internet password 53
Storage option Internet Protocol version 4 See IPv4
*MINIMIZE 175 Internet Protocol version 6 See IPv6
Stream file format Internet protocols 13
*TYPE2 218 Internet Site document 42
Stream files Intrusion detection 415
Main storage option 218 INZTAP 291
UDFS 218 IP address 204
IIOP protocol 42 IP routing tables 34
IIS 108 IPL 175, 209, 211, 215
IMAP 8, 35, 42 IPv4 34
IMAP mail 473 IPv6 34
inactivatelogs command 380 iSeries Access Family 27
Inbound Cluster Replication 475, 539 iSeries Access for Web 27
Inbound Cluster Replication Application Attributes 478 iSeries Access for Windows 26, 54, 300
Inbound Cluster Replication Mail Attributes 477 iSeries and Domino administration
Inbound Connection Controls 413 Conflicting interests 114
Inbound Sender Controls 413 iSeries and viruses 411
Incremental backup 375 iSeries Apache Server 99
Incremental backup strategy 382 iSeries architecture 107, 500
incremental command 378, 381 iSeries benchmarks 468
Incremental daily backups 381 iSeries Client Access Family 27
Incremental save 228 iSeries Collection Services 111
Incremental virus scanning 416 iSeries environment variable 234
Independent ASP 228, 248 iSeries for Domino 20
Independent Computing Architecture 109 iSeries HTTP server 99
Independent Software Vendors 484 iSeries IFS
Index capacity 12 Map network drive 33
Indexer task 88, 170 iSeries Information Center Web site 18
Indexing 231 iSeries Job Scheduler 282–283, 294, 302, 304, 313, 330,
Indexing mail files 59 334
Index 629
Lotus Domino APIs 355 Maximum size 60
Lotus Domino Document Manager 9 Send mail to large number of users restriction 63
Lotus Domino server backup API 375 Mail file owner access 53
Lotus Domino Web Access 469 Mail file policies 97
Lotus Enterprise Integrator 91, 98 Mail file quota 59, 527
Lotus Extension Toolkit 245 Mail file replicas 53
Lotus Freelance Graphics 13 Mail file retention 97
Lotus Instant Messaging 95, 474, 521 Mail file size 12
Lotus Instant Messaging and Lotus Web Conferencing Mail policy implementation 59
422 Mail problems 66
Lotus Instant Messaging and Web Conferencing 9, 11, Mail quotas 508
35, 37, 91, 98, 508 Mail retention policy 12, 57
Lotus Knowledge Base 276 Mail router 88
Lotus Sandbox 65 Mail rules usage
Lotus servers 250 Check for 607
Lotus software compatibility 9 MAIL.BOX 60, 66, 70, 255, 414, 428, 434–435, 441, 446,
Lotus Software for iSeries Compatibility Guide 20, 91 606
Lotus Support 573 MAIL.BOX maintenance 68
Lotus Team Workplace 9, 27, 91, 98, 422 Main storage 212, 228, 599
Lotus Workflow 91 Maintenance 65
Lotus Workplace 95 Maintenance tips 103
LOTUS_SERVERS 278 Malicious code 406
Low priority delay notification 62 Management Central 111, 123, 301
Low priority messages 62 Central system 124
LPAR 89, 91, 135, 192, 218, 233, 247, 456, 464, 474, Domino server monitor 129
489, 554, 559 Endpoint systems 123–124
Active processors 184 Job monitor 129
Current processing capacity 192 View Event log 133
Multiple Lotus products 9 Job monitor status 133
Resources 89 Customize view 133
SMTP mail routing 9 Manage multiple iSeries systems 123
LPAR requirements 9–10 Monitor 125
LPAR Validation Tool 10 Monitor Domino server jobs 129
LVT See LPAR Validation Tool Monitor metrics 126
Set threshold 127
Settings 126
M Monitor real-time system performance 125
MAC address 204, 594 Monitor type 125
Changing 596 Monitors
Macro virus 407 Start 128
Mail addressing 52 Stop 129
Mail and Calendar Users See MCU Performance metrics 125
