Rzal 2 PDF
Rzal 2 PDF
7.2
IBM
Note
Before using this information and the product it supports, read the information in “Notices” on page
71.
iii
Stopping the system.............................................................................................................................51
Turning off the system immediately...............................................................................................53
Using the Power button.................................................................................................................. 54
System values that control IPL............................................................................................................ 54
IBM i concepts........................................................................................................................................... 57
Messages.............................................................................................................................................. 58
IBM i commands...................................................................................................................................58
Security and user authority.................................................................................................................. 60
Authority to access objects............................................................................................................ 60
Security levels................................................................................................................................. 61
User profiles.................................................................................................................................... 61
Authorization lists........................................................................................................................... 62
Files and file systems........................................................................................................................... 62
IBM i restricted state............................................................................................................................63
Jobs...................................................................................................................................................... 64
Subsystems, job queues, and memory pools...................................................................................... 65
Objects..................................................................................................................................................66
Logs and journals..................................................................................................................................66
Software fixes....................................................................................................................................... 67
Printing the system configuration list........................................................................................................67
Analyzing and reporting system problems................................................................................................68
Related information for basic system operations..................................................................................... 69
Notices................................................................................................................71
Programming interface information.......................................................................................................... 72
Trademarks................................................................................................................................................ 72
Terms and conditions.................................................................................................................................73
iv
Basic system operations
Many of the functions and features of the IBM® i platform are specific to IBM and the IBM i operating
system, and might not be familiar to you. This information introduces some of the key concepts and basic
system operation tasks, such as using system interfaces; working with devices, printer output, and the
control panel; and turning on or turning off the system.
Many of these topics provide an introduction and example, and then suggest further resources for more
detailed or advanced information.
Note: By using the code examples, you agree to the terms of the “Code license and disclaimer
information” on page 69.
Character-based interface
The character-based interface, available from most emulator sessions or consoles, might seem unfamiliar
to people without any experience in the IBM i operating system.
The character-based interface is available from most consoles and emulator sessions connected to a
system, and provides more functions than any other interface. While this type of interface might be
unfamiliar at first, it includes several methods for helping new users, and a menu-based hierarchy of tasks
to make finding specific functions simple.
The character-based interface includes three primary displays: navigational, input, and informational.
The navigational display typically consists of a list of menu options and a command line. You can use
this display to find information or tasks on the operating system, and to enter control language (CL)
commands. Input displays are available when the operating system requires information from you. Use
this display to enter or change information. Informational displays provide system information and do not
allow any interaction.
Other types of status are possible for some specific device types, or to indicate a specific problem. For
example, a workstation that is waiting for a user to sign on will have a status of Signon display, and a
device that the operating system is unable to locate will have a status of Resource not detected.
Starting printers
From the command-line interface, you can start a printer.
Before you start the printer, verify the following conditions:
• The printer is turned on and ready.
• The printer or print method has been configured in the operating system.
To start a printer from the command-line interface, follow these steps:
1. Vary on the printer.
a) Enter WRKCFGSTS *DEV *PRT command.
The Work with Configuration Status display shows a list of devices.
b) Enter a 1 next to the printer device description to vary on the printer.
2. Use the Start Print Writer (STRPRTWTR) command to start the print writer, and specify the printer and
output queue (or queues) that the writer will service.
How to choose between the virtual control panel and remote control panel
The following table shows which server models are recommended for the virtual control panel and which
models are recommended for the remote control panel.
270 170
800 250
810 6xx
820 7xx
825 Sxx
830
840
870
890
Related concepts
Control panel buttons, lights, and indicators
These figures illustrate the interface for each of the control panels, including the buttons, lights, and
indicators. The interface for the virtual control panel and remote control panel are identical.
Related tasks
Accessing control panel functions
To access the control panel functions, follow these instructions, which apply to all three kinds of control
panels.
Related information
Operations Console Web site
Related concepts
Physical control panel
The physical control panel is your initial interface with the system. You can use the physical control panel
to perform functions, such as performing an initial program load (IPL) and turning on and turning off
the system. Control panel functions range in complexity from functions that display status (such as IPL
speed) to low-level service functions that only service representatives can access.
