Solved

TSM Server Script

Posted on 2014-10-01
1
261 Views
Last Modified: 2014-10-02
Hi

i want to know if i can add to this script start date and end date

like between 12/08/2013 to 12/08/2014 for tsm server version 6 & 7

 TOTALDATA - Desc="Display amount of data stored on TSM (auditocc)"

SELECT CAST(FLOAT(SUM(backup_mb))/1024 as DEC(8,1)) as BACKUP_GB, CAST(FLOAT(SUM(backup_copy_mb))/1024 as DEC(8,1)) as BACKUP_COPY_GB, CAST(FLOAT(SUM(archive_mb))/1024 as DEC(8,1)) as ARCHIVE_GB, CAST(FLOAT(SUM(archive_copy_mb))/1024 as DEC(8,1)) as ARCHIVE_COPY_GB, CAST(FLOAT(SUM(total_mb))/1024 as DEC(8,1)) as TOTAL_GB from auditocc
0
Comment
Question by:David Regev
1 Comment
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 40355473
The AUDITOCC table does not contain a history.
That's because it is recreated at each run of "AUDIT LICENSES".

So it doesn't contain any timestamp column to run a "where" clause against.

The "OCCUPANCY" table which keeps continuous storage occupancy records
doesn't contain timestamps either.

In fact, there is no way to query how the occupancy of TSM storage looked in the past
 if you don't keep continuous records yourself (e. g. by running a daily script to store daily values) .
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question