Mail and Calendaring Users 498, 500 Setup 124
Mail and Calendaring users See MCU Share a monitor 132
Mail database policy settings Sharing 124
By user type 61 System group 124
Mail environment Management Central Job Scheduler 325
Control 57 Management Class 360, 396
Mail file index 59 Management Collection Object 134, 140, 142
Mail file management 57 Management Information Base 112
Active mail 59 Map network drive 285
Archive mail file 59 Mass mailing 107
Attachment handling 61 Maturation of Notes users 7
Content 58 Maximum Internet Access 103
Document age 58 Maximum mail file size 60
Document size 58 Maximum message size 62
Document type 58 Maximum Post Data 62
Low priority messages 62 MB 12
Mail file quota 59 MCO See Management Collection Object
Mail file size 58 MCO See Management Collection Object
Maximum message size 62
Index 631
ODS 69, 252 SHOW SERVER 123
ODS version 101 SHOW STAT SEM 123
OLAP Cube 160 Storage pools 122
Online backup 248 Performance projection 466
Operating system time 600 Performance Report 143
Operations Navigator 27 Performance tests 466
Organization 104 Performance tuning
Organizational groups 113 iSeries 172
Organizational responsibilities 113 Allocate system resources 172
Organizational roles 113 CPU 172
Organizational unit 104 DASD 172
Original IOA/IOP 490 Disk arms 172
OS/400 APIs 34 How to 172
OS/400 backup and recovery functions 508 IFS 172
OS/400 Collection Services 134, 500 Job attributes 172
OS/400 library system 244 Main memory 172
OS/400 LPAR 9 Memory 172
OS/400 object ownership 33 Run Domino in dedicated storage pool 173
OS/400 Operational Assistant System values 172, 209
Automatic cleanup 181 Work with System Status 172
System cleanup 210 WRKSYSSTS 172
OS/400 save and restore commands 249 iSeries performance adjuster 172, 212, 215
OS/400 System Distribution Directory 15 Memory constrained environment 175
OS/400 user profile 53 NIF pool 174
OS/400 V5R2 Performance Capabilities Reference Guide NSF Buffer pool 174
490 PercentAvailSysResources 174
Output queue Processor multi-tasking 217
Clear 210 QPFRADJ 172, 212, 215
Storage pools 173
Non-DB Paging 173
P Paging and faulting 173
Page fault 220 Reasons for paging and faulting 174
Page out 183 Permanent storage 180
Page thrashing 599 Personal Communications 27
Paging 122 PEX definition 587
Paging and faulting 233 Planning your Domino environment 4
PASE 354 Platform Statistics 231
Password expiration 56 PM eServer iSeries 464
Password quality policy 56 PM/400 27, 135, 137, 139
Password synchronization 54 Point in time 355
Password verification 56 Point in time recovery 382
Password-management options 56 Policy 36, 105
PDM 87 Archive settings 17
Peak period 500 Desktop 106
Peak period CPU utilization 526 Desktop settings 17
Peak user concurrency 6, 508 Exception 17
Pending mail 66 Explicit 17
PercentAvailSysResources 109, 174, 233 Mail retention 57
Percussion 65 Organizational 17
Percussion ServerAdmin Plus 65 Override settings 17
Performance considerations 111 Registration settings 17
Performance Explorer (PEX) trace 605 Security settings 17
Performance management 125 Setup settings 17
Performance monitoring Policy compliance management 415
Checklist 122 Policy Domain 360
CPU utilization 122 Backup Copy Group 360
Ineligible jobs 122 Data Protection for Domino
Memory pools 122 Policy Domain 396
Paging and faulting 122 Management Class 360
QMAXACTLVL 122 Policy viewer tool 18
Run priority 122
