HP NonStop RDF J-series RVUs Management Manual

For j-series and h-series rvus
Table of Contents

Advertisement

HP NonStop RDF System Management
Manual for J-series and H-series RVUs (RDF
1.9)
HP Part Number: 529826-006
Published: June 2009
Edition: J06.03 and subsequent J-series RVUs and H06.03 and subsequent H-series RVUs

Advertisement

Table of Contents
loading

Summary of Contents for HP NonStop RDF J-series RVUs

  • Page 1 HP NonStop RDF System Management Manual for J-series and H-series RVUs (RDF 1.9) HP Part Number: 529826-006 Published: June 2009 Edition: J06.03 and subsequent J-series RVUs and H06.03 and subsequent H-series RVUs...
  • Page 2 The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Updates in the RDF 1.9 manual.......................24 Document Organization........................24 Notation Conventions...........................26 General Syntax Notation.........................26 Notation for Messages........................28 Related Information..........................29 Publishing History..........................30 HP Encourages Your Comments......................30 1 Introducing RDF......................31 RDF Subsystem Overview........................32 Unplanned Outages With ZLT......................34 Unplanned Outages Without ZLT....................34 Planned Outages..........................35 Features............................35 User Interfaces............................38...
  • Page 4 Online Database Synchronization....................54 Online Dumps of the Backup Database..................54 Subvolume-Level and File-Level Replication..................54 Shared Access DDL Operations......................54 Configurable Software Location......................54 EMS Support............................55 SMF Support............................55 RTD Warning Thresholds........................55 Process-Lockstep Operation......................55 Support for Network Transactions....................55 RDF and NonStop SQL/MX......................56 Zero Lost Transactions (ZLT)......................56 Monitoring RDF Entities With ASAP....................56 2 Preparing the RDF Environment..................57 Configuring Hardware for RDF Operations..................57...
  • Page 5 Separating NonStop SQL Tables....................70 Compressing Audit Data for Tables and Files................70 Preparing the Backup System.......................70 Synchronizing the Primary and Backup Databases................71 Re-Creating an Empty Database With an OBEY Command.............71 Synchronizing Databases With SQLCI Commands..............72 Synchronizing Databases With BACKUP and RESTORE Utilities..........73 Synchronizing Databases With FUP..................74 Synchronizing Partitioned Files....................74 Backing Up Application Programs and Files..................74...
  • Page 6 PRIMARYSYSTEM Attribute....................90 BACKUPSYSTEM Attribute....................91 REMOTECONTROLSUBVOL Attribute................91 PNETTXVOLUME Attribute....................91 Setting Individual Process Attributes..................91 RDFNET Process........................91 Monitor Process........................91 Extractor Process........................92 Receiver Process........................93 Purger Process........................94 Updater Processes.........................95 Creating a Configuration Command File..................96 Configuration File Compatibility....................96 Enabling RDF Operations........................97 Starting TMF............................97 Starting RDF............................97 Restarting the Applications......................98 4 Operating and Monitoring RDF.................99 Running RDFCOM..........................99 Command Syntax for Starting an RDFCOM Session..............99...
  • Page 7 Process Priority.........................117 EMS Logs (Collectors)......................117 RETAINCOUNT........................117 PURGETIME..........................117 UPDATERDELAY........................117 UPDATEROPEN........................117 Reading Log Messages........................118 Examining RDF Messages......................118 ASAP..............................120 5 Critical Operations, Special Situations, and Error Conditions......121 Recovering From File System Errors....................121 Handling Disk Space Problems......................124 Exceeding the Maximum Number of Concurrent File Opens............125 Responding to Operational Failures....................125 Communication Line Failures.......................126 System Failures..........................126...
  • Page 8 Monitor Considerations......................143 Updater Considerations......................143 Takeover and Triple Contingency....................143 Checking Exception Files for Uncommitted Transactions............143 How to Plan for the Fastest Movement of Business Operations to Your Backup System After Takeover............................144 Restoring the Primary System.......................147 Online Method of Resynchronizing the Primary Database.............148 Offline Method of Resynchronizing the Primary Database.............148 Reading the Backup Database (BROWSE versus STABLE Access)............149 Near Real Time Read Access to Updates on the Primary System............149...
  • Page 9 Duration and Preparation Issues....................170 SYNCHDBTIME Issues......................170 Enscribe Create Records......................170 Stop-RDF-Updater Records....................170 TMF Shutdown Records.....................171 CREATE/LOAD Issues (Step 4, Method 1)................171 General Considerations for Enscribe Files................171 Special Consideration for Enscribe Files................172 General Considerations for NonStop SQL Tables...............172 Enscribe Queue File Issues.......................172 Different NonStop SQL Product Versions................173 Moving Duplicated Tables and Files to the Backup System............173 Example of Synchronizing An Entire Database Online..............174...
  • Page 10 Usage Guidelines...........................188 Output Displayed..........................190 Examples............................190 RDFCOM-Related Filenames and Process Identifiers................190 Reserved File Names........................191 Disk File Names..........................191 Nondisk Device Names.........................191 Process File Names........................192 RDFCOM Commands.........................192 ADD...............................193 Where Issued..........................193 Security Restrictions.........................193 RDF State Requirement......................193 Usage Guidelines........................194 Examples..........................194 ALTER............................195 Where Issued..........................196 Security Restrictions.........................196 RDF State Requirement......................196 Usage Guidelines........................196 Examples..........................196...
  • Page 11 RDF State Requirement......................205 Examples..........................205 INFO..............................206 Where Issued..........................207 Security Restrictions.........................207 RDF State Requirements......................207 Usage Guidelines........................207 Output Displayed........................208 Examples..........................208 INFO * Command.......................208 INFO EXTRACTOR Command..................209 INFO EXTRACTOR Command With OBEYFORM Option..........209 INFO MONITOR Command....................210 INFO RDF Command......................210 INFO VOLUME Command....................210 INFO PURGER Command....................211 INFO TRIGGER Command....................211 INFO TRIGGER Command With OBEYFORM Option............212 INFO RDFNET Command....................212...
  • Page 12 Examples..........................223 SET IMAGETRAIL.........................224 Usage Guidelines........................224 SET MONITOR..........................224 Where Issued..........................225 Security Restrictions.........................225 RDF State Requirements......................225 Usage Guidelines........................225 Example............................225 SET NETWORK..........................225 Where Issued..........................226 Security Restrictions.........................226 RDF State Requirements......................226 Usage Guidelines........................226 Example............................226 SET PURGER..........................226 Where Issued..........................228 Security Restrictions.........................228 RDF State Requirements......................228 Usage Guidelines........................228 Example............................228 SET RDF............................228 Where Issued..........................231...
  • Page 13 Output Displayed........................240 Examples..........................240 SHOW RDF Command......................240 SHOW RECEIVER Command....................241 SHOW PURGER Command.....................241 SHOW VOLUME Command....................241 SHOW RDFNET Command.....................242 SHOW NETWORK Command....................242 SHOW TRIGGER Command....................242 START RDF............................242 Where Issued..........................243 Security Restrictions.........................243 RDF State Requirement......................243 Usage Guidelines........................243 Examples..........................244 START UPDATE..........................244 Where Issued..........................244 Security Restrictions.........................244 RDF State Requirement......................244 Usage Guidelines........................244...
  • Page 14 Where Issued..........................255 Security Restrictions.........................255 Usage Guidelines........................255 Limitation..........................257 Example............................257 UNPINAUDIT..........................257 Where Issued..........................257 Security Restrictions.........................257 RDF State Requirement......................258 Usage Guidelines........................258 Example............................258 VALIDATE CONFIGURATION....................258 Where Issued..........................258 Security Restrictions.........................258 RDF State Requirement......................258 Usage Guidelines........................258 Example............................259 9 Entering RDFSCAN Commands................261 About the EMS Log..........................261 Elements of RDFSCAN Command Descriptions................261 RDFSCAN Commands........................262 AT..............................262 Usage Guidelines........................262...
  • Page 15 10 Triple Contingency....................271 Overview.............................271 Requirements............................271 How Triple Contingency Works......................271 Hardware Requirements........................272 Software Requirements........................272 The RETAINCOUNT Configuration Parameter.................273 The COPYAUDIT Command......................274 COPYAUDIT Restartability........................275 Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails......275 Triple Contingency Without ZLT....................275 Using ZLT to Achieve the same Protection...................276 Summary.............................277 1 1 Subvolume-Level and File-Level Replication............279 INCLUDE Clauses..........................279...
  • Page 16 NETWORKMASTER Attribute.....................296 Network Configuration Record.....................296 PRIMARYSYSTEM Network Attribute..................296 BACKUPSYSTEM Network Attribute..................296 REMOTECONTROLSUBVOL (RCSV) Network Attribute.............297 PNETTXVOLUME Network Attribute..................297 Adding the Network Record....................297 RDF Network Synchronizer (RDFNET) Process................297 RDF Network Control Files........................297 Normal RDF Processing Within a Network Environment..............297 RDF Takeovers Within a Network Environment................298 Takeover Phase 1 –...
  • Page 17 16 NonStop SQL/MX and RDF...................323 Including and Excluding SQL/MX Objects..................323 Creating NonStop SQL/MX Primary and Backup Databases.............323 Creating a NonStop SQL/MX Backup Database From an Existing Primary Database......326 Online Database Synchronization With NonStop SQL/MX Objects..........328 Creating the Fuzzy Copy on the Primary System.................328 Creating the Fuzzy Copy on the Backup System................330 Offline Synchronization for a Single Partition..................330 Directly From the Primary to the Backup..................330...
  • Page 18 ALTER............................349 COPYAUDIT..........................350 DELETE............................350 EXIT...............................350 FC..............................350 HELP..............................350 HISTORY............................350 INFO..............................351 INITIALIZE RDF...........................351 OBEY..............................351 OPEN.............................351 OUT..............................351 RESET............................352 SET EXTRACTOR..........................352 SET IMAGETRAIL.........................352 SET MONITOR..........................352 SET NETWORK..........................353 SET PURGER..........................353 SET RDF............................353 SET RDFNET..........................354 SET RECEIVER..........................354 SET TRIGGER..........................354 SET VOLUME..........................354 SHOW............................355 START RDF............................355 START UPDATE..........................355 STATUS............................355 STOP RDF............................356 STOP SYNCH..........................356 STOP UPDATE..........................356...
  • Page 19 RDF System Files..........................362 RDF File Codes............................364 C Messages........................365 About the Message Descriptions......................365 RDF Messages.............................365 RDFCOM Messages..........................413 RDFSCAN Messages...........................461 D Operational Limits.....................463 E Using ASAP........................465 Architectural Overview........................465 Installation............................466 Auto Discovery...........................466 Monitoring Specific RDF Environments.....................466 Adding and Removing RDF Environments..................467 Version Compatibility.........................467 RDF Metrics Reported by ASAP......................467 Index..........................469 Table of Contents...
  • Page 20 List of Figures Basic RDF Configuration.......................33 RDF Topologies..........................37 RDF Tasks to Maintain a Copy of a Database................40 RDF Subsystem Processes......................41 Extractor Process Operation......................43 Receiver Process Operation......................45 Synchronized Databases Before Starting RDF................157 Synchronized Databases During RDF Operations..............158 Synchronized Databases, No Outstanding Audit...............158 Synchronized Databases After STOP TMF Command...............159 Unsynchronized Databases......................159 10-1...
  • Page 21 List of Tables Audit Records at the Time of a Primary System Failure..............34 RDF Hardware Requirements.......................57 Software Requirements.........................60 RDF Process and Program Security Attributes................76 RDFCOM Configuration Commands..................105 RDFCOM Operational Commands.....................106 RDFCOM Utility Commands......................107 RDFSCAN Commands........................110 RDF States............................113 Recovery From File Modification Failures (RDF Event 700)............122 Recovery From File Open Failures (RDF Event 705)..............123 Recovery From File Creation Failures (RDF Event 739)..............123 Systems for RDFCOM Commands....................188...
  • Page 22 List of Examples Reciprocal Replication........................50 Chain Replication..........................51 Invalid Chain Replication......................51 List of Examples...
  • Page 23: About This Document

    This manual supports J06.03 and all subsequent J-series RVUs and H06.03 and all subsequent H-series RVUs, until otherwise indicated by its replacement publications. Intended Audience This manual contains information for everyone responsible for RDF installation, management, and operations on HP Integrity NonStop™ systems: • System managers •...
  • Page 24: Updates In The Rdf 1.9 Manual

    • Added information on running a TAKEOVER command using an OBEY file/IN File in “Issuing the TAKEOVER Command in an Obey File” (page 142) “TAKEOVER” (page 255). • Added information about FASTUPDATEMODE in “Near Real Time Read Access to Updates on the Primary System”...
  • Page 25: Rdfscan Commands

    where to look for the information you need, based upon the responsibility you have or the kind of tasks you perform at your site: Responsibility Chapter/Appendix System manager System operator 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, A, C, D, E Database 1, 2, 3, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, A, B, C, D, E administrator...
  • Page 26: Notation Conventions

    Notation Conventions General Syntax Notation This list summarizes the notation conventions for syntax presentation in this manual. UPPERCASE LETTERS Uppercase letters indicate keywords and reserved words. Type these items exactly as shown. Items not enclosed in brackets are required. For example: MAXATTACH Italic Letters Italic letters, regardless of font, indicate variable items that you supply.
  • Page 27 { } Braces A group of items enclosed in braces is a list from which you are required to choose one item. The items in the list can be arranged either vertically, with aligned braces on each side of the list, or horizontally, enclosed in a pair of braces and separated by vertical lines.
  • Page 28: Notation For Messages

    !i and !o In procedure calls, the !i notation follows an input parameter (one that passes data to the called procedure); the !o notation follows an output parameter (one that returns data to the calling program). For example: CALL CHECKRESIZESEGMENT ( segment-id , error !i,o...
  • Page 29: Related Information

    A group of items enclosed in brackets is a list of all possible items that can be displayed, of which one or none might actually be displayed. The items in the list can be arranged either vertically, with aligned brackets on each side of the list, or horizontally, enclosed in a pair of brackets and separated by vertical lines.
  • Page 30: Publishing History

    NonStop SQL/MP software, catalogs, objects, messages, files, and programs. • TACL Reference Manual, which discusses operations available in the HP Tandem Advanced Command Language (TACL), the standard command interface to the NonStop operating system. This is the interface through which you run RDFCOM and RDFSCAN and manage files used by them.
  • Page 31: Introducing Rdf

    This manual describes the Remote Database Facility (RDF) subsystem as implemented in version 1, update 9 of the HP NonStop RDF/IMP, IMPX, and ZLT independent products. Customers who install RDF 1.9 can use existing RDF configuration scripts provided the scripts are not making use of new functionality.
  • Page 32: Rdf Subsystem Overview

    operates, such as transactions, audit trails, and audit volumes. You should understand how TMF software uses elements like before-images, after-images, and control records. In addition, you should also understand the TMF processes that perform backout, volume recovery, and file recovery. If you are not familiar with this information, you should read TMF Introduction. RDF Subsystem Overview RDF maintains a logically replicated database on one or more backup systems by monitoring changes made to audited tables and files on designated primary system volumes and applying...
  • Page 33: Basic Rdf Configuration

    Figure 1-1 Basic RDF Configuration Figure 1-1, there are 20 audited volumes on the primary system ($D1 through $D20). Only volumes $D1 through $D15, however, are configured for RDF protection. Audit records for volumes $D1 through $D10 and $D16 through $D20 are sent to the master audit trail (MAT).
  • Page 34: Unplanned Outages With Zlt

    An unplanned outage typically occurs as the result of a sudden disaster that prevents the database on the primary system from being used. The classic purpose of RDF is to make rapid recovery from an unplanned outage possible by maintaining a replicated database on a backup system. When the primary system is unexpectedly affected by a disaster, you can shift operations to the replicated database on the backup system after having the RDF updaters bring the backup database to a consistent state.
  • Page 35: Planned Outages

