Posted on 2013-10-25
Medium Priority
Last Modified: 2013-10-29
Hi.  I've been asked to apply a couple of fixes to my IBM I.  I've never done this before so am reading up on it.  Maybe a dumb question but can I run commands like DSPPTF and WRKPTFGRP at any time on my production system without impacting my users?  I'm guessing yes but wanted to be sure.
Question by:valmatic
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 18

Accepted Solution

Dave Ford earned 600 total points
ID: 39601185
> can I run commands like DSPPTF and WRKPTFGRP at any time on
> my production system without impacting my users?

Yes. Displaying PTF info has no affect on your users.


Author Closing Comment

ID: 39601443
I Figured.  Thanks a bunch Dave.    

I may post a few more (new) questions as I get into it.
LVL 27

Expert Comment

ID: 39604623
There won't be a significant issue until you actually apply (APYPTF) or remove (RMVPTF) any PTFs. Technically, there can be minor interference when you retrieve or load PTFs; but those would just be the same kinds of interference that any job creates for another. i.e., some CPU will be used, some memory management will happen, some network traffic will use the NIC, etc.

In general, even when applying or removing, users won't notice. But there will potentially be 'Special Instructions' in a cover letter document for each PTF that might direct you to end and restart some server function, or do some similar action, that will temporarily block access to that function. I n some cases, a PTF affects the underlying virtual machine and will require a system restart (IPL) in order for the PTF to become active.

Regardless, I almost always plan PTFs for times when the system usage is relatively quiet. I haven't had a problem for a decade or more, but I don't have a reason to tempt fate.

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.


Author Comment

ID: 39605484
Hi Tom,  I really appreciate the advice.  I'm performing the apply next weekend so not worried about performance during..  I'm still a novice operator though and quite a bit I'm still just not sure of myself on so anything that experienced people throw at me is great stuff  :)
LVL 27

Expert Comment

ID: 39607327
Is this a few specific individual PTFs? Or a "package" of PTFs?

Individual PTFs are relatively trivial. But a package (a cumulative set or one or more 'group' PTFs) can take preparation, depending on how the system had previously been set up. You'll want a couple days to ensure everything is done.


Author Comment

ID: 39608656
Hi Tom,  Both actually.  I'm updating the Hiper, DB and Java groups plus 2 individual PTFs.  I planned to temp apply everything and set to apply permanent at next IPL.

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

New style of hardware planning for Microsoft Exchange server.
The top devops trends for 2017 are focused on improved deployment frequency, decreased lead time for change and decreased MTTR.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question