I had a CVE pop up with recommending a PTF.  I ordered the ptf using
SNDPTFORD.  It brought down just a single ptf.  It was immediate so I
loaded it and applied it.  So far, so good.
Then my coworker Darren showed me this Dawn May article on IFS
https://www.itjungle.com/2019/10/14/guru-move-objects-with-access-client-solutions/
I went to /qsys.lib/qgpl.lib, used the filter to select the ptf number (and
it even found the file with the prefix of Q very quickly) then I clicked
the Send option.  It brought up a list of my LPARs.  I have 14.  I was able
to pick them all in one pass and it sent it lickity split.  Granted, I had
to lodptf/apyptf outside of the tool but I was pretty impressed with it.
I had one system it complained about but retrying it again with no changes
worked.  I'm blaming it on that system being the twin of this one in a h/a
environment and something quirky went on with timing.
This uses QFileSvr.400 under the covers.  And even though the documentation
on QFileSvr.400 says it doesn't handle QSYS IBM figured out a way to
shoehorn this in.  Probably by /qsys.lib/... methods
As an Amazon Associate we earn from qualifying purchases.