    101, a single update was logged in the MAT and sent to the backup system, but the primary system was brought down before the transaction was completed. When the command for a takeover is issued, the updater processes treat all transactions whose outcomes are not known as aborted transactions.
  • Page 36 — A single primary system whose database changes are replicated to databases on multiple backup systems. Such an environment makes possible simultaneous read-only access to all of the backup databases (this is desirable for query-intensive applications such as telephone directory assistance). —...
  • Page 37: Rdf Topologies

    Figure 1-2 RDF Topologies • Supports master and auxiliary audit trail protection; RDF can protect all tables and files that are being audited by TMF, whether they are associated with the Master Audit Trail (MAT) or an auxiliary audit trail. •...
  • Page 38: User Interfaces

    • Economical processing RDF conserves resources at both sites. The extractor typically uses 1% of the resources used by the application on the primary and 4% of the Expand resources. On the backup system the cost of an updater process replicating an update operation is typically 15-25% of the original cost to do the operation on the primary system.
  • Page 39: Rdf Tasks

    You can peruse messages in the EMS log on your terminal screen by using Viewpoint or whatever other tool you normally use for monitoring $0. When you do that, you are dealing with the entire EMS log (not just RDF messages). To isolate RDF messages from the rest of the EMS log, you can use the supplied EMS filter RDFFLTO with an EMS printing distributor to produce an intermediate entry-sequenced file that you then can scan using the RDFSCAN utility.
  • Page 40: Rdf Processes

    Figure 1-3 RDF Tasks to Maintain a Copy of a Database RDF Processes To accomplish its four major tasks, RDF runs different processes on the primary system and the backup system. These processes (the monitor and extractor on the primary system and the receiver, updaters, and purger on the backup system) divide these tasks as summarized in the following pages.
  • Page 41: Primary System Processes

    Figure 1-4 RDF Subsystem Processes Primary System Processes On the primary system: • The monitor process coordinates most RDFCOM commands involving the main RDF processes (for example, start and stop). • Each extractor process reads an audit trail (the MAT or a particular auxiliary audit trail), filters out audit records not relevant to the backup database, transforms the audit record into an image record, and then transmits the image records to an associated receiver process on the backup system.
  • Page 42: Backup System Processes

    Backup System Processes On the backup system: • There is one receiver process for each configured extractor process. A receiver accepts the image records from its extractor, sorts them, and then writes them to the appropriate RDF image trail. • There is one updater process for each primary system volume being protected by RDF.
  • Page 43: Extractor Process Operation

    NOTE: The discussion and figure that follow are both oriented to the extractor associated with the MAT. For information about protecting auxiliary audit trails, see Chapter 13 (page 291). Figure 1-5 Extractor Process Operation Reading large amounts of data from the MAT, the extractor process stores the following records for subsequent transmission to the backup system: •...
  • Page 44: Receiver Process

    explicitly excluded by INCLUDE/EXCLUDE lists), most of the physical audit records generated either for block splits or during FUP RELOAD operations, and all audits generated by the RDF updaters. The extractor always tries to fill the buffer to be sent to the receiver. The buffer never contains partial records;...
  • Page 45: Sorted Image Trails

    Sorted Image Trails RDF maintains its image data on disk volumes specified during RDF configuration. On each of these volumes, the collection of files that contains image data is known as an image trail; that is, there is one image trail per individual image trail volume. The standard image trail used by RDF, called the master image trail, contains the transaction status records that hold key information about whether a transaction has committed or aborted.
  • Page 46: Rdf Control Points

    With sorted image trails, the activity of any one image file typically remains so low that it can be stored on the same disk volumes as the main database with no significant I/O impact. This approach is not recommended, however, if you require very high RDF performance or if RDF is running with the UPDATE option turned off;...
  • Page 47: Audited Database Files

    • Issues a logical REDO request to the disk process (during the normal forward pass over the image trail) for each update associated with its volume. • Issues logical UNDO requests to the disk process when backing out changes associated with transactions that need to be undone during RDF takeover or stop-update-to-timestamp operations.
  • Page 48: Redo Pass

    Each updater maintains a file status table to keep track of the files it has open. An updater closes any database file that has not been updated recently. Updaters also close database files when a STOP RDF or STOP UPDATE command is issued, or when the updater restarts because of error conditions.
  • Page 49: File System Errors Involving Data Files

    partition, regardless of whether it is a primary or secondary partition. RDF does not use the file system for partition mapping. Furthermore, because updates to the backup database are applied by logical REDO/UNDO operations, alternate key files and NonStop SQL indexes are not affected by an update to a file or table.
  • Page 50: Reciprocal And Chain Replication Require Mutually Exclusive Datavols

    Second, because considerable checking must be done across all trails to determine what files can be purged based on what transactions might be represented in the various files on the various image trails, the purger process performs this task. The purger process is a restartable process pair that runs on the backup system (it is started during START RDF and runs even when the updaters are stopped;...
  • Page 51: Chain Replication

    Example 1-2 Chain Replication System \A System \B System \C RDF Subsystem 1 Primary DB 1 ---------> Backup DB 1 Primary DB 2 ----------> Backup DB 2 RDF Subsystem 2 Thus, system \B is both the backup system in RDF subsystem 1 and the primary system in RDF subsystem 2.
  • Page 52: Available Types Of Replication To Multiple Backup Systems

    when the updater for RDF Subsystem 2 on \A applies this record to Primary DB 1, it thereby backs out the committed update of your application. Additionally, Primary DB 1 and Backup DB 1 are no longer in synch. Even though the updater on \B had its transaction aborted, that updater will re-apply the application update to Backup DB 1.
  • Page 53: Rdf Control Subvolume

    In the preceding examples, each RDF configuration operates entirely independently of the other RDF configuration primaried on the same node; that is, each RDF system has its own extractor and monitor process. In this way, Expand problems affecting one configuration might not necessarily affect the others (depending on the configuration).
  • Page 54: Online Product Initialization

    One set of disks can be replicated to another set of target disks to provide a copy of the live database. There are two operational considerations unique to this environment: • The updaters operate in transaction mode, which means you should not stop TMF before stopping RDF.
  • Page 55: Ems Support

    You should place the RDFCOM component on $SYSTEM.SYSTEM, or you must add the new software location to your TACL search-subvolume list. EMS Support RDF/IMP, IMPX, and ZLT all support the Event Management System (EMS). They direct their command, event, warning, and error messages to an EMS collector in the form of fully-tokenized messages.
  • Page 56: Rdf And Nonstop Sql/Mx

    For information about this capability, see Chapter 14 (page 295). RDF and NonStop SQL/MX RDF can replicate NonStop SQL/MX user tables and indexes as well as NonStop SQL/MP objects and Enscribe files. For information about this capability, see Chapter 16 (page 323).
  • Page 57: Preparing The Rdf Environment

    2 Preparing the RDF Environment Before RDF can be run on a NonStop system, the system configurations and user applications must meet certain RDF requirements. This chapter explains how to prepare each system for RDF installation and operation, ensuring that all these requirements are met and that you understand the RDF product’s restrictions.
  • Page 58: Disk Volume Limit

    (in “standby” mode). Sizing the RDF configuration is a complex task that is best carried out by HP personnel. Those personnel can assist you in configuring and sizing your RDF environment using tools and utilities designed and developed as part of the RDF Professional Service.
  • Page 59: Preparing Software And Database Files For Rdf Operations

    It is almost impossible to calculate the RDF audit transmission rate from the TMF audit generation rate alone. HP has developed a sizing tool that can be used to predict accurately the Expand bandwidth requirements between the primary and backup systems by simulating the RDF extractor. That utility reads the TMF audit trails and generates detailed information about TMF audit generation and RDF audit transmission activity.
  • Page 60: Configuring Tmf For Rdf Operations On The Primary System

    Table 2-2 Software Requirements Software Requirement Files The RDF/IMP, IMPX, and ZLT products protect only files on the primary system that are audited by the TMF subsystem. Auditing The RDF/IMPX and ZLT products support the use of TMF auxiliary audit trails on the primary system (volumes protected by RDF can store audit data in either the MAT or an auxiliary audit trail).
  • Page 61: Tmf Configuration With Dump Process On The Primary System

    extractor-to-receiver throughput. Please note that altering the value of AUDTITRAILBUFFER can be done offline or online, but if you do it online your new value will not take effect until you take the disk down and then bring it back up. TMF Configuration With Dump Process on the Primary System When you configure TMF with audit dump on, that subsystem dumps an audit trail file to tape or disk before purging the audit trail file.
  • Page 62: Preparing Databases For Rdf Protection

    backup database, you must also take audit dumps too. For more information see, “SET RDF” command in Chapter 8 (page 187). Preparing Databases for RDF Protection When preparing databases on the primary system for RDF protection, you must consider the following system aspects: •...
  • Page 63: Dsm Catalogs And File Code 900

    DSM Catalogs and File Code 900 All files that have the file code 900 are replicated by the RDF product. These consist of DSM Tape Catalog files as well as some related files. In the case of files having the file code 900, RDF replication of them to the RDF backup system can provide critical information if you later lose the primary system to a disaster.
  • Page 64: Designing Transactions For Rdf Protection

    Designing Transactions for RDF Protection When designing applications containing transactions that update databases protected by RDF, you must consider the following restrictions that apply to the subsystem: • The effects of network (distributed) transactions after an RDF takeover operation • Database operations not replicated by RDF The sections that follow explain these restrictions.
  • Page 65: Partitioned Files

    Partitioned Files All partitions of a partitioned Enscribe file or NonStop SQL table or index must reside on volumes protected by RDF, or none should. Corresponding partitions on each system must have the same key values. CAUTION: For partitioned files, it is essential that the partial key value for Enscribe files or first key value for NonStop SQL tables on the backup system exactly match those on the primary system.
  • Page 66: Configuring An Smf Environment On The Primary System

    Configuring an SMF Environment on the Primary System When configuring an SMF environment on an RDF primary system, make sure that SMF catalog files are not replicated by RDF to the backup system. The SMF catalogs on the primary and backup systems must remain independent of each other.
  • Page 67 SMF allows physical disks to be added and removed from pools. The RDF updaters must be stopped prior to the addition or deletion of any physical disks from SMF pools on the backup system. Using SMF With RDF...
  • Page 69: Installing And Configuring Rdf

    TMF if you are going to use the TIMESTAMP parameter of the INIT RDF command or if you are going to omit the timestamp parameter in all forms). For information about issuing this and other TMFCOM commands, see the HP NonStop TMF Reference Manual. Preparing the Tables and Files Now prepare your tables and files.
  • Page 70: Separating Nonstop Sql Tables

    Separating NonStop SQL Tables It is recommended that you avoid registering NonStop SQL tables protected by RDF in the same catalogs as tables that are not protected by RDF. Separating protected tables from unprotected ones simplifies the comparison of primary system catalogs with backup system catalogs. Compressing Audit Data for Tables and Files Although not required by RDF, using the AUDITCOMPRESS file attribute will enhance RDF performance.
  • Page 71: Synchronizing The Primary And Backup Databases

    The backup system should also have copies of the following files in case an RDF takeover operation is necessary: • OBEY command files and TACL scripts containing NonStop SQL/MP or NonStop SQL/MX DDL commands that define the database • SQLCI or MXCI report definitions To make it easy to compare catalogs on the primary and backup systems, it is strongly recommended that you register objects protected by RDF in separate catalogs from objects not protected by RDF.
  • Page 72: Synchronizing Databases With Sqlci Commands

    Copy the command file or TACL macro to the backup system. Now do the following on the backup system: • Change any system references in the command file or TACL macro from the primary system name to the backup system name. If the volume names are different or if you want a different database layout on the backup system, change volume references as well.
  • Page 73: Synchronizing Databases With Backup And Restore Utilities

    CREATE CONSTRAINT EMPNUM_CONSTRNT ON =EMPLOYEE CHECK EMPNUM BETWEEN 1 AND 99999; Create the index for the NonStop SQL/MP table on the primary system: CREATE INDEX =EMPLNAME ON =EMPLOYEE( LAST_NAME, FIRST_NAME ); Enter commands to specify the data to be inserted into the table on the primary system: INSERT INTO =EMPLOYEE ( EMPNUM, FIRST_NAME, LAST_NAME ) VALUES ( 826, "Evans", "Joan"...
  • Page 74: Synchronizing Databases With Fup

    system. You must include the AUDITED parameter in both the BACKUP and RESTORE commands. BACKUP $TAPE,($DATA01.*.*,$DATA02.*.*,$DATA03.*.*, $DATA04.*.*), AUDITED RESTORE $TAPE,($DATA01.*.*,$DATA02.*.*,$DATA03.*.*, $DATA04.*.*), AUDITED Synchronizing Databases With FUP You can use the FUP DUP command to copy Enscribe database files from the primary system to the backup system.
  • Page 75: Installing Rdf

    READLIST A diagnostic tool for analysts that reads undo lists and dumps data into entry-sequenced files RDIMAGE A diagnostic tool for HP analysts T0346ann The software documentation file (an EDIT file) RDFFLTO A filter to use with EMSDIST to isolate RDF messages...
  • Page 76: Rdf/Zlt (T0618) Product Components

    RDF/ZLT (T0618) Product Components The release CD includes the following components for the RDF/ZLT product: RDF/ZLT The RDF/ZLT enabler module Readme The software documentation file To use the RDF/ZLT product, you must purchase both RDF/IMPX and RDF/ZLT (two separate CDs), install RDF/IMPX, and then install RDF/ZLT. Process-Lockstep Gateway (T1226) Product Components The release CD includes the following files associated with the process-lockstep capability: SLOCKCOB...
  • Page 77 Table 3-1 RDF Process and Program Security Attributes (continued) Program Name Run Under a Specific Logon ? LICENSE Required for Object File? RDFEXTO YES ++ RDFMONO YES ++ RDFNETO YES ++ RDFPRGO YES ++ RDFRCVO YES ++ RDFSCAN NO++++ RDFSNOOP YES +++ RDFUPDO YES ++...
  • Page 78: Using The Owner Attribute To Allow Super Group Users To Start, Stop, And Manage Rdf

    • RDFSNOOP. The RDFSNOOP program opens the image files in privileged mode and must be licensed with FUP or by running the RDFINST macro. RDFSNOOP can be owned by any user ID. RDFSNOOP must be run by a member of the super-user group (user ID 255,nnn) to read the image files.
  • Page 79: Tmf Subsystem Running Previously

    TMF Subsystem Running Previously If TMF was running on the primary system and you have shut the TMF subsystem down, and if you have started TMF on the backup system and added the RDF updater volumes to the TMF configuration, you need not take any other steps with respect to TMF. Proceed to the next task, described in “Initializing RDF”.
  • Page 80: Initializing Rdf To A Tmf Shutdown Timestamp

    Initializing RDF To a TMF Shutdown Timestamp If TMF was running previously on the primary system and did not need to be initialized and configured, you can initialize RDF to a timestamp that reflects the time of the last TMF shutdown. This initialization is typically used when one stops TMF in order to initialize RDF to that TMF stop location.
  • Page 81: Determining A Valid Inittime Value

    Determining a Valid inittime Value When using the INITTIME parameter without the NOW clause, it is important that you specify a valid inittime value. To do so, first issue a STATUS RDF command and take note of the highest updater RTD time. Then round that RTD time up to the next higher minute (0:43 becomes 1:00, 1:27 becomes 2:00, 3:04 becomes 4:00, and so forth).
  • Page 82: Tmf Shutdown Records

    tableA (which used to contain it, but now does not), and the audit record will not be applied to the backup database. In this particular case, the database is not corrupted, but data corruption could happen for other NonStop SQL/MP or NonStop SQL/MX DDL SHARED ACCESS operations.
  • Page 83: Disaster Points

