FAQ
This topic lists frequently asked questions.
Can BMC AMI Cloud Data back up empty data sets?
Yes. For an incremental backup the data set change bit must be turned on in the Policy options.
Does BMC AMI Cloud Data support automatic recall?
Yes. Like HSM or CA-Disk, when a data set is referenced by a batch job or online in TSO, the data set is automatically recalled to primary DASD for use.
What do I do with the management classes assigned in my SMS ACS routines? Do I need to change these?
No. BMC AMI Cloud Data policies can work with your existing SMS management classes and storage group definitions.
How does a user of BMC AMI Cloud Data check for issues, such as a failed backup?
All the information and logs are available in the BMC AMI Cloud Data UI. Running a BMC AMI Cloud Data policy using JCL includes the policy run log in the JOB output. This log can be reviewed either on the mainframe or through the BMC AMI Cloud Data UI.
If I specify the parameter REPLACE on the RESTDSN command and the data set doesn’t exist in the z/OS catalog, will the data set still be restored?
Yes.
How will migrated/archived data sets look to my users?
Data sets migrated/archived with BMC AMI Cloud Data have a VOLSER of M9ARCH (default) or a similar name chosen by the installer. The end-user can browse, select, or edit the data set in ISPF in the same manner as if it was migrated by HSM. The data set is automatically recalled. The message, ZM9RC01I RECALL NEEDED, DSN=dataset name is issued.
Does BMC AMI Cloud Vault support AWS Object lock enablement at the bucket level?
Yes, BMC AMI Cloud Vault supports Object Lock enablement at the bucket level. The customer needs to set up a lifecycle policy to delete the old versions after a given time period
How does BMC AMI Cloud Data handle data sets that are open at the time of backup?
BMC AMI Cloud Data automatically allows for backups of open data sets. BMC AMI Cloud can be configured by the user to finish a backup with a warning about data sets that were open during the backup.
Cloud Data Platform uses OSA cards. What can BMC AMI Cloud offer in case the customer has a small number of OSA cards?
While 10GbE OSA cards are getting more and more widely available, some customers have only a limited number of 1GbE OSA cards. You do not need to compare the number of FICON cards you have to the number of OSA cards needed for data management. OSA cards can be fully utilized for the full bandwidth, multiple OSA cards can be used in parallel to increase both read and write throughput. Cloud Data Platform allows compressing the data on the mainframe using either zIIP engines or zEDC cards in order to reduce the amount of data being sent over the network thus reducing the amount of bandwidth needed by OSA cards.
When using Cloud Data Sets (CDS) what changes will need to be done for applications writing directly to tape?
No changes are needed for any application using either BSAM or QSAM. The application will still think it is reading/writing to tape while those reads/writes will be intercepted by CDS and redirected to object storage. These data sets will be cataloged with a special pseudo VOLSER to represent the fact that they reside on object storage.
Can BMC AMI Cloud Data run side by side with DFSMShsm, FDR, or CA-Disk?
Yes. BMC AMI Cloud Data can run side by side with any backup/archive software. Both products will be able to archive and automatically recall their own archives/migrates in a transparent manner. One exception is when you want to incrementally backup the same data set using the different products. You will not want both products to reset the change bit, as that will interfere with the other software backup decisions. When needed, BMC AMI Cloud Data can avoid resetting the change bit at a Policy level to avoid any conflicts when running multiple backup software on the same data.
How will backup data be secured in transit?
Standard HTTPS communications will be used with the cloud storage in order to secure the data in transit, either on-site or to the public cloud.
How will restores of backups be handled with encrypted backups?
Both in-flight and at-rest data encryption are transparent to the end user using Cloud Data Platform. This is done automatically by Cloud Data Platform and the cloud infrastructure.
How will the integrity of backup data be maintained?
Data integrity of backup is maintained in several ways:
- Data blocks are written by DFSMSdss which has its own data integrity mechanism. Any changes to the data will be detected by DFSMSdss during restore and will fail the restore operation
- Cloud object storage does not allow for the alteration of objects. Any alteration to an object requires uploading a new version of this object. Uploading a new object is recorded in a cloud vendor audit and detectable by the new object create date. The old version which, was overridden, can also be kept if the versioning storage feature is enabled in the Policy option.
- The Cloud Data Platform is capable of uploading each object with a hash signature verified by the target cloud object storage before accepting the object. This feature needs to be enabled specifically.
What data types are supported for migration to object storage?
All data set types are eligible for migration to object storage. The object storage repository serves as secondary storage, it is not intended to replace primary DASD for z/OS. Both backups and archives can reside on object storage. Data sets can also be imported from tape without intermediate DASD space being required.
Can Cloud Data Platform write to all storage vendors?
Cloud Data Platform is hardware and vendor agnostic. We have formed strategic partnerships with various companies to bring a full backup/archive solution for all silos within the data center.
Is there a BMC AMI Cloud user interface on the mainframe?
BMC AMI Cloud user interfaces include a web UI, a RESTful API that can be executed from z/OS, and a TSO command line interface (CLI) to perform BMC AMI Cloud functions from batch, REXX or TSO.
Is it possible to import historical full dumps from tapes?
Yes, we can create a process for historical full dump import from DFSMSdss or DFSMShsm.
How can we have no changes to JCL and still be able to run the backups through BMC AMI Cloud?
Backups and archives are defined through policies that can be executed either from the web UI or initiated from z/OS batch jobs using an API. There is also a z/OS command line interface (CLI) to initiate single data set backups/restores, archives/recalls, that can be called from TSO, REXX, or JCL.
When BMC AMI Cloud Data performs a backup does it backup the entire data set or can it determine just the changed tracks/bytes?
BMC AMI Cloud Data backs up the entire data set.
If we do a full volume dump, does BMC AMI Cloud Data keep track of data sets on the volumes?
Yes. After each volume backup is performed a list of data sets that resides on that volume is generated and kept in the BMC AMI Cloud Platform database.
Can a single data set be restored from a full volume restore?
Yes. As mentioned after each full volume backup all data sets are indexed to allow restore from physical backup at the data set level.
What data compression options are available with BMC AMI Cloud Data?
BMC AMI Cloud Data can use any of the following options when running on z14/z15 machines:
- Lz4 – for use on the zIIP
- GZIP - for use with zEDC or zIIP
- DFDSS-GZIP – for use with zEDC
- DFDSS-COMPRESS for use when no zIIP is available
In addition to compressing the data, before transmitting the data over TCP/IP, BMC AMI Cloud Data breaks the data down into chunks and moves the data in parallel.
What tier capabilities are supported on AWS?
We only support STANDARD or INFREQUENT ACCESS (IA) as values for the object storage tier. Access to Glacier is not permitted, rather we write to S3 and AWS lifecycle policy migrates data to Glacier.
In the documentation, it notes that both ports 80 and 443 are said to be open. Is there a need for port 80 (typically not encrypted) or just 443?
We redirect to port 443 if someone tries to use 80. It’s just so that the customer won’t get a weird HTTP response when trying to access the non-encrypted port.