Solved

Virtualizing TAPE on dual VIOS

Posted on 2016-07-22
3
65 Views
Last Modified: 2016-07-28
We have connected IBM protectier (IBM 3500) to a dual VIOS server in order to virtualize them to a TSM server running on an old Power system 550.
After the connection and FC zonning between protectier and VIOS, we can see the devices:

padmin@vios1 $ lsdev -type tape
name             status      description
rmt0             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt1             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt2             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt3             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt4             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt5             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt6             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt7             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt8             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt9             Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt10            Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt11            Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt12            Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt13            Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt14            Available   IBM 3580 Ultrium Tape Drive (FCP)
rmt15            Available   IBM 3580 Ultrium Tape Drive (FCP)
smc0             Available   IBM 3584 Library Medium Changer (FCP)

Open in new window


So, we're trying to map, in this case, rmt0 to the AIX 6.1 (TSM server), but we're having this error:

padmin@vios1 $ mkvdev -vdev rmt0 -vadapter vhost2 -dev tsm3_rmt0
"rmt0" is not a valid backing device.

Open in new window


Any idea why?
0
Comment
Question by:CSIA AN
  • 2
3 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 41727664
If I remember well only SAS (Serial Attached SCSI) tapes can be virtualized, not FC tapes.
http://www-01.ibm.com/support/docview.wss?uid=isg3T1011269
1
 
LVL 2

Author Comment

by:CSIA AN
ID: 41731461
Thanks
0
 
LVL 2

Author Closing Comment

by:CSIA AN
ID: 41733147
Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now