    Subtract this value from the general timestamp (11AUG2008 05:24). Issue the STOP UPDATE command. This command stops the updaters but allows the extractor and receiver to continue to shipping and storing audit, respectively. Install the new RDF software in a different volume.subvolume from that housing the current version of RDF that is running.
  • Page 84: Configuring Rdf

    For RDF network environments, you should subtract an additional 15 minutes from the timestamp you calculated in Step 4. Configuring RDF For RDF to operate correctly, you must establish values for the following sets of attributes in the RDF configuration file: •...
  • Page 85: Setting Global Attributes

    NOTE: Instead of issuing SET and ADD commands interactively within an RDFCOM session, you can create and execute an RDF configuration command file. The first time you configure RDF, you can either configure it interactively or use the text editor to create a command file. After you have configured RDF, you can easily create a command file from the existing configuration file as explained in “Creating a Configuration Command File”...
  • Page 86: Updatertxtime Attribute

    UPDATERTXTIME Attribute The UPDATERTXTIME attribute specifies the maximum transaction duration in seconds (from 10 to 300) for all updater processes. The default is 60 seconds. RDF updaters operate in transaction mode. Updater transactions are essentially long-running transactions that pin audit trail files on the backup system and can affect the duration of backout operations if an updater transaction aborts for any reason.
  • Page 87: Network Attribute

    NETWORK Attribute The NETWORK attribute specifies whether or not you are configuring an RDF network. When set to OFF (the default value), an RDF takeover operation provides local database consistency, but it cannot provide transaction consistency for network transactions that involved several RDF backup databases.
  • Page 88: Remote Standby Attribute

    REMOTE STANDBY Attribute The REMOTE STANDBY attribute specifies the system name of the ZLT standby system. node-name must be a valid name and must identify a system in your current Expand network. The default is the name of the backup system. For information about the ZLT capability, see Chapter 17 (page 337).
  • Page 89: Dedicated Image Trails Or Image Trails On Updatevolumes

    NOTE: To have secondary image trails, you must add them after initialization and before RDF has been started for the first time. Also you cannot add secondary image trails until you have configured the receiver, as described in the previous paragraphs. The secondary image trail files have the same extents as the master image trail files.
  • Page 90: Setting Network Configuration Record Attributes

    • CPUS • PRIORITY • WAIT or NOWAIT The PROGRAM parameter specifies the name of a Guardian object file that is executed once RDF has reached a particular state, either after a STOP RDF, REVERSE, or TAKEOVER operation. The INFILE attribute specifies the name of an edit file that will be passed as the IN file to the trigger process when it is created.
  • Page 91: Backupsystem Attribute

    $RNET. The process name can be any unique valid process name up to six characters, including the $ symbol. However, you cannot specify HP reserved process names that are of the form $X*, $Y*, or $Z*, in which * is any alphanumeric string.
  • Page 92: Extractor Process

    $EXT. The process name can be any unique valid process name up to six characters, including the $ symbol. However, you cannot specify HP reserved process names that are of the form $X*, $Y*, or $Z*, in which * is any alphanumeric string.
  • Page 93: Receiver Process

    $RECV. The process name can be any unique valid process name up to 5 characters, including the $ symbol. However, you cannot specify HP reserved process names that are of the form $X*, $Y*, or $Z*, in which * is any alphanumeric string.
  • Page 94: Purger Process

    $PURG. The process name can be any unique valid process name up to 5 characters, including the $ symbol. However, you cannot specify HP reserved process names that are of the form $X*, $Y*, or $Z*, in which * is any alphanumeric string.
  • Page 95: Updater Processes

    $UP01. The process name can be any unique valid process name up to 5 characters, including the $ symbol. However, you cannot specify HP reserved process names that are of the form $X*, $Y*, or $Z*, in which * is any alphanumeric string.
  • Page 96: Creating A Configuration Command File

    The following RDFCOM commands configure an updater named $UP01 to run as a process pair in CPUs 2 and 4 at a priority of 180. The updater will be associated with an secondary image trail on the volume $IMAGA1. The name of the backup volume and the primary volume being protected is $DATA01.
  • Page 97: Enabling Rdf Operations

    Enabling RDF Operations After you have copied all pertinent database files from the primary system to the backup system, installed the RDF software on both systems, initialized and configured TMF on the primary and all backup systems, and initialized and configured RDF, you can then start the TMF and RDF subsystems.
  • Page 98: Restarting The Applications

    If you later want to start the updater processes, you merely issue a START UPDATE command. Restarting the Applications As the final step in establishing an RDF environment, if you had shut down your applications previously, you can restart them now. Installing and Configuring RDF...
  • Page 99: Operating And Monitoring Rdf

    4 Operating and Monitoring RDF To operate and monitor RDF, you enter commands through two online utilities: the RDFCOM and RDFSCAN interactive command interpreters. Through these utilities, you initiate communication with RDF, request various RDF operations or information displays, and terminate communication with the subsystem.
  • Page 100: Using Rdfcom Interactively

    IN command-file specifies a command file from which RDFCOM commands are to be read. RDFCOM reads 132-byte records from the specified file until it encounters either the end-of-file mark or an EXIT command. If you do not specify the IN option, TACL automatically supplies the name of its current default input file—usually the terminal from which you issued the RDFCOM command.
  • Page 101: Ending A Session

    >RDFCOM [control-subvolume] For example, to start a session on a primary system named SANFRAN, you would enter the following command (assuming that no suffix character was specified in the INITIALIZE RDF command): >RDFCOM SANFRAN If the suffix character “3” was specified in the INITIALIZE RDF command, then you would enter the following command: >RDFCOM SANFRAN3 When RDFCOM starts, it searches the specified control-subvolume on $SYSTEM of the local...
  • Page 102: Using Rdfcom Noninteractively (Without An In File)

    resume communication with RDFCOM by entering the operating system command PAUSE at the TACL prompt. • If you press BREAK when an RDFCOM command that displays information (such as STATUS RDF) is in progress, RDFCOM terminates execution of this command and prompts you for another one.
  • Page 103: Using Scripts For Easy And Fast Rdf Initialization And Configuration

    To run RDFCOM and execute the commands in this file, supply the command file name in the IN option of the command to start RDFCOM: 4> RDFCOM /IN RDFSET/ control-subvolume When it uses a command file in this way, RDFCOM works in batch mode: RDFCOM begins the session, reads and executes each command from the command file, and displays the associated output at your terminal.
  • Page 104: Managing Multiple Rdf Environments From One Rdfcom Session

    You would execute this command as an OBEY file to your TACL prompt. For this example, assume you have been running an RDF subsystem where \Boston is your primary system and \SF is your backup system. You have stopped TMF and RDF, you have reinitialized and reconfigured TMF, and you want to reinitialize, reconfigure, and restart RDF.
  • Page 105: Using Rdfcom Commands

    RDF Subsystem PRIM1 \PRIM1 ------------------> \BACK1 RDF Subsystem PRIM2 \PRIM2 ------------------> \BACK2 RDF Subsystem PRIM3 \PRIM3 ------------------> \BACK3 Now suppose these RDF subsystems are running as an RDF network, you have lost PRIM1, you have stopped the applications on PRIM2 and PRIM3, and you want to execute the takeover commands from a single obey file to be executed on BACK1.
  • Page 106: Operational Commands

    Table 4-1 RDFCOM Configuration Commands (continued) Command Object Function RDF; IMAGETRAIL; Adds option values to the MONITOR; PURGER; configuration memory table for the EXTRACTOR; RDFNET; specified process. RECEIVER; NETWORK; VOLUME; TRIGGER; RDF; VOLUME; Lists current option values from the SHOW MONITOR;...
  • Page 107: Entering Commands

    Table 4-3 RDFCOM Utility Commands Command Object Function Terminates an RDFCOM session. EXIT Enables you to edit (fix) a previously issued command. {ABBREVIATIONS } {ALL } {command Displays help text for commands and HELP } {message-number} messages. Displays the 10 most recently issued HISTORY RDFCOM commands.
  • Page 108: Help For Rdf Error Messages

    { PURGER { RDFNET { NETWORK { TRIGGER trigger-type { VOLUME $volume { $volume Cannot be performed with RDF running. Only a user in the SUPER group can execute this command. To obtain a list of the available RDFCOM commands, enter: ]HELP ALL RDFCOM displays the following information: Help is available for the following:...
  • Page 109: Running Rdfscan

    In response, RDFCOM displays the following information: ------------------------------------------------------------- Primary Stopped ------------------------------------------------------------- Cause: The primary process of a NonStop process pair has stopped. This probably was the result of an operator inadvertently issuing a STOP command from TACL. Effect: The backup process takes over, but not in fault-tolerant mode, until the primary process can be re-created.
  • Page 110: Ending A Session

    Enter the RDFSCAN function you want: To begin an RDFSCAN session and open the file $SPOOL.SANFRAN.RDFLOG for scanning, enter: >RDFSCAN $SPOOL.SANFRAN.RDFLOG RDFSCAN displays the following: RDFSCAN - T0346A06 - 14MAR04 (C)1988 Tandem (C)2004 Hewlett Packard Development Company, L.P. File: $SPOOL.SANFRAN.RDFLOG, current record: 7346, last record: 8967 Enter HELP ALL for instructions Enter the RDFSCAN function you want:...
  • Page 111: Requesting Online Help

    Table 4-4 RDFSCAN Commands (continued) Command Object Function NOLOG Turns off the LOG command. SCAN Beginning at the current record, number examines the specified number of messages in the message file, and displays messages that contain the current match pattern. The complete syntax for all RDFSCAN commands appears in Chapter 9 (page 261).
  • Page 112: Introductory Usage Information

    Scan - Reads "n" lines of the RDFLOG and displays them with optional pattern matching. FILE: \WHICH.$SYSTEM.RDF.RDFLOG, current record: 37501, last record: 37513 Enter the next RDFscan function you want: Introductory Usage Information To display a brief introduction to the purpose, features, and use of RDFSCAN, enter HELP INTRO: Enter the next RDFscan function you want: HELP INTRO...
  • Page 113: Rdf States

    Receiver (0) $RRCV0 0:00 185 $MIT 1: 2 Receiver (1) $RRCV1 0:00 185 1: 2 Imagetrail (0) $IMAGE0 Imagetrail (1) $IMAGEA Purger $RPRG 1: 2 $DATA06 -> $DATA06 $RUPD1 0:06 185 $IMAGE0 9568 1: 2 $DATA07 -> $DATA07 $RUPD2 0:00 185 $IMAGEA 811008 2: 3 $DATA08 ->...
  • Page 114: Main Status Rdf Display

    Table 4-5 RDF States (continued) Status Description Update NSA Stopped RDF had been running with Update On, a Shared Access NonStop SQL/MP or SQL/MX operation was detected, and all updaters have completed their shutdown. Note, you must consult the RDF LOG for either the RDF event 905 or 908 to determine if it is safe for you to perform the DDL operation on the backup system.
  • Page 115 The receiver RTD time virtually always mirrors that of the extractor sending to it. The only time it varies is during a receiver restart condition. The value of this RTD time has to a large part become obsolete, but it continues to be displayed for long standing continuity with older RDF releases.
  • Page 116: Using Rdf Status Data To Control Tmf Audit Dumping

    column for any RDF process, you should examine the messages in the RDF log file or on the RDF log device to determine what is happening and what corrective action to take. Except for updaters, asterisks in the Error column continue to appear in every STATUS RDF display until the error condition has been corrected.
  • Page 117: Process Priority

    To change any of the attribute values listed above, you start RDFCOM and use the ALTER command. ALTER is a restricted command; it can be issued only by members of the super-user group. See the description of the ALTER command in Chapter 8 (page 187).
  • Page 118: Reading Log Messages

    Reading Log Messages RDF messages are sent to the EMS log (collector) specified during RDF configuration. If RDF encounters an error while attempting to open or send a message to the configured log, RDF takes the following actions: RDF writes either of the following messages to the local $0 process: "705 File Open Error error# filename"...
  • Page 119 NOTE: The record numbers reflected by RDFSCAN are approximate and might not exactly match the record numbers that would be displayed by a FUP INFO RDFLOG, STAT command. With RDFSCAN you can specify: • A starting point within the message file •...
  • Page 120: Asap

    261). ASAP HP's NonStop ASAP product provides in-depth monitoring of the RDF subsystem. It monitors the availability and status of all RDF components and also monitors how RDF is performing, in real-time and historically. ASAP lets a user set goals on key properties like RTD time and alerts when goals aren't met using a variety of alerting mechanisms.
  • Page 121: Critical Operations, Special Situations, And Error Conditions

    5 Critical Operations, Special Situations, and Error Conditions When running RDF, there are a number of critical operations and situations that need careful consideration. Understanding all aspects of these operations and situations is essential. Understanding critical operations ensures that you perform said operations correctly, quickly, and efficiently.
  • Page 122: Recovery From File Modification Failures (Rdf Event 700)

    Some errors involving one or more updaters might require you to resynchronize certain files; see the EMS event log for further information. Any error that cannot be explained should be reported to your service provider. For information about the causes, effects, and recovery actions for all RDF event messages, see Appendix C (page 365) or at the RDFCOM prompt enter the HELP command followed by the RDF event number.
  • Page 123: Recovery From File Open Failures (Rdf Event 705)

    Table 5-1 Recovery From File Modification Failures (RDF Event 700) (continued) File System Error Recovery Action 200 through 231 Repair the device or clear the condition. Enable the volume for TMF transaction processing. Table 5-2 lists the file-system error numbers and recovery actions for RDF event 705, which reports file-opening failures.
  • Page 124: Handling Disk Space Problems

    Table 5-3 Recovery From File Creation Failures (RDF Event 739) (continued) File System Error Recovery Action 60 through 66 Repair the device or clear the condition. Repair the device or clear the condition. Repair the device or clear the condition. 120 through 121 Repair the device or clear the condition.
  • Page 125: Exceeding The Maximum Number Of Concurrent File Opens

    Exceeding the Maximum Number of Concurrent File Opens The maximum number of audited files a single updater can have concurrently open is 3,000. If you have more than 3,000 audit files being replicated by a single updater, then it is possible that the updater associated with the volume may report RDF event 813 - "Concurrent file opens exceeds capacity".
  • Page 126: Communication Line Failures

    • Failure of a TMF audited volume on the primary system • TMF subsystem failure after which the TMF volume recovery is successful • TMF file recovery operation on the primary system that is not to a timestamp, first purge, or TOMATPOSITION position.
  • Page 127: Processor Failures

    Processor Failures All RDF processes other than RDFCOM run as process pairs. If a CPU failure causes a primary RDF process to fail, the backup process takes over without interruption in service. If any RDF process pair stops unexpectedly, the monitor sends abort messages to the other RDF processes in order to bring about an orderly shutdown of RDF.
  • Page 128: Purger Failure

    Purger Failure If the primary CPU of the purger process fails, the purger process in the backup CPU takes over, the current PURGETIME interval is aborted, and a new PURGETIME interval is started. When the CPU that failed comes back up, RDF switches the purger to run on the reactivated primary CPU.
  • Page 129: Tmf Subsystem Failure On The Backup System

    ~DISABLE DATAVOLS * ~START TMF Notice that these commands prevent any disk volumes on the local system from being enabled for TMF operations before starting the subsystem. Reenable all pertinent disk volumes for TMF operations by entering the following command through TMFCOM: ~ENABLE DATAVOLS When this command is executed, TMF performs its volume recovery operation on the audited...
  • Page 130: File Recovery On The Primary System

    File Recovery on the Primary System A file recovery operation occurs whenever a TMFCOM RECOVER FILES command is issued at the primary system. A simple file recovery operation does not affect RDF nor does it require database synchronization. A file recovery operation to a timestamp or a first purge, however, does require you to stop RDF, reinitialize, and resynchronize the affected files.
  • Page 131: Tmfcom Abort Transaction With Avoidhanging Option On Primary System

