Tape libraries...................................................................................................................................................................... 34
Initializing DLm scratch volumes............................................................................................................................. 35
Defining tape libraries.................................................................................................................................................36
Configuring virtual devices..............................................................................................................................................37
Planning considerations..............................................................................................................................................37
DLm configuration files.............................................................................................................................................. 37
Adding devices............................................................................................................................................................. 38
Scratch synonyms .......................................................................................................................................................41
Configuring global parameters....................................................................................................................................... 44
Encryption...........................................................................................................................................................................45
Key Management Interoperability Protocol ......................................................................................................... 45
Configuring KMIP........................................................................................................................................................ 45
Uploading and Monitoring Certificates.................................................................................................................. 46
Configuring Static Keys............................................................................................................................................. 47
Tape erase...........................................................................................................................................................................48
Space erase policy.......................................................................................................................................................48
Time-to-Live erase policy.......................................................................................................................................... 49
Erase policy................................................................................................................................................................... 49
DLm Long term retention................................................................................................................................................ 49
General LTR feature notes ...................................................................................................................................... 50
Configuring LTR S3 buckets.....................................................................................................................................50
Configuring LTR policies............................................................................................................................................ 52
Configuring Cloud Storage parameters................................................................................................................. 53
Configuring Migration Policies....................................................................................................................................... 55
Migration Policies configuration fields......................................................................................................................... 57
Chapter 5: Monitoring DLm......................................................................................................... 59
VTE logs and DLm statistics...........................................................................................................................................59
VTE logs.........................................................................................................................................................................59
Viewing the latest VTE logs......................................................................................................................................59
Support data.................................................................................................................................................................60
VOLSER Listing............................................................................................................................................................60
Capacity statistics........................................................................................................................................................61
Throughput statistics................................................................................................................................................. 63
System health check.................................................................................................................................................. 64
DLm diagnostic reporting................................................................................................................................................ 65
VTE................................................................................................................................................................................. 65
Chapter 6: SRDF Replication....................................................................................................... 70
SRDF replication overview.............................................................................................................................................. 70
SRDF Synchronous (SRDF/S)................................................................................................................................. 70
Prerequisites for SRDF replication........................................................................................................................... 71
SRDF connections and configuration............................................................................................................................71
SRDF replication capabilities..................................................................................................................................... 71
SRDF/S active-passive configuration..................................................................................................................... 71
Configuration files on source and target systems............................................................................................... 72
Disaster recovery capabilities......................................................................................................................................... 72
SRDF benefits.................................................................................................................................................................... 72
4 Contents