Remote control panel
The remote control panel provides a way to use control panel functions through a PC. The graphical user
interface of the remote control panel looks similar to the physical control panel.
Virtual control panel
With the virtual control panel, you can use control panel functions through a PC.
Related tasks
Accessing control panel functions
To access the control panel functions, follow these instructions, which apply to all three kinds of control
panels.
Related concepts
Physical control panel
The physical control panel is your initial interface with the system. You can use the physical control panel
to perform functions, such as performing an initial program load (IPL) and turning on and turning off
the system. Control panel functions range in complexity from functions that display status (such as IPL
speed) to low-level service functions that only service representatives can access.
Remote control panel
The remote control panel provides a way to use control panel functions through a PC. The graphical user
interface of the remote control panel looks similar to the physical control panel.
Virtual control panel
With the virtual control panel, you can use control panel functions through a PC.
Control panel buttons, lights, and indicators
Note: The examples in the following topics show control panels with a 4-word (32 character) display.
Control panels with a 1-word (8 character) display only show the first word (8 characters) of each
function.
Related concepts
Control panel functions
There are few functional differences among these control panels. The main difference is that the physical
control panel and the remote control panel, when cabled directly to the system, can turn on the system.
The virtual control panel and the remote control panel, if connected through a LAN, cannot turn on the
system.
Function 01 - Display Selected IPL Type, Logical Key Mode, and IPL Speed (on Systems without a
Keystick)
You can use this function to display the selected IPL type, logical key mode, and speed for the next IPL.
1. Display IPL types (A, B, C, or D).
2. Display the valid logical key modes (M or N).
3. Display IPL speed (F, S, SE, V=F, or V=S).
The following table shows a function 01 example on systems without a keystick.
Function 02 with a keystick - Select IPL Type and IPL Speed Override (on Systems with a Keystick)
Before you can use function 02, you must have the system in Manual mode. You can change the IPL type
with the system turned on or off. However, to select the IPL speed override, you must turn off the system.
The following table shows the sequence used to select the IPL type on systems that are turned on.
The following table shows the sequence used to select the IPL type and IPL speed on systems that are
turned off.
Table 6. Function 02 - Select IPL type and IPL speed on turned-off systems with a keystick
Function/Data Action or Description
Use Increment or Decrement button to scroll to
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ function 02.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Function 02 without a keystick - Select IPL type, IPL speed override, and Logical key mode (on
Systems without a Keystick)
You can use function 02 in either normal mode or manual mode. With the system either turned on or off,
this function allows you to select the IPL type and logical key mode. Before you can select the IPL speed
override, you must turn off the system.
Turned-on systems
For turned-on systems without a keystick, function 02 is used to select the IPL mode and logical key
mode. The following table shows an example of the function 02 IPL type and logical key mode selection
sequence for a turned-on system that does not have a keystick.
Table 7. Function 02 - Select IPL type and logical key mode on turned-on systems without a keystick
Function/data Action or description
Use the Increment or Decrement button to scroll
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ to function 02.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Turned-off systems
For turned-off systems without a keystick, function 02 is used to select the IPL type, logical key mode,
and IPL speed indicators. The following table shows an example of the function 02 IPL type, logical key
mode, and IPL speed selection sequence for a turned-off system that does not have a keystick.
Yes End.
No Exchange the control panel on the expansion
unit.
In this format, RR represents the frame number where the failing unit is installed; U represents the SPCN
port to which the failing unit is connected; and rrr represents unit reference code (URC).
Function 07
Function 07 is only used during service by authorized IBM service representatives.
Function 08 - Fast Turn Off
t m m m c c c c _ _ _ _ _ _ _ _
h h h h _ _ _ _ i i i i i i i i
1 9401
2 9402
4 9404
6 9406
Values for iiiiiiii indicate the description of the system turn on or restart path:
Starting an IPL
To start a system initial program load (IPL), you can use the StartIPL API.
To use this command, follow these instructions:
• You must insert a key to use this command (on systems with a keystick).