    • On the primary system, reinitialize RDF with the INITTIME option, specifying the calculated timestamp from the above step. • Restart RDF. When the updaters have caught up with transaction activity on the primary system, the backup database is once again synchronized with your primary database. TMFCOM ABORT TRANSACTION With AVOIDHANGING Option on Primary System Under some circumstances, the TMF Backout process on the primary system is not able to back out transactions from a data file (for example, hung transactions).
  • Page 132: Stopping Rdf

    Issue the RDFCOM UNPINAUDIT command. If you have only one RDF subsystem configured on your primary system and the control subvolume is the name of the primary system, then this is a simple operation. If, however, you have multiple RDF subsystems configured on the primary system, each with its own set of extractors, then you may need to issue the UNPIN audit command for each RDF subsystem.
  • Page 133: Stopping Rdf By Stopping Tmf

    enables the RDF processes to resume processing where they stopped before the shutdown, unless an audit trail file that RDF needs has been purged and cannot be restored to disk. Stopping RDF by Stopping TMF The reason for stopping RDF by stopping TMF is to ensure that the primary and backup databases are logically identical when the shutdown is complete (RDF has applied all changes to the backup database).
  • Page 134: Stopping Rdf From The Primary System

    When you shut down RDF by issuing a TMFCOM STOP TMF command, you can use successive STATUS RDF commands to determine when all of the RDF processes have stopped. Stopping RDF From the Primary System When you issue the STOP RDF command on the primary system, all RDF processes stop immediately without processing to the end-of-file mark in the MAT (except the updaters, which might continue for a short while to finish up their work in progress).
  • Page 135: Stopping Rdf Using Stop Rdf, Drain

    When you issue a STOP RDF command on the backup system, RDFCOM attempts to contact the RDF monitor on the primary system. After discovering that the monitor is not accessible, RDFCOM sends individual stop messages to all RDF processes on the backup system. If RDFCOM can contact the monitor on the primary system, the STOP RDF command is aborted.
  • Page 136: Restarting Rdf

    Restarting RDF If you want to restart RDF and have it resume processing where it stopped at the previous shutdown, you can only do so if you have not reinitialized RDF subsystem since the shutdown. Use the START RDF command to restart RDF. RDF automatically starts with UPDATE ON unless you explicitly specify UPDATE OFF in the START RDF command.
  • Page 137: Using Stop Rdf, Reverse And The Reverse Trigger

    When the extractor for the new RDF subsystem running from \B to \A reports an RTD time of 0:00, then you know that extractor has caught up and you can then prepare for another switchover operation to move your application processing back to \A. The planned switchover repeats the procedure described above, except that you reverse the roles of systems \A and \B.
  • Page 138 With reciprocal configurations it is imperative that you make sure the file-sets being replicated by the two RDF subsystems are absolutely independent of each other, and this can only be done in one of two ways: The volumes protected by RDF Subsystem #1 are completely different from the volumes protected by RDF Subsystem #2.
  • Page 139: Takeover Operations

    When the extractor for RDF subsystem #1 reports an RTD time of 0:00, then you know that extractor has caught up and you can then prepare for another switchover operation to move your application processing back to \A, as follows: On system \B, create an audited Enscribe file on each data volume in the RDF subsystem #1 configuration.
  • Page 140: Phase Two Undo Pass

    Transactions that must be undone during this undo pass are stored in the ZTXUNDO file in your Master Image Trail subvolume. You can use the READLIST utility to see what transactions were undone by this Local Undo operation. Phase Two Undo Pass This is also known as File Undo.
  • Page 141 NOTE: If you do not use the ! option and if the primary system is down, then RDFCOM will need to wait for the Expand level-4 timer to expire. This timer is usually set to 4 or 5 minutes, and this means that the actual takeover processing does not commence until after the timer expires.
  • Page 142: Issuing The Takeover Command In An Obey File

    By using the TAKEOVER ! version of the TAKEOVER command you eliminate the Expand level-four timer and the prompt. For super fast takeover, see “How to Plan for the Fastest Movement of Business Operations to Your Backup System After Takeover” (page 144).
  • Page 143: Takeover Failure

    Takeover Failure If a double CPU failure occurs and any RDF process pair fails during the takeover operation, you can restart the operation just by entering the TAKEOVER command through RDFCOM again. You can ascertain that a takeover operation failed by issuing a STATUS RDF command and getting a response such as the following: STATUS RDF (\RDF04 ->...
  • Page 144: How To Plan For The Fastest Movement Of Business Operations To Your Backup System After Takeover

    Your database administrator can use the RDFSNOOP utility to examine exception records in exception files. For information about RDFSNOOP, see Appendix B (page 359). CAUTION: The absence of exception file records after a successful takeover operation does not necessarily indicate that the backup database is logically identical to the primary database. It is possible that no audit data reached the backup system for some transactions committed on the primary system.
  • Page 145 as the RDF takeover operation completes and you will have full TMF protection. For more details see the discussion on “TMF and Online Dumps on the Backup System” (page 154). Most customers require a high-level decision to takeover on the backup system; this is not an automated decision for the majority of RDF users;...
  • Page 146 advantageous to have one application that performs query processing and another that does read/write operations. If your applications have files open for read access, then your operations staff can close files and/or restart the applications while the decision is made to takeover or not. –...
  • Page 147: Restoring The Primary System

    in order to resume business operations on your backup system. Do it when you can schedule down time or do it during periods of low activity. Since a lot can change over the course of a year, it is a standard disaster recovery practice that you perform this exercise at least once a year.
  • Page 148: Online Method Of Resynchronizing The Primary Database

    If the takeover completes on the backup system, the purger logs an RDF event 888 specifying a MAT position (sno, rba). Subsequently, when the primary system is once again online and you are ready to switch the applications back to the primary, you first initiate a TMF file recovery command on the former primary system, using the TOMATPOSITION option with the MAT position from the 888 event.
  • Page 149: Reading The Backup Database (Browse Versus Stable Access)

    Reading the Backup Database (BROWSE versus STABLE Access) Unlike databases protected by TMF, backup databases for RDF protection have no locks on rows or records, even while these rows or records are being updated. Therefore, applications can read the backup databases at any time; the data can, however, be inconsistent because reading and updating can occur simultaneously.
  • Page 150: Access To Backup Databases With Stable Access

    Access to Backup Databases with Stable Access Because the RDF updaters work asynchronously with respect to one another and to transaction boundaries, when you use the backup database as a read-only resource you are almost always accessing an inconsistent database, meaning that you normally only have Browse access to the backup database.
  • Page 151: Rdf And Nonstop Sql Ddl Operations

    undo, the updaters read this list, and they read backwards in the image trail, performing logical undo operations on those records that need to be backed out. The following example illustrates the effect of a STOP UPDATE, TIMESTAMP command. In the example, t+number indicates a transid, and the timestamp below reflects the time of most recent commit or abort record in the audit trail.
  • Page 152: Performing Nonshared Access Ddl Operations

    The only operations that must be performed WITH SHARED ACCESS are merge partitions and move boundaries. It is recommended that you perform all other operations with nonshared access. NOTE: When you make DDL changes to your primary database, you can use the NonStop SQL DDL Replicator product to replicate NonStop SQL/MP DDL changes to your backup database automatically, instead of you having to perform those changes manually on the backup system.
  • Page 153: Network Configurations And Shared Access Nonstop Sql Ddl Operations

    again checks to see all updaters have processed all image audit up to this special record. When the purger generates the RDF event 908, you are now ready to perform steps 2 and 3 above. CAUTION: While the NonStop SQL products allow a DDL change with Shared Access where the target is located on a different node, RDF does not support this.
  • Page 154: Tmf And Online Dumps On The Backup System

    Execute a process that opens the image trail file with shared read access. This can be a simple process that you supply to perform only this operation. When the purger determines that all updaters are finished with this image trail file (named, say, AA000007), and have moved on to the next image trail file (named, say, AA000010), then it might try to purge AA000007.
  • Page 155: Doing Fup Reload Operations With Updaters Running

    Of course, if you are taking online dumps of your backup database, you must also configure TMF to perform audit dumping either to tape or disk. Doing FUP RELOAD Operations With Updaters Running Because the backup database is audited by TMF, you cannot do FUP RELOAD operations on it unless you have altered the RDF UPDATEROPEN attribute to SHARED.
  • Page 156: Online Remirroring Of Updater Subvolumes

    NOTE: If you enter the SCF PRIMARY DISK for an updater's UPDATEVOLUME, the affected updater might report a number of RDF 700 events with the file-system errors 10, 11, and 71. If these errors occur, they will be reported immediately following the disk primary event. In this situation, these errors can be expected and they do not indicate that the backup database has become inconsistent with the primary database.
  • Page 157: Maintaining The Databases

    6 Maintaining the Databases A vital task in working with RDF is to keep the backup and primary databases synchronized with each other. This chapter, which is intended for database administrators, includes these key topics: • “Understanding Database States” (page 157) •...
  • Page 158: Synchronized Databases During Rdf Operations

    Figure 6-2 Synchronized Databases During RDF Operations Figure 6-3 shows synchronized databases where the application is running on \PRIMARY and the transaction data for the three new transactions has been applied to the backup database. Figure 6-3 Synchronized Databases, No Outstanding Audit Figure 6-4 shows synchronized databases where TMF has just been shut down.
  • Page 159: Making Changes To Database Structures

    Figure 6-4 Synchronized Databases After STOP TMF Command Figure 6-5 shows unsynchronized databases. In this figure, T5 and T6 (transactions 5 and 6) have not been transmitted to the backup system because of a physical disaster, such as fire or flood, or because the primary or backup systems have failed.
  • Page 160: Nonstop Sql/Mp Or Nonstop Sql/Mx Databases

    NonStop SQL/MP or NonStop SQL/MX Databases For NonStop SQL/MP or NonStop SQL/MX databases, changes you need to perform manually on the backup system include: • Catalog changes • Results of DDL operations, including creating or altering tables and views • Partition key changes •...
  • Page 161: Without Shared Access

    you need to restart updating. When restarted, the only updaters that do any work are those that terminated prematurely last time. When they reach the special record, they stop and the purger then logs the event 908. See the section “RDF and NonStop SQL DDL Operations”...
  • Page 162: Guidelines For Create Index And Alter Table Move Operations

    Guidelines for Create Index and Alter Table Move Operations The following guidelines apply to NonStop SQL/MP and NonStop SQL/MX DDL operations: • Creating an index or loading data into an added table partition does not interfere with RDF protection. Although a CREATE INDEX or ALTER TABLE MOVE FROM FIRST KEY UP TO KEY operation seems to create an audited index or partition within a transaction, only the updates to the catalog and file labels are audited.
  • Page 163: Partition Key Changes

    a backup index to be different than that of the primary index. In such a case, the index rows transmitted from the primary system to the backup system will be corrupt with regard to their key values. Although the records are physically present in the index on the backup system, NonStop SQL/MP does not see them because the actual key specifier value does not match the expected one.
  • Page 164: Enscribe Databases

    If you purge a table on the primary system, you must not re-create it on the primary system until you are certain that the updaters have caught up, and you have purged and re-created the table on the backup system. For NonStop SQL/MP and NonStop SQL/MX databases, RDF replicates the following file-label modification: PURGEDATA...
  • Page 165: Resynchronizing Entire Databases Offline

    The remainder of this chapter describes how to do offline resynchronization. For information about online resynchronization, see Chapter 7 (page 167). To resynchronize the primary and backup databases, you need to make all backup database files or tables logically identical to the primary database files or tables when there is no audit data to be processed for the files or tables.
  • Page 166: Resynchronizing Individual Tables Or Files Offline

    To resynchronize only the affected volume or the individual files/tables on that volume, do the following: Stop your applications. Either Stop TMF or stop RDF using the Drain option (see discussion on this option in Chapter Make a copy of the tables and files that reside on the particular volume. Move the copy of the database taken in Step 3 to your backup system.
  • Page 167: Online Database Synchronization

    7 Online Database Synchronization With RDF/IMP, IMPX, or ZLT you can synchronize entire databases or selected volumes, files, tables or even partitions while your applications continue to run. For information about NonStop SQL/MX databases, see Chapter 16 (page 323). Overview The RDF online database synchronization protocol consists of the following general steps (the details of which are discussed later in this chapter): •...
  • Page 168: Synchronizing Entire Databases Online

    NOTE: RDF does not replicate NonStop SQL/MP and NonStop SQL/MX catalogs. Therefore, if you are synchronizing NonStop SQL/MP and NonStop SQL/MX tables, you might need to create NonStop SQL/MP and NonStop SQL/MX catalogs manually on the backup system if they do not already exist.
  • Page 169: Considerations When Synchronizing Entire Databases

    purpose of this command is to enable RDF to determine when the synchronization operation has completed and the backup database is synchronized with the primary database. When the extractor completes its role in the online synchronization operation, it generates the RDF Event 782 and then resumes normal operations. For more detailed information, see “Phases of Online Database Synchronization”...
  • Page 170: Duration And Preparation Issues

    Duration and Preparation Issues As indicated in the steps described above, getting a complete copy of your entire database and placing it on the backup system can take quite a bit of time, and you cannot start the updaters until the database is fully prepared on the backup system. This leads to an issue that you must consider.
  • Page 171: Tmf Shutdown Records

    through M and a new table (tableB) contains the keys N through Z. Suppose also that you performed this operation manually on the backup system. If you then initialize the RDF subsystem to a point in the MAT prior to the Stop-RDF-Updater record associated with the partition boundary change and an updater encounters audit records associated a key N through Z, the updater will report an error because it will try to apply the audit records to tableA (which used to contain it, but now does not), and the audit records will...
  • Page 172: Special Consideration For Enscribe Files

    • Partitioned files (key-sequenced or relative). For partitioned files, you can initiate the load operation with a single command by executing the LOAD command against the primary partition. • Alternate key files (key-sequenced or relative). You should execute LOAD commands against all alternate key files.
  • Page 173: Different Nonstop Sql Product Versions

    If the file is empty and contains zero records, you must reissue your original command again, and recheck the contents of the target file. FUP COPY QUEUE1, QUEUE2, FIRST 1, SHARE FUP COPY QUEUE2,, H The target file, QUEUE2 in this example, is not ready for synchronization until it has at least one record in it.
  • Page 174: Example Of Synchronizing An Entire Database Online

    FUP ALTER $DATA1.subvol.file, PART (1,$DATA3) • If you move duplicate Enscribe alternate key files, you must alter the system name in the file label of the duplicate file or table to specify the backup system. For example, if you moved a duplicate Enscribe alternate key file named ALTF0100 associated with the file PART0100, you must change the system name in the file label of the duplicate alternate key file to that of the backup system: FUP ALTER $DATA1.TEST.PART0100...
  • Page 175 set code 4700 set part (1, $data2, 2, 2 ) set altkey (1, file 0, keyoff 6, keylen 2 ) set altkey (2, file 0, keyoff 6, keylen 2, no update ) set altkey (3, file 0, keyoff 6, keylen 2 ) set altkey (4, file 0, keyoff 6, keylen 2, no update ) set altkey (5, file 0, keyoff 6, keylen 2, no update ) set altfile (0, $data3.test.altf0200 )
  • Page 176: Synchronizing Selected Database Portions Online

    Synchronizing Selected Database Portions Online There are a number of reasons why you might want to synchronize only selected portions of your database. For example: • If you have a large database, it might be easier to break the total number of volumes into subsets, and then synchronize one subset at a time.
  • Page 177: Partial Database Synchronization Issues

    option. For the timestamp to be used with the SYNCHDBTIME attribute, you specify a timestamp following the guidelines for the INITTIME option. When you configure a new RDF subsystem, use your existing RDF configuration file. You then follow the guideline for an entire database synchronization operation, except that you only need to obtain a new copy of the one file or partition.
  • Page 178: Key-Sequenced Files With Frnl (Step 4, Method 2)

