Solved

TSM Server Script

Posted on 2014-10-01
1
248 Views
Last Modified: 2014-10-02
Hi

i want to know if i can add to this script start date and end date

like between 12/08/2013 to 12/08/2014 for tsm server version 6 & 7

 TOTALDATA - Desc="Display amount of data stored on TSM (auditocc)"

SELECT CAST(FLOAT(SUM(backup_mb))/1024 as DEC(8,1)) as BACKUP_GB, CAST(FLOAT(SUM(backup_copy_mb))/1024 as DEC(8,1)) as BACKUP_COPY_GB, CAST(FLOAT(SUM(archive_mb))/1024 as DEC(8,1)) as ARCHIVE_GB, CAST(FLOAT(SUM(archive_copy_mb))/1024 as DEC(8,1)) as ARCHIVE_COPY_GB, CAST(FLOAT(SUM(total_mb))/1024 as DEC(8,1)) as TOTAL_GB from auditocc
0
Comment
Question by:David Regev
1 Comment
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 40355473
The AUDITOCC table does not contain a history.
That's because it is recreated at each run of "AUDIT LICENSES".

So it doesn't contain any timestamp column to run a "where" clause against.

The "OCCUPANCY" table which keeps continuous storage occupancy records
doesn't contain timestamps either.

In fact, there is no way to query how the occupancy of TSM storage looked in the past
 if you don't keep continuous records yourself (e. g. by running a daily script to store daily values) .
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Solaris SUN OS 4.1.3 cloning 6 75
NetApp vFiler Question 2 41
DPM 2016 can't see iSCSI disk 5 46
Optimum method for backing workstations My Documents to a backup server 17 57
Create your own, high-performance VM backup appliance by installing NAKIVO Backup & Replication directly onto a Synology NAS!
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now