• The system must be in Manual mode.
• You must turn on the system.
This API returns the following information.
Is CPM present?
You can use the GetCPMPresent API to determine whether the continuously powered main storage
(CPM) is present on the system.
There are no restrictions to the use of this command.
This API returns the following information.
Is CPM enabled?
You can use the GetCPMEnabled API to determine whether the system has continuously powered main
storage (CPM) enabled.
There are no restrictions to the use of this command.
This API returns the following information.
Is SPCN present?
You can use the GetSPCNPresent API to determine whether the system powered control network
(SPCN) is present on the system.
There are no restrictions to the use of this command.
This API returns the following information.
Prerequisites
This procedure assumes that the system is running, and requires that several additional conditions be met
before you begin an IPL. While most of these settings are the default values, you must verify them if you
are unsure.
• The IPL mode for the system must be set to Normal (unattended IPL).
• The Type of restart (QIPLTYPE) system value must be set to unattended (0).
• Turn on any devices, such as display stations, printers, tape devices, and controllers, that you or others
want to use.
Prerequisites
This procedure assumes that the system is running, and requires that several additional conditions be met
before you begin an initial program load (IPL). Most of these settings are the default values, but you must
verify them if you are unsure of the current setting.
• The IPL mode for the system must be set to Manual (attended IPL).
• The Type of restart (QIPLTYPE) system value must be set to attended (1).
Situation
If you want to change IPL options, install the operating system, use dedicated service tools, work with
logical partitions, or recover from a system failure, you need to perform an attended IPL. This IPL mode
requires that you respond to several prompts during the startup sequence.
IPL type
The IPL type determines which copy of programs your system uses during the initial program load (IPL).
There are four IPL types:
IPL type A
Use IPL type A when directed for special work, such as applying fixes (PTFs) and diagnostic work. For
example, use IPL type A in the following circumstances:
• When IPL type B fails
• When the procedures direct you to use IPL type A
• When you suspect problems with temporary Licensed Internal Code fixes.
IPL type A uses the A copy of Licensed Internal Code during and after the IPL. This copy of Licensed
Internal Code is the permanent copy. It resides in System Storage Area A. It contains no temporarily
applied fixes.
IPL type B
Use IPL type B for routine work and when directed by a PTF procedure. This type of IPL runs the
newest copy of Licensed Internal Code and is necessary when you permanently apply certain fixes.
IPL type B uses the B copy of Licensed Internal Code during and after the IPL. This copy resides in
System Storage Area B. This copy contains temporarily applied fixes.
IPL type C
Rochester development support reserves this type of IPL for hardware service representatives.
Attention: Do not use this function. Data loss can occur with improper use of this function.
IPL type D
Use IPL type D when directed for special work, such as installing and reloading programs.
IPL type D loads the system programs from an alternate IPL load source, such as a tape drive or
CD-ROM.
Typically an IPL uses programs that are stored on the primary IPL load source (typically a disk drive).
Sometimes it is necessary to perform an IPL from another source, such as programs that are stored on
tape. To do this, you must use IPL type D to perform an IPL from the alternate IPL load source.
Use IPL type D only during one of the following situations:
• When the installation or restore procedures direct you to use IPL type D
• When IPL type B and IPL type A fail (when the primary IPL load source cannot perform an IPL on the
system properly) and only when directed by your support personnel
• When service directs you to perform an alternate installation
Related concepts
Changing operating modes and IPL types
By changing IPL types, you can perform an initial program load (IPL) from the load-source media or from
an alternate load source media. With this operation, you can apply fixes (PTFs). By changing the operating
mode, you have several options in controlling the IPL.
Related tasks
Using software fixes
Manual (attended)
After power-on, operating the system in Manual (attended) mode means that an operator uses the
control panel to direct the system for special needs.
During manual mode IPL, DST and the operating system present menus and prompts that allow you to
make changes to the internal system environment. This can include entering debug mode for service
representatives to diagnose difficult problems.