    To load the primary partition only, issue the following command: FUP LOAD $DATA1.TEST.PART0100, $DATA1.TEMP.PART0100, PARTONLY,SHARE To load the secondary partition only, issue the following command: FUP LOAD $DATA2.TEST.PART0100, $DATA2.TEMP.PART0100, PARTONLY,SHARE When the load operations are finished, use BACKUP and RESTORE (or FUP DUP) with the PARTONLY option to copy the partition you need to the backup system.
  • Page 179: Nonstop Sql/Mp And Nonstop Sql/Mx Tables With Partitions

    FRNL (Step 4, Method 2) This method can be used for tables with or without SYSKEY or clustering keys. There are no special considerations for key-sequenced tables with indexes, but see below for issues regarding the synchronization of indexes. NonStop SQL/MP and NonStop SQL/MX Tables With Partitions The utilities associated with and related to the NonStop SQL products have limitations that make synchronization of individual partitions complicated and difficult.
  • Page 180: Key-Sequenced Tables

    Thus, you now have on tape empty partitions for the entire table. Should you ever lose a volume to a complete media failure, you can install a new disk and then use the RESTORE utility with the PARTONLY option to recover the missing partition. Because you have backed up a table with the name you need on the backup system, you can restore any partition that you need to with the PARTONLY option and without having to use the MAP NAMES option.
  • Page 181: Relative Tables

    table with all its partitions onto disk on the backup system. You must use MAP NAMES to correct the system name. Thus, $DATA.DUP.PART is now on the backup system. If you created the duplicate table directly on the backup system, skip this step. Rename the original table on the backup system whose primary partition is being synchronized to a temporary name using the SQLCI ALTER TABLE command ($DATA.TEST.PART becomes $DATA.TEMP.PART).
  • Page 182 Purge the RDF control subvolume and then issue an INITIALIZE RDF command of the following form on the primary system: INITIALIZE RDF, BACKUPSYSTEM \system, SYNCHDBTIME ddmmmyyyy hh:mm For the timestamp, follow the guidelines for the INITTIME option. Configure RDF and then issue a START RDF, UPDATE OFF command on the primary system.
  • Page 183: Nonstop Sql/Mp And Nonstop Sql/Mx Indexes (With Or Without Partitions)

    14. Rename the original table on the backup system from its temporary name back to its original name using the SQLCI ALTER TABLE command ($DATA. TEMP.PART becomes $DATA.TEST.PART). 15. Use the RESTORE utility with the PARTONLY option to put the loaded primary partition of the duplicate table into the correct location.
  • Page 184: Phase 2

    Phase 2 Phase 2 completes when the extractor is certain the synch-complete image record has been successfully written in all image trails, and the extractor’s restart location is at a point in the audit trail following the TMP control point record associated with the completion of phase 1, part 3, above.
  • Page 185 Additionally, the STATUS RDF display has been enhanced to identify which database volumes are still being synchronized. That information is reported in the error column of the display. If a volume is still being synchronized, its entry in the error column is sync. As soon as a volume is successfully synchronized, its entry in the error column is blank.
  • Page 187: Entering Rdfcom Commands

    8 Entering RDFCOM Commands To manage, operate, and control RDF and its environment, you enter commands through the RDFCOM online utility. This chapter, directed to system managers and operators, describes the RDFCOM commands and their attributes. In this chapter, you will find: •...
  • Page 188: Rdf State Requirement

    The default security restrictions for all RDFCOM commands are summarized in Table 8-2. RDF State Requirement Some RDFCOM commands can only be entered after RDF has been started; others must be entered before the subsystem has been started or after it has been stopped. In each command description, these constraints are listed under the heading “RDF State Requirement.”...
  • Page 189: Default User Security For Rdfcom Commands

    Table 8-1 Systems for RDFCOM Commands (continued) Extractor Image Monitor Receiver Purger Update Volume RDFNET Network Trigger Other Trail Objects TAKEOVER UNPINAUDIT VALIDATE Legend P = Primary only B = Backup only E = Either * = SYNCH ** = RTDWARNING Table 8-2 Default User Security for RDFCOM Commands Extractor...
  • Page 190: Output Displayed

    Table 8-2 Default User Security for RDFCOM Commands (continued) Extractor Image Monitor Receiver Purger Update Volume RDFNET Network Trigger Other Trail Objects RESET SHOW START STATUS STOP S*** TAKEOVER UNPINAUDIT VALIDATE Legend: A = All users S = Super-user group only O = owner of subsystem * = Must also...
  • Page 191: Reserved File Names

    The system does not distinguish between uppercase and lowercase alphabetic characters in a file name. If all the optional left-hand parts of a file name are present, it is called a fully qualified file name; if any of the optional left-hand parts are missing, it is called a partially qualified file name.
  • Page 192: Process File Names

    device-name specifies the name of a device. A device name consists of a dollar sign ($) followed by one to seven alphanumeric characters; the first alphanumeric character must be a letter. qualifier is an optional qualifier. It consists of a pound sign (#) followed by one to seven alphanumeric characters;...
  • Page 193: Add

    The ADD command applies configuration parameter values for the specified process or other object from the RDF configuration memory table to the RDF configuration file. ADD {RDF {MONITOR {EXTRACTOR {RECEIVER {IMAGETRAIL $volume {PURGER {RDFNET {NETWORK {[VOLUME] $volume {TRIGGER trigger-type } applies RDF global configuration parameters.
  • Page 194: Usage Guidelines

    Although more than one primary volume can be protected by a single disk volume on the backup system, HP strongly recommends that you configure your environment so that each updater process writes to its own volume (that is, that there is a one-to-one mapping of primary volumes to backup volumes).
  • Page 195: Alter

    When the preceding command sequence is executed, all of the other RDF global parameters are set to their default values: (In this list, \LONDON is the system at which you issued the command sequence.) PRIMARYSYSTEM: \LONDON CONTROL SUBVOLUME: LONDON LOGFILE UPDATERDELAY: UPDATEROPEN: PROTECTED...
  • Page 196: Where Issued

    trigger-type is REVERSE or TAKEOVER. This command parameter alters a trigger that has already been added to the RDF configuration. Where Issued These commands can be issued only at the primary system, except altering the TAKEOVER trigger, which can also be issued on the backup system if and only if the primary system is not available.
  • Page 197: Copyaudit

    The following command changes the execution priority of the auxiliary extractor process associated with the auxiliary audit trail AUX02 to 170: ]ALTER EXTRACTOR ATINDEX 2 PRIORITY 170 To change the primary and backup CPUs for the master receiver process to CPUs 3 and 4 respectively, enter an ALTER RECEIVER CPUS command: ]ALTER RECEIVER CPUS 3:4 Remember you cannot do this particular alter operation while RDF is running.
  • Page 198: Copyaudit Restartability

    (The RDF control subvolume is A1 on both systems.) RDF Configuration #2: \A ------------------> \C (The RDF control subvolume is A2 on both systems.) Assume you have lost the original primary system (\A), you have successfully completed a takeover on both backup systems (\B and \C), and the MAT positions displayed by the respective 735 messages are: 735 LAST MAT POSITION: Sno 10, RBA 100500000 735 LAST MAT POSITION: Sno 10, RBA 100000000...
  • Page 199: Example

    on at the time of the error condition, and then resumes copying. Because it keeps track of where it was in the COPYAUDIT operation, RDFCOM does not have to recopy the previously copied image files. RDFCOM abends if it encounters network problems while searching the remote image trails for missing audit records.
  • Page 200: Security Restrictions

    NOTE: You should only delete the TAKEOVER trigger on the backup system prior to issuing the TAKEOVER command. If you delete the TAKEOVER trigger on the backup system when you are not intending to execute a takeover operation, then you must remember to delete the trigger on the primary system too when the latter comes back online.
  • Page 201: Exit

    Now assume that RDF is protecting primary system data volume $DATA06, which is configured to auxiliary audit trail AUX01. Assume also that the changes are being replicated to backup system volume $DATA6, and that the updater for that volume is acquiring its audit data from secondary image trail volume $SECITB.
  • Page 202: Where Issued

    ? or ! when you only want to display the command, not change it. The FC command is a standard feature of many HP software products. For more information about how to use this command, see the TACL Reference Manual.
  • Page 203: Help

    RDF now displays the corrected INFO MONITOR command followed by another prompt that asks for any further corrections. Because you have no further changes, you press the Return key after the subcommand prompt. Now, RDFCOM processes the INFO MONITOR command, this time successfully.
  • Page 204: Rdf State Requirement

    RDF State Requirement You can issue the HELP command at any time, whether or not RDF has been started. Usage Guidelines This command retrieves and displays information from the RDFHELP file. If you omit all options, RDFCOM uses the ALL option and lists all RDFCOM commands. Examples To display the syntax of the ADD command, enter: ]HELP ADD...
  • Page 205: History

    HISTORY OBEY OPEN RDF Concepts: Abbreviations RDF error messages: error-number E.g., "help 700" prints an explanation for the RDF error message 700 To display information about RDF message 715, enter: ]HELP 715 RDFCOM displays the following description: ------------------------------------------------------------- Primary Stopped ------------------------------------------------------------- Cause: The primary process of a NonStop process pair...
  • Page 206: Info

    Now, suppose you issue a HISTORY command: ]HISTORY In response, RDFCOM displays: History: ADD EXTRACTOR START RDF SHOW EXTRACTOR ALTER EXTRACTOR PRIORITY 170 SHOW RECEIVER ALTER RECEIVER PRIORITY 175 STATUS RDF ALTER MONITOR PRIORITY 195 INFO * HISTORY INFO The INFO command displays the current configuration parameter values from the configuration file for the specified process or other object.
  • Page 207: Where Issued

    The subsystem saves the text in the command file, also embedding the appropriate SET and ADD commands. Any time you want, you can execute the text by specifying the command file name in an OBEY command or in the IN option of the RDFCOM command that begins a session, producing a new RDF configuration based on the one captured by the INFO command.
  • Page 208: Output Displayed

    Output Displayed The parameters displayed for the RDF global options, secondary image trails, and the individual processes are explained under the SET IMAGETRAIL, SET RDF, SET MONITOR, SET EXTRACTOR, SET RECEIVER, SET RDFNET, SET NETWORK, SET PURGER, and SET VOLUME command descriptions.
  • Page 209: Info Extractor Command

    VOLUME CPUS 2:1 VOLUME PRIORITY 160 VOLUME UPDATEVOLUME $DATA1 VOLUME IMAGEVOLUME $SECIT1 VOLUME PROCESS $UP01 VOLUME $DATA02 VOLUME ATINDEX 0 VOLUME CPUS 2:1 VOLUME PRIORITY 160 VOLUME UPDATEVOLUME $DATA2 VOLUME IMAGEVOLUME $SECIT2 VOLUME PROCESS $UP02 VOLUME $DATA03 VOLUME ATINDEX 0 VOLUME CPUS 2:1 VOLUME PRIORITY 160 VOLUME UPDATEVOLUME $DATA3...
  • Page 210: Info Monitor Command

    SET EXTRACTOR RTDWARNING 60 ADD EXTRACTOR INFO MONITOR Command To display the current configuration parameters for the monitor process, enter: ]INFO MONITOR RDF displays output in the following format: MONITOR PROCESS $MON MONITOR CPUS 2:1 MONITOR PRIORITY 170 You would see this particular output, for example, if you originally configured the monitor to run in CPUs 2 and 1 at the default priority of 165, but later changed the priority to 170 (using an ALTER command).
  • Page 211: Info Purger Command

    system. The updaters $UP01 and $UP02 are accessing the secondary image trail $SECIT1; updater $UP03 is accessing the secondary image trail $SECIT2. To display the current configuration parameters for all of the updater processes, enter: ]INFO VOLUME * RDF displays the following: VOLUME $DATA01 VOLUME ATINDEX 0 VOLUME CPUS 0:1...
  • Page 212: Info Trigger Command With Obeyform Option

    TRIGGER INFILE $DATA01.RDF.TKOVER TRIGGER OUTFILE $DATA01.RDF.OUTFILE TRIGGER CPUS 0:1 TRIGGER PRIORITY 150 TRIGGER NOWAIT TRIGGER TAKEOVER INFO TRIGGER Command With OBEYFORM Option Like all INFO commands, INFO TRIGGER supports the optional OBEYFORM parameter. The output of an INFO TRIGGER REVERSE, OBEYFORM command might be: SET TRIGGER PROGRAM $SYSTEM.RDF.RDFCOM SET TRIGGER INFILE $DATA01.RDF.RDFCONF SET TRIGGER OUTFILE $DATA01.RDF.OUTFILE...
  • Page 213 INITIALIZE RDF , BACKUPSYSTEM backup-system-name [ , SUFFIX suffix-character [ , TIMESTAMP <day><mon><year><hour>:<min> [ , INITTIME <day><mon><year><hour>:<min> | NOW ] [ , SYNCHDBTIME <day><mon><year><hour>:<min>] backup-system-name specifies the backup system. The system name begins with a backslash (\) followed by 1 to 7 letters or digits;...
  • Page 214 SYNCHDBTIME <day><mon><year><hour>:<min> is a timestamp used for online database synchronization. It has the same format as the timestamp parameter described above. There are no special considerations for specifying the synchdbtime parameter, except that it must designate a time earlier than the present time. The SYNCHDBTIME parameter can only be used if RDF/IMP, IMPX, or ZLT is installed on both the primary and backup systems.
  • Page 215: Where Issued

    causes the control subvolume files both on the primary and backup systems to be purged before initialization. • If used in an interactive mode (either as a command from RDFCOM or in an OBEY file ) without "!" operator, RDFCOM displays: RDFCOM will purge all the files in the control subvolume (of both local &...
  • Page 216 • If you include the TIMESTAMP, INITTIME, or SYNCHDBTIME options in the INITIALIZE RDF command, the initialization will complete much quicker if all the files from the current down to the one in which the timestamp being sought is located are all on disk. If, however, some of these audit files have been dumped to tape, RDFCOM triggers TMF to prompt you to restore needed audit trail files.
  • Page 217: Examples

    • If you include the TIMESTAMP option in the INITIALIZE RDF command, use the following guidelines to determine when you must restore the backup database: — If you are going to start RDF with UPDATE ON, restore the database to the backup system before you start RDF.
  • Page 218: Usage Guidelines

    Usage Guidelines If you omit system, volume, or subvolume, RDFCOM uses the defaults in effect when RDFCOM was started. A command file can contain other OBEY commands, nested up to four levels deep. RDFCOM reads the commands in the command file until it reaches an EXIT command or the end of the file: •...
  • Page 219: Examples

    accomplish the same thing—identifying DENVER3 as the RDF control subvolume and then obtaining current status information for that system: • Sequence A: >RDFCOM ]OPEN DENVER3 ]STATUS RDF • Sequence B: >RDFCOM DENVER3 ]STATUS RDF Remember that, when you enter the RDFCOM command without specifying a control subvolume, RDFCOM assumes that the control subvolume name is the same as that of the local system on which the RDFCOM is running (without the backslash and with no suffix character).
  • Page 220: Where Issued

    Where Issued Primary or backup system. Security Restrictions None; anyone can enter the OUT command. RDF State Requirement You can enter the OUT command at any time, whether or not RDF has been started. Usage Guidelines The OUT command specifies a file to which all subsequent output, other than prompts for entering RDFCOM commands, is to be written during this session.
  • Page 221: Where Issued

    resets the values for the RDF global options. MONITOR resets the values for the monitor process. EXTRACTOR resets the values for the extractor process (this includes resetting the ATINDEX value to 0). RECEIVER resets the values for the receiver process (this includes resetting the ATINDEX value to 0). VOLUME resets the values for the updater processes (this includes resetting the ATINDEX value to 0 and clearing all EXCLUDE and INCLUDE clauses).
  • Page 222: Examples

