The SAVSYS command requires that your system be in a restrictive state. The only active job in a restrictive state is the system console.
IBM has been kind enough to split the SAVSYS command into three parts though:
- The Save System (SAVSYS) command saves a copy of the Licensed Internal Code and the QSYS library in a format compatible with the installation of the operating system. It does not save objects from any other library.
- Security data is saved
- Configuration data is saved.
The second and third parts of the SAVSYS command can be run while the system is fully active.
IBM has supplied us with two commands to do this.
Save Security Data – IBM Supplied Help
The Save Security Data (SAVSECDTA) command saves all security information without requiring a system in a restricted state. The SAVSECDTA command saves the same security information that is saved when a Save System (SAVSYS) command is run including the following:
- User profiles
- Authorization lists
- Authority holders
Information saved with the SAVSYS or SAVSECDTA command can be restored using the restore user profiles (RSTUSRPRF) and restore authority (RSTAUT) commands.
Save Configuration – IBM Supplied Help
The Save Configuration (SAVCFG) command saves all configuration and system resource management (SRM) objects without requiring a system in a restricted state. The information saved includes the following:
- Line descriptions
- Controller descriptions
- Device descriptions
- Mode descriptions
- Class-of-service descriptions
- Network interface descriptions
- Network server descriptions
- NetBIOS descriptions
- Connection lists
- Configuration lists
- Hardware resource data
- Token-ring adaptor data
Information saved can be restored with the restore configuration (RSTCFG) command.
To separately run these three saves, you would use the following commands in the following order:
ENDSBS *ALL *IMMED (Goto a restrictive state)
SAVSYS DEV(TAP01) OMIT(*SECDTA *CFG)
Start up your system…
Dig Deeper on Data backup, storage and retrieval on iSeries
Related Q&A from Ken Graap
Find out if log files can be omitted during a save without causing problems in a full restore. Continue Reading
The BRMS Network feature allows a BRMS system to connect to other BRMS systems via a network, and enables a user to consolidate media such as backup ... Continue Reading
The only option to correct damage preventing file journaling is to use the RCLSTG command. Continue Reading