Use the manual mode to perform an IPL and run the system to perform the following actions:
• Change IPL options (including system values)
• Install the operating system
• Load fixes (PTFs)
• Make some types of system hardware upgrades
• Use DST (for advanced users and service only)
• Problem diagnosis (for advanced users and service only)
Auto (automatic)
Use Auto mode for an automatic remote IPL, automatic IPL by date and time, and an automatic IPL
after a power failure.
Secure
Use Secure mode to prevent use of the control panel to perform an IPL. This mode is not a form of
IPL; it is a means to prevent an unauthorized or inadvertent IPL from the control panel.
Related concepts
Starting the system without making configuration changes (unattended IPL)
This is the most common way to start the system. Unattended initial program loads (IPLs) reset system
storage and recognize any configuration changes automatically.
Changing the system during IPL (attended IPL)
If you want to change initial program load (IPL) options, to install the operating system, to use dedicated
service tools, to work with logical partitions, or to recover from a system failure, you need to perform an
attended IPL. These situations might require you to enter information or change system values.
Changing operating modes and IPL types
By changing IPL types, you can perform an initial program load (IPL) from the load-source media or from
an alternate load source media. With this operation, you can apply fixes (PTFs). By changing the operating
mode, you have several options in controlling the IPL.
Solving problems with the automatic power schedule
Changing the IPL type and the operating mode for systems with a keystick
To change the IPL type and the operating mode for systems with a keystick, follow these steps:
1. Insert the keystick.
2. Use the Mode button to scroll through the four operating modes (Manual, Normal, Secure, and Auto)
and select the Manual mode.
Note: An indicator light on the control panel shows the active mode.
3. Use the Increment or Decrement button to select function 02 (only available in Manual mode), and
press the Enter button.
4. Use the Increment or Decrement button to select the required IPL type (A, B, C, or D) and press the
Enter button.
Changing the IPL type and the operating mode for systems without a keystick
To change the IPL type and the operating mode for systems without a keystick, follow these steps:
1. Use the Increment or Decrement button to select function 02, and press the Enter button.
2. Use the Increment or Decrement button to select the required IPL type (A, B, C, or D) and the
operating mode (either M=manual or N=normal), and press Enter.
Note: The control panel displays both the IPL type and the operating mode. For example, B_N
indicates a B type IPL in a normal mode.
Related concepts
IPL type
The IPL type determines which copy of programs your system uses during the initial program load (IPL).
Operating mode of an IPL
The operating mode determines the number of options that are presented to the operator for
consideration during and after the initial program load (IPL). It can also secure (lock) the control panel to
prevent an unauthorized or inadvertent IPL from the control panel.
Security considerations
To change system values, you must be signed on as QPGMR, QSYSOPR, or QSRV, or have all object
(*ALLOBJ) authority. Certain system values can be changed only by a security officer (someone with all
object (*ALLOBJ) and security administrator (*SECADM) special authorities).
Related concepts
System values that control IPL
You can use these system values to control the type of initial program load (IPL) and the way the system
performs an IPL. You can now work with all system values in System i Navigator.
Related tasks
Defining or changing the system at IPL
On the Define or Change the System at IPL display, you can change the system configuration, system
values, user profiles, and system, network, object, or file attributes during the initial program load (IPL).
QSYS/STRSBS SBSD(QSERVER)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QUSRWRK)
MONMSG MSGID(CPF0000)
QSYS/RLSJOBQ JOBQ(QGPL/QS36MRT)
MONMSG MSGID(CPF0000)
QSYS/RLSJOBQ JOBQ(QGPL/QS36EVOKE)
MONMSG MSGID(CPF0000)
QSYS/STRCLNUP
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QINTER)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QBATCH)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QCMN)
MONMSG MSGID(CPF0000)
DONE:
QSYS/STRSBS SBSD(QSPL)
MONMSG MSGID(CPF0000)
CALL PGM(QSYS/QWCSWTRS)
MONMSG MSGID(CPF0000)
NOWTRS:
RETURN
CHGVAR VAR(&CPYR) VALUE(&CPYR)
ENDPGM
• If you have just installed new hardware, you might need to change the system password during the
first IPL. To do this, follow these steps:
a) Select option 1 (Change the system password) on the Verification of System Password Failed
display.