    Examples To reset the extractor process parameters in the configuration memory table to their default values, enter: ]RESET EXTRACTOR To reset the extractor process parameters in the configuration file to their default values so that these values now affect RDF, issue the following commands after RDF has been initialized: ]RESET EXTRACTOR ]SET EXTRACTOR PROCESS $EXT ]ADD EXTRACTOR...
  • Page 223: Where Issued

    included in its display. The display includes only those RDF processes (extractor or updaters) whose RTD exceeds the configured threshold. The default is 60 seconds. VOLUME volume-name specifies a valid volume name in the current TMF configuration on your primary system. When configuring RDF for ZLT, you must add the complete set of audit trail volumes to which protected data volumes are configured.
  • Page 224: Set Imagetrail

    ]SET EXTRACTOR RTDWARNING 180 ]ADD EXTRACTOR To configure a master extractor in an RDF/ZLT environment, where there are two active volumes ($TMFMAT1 and $TMFMAT2), and one overflow volume ($MATOFLO), issue the following commands: ]SET EXTRACTOR PROCESS $EXTR ]SET EXTRACTOR CPUS 3:4 ]SET EXTRACTOR RTDWARNING 165 ]SET EXTRACTOR VOLUME $TMFMAT1 ]SET EXTRACTOR VOLUME $TMFMAT2...
  • Page 225: Where Issued

    CPUS primary-CPU : backup-CPU identifies the CPUs in which the monitor process is to run as a process pair on the primary system; primary-CPU is the primary CPU; backup-CPU is the backup CPU. Values range from 0 through 15. The defaults are 0:1. PRIORITY priority identifies the execution priority for the monitor process;...
  • Page 226: Where Issued

    BACKUPSYSTEM backup-system For a network master, specifies the name of the associated backup system. For a nonnetwork master, specifies the name of the network master’s backup system. REMOTECONTROLSUBVOLUME subvolume For a network master, specifies the name of the primary system’s remote control subvolume. For a nonnetwork master, specifies the name of the network master’s remote control subvolume.
  • Page 227 PRIORITY priority identifies the execution priority for the purger process; priority is the execution priority, from 10 through 199. The default is 165. PROCESS process-name specifies the process name for the purger process; process-name is any unique, valid process name of up to six characters; the first character must be a dollar sign ($). You cannot specify any of the reserved process names listed in the Guardian Procedure Calls Reference Manual.
  • Page 228: Where Issued

    from file AA000010 to file AA000013. Files AA000010 through AA000012 might no longer needed, but, because the RETAINCOUNT is set to three, the purger process can only purge AA000010 (it must keep AA000011 and AA000012 on disk). Thus, as long as the RTD times of the extractors on the two backup systems are less than 24 hours apart, the triple contingency protocol will work successfully.
  • Page 229 LOGFILE ems-collector-name specifies a device (EMS collector) that is to receive messages from RDF. The specified device must exist on both the primary and backup systems. The default is $0. The device on the primary system receives log messages from the extractor and monitor processes plus RDFCOM messages that are logged in message 835 and messages from RDFNET, if configured.
  • Page 230 SOFTWARELOC $volume.subvolume specifies where the RDF software is installed. The default is $SYSTEM.RDF. NETWORK {ON | OFF} specifies whether or not you are configuring an RDF network. When set to OFF (the default value), RDF takeover operations execute and database consistency is not guaranteed for transactions spanning more than one RDF backup database.
  • Page 231: Where Issued

    {OWNER {owner-id} where owner-id is either groupname,username or groupnumber,usernumber. This parameter specifies the userid under which all RDF processes will always run. This global configuration parameter provides functionality whereby any super-user group userid can start and stop RDF. Once the OWNER attribute is set, you must limit EXECUTE access to the RDFCOM object so that only those super group users authorized to manage RDF can run RDFCOM.
  • Page 232: Where Issued

    {PRIORITY priority {PROCESS process-name CPUS primary-CPU : backup-CPU identifies the CPUs in which the RDFNET process is to run as a process pair on the primary system; primary-CPU is the primary CPU; backup-CPU is the backup CPU. Values range from 0 through 15. The defaults are 0:1. PRIORITY priority identifies the execution priority for the RDFNET process;...
  • Page 233 ATINDEX audittrail-index-number is an integer value identifying a configured TMF audit trail on the primary system. 0 specifies the MAT. 1 through 15 specify auxiliary audit trails AUX01 through AUX15. The default is 0. For each configured extractor, there must be a corresponding receiver with the same ATINDEX value.
  • Page 234: Where Issued

    only specify FASTUPDATEMODE ON if your throughput rate is typically low to moderate. In environments with high extractor-to-receiver throughput, specifying FASTUPDATEMODE ON will cause the extractor to fall behind TMF audit generation. See Chapter 3 “Installing and Configuring RDF” for a more complete discussion of this option, and note that for FASTUPDATEMODE to achieve what you want, you must also set the RDF UPDATERDELAY to 1 second.
  • Page 235: Set Trigger

    By default, in this example the auxiliary receiver process will run at a priority of 165. SET TRIGGER The SET TRIGGER command sets trigger parameters within the RDF configuration memory table. The supplied values are not applied to the RDF configuration file, however, until you issue an ADD TRIGGER command.
  • Page 236: Security Restrictions

    Security Restrictions None. RDF State Requirements None. Usage Guidelines The SET TRIGGER command enters the trigger parameter values specified in this command into the RDF configuration table in memory. This table serves as an input buffer only, so these values do not affect the subsystem until they are applied to the RDF configuration file through the ADD command.
  • Page 237 {ATINDEX audittrail-index-number } {CPUS primary-CPU : backup-CPU {PRIORITY priority {PROCESS process-name {IMAGEVOLUME $volume {UPDATEVOLUME $volume {INCLUDE subvol.file {EXCLUDE subvol.file {MAPFILE $vol.subvol.file {MAPLOG $vol.subvol.file ATINDEX audittrail-index-number is an integer value from 0 through 15 specifying the audit trail on the primary system to which the data volume being protected is mapped.
  • Page 238: Where Issued

    MAPFILE $vol.subvol.fname specifies the mapfile on the backup system that contains mapping strings that constitute the mapping rules. The updater will apply these rules to the audit records present in the image trail files. This parameter is optional. MAPLOG $vol.subvol.fname specifies the log file on the backup system into which the updater should log the source and target filename pairs if a mapping rule is applied.
  • Page 239: Examples

    If you want to specify different INCLUDE/EXCLUDE lists for each volume, then you should use the RESET VOLUME command after you ADD each updater. The RESET VOLUME command clears out any INCLUDE/EXCLUDE lists you SET for the previous updater. To view the current INCLUDE and EXCLUDE parameters in the RDF configuration memory table, issue a SHOW VOLUME command.
  • Page 240: Where Issued

    RECEIVER displays the current configuration parameter values for the receiver process. IMAGETRAIL displays the current configuration parameter values for the image trail. PURGER displays the current configuration parameter values for the purger process. RDFNET displays the current configuration parameter values for the RDFNET process. NETWORK displays the current configuration parameter values for an RDF network.
  • Page 241: Show Receiver Command

    RDF UPDATERDELAY 10 RDF UPDATERTXTIME 60 RDF UPDATERRTDWARNING 60 RDF UPDATEROPEN PROTECTED RDF NETWORK OFF RDF NETWORKMASTER OFF RDF UPDATEREXCEPTION ON RDF REPLICATEPURGE OFF RDF OWNER SUPER.RDF The primary system name is set implicitly and the backup system name is set in the INITIALIZE RDF command.
  • Page 242: Show Rdfnet Command

    • The updater is to use the secondary image trail $SECIT1 (which was previously added to the RDF configuration by way of an ADD IMAGETRAIL command). • You have configured this updater only to replicate file in the subvolume MYFILESET.*, but you do not want to replicate MYFILESET.LOG.
  • Page 243: Where Issued

    START RDF [, UPDATE {ON | OFF}] UPDATE ON Enables update processing on the backup system; this is the default value. UPDATE OFF Disables update processing on the backup system. RDF image files are not purged from the backup system. Where Issued Primary system only.
  • Page 244: Examples

    Examples To start RDF with updating enabled, enter: ]START RDF To start RDF with updating disabled, enter: ]START RDF, UPDATE OFF START UPDATE The START UPDATE command starts all updater processes on the backup system. START UPDATE Where Issued Primary system only. Security Restrictions You can issue the START UPDATE command if you are a member of the super-user group and have a remote password from the RDF primary system to the backup.
  • Page 245: Where Issued

    RECEIVER requests information and statistics for the receiver process. PURGER requests information and statistics for the purger process. PROCESS procname requests information and statistics for the specified process. VOLUME requests information and statistics for all configured updater processes. RTDWARNING requests information and statistics for only those processes (the extractor or any updater) that have fallen behind the configured RTD threshold (rtd-time).
  • Page 246 Imagetrail (1) $IMAGEA Purger $RPRG 1: 2 $DATA06 -> $DATA06 $RUPD1 0:06 185 $IMAGE0 9568 1: 2 $DATA07 -> $DATA07 $RUPD2 0:00 185 $IMAGEA 811008 2: 3 $DATA08 -> $DATA08 $RUPD3 0:06 185 $IMAGEA 811568 3: 0 RDFCOM - T0346H09 – 11AUG08 C)2008 Hewlett-Packard Development Company, L.P.
  • Page 247: Rdf Process

    ($RRCV0) associated with the MAT and writing to the Master Image Trail ($MIT) and a Secondary Image Trail ($IMAGE0), a second receiver ($RRCV1) associated with AUX01 and writing to a Secondary Image Trail ($IMAGEA1), updater $RUPD1 associated with the MAT reading $IMAGE0 and applying updates to $DATA006, updater $RUPD2 associated with the AUX01 reading $IMAGEA1 and applying updates to $DATA007, and updater $RUPD3 associated with the AUX01 reading $IMAGEA1 and applying updates to $DATA08.
  • Page 248: Pri

    The RTD value reported for each updater process is the difference between the “last modified time” of that updater's audit trail on the primary system and the timestamp added to the image record by the extractor before sending it to the receiver. As is the case with the receiver during an RDF takeover operation, the RTD is replaced by dots to indicate there is no RTD.
  • Page 249: Cpus

    Cpus The eighth column specifies the CPUs in which each process pair is running. Error The final column is used for several purposes. For all RDF processes it is usually blank, which indicates the process is running normally and without any error condition. The following displays can also be reported.
  • Page 250: Examples

    Examples To display current RDF configuration information and operational statistics once, enter this command: ]STATUS RDF To display that information 10 times, once every minute, enter: ]STATUS RDF, PERIOD 60, COUNT 10 To display current information and statistics for all configured extractor processes once, enter this command: ]STATUS EXTRACTOR To display current information and statistics for only those processes (the extractors or any...
  • Page 251: Security Restrictions

    Security Restrictions You can issue the STOP RDF command if you are a member of the super-user group that initialized RDF and have a remote password from the RDF primary system to the backup. RDF State Requirement You can issue the STOP RDF, DRAIN and STOP RDF, REVERSE commands only while RDF is running and update is on.
  • Page 252: Examples

    NOTE: Before you can restart RDF, you must stop RDF on the primary system as well. When RDFCOM executes the STOP RDF command, it writes a message to the RDF log file indicating this action. Updaters cannot always respond immediately to a STOP RDF command. If an updater has audit records queued for the disk process, the updater must wait until all of that information is processed before it can shut down.
  • Page 253: Usage Guidelines

    Usage Guidelines You must wait until the preceding load or TMF FRNL operations have completed before issuing this command. See the descriptions of online database synchronization in Chapter 7 (page 167) for the proper use of this command. Example To issue this command as part of online database synchronization, enter: ]STOP SYNCH STOP UPDATE The STOP UPDATE command suspends updating of the backup database and stops all updater...
  • Page 254: Usage Guidelines

    Usage Guidelines Use the STATUS RDF command to determine whether updating is enabled or disabled. If updating is disabled, the STATUS RDF display specifies the state “Update stopped” and shows no status information for the updater processes. When you disable updating with the STOP UPDATE command, the extractor continues to send all relevant audit from the primary system to the receiver, and the latter stores it in the image trails.
  • Page 255: Takeover

    TAKEOVER The TAKEOVER command puts the backup database into a consistent state with regard to transaction boundaries, after which it can become your new database of record. TAKEOVER [!] If you omit the ! option, then RDFCOM attempts to reach the primary system to verify that it is indeed inaccessible.
  • Page 256 In a non-network configuration, a takeover operation occurs in two phases. • Phase 1 (local undo) undoes transaction data that was incomplete at the backup system at the time the primary system failed. That is, it undoes transactions that were applied during the redo phase but the final states of those transactions are unknown by RDF.
  • Page 257: Limitation

    If your primary system is recovered and comes back online, See Chapter 5 (page 121) for how to recover it and use its database as a backup to the database on your backup system where your application processing is not taking place. For further related considerations, see also Exception File Optimization in Chapter 5 (page 121).
  • Page 258: Rdf State Requirement

    RDF State Requirement You can only issue the UNPINAUDIT command while RDF is stopped. Usage Guidelines If the system at which you issue the UNPINAUDIT command is the primary system in more than one RDF configuration, then you must open the RDF control subvolume and issue another UNPINAUDIT command for each of the other RDF configurations as well.
  • Page 259: Example

    In response to a VALIDATE CONFIGURATION command, RDF verifies: • RDF global options are configured. • RDF is initialized, and TMF is running on the primary system. • The monitor, extractor, receiver, purger, and at least one updater are all configured. •...
  • Page 261: Entering Rdfscan Commands

    9 Entering RDFSCAN Commands All RDF messages are directed to an EMS event log (collector). To examine that log without looking at all events for the entire system, you first use the standard EMS filter RDFFLTO to create an intermediate entry-sequenced file copy of the RDF log, and then enter commands through the RDFSCAN online utility.
  • Page 262: Rdfscan Commands

    In addition, this element is included only if applicable: • Output Displayed: Only two RDFSCAN commands (LIST and SCAN) produce output, although others influence its content and destination. For information about the other elements, see “Command Description Elements” in Chapter 8 (page 187).
  • Page 263: Usage Guidelines

    disables the display of record numbers. Usage Guidelines The DISPLAY function is automatically enabled if pattern matching is enabled and is automatically disabled if pattern matching is disabled. For information about enabling and disabling pattern matching, see the MATCH command description in “MATCH”...
  • Page 264: Examples

    Examples If you issue an EXIT command in response to the RDFSCAN prompt, RDFSCAN terminates the session and displays a logoff message: Enter the next RDFscan function you want: EXIT Thank you for using RDFscan If you press Ctrl-Y in response to the RDFSCAN prompt, RDFSCAN terminates the session and displays an end-of-file indication followed by the logoff message: Enter the next RDFscan function you want: Ctrl-Y...
  • Page 265: Help

    HELP The HELP command displays the syntax of RDFSCAN commands or introductory information about the RDFSCAN utility. HELP [ ALL [ INTRO [ command ] displays the syntax of all RDFSCAN commands. INTRO displays information on how to use the RDFSCAN utility. command displays the syntax of the RDFSCAN command indicated by command.
  • Page 266: Output Displayed

    If pattern matching is disabled, the LIST command displays the specified number of messages starting at the current record. This behavior is identical to using the SCAN command with pattern matching disabled. For information about enabling and disabling pattern matching, see the MATCH command description in “MATCH”...
  • Page 267: Usage Guidelines

    Usage Guidelines The LIST command always transmits its output to the standard output device for RDFSCAN, which is normally your terminal. When you specify a destination file in the LOG command, RDFSCAN directs subsequent LIST command output to that destination file as well as producing it on the standard output device.
  • Page 268: Examples