Index 633
Registration preferences 71 Option 23 270
Repair corrupted database 68 Save system data 270
Replica ID 253 Save user data 270
REPLICA task 88 Save Save File Data command 281
Replication hub 66 Save System command 267
Replication task 88 Save/restore comparison 251
REPORT task 88 savhelp.nsf 418
Required Per-User Bandwidth 6 savlog.nsf 418
Resource-balancing plan 112 savquar.nsf 418
Response time 173 SAVSAVFBRM 300
Restore SAVSAVFDTA 281
Full system recovery 271 SAVSYS 267
Point in time 355 SBMDOMCMD 85
restore command 385 ScanMail
Restore Domino database 384 ACL 430
Restore Object command 271–272 Activity log 423
Restricted state 267, 337 Administrator tasks 423
Retransmission 123, 202, 590 Attachment blocking 444
RMVPTF 277 Automatic update 432
Roaming user 8, 56, 97, 508, 528 Automatic updates 423
Roaming user server 56 Centralized monitoring and reporting 450
Roaming user settings 53 Compressed file scanning 445
root 107, 218 Configuration 429
Route table Action on cleanable files 437
Dynamic 595 Action on uncleanable files 437
ROUTER task 88 Encrypted mails 437
RPLCFG(*NO) 279 Logging options 438
RST command 271–272 Max compression level 437
Rules 411 Maximum extract file size 437
e-mail usage policy 411 Notifications 437
Run Domino Command 68, 84 Password protected files 437
Run priority 122, 189, 192–193 SSL options 430
Change 195 Testing 440
SERVER job 190 Virus logging options 439
Run Query 150 Virus notification 438
RUNDOMCMD 68, 84 Visibility of databases 430
Configuration command 426
Configuration interface 423
S Configure scanning 435
S/390 422 Consolidated reports 423
Sametime 422 Database security 430
See Lotus Instant Messaging and Lotus Web Confer- dbscan 441
encing dbscan.pgm 428
Sametime See Lotus Instant Messaging and Web Debugging tasks 450
Conferencing Determine file type 447
SAN See Storage Area Network Domino databases 429
SAR 93, 98 Handling of virus incidents 437
sav.nsf 418 Hardware prerequisites 424
savdefs.nsf 418 Incremental Scan 446
SAVE 14 Installation 424
Save Installation package 424
To save file 248 libsmlnred.srvpgm 428
To tape 248 Log purging 449
Save file 249, 280 Logging level 450
CRTSAVF 280 Manual database scanning 434
Dedicated library 280 Memory utilization 445
Reuse 280 Memory-based scanning 428, 445
Save to tape 281 Multitasking scan environment 446
SAVE menu 257–258, 266 NOTES.INI entries 429
SAVE menu options 267 NOTES.INI variables 429
Option 22 270
Index 635
Server to server 110 CPU utilization 456
Server to storage 110 Mail file size range 457
Server_Session_Timeout 473 Moderate mail user 457
ServerTasks 135, 435, 441 Modified mail template 458
Service level agreement See SLA Network compression 461
SH CLUSTER command 90 CPU impact 461
Shared drive 285 Network diagram 461
Shared mail 61 Bandwidth between locations 461
Shared mail database 61 Peak period CPU utilization 459
Shared pool 233 Registered Domino users 456
Shared processing pools 192 Roaming user 461
Sherpa Software CPU impact 461
Mail Attender 65 Server consolidation 461
Short name 272 Domino server characteristics 459
SHOW MEMORY DUMP 235 Single Copy Template 461
Show Platform Statistic 112 Understand overall I/T environment 461
SHOW STAT 170, 480 Volatility of applications 461
SHOW STAT DATABASE 231 Sizing questionnaire 508
SHOW STAT SERVER 474 SLA 6, 60, 68, 113, 115
SHOW STAT SERVER.USERS.* 231 Domino only 116
Show Statistic 112 Application availability 116