The following system information about the Change the System Password display is shown:
– System serial number
– System type number
Operator panel restart (0) The restart operation occurred when requested
from the operator panel or from Dedicated Service
Tools (DST) for a secondary partition.
Automatically power down the entire system (0) The system automatically turns down when system
utility power fails.
Power down system after time interval Specifies the delay time in seconds before the
(1-99999) utility power fails.
Power down system, retain power on main tower Turns down only the processor, I/O processor
(*BASIC) cards, and load source storage. The appropriate
wait time, in seconds, is calculated. (This must be
used only if you have the battery power unit or an
uninterruptable power supply without every rack
being connected.)
Power down system, system calculates delay The appropriate wait time (in seconds) is
time (*CALC) calculated. This value must be used only if you
have a 9402 or 9404 system with a battery power
unit.
Do not automatically power down system *NOMAX is used when a user supplied program
(*NOMAX) is controlling the turning down of the system or a
generator is providing unlimited power. The system
does not start any action on its own.
IBM i concepts
IBM i is the operating system for the IBM i platform. It manages hardware and software resources, and
provides an interface that you can use to work with the system. To best use the operating system, you
need to be familiar with some system concepts.
System maintenance
Logs and Record keeping is an important way for the system to protect data and track system
journals problems. Learn what logs and journals are for and how to use them.
Software Recent versions of IBM i software add functions and solve known problems. Learn how to
fixes install and manage software and software updates.
IBM i commands
The operating system uses control language (CL) commands to interpret instructions from users. You
need to know the basic rules for using CL, and how to get detailed help for any CL command.
CL provides a powerful and flexible means of entering commands on the system. You can use CL to
control most of the operating system functions by entering them from the character-based interface, by
including them in programs, or by sending commands in System i Navigator. While the IBM i menu system
and CL commands might be unfamiliar at first, they follow an easy-to-use syntax, and the operating
system includes many features to help you use them successfully.
CL command syntax
CL commands consist of a verb, an object, and sometimes an adjective; for example, WRKACTJOB:
One of the important features of CL syntax is that it is consistent. For example, regardless of the object or
command you want to work with, using the verb WRK in the command starts a menu that allows you to
perform the available actions on the specified object.
Entering CL commands
You can enter CL commands from System i Navigator by selecting Run a command from the taskpad. In
System i Navigator, a taskpad is a view of system tasks that lets a user interact with operating system
functions. It contains a set of interrelated tasks that either perform a function or launch help that explains
how to perform a function. Alternatively, you can enter CL commands from any command line and most
displays on the character-based interface.
Every command has a set of required and optional parameters. For example, Create Library (CRTLIB)
requires, at a minimum, that you specify the name of the library that you want to create. The syntax
Security The operating system operates in one of several predefined levels of security. The
levels security level currently in effect determines the level of detail that user profiles must
provide to grant appropriate access to system resources. This level of detail can range
from simple password management to explicitly providing a level of access to each object
that a user can read or change.
Security Many more detailed aspects of system security are set by the system values. These
system system values set the security level, and grant or restrict options like adopted authority.
values
User profiles The user profile contains most of the authorizations and preferences for individual users
or groups. You can use System i Navigator to create and manage users and groups across
the system.
Authorizatio You can create authorization lists that specify groups of objects. Users and groups can
n lists then be authorized to this list, granting them authority to everything that list contains.
Also, security settings regarding policies and authorization lists are available in System i Navigator under
Security.
Related concepts
System values
Assume that a user needs authorization to add, change and delete data in a database, but does not need
to delete tables or the database itself. The user can be granted object data-level authority, rather than
object-level authority.
Security levels
The operating system operates in one of several predefined levels of security. The security level currently
in effect determines the level of detail that user profiles must provide to grant appropriate access to
system resources. This level of detail can range from simple password management to explicitly providing
a level of access to each object that a user can read or change.
Security on your system is arranged in a series of levels or classes, each offering a greater degree of
security and protection of your data than the previous. Select the level that best meets the needs of your
organization.