    If you enter the MATCH command but omit the text parameter, the RDFSCAN prompts you for a match pattern. To disable pattern matching, merely press the RETURN key at the prompt without entering a pattern. When entering a match pattern, you can use asterisks (*) and question marks (?) as wild-card characters.
  • Page 269: Usage Guidelines

    Usage Guidelines When you issue the NOLOG command, RDFSCAN stops copying records to the file specified in the LOG command. However, RDFSCAN continues to display at your terminal all records accessed by subsequent LIST commands. Examples This command disables the copying of LIST command output: Enter the next RDFSCAN function you want: NOLOG File: $SYSTEM.SANFRAN.RDFLOG, current record: 9454,...
  • Page 270 Enter the next RDFSCAN function you want: AT 1000 File: $SYSTEM.SANFRAN.RDFLOG, current record: 1000, last record: 2955 Enter the next RDFSCAN function you want: MATCH *$AU02* File: $SYSTEM.SANFRAN.RDFLOG, current record: 1000, last record: 2955, Pattern: *AU02* Enter the next RDFSCAN function you want: SCAN 1000 Record number: 1011 2004/06/08 04:13:49 \LAB1...
  • Page 271: 10 Triple Contingency

    10 Triple Contingency The triple contingency feature makes it possible for your applications to resume running with full RDF protection within minutes after loss of your primary system. NOTE: Replication of network transactions is not supported in conjunction with the triple contingency feature, nor is the replication of auxiliary audit trails.
  • Page 272: Hardware Requirements

    (that is, which system had received the least amount of audit data from the extractor by the time the primary system was lost). • On the backup system that was further behind (had the least amount of audit data), issue the COPYAUDIT command specifying the name of the other backup system and its RDF control subvolume.
  • Page 273: The Retaincount Configuration Parameter

    It is strongly recommended, however, that the various RDF process priorities be identical on both backup systems so that the performance of the two systems is approximately the same. WARNING! If the two backup systems are configured differently from one another in any important regard, the triple contingency feature will not work when you need it, and there will be no advance warning to that effect.
  • Page 274: The Copyaudit Command

    (and therefore be eligible for purging), but, because the RETAINCOUNT is set to three, the purger process can only purge AA000010 (it must keep AA000011 and AA000012 on disk). Thus, as long as the RTD times of the extractors on the two backup systems are less than 36 hours apart, the triple contingency protocol will work successfully.
  • Page 275: Copyaudit Restartability

    500 kilobytes of audit records is missing on \C. Because \C has the least amount of audit records, you must issue this command on \C: COPYAUDIT, REMOTESYS \B, REMOTECONTROLSUBVOL A1 For each image trail, RDFCOM on \C reads its own context file to determine the MAT position of the last audit record in the trail.
  • Page 276: Using Zlt To Achieve The Same Protection

    RDF Subsystem #2 \A ---------> \C Because the two subsystems run independently of one another, if system \A fails and you execute TAKEOVER commands on systems \B and \C, the two backup databases might not be synchronized with one another. The extractor for the \A-to-\B subsystem, for example, might have replicated audit data to system \B, but, before the extractor for the \A-to-\C subsystem could replicate the same data to system \C, system \A failed.
  • Page 277: Summary

    Summary To be able to use the triple contingency feature, you must: Establish two RDF configurations with the same primary system and separate backup systems. Ensure that the hardware configurations of the two backup systems are identical with regard to data volumes and image trail volumes. Ensure that the data volumes and image trails of the two RDF configurations are configured identically with respect to the two backup systems (with the few minor exceptions noted earlier in this chapter).
  • Page 279: 1 Subvolume-Level And File-Level Replication

    1 1 Subvolume-Level and File-Level Replication By default, RDF provides volume-level protection, wherein changes to all audited files and tables on each protected primary system data volume are replicated to an associated backup system data volume. RDF/IMP, IMPX, and ZLT also support subvolume-level and file-level replication. To use this capability, you supply INCLUDE and EXCLUDE clauses when configuring updaters to identify specific subvolumes and files you want either replicated or not replicated.
  • Page 280: Wildcard Character (*)

    Wildcard Character (*) The asterisk (*) can be used as a wildcard character in both subvolume and file names. Within Subvolume Names When used to designate subvolume names, the * must always be used as a suffix. su*v.fname, *.fname, and *.*, for example, are not valid. But DB*.filename is valid because the asterisk is used as a subvolume name suffix.
  • Page 281: Include And Exclude Processing

    SET VOLUME CPUS 1:2 SET VOLUME IMAGEVOLUME $IMAGE SET VOLUME PRIORITY 185 SET VOLUME PROCESS $MM02 SET VOLUME UPDATEVOLUME $DATA02 SET VOLUME INCLUDE SBSUBVOL.MYFILE SET VOLUME INCLUDE SBTEST10.FILE1 SET VOLUME INCLUDE SBTEST10.FILE2 ADD VOLUME $DATA02 RESET VOLUME If you did not use the RESET VOLUME command above, then the INCLUDE lists for $DATA01 and $DATA02 are as follows: $DATA01 MYSUBVOL.MYFILE...
  • Page 282: Error Checking

    In the above example, the INCLUDE clause specifies that only audited files in $DATA01.MMTEST10 are to be replicated. The INCLUDEPURGE clause specifies that every Enscribe purge operation involving files in this same subvolume are to be replicated, but the EXCLUDEPURGE clause specifies that any purge operations involving the file $DATA01.MMTEST10.FILE10 are NOT to be replicated.
  • Page 283 SET VOLUME INCLUDEPURGE RRVOL*.* SET VOLUME EXCLUDEPURGE RRTYP*.* There is still one updater responsible for replicating changes from $DATA01 on the primary system to $DATA01 on the backup system, but the INCLUDE and EXCLUDE clauses explicitly identify which subvolumes and files on \PRIMARY.DATA01 are to be replicated (all audited files and tables in the subvolumes MMTEST10, DATA*, and DB* are replicated, except MMTEST10.CONC0826 and any files or tables in DATA* whose names start with "C").
  • Page 285: 12 Subvolume Name Mapping

    12 Subvolume Name Mapping RDF allows users to replicate data from primary system source subvolumes to differently named destination subvolumes on the backup system. However, the recommended configuration is still one-to-one mapping between source subvolumes on the primary system and their corresponding destination subvolumes on the backup system.
  • Page 286: How An Updater Manages Filename Collisions

    • Volume names are not allowed in mapping strings. If the updater detects a $ character, it logs an error. • Reserved names are not allowed in mapping strings. See the examples of invalid mapping strings listed below. • When two or more mapping rules are present in a mapfile, the rule listed first always takes precedence if it fits.
  • Page 287: Creating A Maplog To Log Subvolume Name Mapping

    MAP NAMES TEST1.* TO TEST2.* Assume that the file $DATA01.TEST1.FILE on the primary system is modified. RDF applies the mapping rule on this file and replicates its changes to the file $DATA01.TEST2.FILE on the backup system. Next, the file $DATA01.TEST2.FILE on the primary system is modified. RDF determines that the mapping rule does not apply.
  • Page 288: Adding A Mapfile And Maplog To An Updater's Configuration Record

    Adding a Mapfile and Maplog to an Updater's Configuration Record Use the RDFCOM SET command to store the names and paths for an updater's mapfile and maplog into the updater's configuration record. For example: RESET VOLUME SET VOLUME ATINDEX SET VOLUME CPUS SET VOLUME PRIORITY SET VOLUME PROCESS $WU01...
  • Page 289 To illustrate this problem scenario, assume these circumstances: • You create an audited, partitioned, key-sequenced file (Enscribe, SQL/MP, or SQL/MX) on the primary system where the primary and secondary partitions are on the same subvolume at $DATA01.SVOL.FILE and $DATA02.SVOL.FILE. • One updater replicates the changes for the primary partition $DATA01.SVOL.FILE on the primary system to $DATA11.SVOL1.FILE on the backup system using this mapping string: MAP NAMES SVOL.* TO SVOL1.*...
  • Page 291: 13 Auxiliary Audit Trails

    13 Auxiliary Audit Trails In addition to the Master Audit Trail (MAT), RDF/IMPX and ZLT support protection of up to 15 auxiliary audit trails. If you want to protect data volumes associated with an auxiliary audit trail, you must configure an auxiliary extractor and an auxiliary receiver for that trail.
  • Page 292: Configuring Image Trails

    • It is an error if the specified atindex does not correspond to a valid index of a configured auxiliary audit trail. That is, if you have configured two TMF auxiliary audit trails with the respective audit trail numbers of 1 and 2, you cannot configure an auxiliary extractor with an atindex value of 3.
  • Page 293: Takeover Ramifications

    up with the master extractor. When that happens, RDF (or more specifically, the master receiver process) might falsely appear to be hung. As soon as the auxiliary extractor has caught up, however, the TMF shutdown operation proceeds. The same can happen to the updaters when a stop-update-to-time or a SQL shared access DDL operation enters the RDF subsystem, wherein the updaters configured to an auxiliary audit trail may take a long time to shutdown if the auxiliary extractor has fallen behind.
  • Page 294 For more information about Expand multi-CPU paths, see the Expand Configuration and Management Manual. Auxiliary Audit Trails...
  • Page 295: 14 Network Transactions

    14 Network Transactions The RDF/IMPX and RDF/ZLT products are able to guarantee backup database consistency for transactions that update data residing on more than one RDF primary system. RDF/IMPX and RDF/ZLT can map the volumes being protected to both the MAT and auxiliary audit trails. NOTE: Network transaction processing is currently not supported in configurations that use the triple contingency feature.
  • Page 296: Networkmaster Attribute

    NETWORKMASTER Attribute This attribute, located in the RDF configuration record, specifies whether or not the particular system is the master of the RDF network. Each RDF network has one, and only one, network master. To set this attribute, use this RDFCOM command: SET RDF NETWORKMASTER {ON | OFF} When this attribute is set to OFF (the default value), the particular system is not the network master.
  • Page 297: Remotecontrolsubvol (Rcsv) Network Attribute

    There is no default value. REMOTECONTROLSUBVOL (RCSV) Network Attribute The remote control subvolume (RCSV) is the name of the control subvolume used by the RDF subsystem configured for the specified primary and backup systems. It is set by this RDFCOM command.
  • Page 298: Rdf Takeovers Within A Network Environment

    the MAT and auxiliary audit trails and send data to the receivers. The updaters read their data from their image trails and apply it to their UpdateVolumes. During normal processing, no RDF subsystem (except the RDFNET process within the network master primary system) interacts with any other RDF subsystem in the RDF network.
  • Page 299: Takeover Phase 3 Performance

    (it is undone during phase 1 on the tenth system). All of the updaters then look for audit data associated with the transaction, and undo it. The purger of the network master determines what network transactions are incomplete across the different backup systems, and it produces the master network undo list. Each purger then uses this master list to ascertain the transaction data that must be undone on its backup database.
  • Page 300: Takeover And File Recovery

    Takeover and File Recovery When a takeover operation completes in an RDF network environment, the purger logs two events: one reports a safe MAT position (indicating that all committed data up to that location was successfully applied to the backup database), and the second (888 or 858) reports whether or not a File Recovery position is available for use on the primary system.
  • Page 301 More specifically, assume that system \A (the network master) executes: T10 (network transaction started on \A) T11 (non-network transaction) T11 commit T10 commit T12 (network transaction started on \A) T12 commit T13 (network transaction started on \B) T13 commit T14 (non-network transaction) T15 (network transaction started on \A) T14 commit T15 commit...
  • Page 302: Takeover And The Retaincount Value

    T13 preceded the commit for T12. Therefore, the purger determines that these two transactions could not have touched the same data, and T13 does not need to be undone. This illustrates a very important point. With network transactions, the commit sequence of network transactions might differ from one node to another, depending on where the transactions originated.
  • Page 303: Network Configurations And Shared Access Nonstop Sql/Mp Ddl Operations

    Network Configurations and Shared Access NonStop SQL/MP DDL Operations Under certain circumstances after a shared access NonStop SQL/MP DDL operation, takeover network undo processing leads to an abort with database corruption. To avoid this problem, use this protocol when performing shared access NonStop SQL/MP DDL operations in a network environment: Issue the RDFCOM STOP RDF command on the primary system where you plan to perform the shared access NonStop SQL/MP DDL operation.
  • Page 304: Rdf Networks And Abort Or Stop Rdf Operations

    The network configuration record must point to the network master of the RDF network. You must ensure that the updater responsible for the PNETTXVOLUME is also configured to the same image trail as that listed in the network master’s network configuration record. Otherwise, validation will fail and you will be unable to start the newly configured subsystem.
  • Page 305: Sample Configurations

    It is rare for clocks on different systems to have exactly the same values, thus rendering it impossible for stop-update-to-time operations to perform correctly across multiple backup systems. Sample Configurations Two sample configurations follow, one for the network master and one for a non network master. The network attributes are highlighted in bold.
  • Page 306: Sample Non-Network Master Configuration

    SET NETWORK REMOTECONTROLSUBVOLUME RDF05 SET NETWORK PNETTXVOLUME $DATA08 ADD NETWORK SET RDFNET CPUS 0:2 SET RDFNET PRIORITY 165 SET RDFNET PROCESS $MNET ADD RDFNET SET VOLUME ATINDEX 0 SET VOLUME CPUS 1:2 SET VOLUME IMAGEVOLUME $DATA06 SET VOLUME PRIORITY 185 SET VOLUME PROCESS $RU43 SET VOLUME UPDATEVOLUME $DATA07 ADD VOLUME $DATA07...
  • Page 307: Rdfcom Status Display

    SET NETWORK PRIMARYSYSTEM \RDF04 SET NETWORK BACKUPSYSTEM \RDF06 SET NETWORK REMOTECONTROLSUBVOLUME RDF04 ADD NETWORK SET VOLUME ATINDEX 0 SET VOLUME CPUS 1:2 SET VOLUME IMAGEVOLUME $DATA06 SET VOLUME PRIORITY 185 SET VOLUME PROCESS $RU53 SET VOLUME UPDATEVOLUME $DATA08 ADD VOLUME $DATA08 RESET VOLUME RDFCOM STATUS Display This example illustrates the RDFCOM STATUS display for a network master it includes the...
  • Page 309: 15 Process-Lockstep Operation

    15 Process-Lockstep Operation The RDF/IMPX products include the process-lockstep operation, which is process-based. That is, when a process invokes the lockstep operation for a business transaction, the process must wait until all audit records associated with that business transaction are safely stored in image trails on the backup system before continuing.
  • Page 310: The Dolockstep Procedure

    Including the DoLockstep in COBOL85 Applications To invoke the DoLockstep procedure from a COBOL85 program, you must first include the DoLockstep object module in the SPECIAL-NAMES paragraph in the CONFIGURATION section. CONFIGURATION SECTION. SOURCE-COMPUTER. HP NONSTOP. OBJECT-COMPUTER. HP NONSTOP. SPECIAL-NAMES. FILE "$vol.subvol.LSLIBTO" IS LOCKSTEP-LIB.
  • Page 311: The Lockstep Transaction

    When the RDF receiver has flushed all audit records up to and including the lockstep audit into the image trail, it replies to the extractor that the lockstep data is safe. When the extractor receives that information, it replies to the gateway which, in turn, passes status back to the DoLockstep call, and the latter then returns status to the application.
  • Page 312: Multiple Concurrent Lockstep Operations

    Multiple Concurrent Lockstep Operations Because DoLockstep suspends the calling application until the associated lockstep transaction commits on the backup system, a single application process cannot have more than one lockstep operation in progress at any one time. Multiple application processes, however, can invoke DoLockstep concurrently. If called while idle, the RDF gateway immediately initiates a lockstep transaction to perform the requested lockstep operation (one calling process, one lockstep transaction).
  • Page 313: Startupmsg