Signature 26 Application promotion to production 116
Simple Mail Users 498, 501 Backup and restore 116
Simple Network Management Protocol 112 Directory lookup time 116
Single copy object store See Shared mail Domino cluster availability 116
Single Copy Template 508, 528 Domino server availability 116
Single sign-on 54, 99 Group creation time 116
Single-level storage 200, 228, 244, 255 Help desk wait time 116
Sizing ID creation time 116
Growth 508 Mail delivery time 116
Sizing Domino Mail file restore time 116
3x heavy mail user 457 Mail usage 116
Application characteristics 460 Maintenance windows 116
Applications 460 Password reset time 116
Browser access 458 Problem response time 116
Casual mail user 457 Replication performance 116
Concurrent Domino users 456 iSeries and Domino 117
Concurrent mail user types 457 Availability of iSeries 117
CPW vs. CIW vs. MCU 456 Backup and recovery time 117
Database access 460 CPU utilization 117
Disconnected users 458 Housekeeping 117
Domino clustering 458 Maintenance 117
Domino statistics reporting 461 Organizational responsibilities 117
Domino version 460 Other roles and responsibilities 117
Extensive use of agents 458 Application business owner 117
From non-Domino mail 460 Application developer 117
Full text index impact 458 Desktop support 118
Heavy mail user 457 End user 117
HTTPS 458 Hardware vendor(s) technical support 118
Local mail replicas 458 Help desk 117
LPAR impact 456 Information Security 118
Mail client type 457 IS Management 118
CPU utilization 458 Lotus Instant Messaging/Domino Program
Domino Access for Microsoft Outlook 457 Manager 119
Domino Web Access 457 Lotus Technical Support 118
IMAP 457 Network server administrator 118
Notes client 457 Support analyst 117
POP3 457 Performance 117
WebMail 457 Problem solving time 117
Mail file size 456 Smart Upgrade 106
Index 637
sav.nsf 418 TCP packet
savdefs.nsf 418 Retransmission 590
savhelp.nsf 418 TCP packets 590
savlog.nsf 418 TCP port 201
savquar.nsf 418 TCP/IP configuration 34, 200, 204
Scan window 416 ARP broadcast 204
Send e-mail notifications 416 Bind route to interface 205
Update virus definitions files 422 Domain Name Server 205
Virus definition updates 416 Host name search priority 206
Virus Scan Interfaces 204
On-demand scans 419 IP address 204
Real Time 419 Local host table 205
Scan Now 419 MAC address 204
Scheduled Scans 419 Route 204
Virus scanning 416 Route table 204
Symantec AntiVirus/Filtering for Dominofor OS/400 TCP/IP Connection Status
Implementation Guide 415 NETSTAT 590
Symantec Client Firewall 415 TCP/IP connections 575
Symbolic links 261 TCP/IP conversation
System ASP 228, 288 Communication resets 208
System change 70 TIMEWAIT state 208
System configuration 500 TCP/IP Routes 595
System console 267 TELL HTTP QUIT 179
System job 188 TELL HTTP SHOW THREAD STATE 180
System management tasks 301 TELL ROUTER QUIT 178
System migration 20 TELNET 201
System outage 70 Thread number 191
System recovery 271 Thread safe 240
System status information 575 Threads 188, 598
System Summary Information report 180 Ineligible 212
System upgrade 19 Initial 188
System utilization 473 Multithreaded 189
System value 209 Number 212
QACTJOB 211 Secondary 189
Auxiliary storage allocation 211 Threats
Set 211 Denial of service attacks 406
QADLACTJ 211 Spam 406
QADLTOTJ 209 Unsolicited e-mail 406
QBASACTLVL 173, 214 Virus 406
Set 215 Worms 406
QBASPOOL 173, 214, 216 Threshold settings 66
Set 214 Threshold values 67