You can use System i Navigator to change these settings on a single system or across multiple systems.
Level 20
This level is referred to as password security. That is, users must have a password and user ID that
is recognized by your system to gain access to the system. Both the user ID and initial password are
created for users by the system administrator.
This level of security offers all users on the system total authority to do anything they want. That
means they can access all data, files, objects, and so on, on your system. This might be appropriate
for small businesses where internal security is a low priority, but will likely be inappropriate for
larger businesses that do not want every employee to be able to access confidential payroll files, for
example.
Level 30
This level is referred to as resource security. That is, users must have a valid user ID and password
defined for them by the system administrator, and no longer have automatic access to everything on
the system. User access is limited by the security policies of the business.
Level 40
This level is referred to as system integrity security. That is, at this level, the system itself is protected
against users. User-written programs cannot directly access the internal control blocks through
pointer manipulation.
Level 40 is the default security level for every new installation.
Level 50
This level is referred to as enhanced system integrity security. Level 50 is the recommended level of
security for most businesses, because it offers the highest level of security currently possible. Not
only is the system protected against user-written programs, but it ensures that users only have access
to data on the system, rather than information about the system itself. This offers greater security
against anyone attempting to learn about your system.
Related information
Planning and setting up system security
Security reference
User profiles
The user profile contains most of the authorizations and preferences for individual users or groups. With
System i Navigator, you can create and manage users and groups across the system.
User profiles contain the information that the system requires to allow users to sign on to a system,
to access their own customized session, including their own message and output queue, and to access
functions and objects to which they have been granted authority.
A user profile includes:
• A system user profile name
• The user's privileges and limitations
Authorization lists
Authorization lists consist of a list of users or groups, the type of authority (use, change, and exclude) for
each user or group, and a list of objects to which this list provides access.
Providing each user with explicit access to every object the user needs to work with might create a great
deal of duplicated effort because many users need to access the same group of objects. A much easier
way to provide this access is to create authorization lists. Users and groups can then be authorized to this
list, which grants them authority to everything that the list contains.
To work with authorization lists, open Security in System i Navigator and select Authorization lists.
For example, an authorization list can be created to contain a list of objects related to an inventory
database. A user responsible for ordering new inventory items can be granted authority to see the
contents of the database objects. Additionally, a user group in shipping and receiving needs to update this
database as parts come in and out of stock. This group can have authority to change the contents of the
objects.
Spooled files
Spooling is a system function that saves data in a database file for later processing or printing. With
spooled files, you can manage your data files on attached devices, such as a diskette or printer.
Tape files
Tape files are device files that provide access to attached tape devices. The Tape files topic collection
describes the characteristics and use of tape device files for application programs. This topic also
provides information about storing and accessing data from a tape device, and conceptual information
about tape, tape data files, and tape device files.
Related concepts
Objects
Everything on the system that can be worked with is considered an object. Objects provide a common
interface for working with system components. This topic discusses the different kinds of objects and how
to work with them.
Database file management
Securing the integrated file system
Related information
Spooled files and output queues
Jobs
All work done by the operating system is divided into units called jobs. Jobs are how the operating system
organizes, tracks, and processes work.
A job typically includes all of the information the system requires to complete a specific task. This
information might include data files, programs, and instructions for processing and tracking the job
throughout its processing. Jobs vary greatly in their complexity, ranging from simple tasks, like printing
a specified document, to complex procedures, like generating reports based on information spread
throughout the system. Tracking and managing jobs is an important part of normal system operation.
Jobs are an essential part of work management. To learn more about how jobs are processed, including
working with subsystems and job queues, see The structure of your system. For an example of how jobs
move through the system, see A job's life.
After finding the jobs you want to work with, you can display their attributes or change their queue,
priority, messages, and other features by right-clicking the job and clicking Properties. Additionally, your
system administrator might decide to set up a job monitor to work with some jobs.
Related concepts
Managing jobs
Related tasks
Creating a new monitor
Objects
Everything on the system that can be worked with is considered an object. Objects provide a common
interface for working with system components. This topic discusses the different kinds of objects and how
to work with them.
One of the differences between the IBM i operating system and other operating systems is the concept
of objects. Anything that you can change in the operating system is a type of object. For example,
data files, programs, libraries, queues, user profiles, and device descriptions are all types of objects. By
treating everything as an object, the operating system can provide all of these items with an interface that
defines what actions users can perform, and how the operating system needs to treat the encapsulated
data. Additionally, this interface allows for standardized commands across different system elements; the
commands for working with user profiles and data files are similar.
One important type of object is the library. Libraries are essentially containers, or organizational
structures for other objects, and you can use libraries to reference other objects on your system. Libraries
can contain many objects, and can be associated with a specific user profile or application. The only
library that can contain other libraries is called QSYS. It contains all other libraries on the system.
There are many different types of objects in the operating system. Finding objects and performing actions
on them are basic functions of system operations.
Related concepts
IBM i commands
The operating system uses control language (CL) commands to interpret instructions from users. You
need to know the basic rules for using CL, and how to get detailed help for any CL command.
Files and file systems
Files and file systems present information about database file management, spooled files, tape files, and
the integrated file system capabilities of the IBM i platform.
i5/OS objects
CL commands that operate on i5/OS objects
Logs
A log is a database file that contains the history of backup, archive, recovery, and media management
operations that can be displayed online or printed for future reference. Logs are used in backup and
recovery situations. Logs can also contain information about jobs, general system information, and
problems.
Journals
A journal is a system object that contains information about changes made to another system object.
The journal can be used to recover database files, data areas, data queues, and integrated file systems
objects. Regular journaling speeds up management tasks such as save operations.
Related concepts
Job logs
History logs
Problem logs
Journal management
Related information
Recovering your system PDF
Software fixes
You can use fixes to install and manage software and software updates.
IBM supports several different releases of the operating system, and businesses might have several
systems running different versions. This can cause some system operations to be more complex; different
versions of the operating system can contain new or changed functions and features. Moreover, IBM
provides updates to the operating system and other programs between releases in sets of program
temporary fixes (PTFs), also known as fixes. The PTFs that have been applied to a system can also affect
system operations. System i Navigator provides ways to manage the software and fixes across a business.
Related concepts
Maintaining and managing i5/OS and related software
PTF Maintenance Strategy
IBM Redbooks
Other information
• Basic printing
• System i Navigator
Related reference
PDF file for Basic system operations
You can view and print a PDF file of this information.
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property
Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
Software Interoperability Coordinator, Department YBWA
3605 Highway 52 N
Rochester, MN 55901
U.S.A.
If you are viewing this information softcopy, the photographs and color illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
72 Notices
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or
trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications
Agency which is now part of the Office of Government Commerce.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon,
Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or
its subsidiaries in the United States and other countries.
Linux® is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
ITIL is a registered trademark, and a registered community trademark of the Office of Government
Commerce, and is registered in the U.S. Patent and Trademark Office.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other
countries, or both and is used under license therefrom.
Java and all Java-based trademarks and logos are trademarks of Oracle, Inc. in the United States, other
countries, or both.
Other product and service names might be trademarks of IBM or other companies.
Notices 73
74 IBM i: Basic system operations
Terms and conditions
Permissions for the use of these publications is granted subject to the following terms and conditions.
Personal Use: You may reproduce these publications for your personal, noncommercial use provided that
all proprietary notices are preserved. You may not distribute, display or make derivative works of these
publications, or any portion thereof, without the express consent of IBM.
Commercial Use: You may reproduce, distribute and display these publications solely within your
enterprise provided that all proprietary notices are preserved. You may not make derivative works of
these publications, or reproduce, distribute or display these publications or any portion thereof outside
your enterprise, without the express consent of IBM.
Except as expressly granted in this permission, no other permissions, licenses or rights are granted, either
express or implied, to the publications or any information, data, software or other intellectual property
contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use
of the publications is detrimental to its interest or, as determined by IBM, the above instructions are not
being properly followed.
You may not download, export or re-export this information except in full compliance with all applicable
laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS
ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT,
AND FITNESS FOR A PARTICULAR PURPOSE.