QDYNPTYADJ 217 Time format 25
QDYNPTYSCD 217 Time slice 189
QMAXACTLVL 184, 212, 599 Time-out 473
QMCHPOOL 173, 212 TimeSeparator 44
QPFRADJ 172, 212, 214–215 TimeZone 44
QPRCMLTTSK 217 Tivoli 65
QTOTJOB Tivoli Analyzer 5
Auxiliary storage allocation 209 Tivoli Data Protection for IBM Lotus Domino 64
Set 210 Tivoli Storage Manager clients 250
QUTCOFFSET 603 Tivoli Storage Manager for Data Protection modules 354
QVFYOBJRST 26 Total cost of ownership 93
Set QMCHPOOL 213 Total cost of ownership See TCO
Total CPU 584, 603
TPROFS Performance Explorer Trace (PEX Trace) 587
T TPROFS trace 605
Tape 258 Transaction 252
TASKINFO 176 Transaction log 338
TCO 57, 93 Size 254
TCP network traffic 594
Index 639
User registration 53 Web site identification 42
User Registration feature 53 WebMail 8, 109, 473
User-defined file system 307 WebSphere 99, 243
UTF-16 219 Websphere 335
UUencode 447 Websphere Application Server 267
WebSphere integration 99
Weekly full backups 381
V Windows 243
V5R2 Performance Capabilities Reference 464 Windows 2000 500
Verity KeyView filter 12 Windows Terminal Server 109
View logging 50, 230 WLE 463, 508
View system status 78 Active users 467, 472
VIPA 34 Add Workload 512
Virtual host 35 Agents 481
Virtual host document 35 Amount of memory 482
Virtual IP Address See VIPA Antivirus protection factor 528, 535
Virtual storage 228 Application complexity rating 484
Virus 406 Application rating 483, 544, 564
Blended threat 407 Custom 484
Life cycle Example applications 483
Assimilation 408 Average mail user 480
Creation 408 Basic Workload Selection 512
Discovery 408 Complexity of applications 467
Eradication 408 Concurrency ratings 472
Macro virus 407 Concurrent mail users 482
Points of attack 407 Concurrent user to HTTP hit rate ratio 486
Points of entry 406 Concurrent users 467, 472
Protection 410 CPU utilization 482
Content security 410 Create PDF 524, 547, 552
Security policies 410 Critical factors 467
Trojan 407 Custom application rating 485
Vulnerabilities 407 Customer Relationship Management application ex-
Worms 407 ample 528
Virus attacks 416 DB2 access 528, 564
Virus definition updates 416 DB2 database processing 486
Virus detection Default concurrency values 473
Heuristic technology 408 Default values 471–472
Virus protection 422 Disk full target 528
Virus protection/content filtering 415 Domino application sizing 483
Virus resistant Domino clustering 475
iSeries 107 Domino instance 470
Virus scan window 416 Domino partition 470
Virus scanning 416 Domino R5 estimate 471, 517
Volume identifier 291 Domino Workload 512
Vulnerabilities 407 Domino-specific parameters 471
Existing applications
W Add-in tasks 487
Watchdog job 88 Back end data access 488
Web Administrator client 53 Data access 487
Web content 108 DB2 access 488
Web preferences 44 Design metrics 487
Web realm 42 Number of agents 487
Web server log files Number of views 487
ACCESS-LOG 69 User response time 487
AGENT-LOG 69 Existing workload 465, 482
CGI-ERROR-LOG 69 Fail over mode scenario 480
ERROR-LOG 69 Growth rate 522, 566
REFERER-LOG 69 Growth solution 522, 545
Web site alias 35 Identify estimate 513
Web Site document 42 Immediate solution 522
Index 641
WRKSBMJOB 225
WRKSBS 79
WRKSHRPOOL 216
WRKSYSACT 583
WRKSYSSTS 122, 175, 210, 212, 214–215, 288, 575,
578, 600
DASD
Current unprotect used 175
Permanent storage utilization 180
System ASP 175
Total 175
DASD utilization 175
Main storage utilization 172
Max Active 184
X
X.509 37