    STARTUPMSG This attribute must include the process name of your RDF extractor (for example, STARTUPMSG "ENABLE $MEXT"). The startup message must also include either ENABLE or DISABLE as the first parameter. Failure to include either of these parameters will cause the gateway to stop. The gateway can only communicate with one extractor.
  • Page 314: Lockstep And Auxiliary Audit Trails

    transaction is in progress, the RDF gateway merely queues the request. Consequently, if an application process issues a DoLockstep request immediately after the gateway has started a lockstep transaction, that request must wait to be performed until the current lockstep transaction is committed on the backup system.
  • Page 315 errnum is a file-system error number. procname is the name of an extractor process. Cause The RDF extractor is no longer responding, and it might be stopped. Effect The lockstep gateway stops. Recovery Determine why the RDF subsystem stopped, correct the problem, and then restart the subsystem.
  • Page 316 Error errnum received when attempting to obtain info on file filename. errnum is a file-system error number. filename is the name of a lockstep file. Cause The lockstep gateway received the specified error while attempting to call FILE_GETINFOLIST_ on the specified file. Effect The lockstep gateway stops.
  • Page 317 Effect The lockstep gateway stops. Recovery This is an internal error, but the gateway is restarted. If the problem persists, contact the Global Mission Critical Solution Center (GMCSC) or your service provider. Invalid data returned from the RDF Extractor. Cause The lockstep gateway sent a request to the RDF extractor, and the latter returned invalid data.
  • Page 318 Effect The lockstep gateway stops. Recovery This is an internal error, but the gateway is restarted. If the problem persists, contact the Global Mission Critical Solution Center (GMCSC) or your service provider. Filename formatting error errnum. errnum is a file-system error number. Cause The lockstep gateway received the specified error while attempting to format the lockstep filename.
  • Page 319 Cause The specified error was returned when the lockstep gateway attempted to open the RDF extractor. Effect The gateway continues trying to open the extractor and will repeat this message every five minutes until the open is successful. Recovery This is an informational message. If you want lockstep operations to resume, and if your RDF subsystem is not currently running, you must restart the subsystem.
  • Page 320 Recovery This is an informational message; no recovery is required. Lockstep Gateway Started. Cause The lockstep gateway is started. Effect The lockstep gateway continues its initialization activity. Recovery This is an informational message; no recovery is required. RDF extractor procname responded with error errnum to lockstep request. procname is the name of an extractor process.
  • Page 321 Recovery Correct the STARTUPMSG attribute script and then manually delete the RDF lockstep gateway process from SCF and run your newly edited SCF script. The process name must not include a node name. A spurious STARTUPMSG argument was encountered for the lockstep gateway. Cause In your SCF script for starting the lockstep gateway, the STARTUPMSG attribute contained an extra or unrecognizable argument.
  • Page 323: 16 Nonstop Sql/Mx And Rdf

    16 NonStop SQL/MX and RDF RDF supports replication of NonStop SQL/MX user tables (file code 550) and indexes (file code 552). These operations are supported in much the same way as they are with NonStop SQL/MP, and the same types of data and DDL operations are replicated. This chapter describes these operations: •...
  • Page 324 If you want each catalog to be seen from both systems, register your primary and backup catalogs. To register the primary catalog on the backup system, issue a REGISTER CATALOG command on the primary system. To register the backup catalog on the primary system, issue a REGISTER CATALOG command on the backup system.
  • Page 325 LOCATION clause when creating the primary system's schema, you must query the primary system to obtain the Guardian subvolume name, and you must use the Guardian subvolume name with the LOCATION clause here. For example, if issued on the backup system, this command creates a schema on the backup system called SCH in catalog BCAT using subvolume ZSDXYZ3A: CREATE SCHEMA BCAT.SCH LOCATION ZSDXYZ3A;...
  • Page 326: Creating A Nonstop Sql/Mx Backup Database From An Existing Primary Database

    Create each object on the backup system. The ANSI name of the object must be constructed as follows: • catalog name: use the name of the backup catalog you created in Step 2. • schema name: use the name you used in Steps 4 and 5. •...
  • Page 327 the name of the subvolume used for the schema on the primary system, then you must query the primary system to obtain the Guardian subvolume name, and you must use the Guardian subvolume name with the LOCATION clause here. See “Creating NonStop SQL/MX Primary and Backup Databases”...
  • Page 328: Online Database Synchronization With Nonstop Sql/Mx Objects

    At the backup system, use the RESTORE utility to place the objects on the backup system, specifying the ANSI names for the backup system. Use the LOCATION clauses to have RESTORE place the objects in the correct Guardian locations. See “Restoring to a Specific Location”...
  • Page 329 MXGNAMES utility as described in “Creating a NonStop SQL/MX Backup Database From an Existing Primary Database” (page 326) to generate the LOCATION clauses for the temporary objects, modifying the volume names as necessary and using the primary node name for the -node option. Alternatively, you can use the SHOWDDL command to obtain the fully qualified filenames of the objects you want replicated and specify the same Guardian subvol.filenames in the corresponding LOCATION clauses when creating the temporary objects.
  • Page 330: Creating The Fuzzy Copy On The Backup System

    The backup database is now ready for RDF replication, and you can drop the temporary catalog.schema.objects on your primary system. Creating the Fuzzy Copy on the Backup System The advantage of this method is that it eliminates the use of temporary objects as well as tape handling because you create your backup objects directly on the backup system.
  • Page 331: Indirectly From The Primary To The Backup By Way Of A Temporary File

    Load the rows from the primary partition into the backup partition. This requires each catalog to be registered on the other node as described in “Creating NonStop SQL/MX Primary and Backup Databases” (page 323). INSERT INTO backup-table SELECT * FROM primary-table WHERE key-column >= 'F' AND key-column <...
  • Page 332: Correcting Incorrect Nonstop Sql/Mx Name Mapping

    Perform the steps described in “Online Database Synchronization With NonStop SQL/MX Objects” (page 328). In this case, you are only dealing with a single partition. If you create a temporary table on your primary system, you only need to populate the one partition with the INSERT statement shown in “Offline Synchronization for a Single Partition”...
  • Page 333: Consideration For Creating Backup Tables

    Consideration for Creating Backup Tables Currently, you cannot use the CREATE LIKE statement to create backup or temporary tables because CREATE LIKE does not preserve the original Guardian file names that are essential for RDF. At some point in the future when ANSI names are supported, CREATE LIKE will be a viable means of creating backup or temporary tables, but until then the following discussion has the utmost significance.
  • Page 334 Primary Node: \P Backup Node: \B All volume names are identical on the primary and backup systems. Primary catalog name: PCAT Backup catalog name: BCAT You are restoring four tables from two different schemas in catalog PCAT. Schema information: Primary schema name Schema subvolume Backup schema name PCAT.MYSCHEMA...
  • Page 335: Comparing Nonstop Sql/Mx Tables

    As described in “Creating a NonStop SQL/MX Backup Database From an Existing Primary Database” (page 326), you can use the MXGNAMES utility to automatically generate the correct LOCATION clauses, substituting the backup node name as needed. However, you must remap any nonmatching volume names in these locations manually.
  • Page 337: Zero Lost Transactions (Zlt)

    17 Zero Lost Transactions (ZLT) Zero Lost Transactions (ZLT), functionality that is available only with the RDF/ZLT product, ensures that no transactions that commit on the primary system are lost on the RDF backup system if that primary system is downed by an unplanned outage. RDF achieves this though the use of remote mirroring for the relevant TMF audit trail volume(s).
  • Page 338: Zlt Configuration With A Single Standby/Backup System

    Figure 17-1 ZLT Configuration With a Single Standby/Backup System Figure 17-2 shows the configuration where a single system serves as both the standby and backup systems, and the remote mirror is located at an intermediate site. Figure 17-2 ZLT Configuration With a Single Standby/Backup System and With the Remote Mirror Located at an Intermediate Site Figure 17-3 shows the configuration where individual standby and backup systems are located...
  • Page 339: Zlt Configuration With Standby And Backup Systems Located At Separate Sites

    Figure 17-3 ZLT Configuration With Standby and Backup Systems Located at Separate Sites If the standby and backup systems are not one and the same, you must remember to set up remote passwords between the standby and backup systems. You must do so with the same userid that has control over starting and stopping RDF.
  • Page 340: Using Commitholdmode

    ZLT is currently only supported with an HP StorageWorks XP disk array. Assigning CPUs on the Standby System By default, the same CPUs configured for each extractor on the primary system are used for the corresponding extractor on the standby system, provided that both the necessary primary and backup CPUs are available on the standby system.
  • Page 341: Rdf Configuration Attributes

    the primary CPU for all extractors, it puts the primary processes of the extractors in as many different CPUs as possible to achieve load balancing provided there are enough CPUs. If, for example, you have six extractors configured, but you only have two CPUs on your standby system, the monitor places the primary processes of three extractors on one CPU and the primary processes for the other three extractors on the other CPU.
  • Page 342: Alter Rdf Remote Mirror Configuration

    ZLT Takeover Operations CAUTION: At the time of a ZLT takeover, HP strongly recommends that before connecting the remote mirrors to the standby system, you either disconnect the remote mirrors from the primary RDF system, or disable the XP disk array Logical Unit (LUN) from the primary system. If the remote mirror's LUN remains shared and active with both the primary and the standby RDF systems, it might cause data corruption on the remote mirror disk.
  • Page 343: The Audit-Fixup Process

    Each extractor logs RDF event 901 reporting it is started for ZLT processing, starts a special audit-fixup process to fix up the last file in the audit trail (see “The Audit-Fixup Process” below), and sends all remaining audit records to its receiver. When an extractor reaches the end of its audit trail, it sends a “ZLT finished”...
  • Page 344: Rdfcom Info And Show Commands

    If a takeover does not involve ZLT, the extractor is not included in the STATUS display during an RDF takeover operation. With ZLT configured and enabled, the STATUS RDF display changes during an RDF takeover. During phase 1 (ZLT processing), status is displayed for the extractor(s), consisting of process name, sno, rba, cpus, error.
  • Page 345 Determine which disks (the local disk on the primary system or the remote mirror on the standby system) for all audit trails in the RDF configuration received the most audit records. The example that follows shows how to do so for the MAT. If your RDF configuration includes one or more auxiliary audit trails, you must do the same for each auxiliary audit trail.
  • Page 346: Zlt And Rdf Networks

    Once the remote mirror is started, issue SCF START $audit-vol (which causes the revive from -M to -P) Start TMF. When startup is complete, the database on the primary system contains the same data that the database on the backup system had at the conclusion of the RDF takeover operation.
  • Page 347: Sql Shared Access Ddl Operations

    SQL Shared Access DDL Operations Normal support for SQL shared access DDL operations is provided during ZLT takeover operations: • The updaters are guaranteed to stop at the correct locations. • If some of the updaters terminated prematurely while a shared access operation is in the system, only those that had not completed the task are restarted during the next takeover operation.
  • Page 349: A Rdf Commands Quick Reference

    A RDF Commands Quick Reference The syntax rules for the RDFCOM and RDFSCAN commands, explained in detail in Chapter 8 (page 187) Chapter 9 (page 261), are summarized in this appendix. This appendix, which is written for system managers and operators, summarizes the syntax descriptions for: •...
  • Page 350: Copyaudit

    {RECEIVER receiver-option {PURGER purger-option {RDFNET netsync-option {TRIGGER {trigger-type } {trigger-option } } {VOLUME updater-option COPYAUDIT The COPYAUDIT command copies missing audit records from the backup system that has the most to the backup system that has the least. This command is only for use with the triple contingency feature.
  • Page 351: Info

    Where Issued: Primary or backup system. Security: Any user. HISTORY INFO The INFO command displays the current configuration parameter values from the configuration file for the specified process or other object. Where Issued: Primary or backup system. Security: Any user. INFO {* [ATINDEX audittrail-index-num] {IMAGETRAIL...
  • Page 352: Reset

    Where Issued: Primary or backup system. Security: Any user. OUT [\system.][$volume.][subvolume.][file] RESET The RESET command resets all configuration parameters for the specified process to their default values within the RDF configuration memory table. The corresponding parameters within the configuration file do not change, however, unless you issue an ADD command. Where Issued: Primary system only.
  • Page 353: Set Network

    {CPUS primary-CPU : backup-CPU } {PRIORITY priority {PROCESS process-name SET NETWORK The SET NETWORK command sets RDF network configuration parameters within the RDF configuration memory table. The supplied values are not applied to the RDF configuration file, however, until you issue an ADD NETWORK command. Where Issued: Primary system only.
  • Page 354: Set Rdfnet

    SET RDFNET The SET RDFNET command sets the designated configuration parameters for the RDFNET process to the supplied values within the RDF configuration memory table. The supplied values are not applied to the RDF configuration file, however, until you issue an ADD command. Where Issued: Primary system only.
  • Page 355: Show

    where volume-option is: {ATINDEX atindex {CPUS primary-CPU : backup-CPU } {PRIORITY priority-number {PROCESS process-name {IMAGEVOLUME volume {UPDATEVOLUME volume {INCLUDE subvol.file {EXCLUDE subvol.file {INCLUDEPURGE subvol.file {EXCLUDEPURGE subvol.file {MAPFILE $vol.subvol.file {MAPLOG $vol.subvol.file SHOW The SHOW command displays the current parameter values contained in the RDF configuration memory table for the specified process.
  • Page 356: Stop Rdf

    {PROCESS procname } {VOLUME {RTDWARNING {RDFNET STOP RDF The STOP RDF command shuts down the RDF subsystem. Where Issued: Primary or backup system (can be issued on the backup system only when all communications lines to the primary system are down). Security: Super-user group member with remote password from the primary system to the backup.
  • Page 357: Rdfscan Commands Quick Reference

    RDFSCAN Commands Quick Reference RDFSCAN runs under the Guardian user interface (normally the TACL command interpreter) to the NonStop operating system. The RDFSCAN command starts an RDFSCAN session that lets you enter RDFSCAN commands interactively, noninteractively, or through a command file. Where issued: primary or backup system.
  • Page 358: Nolog

    NOLOG The NOLOG command disables LIST command copying that was previously enabled by a LOG command. NOLOG SCAN The SCAN command scans a specific number of messages in the log file and displays all of those in that range that contain the current match pattern. SCAN number File Names and Process Identifiers File names and process identifiers sometimes appear as parameters in RDFCOM and RDFSCAN...
  • Page 359: B Additional Reference Information

    B Additional Reference Information This appendix provides additional reference information about: • “Default Configuration Parameters” (page 359) • “Sample Configuration File” (page 360) • “RDFSNOOP Utility” (page 362) • “RDF System Files” (page 362) • “RDF File Codes” (page 364) Process names are also reserved: $X* , $Y* , and $Z*.
  • Page 360: Sample Configuration File

    Parameter Default Value(s) RECEIVER n.a. n.a. FASTUPDATEMODE TRIGGER CPUS TRIGGER PRIORITY TRIGGER WAIT WAIT n.a. n.a. TRIGGER NOWAIT WAIT n.a. n.a. PURGER CPUS PURGER PRIORITY PURGER PURGETIME 1440 PURGER RETAINCOUNT 5000 VOLUME ATINDEX VOLUME CPUS VOLUME PRIORITY VOLUME $SYSTEM n.a. n.a.
  • Page 361 SET RECEIVER CPUS SET RECEIVER EXTENTS (1000,1000) SET RECEIVER PRIORITY SET RECEIVER RDFVOLUME $GOLD SET RECEIVER FASTUPDATEMODE ON SET RECEIVER PROCESS $MRECV | *** | *** Add the receiver parameters to the | *** RDF configuration file. | *** ADD RECEIVER| *** | *** Add secondary image trails.
  • Page 362: Rdfsnoop Utility

    | *** $DB3 on the backup node corresponds to | *** the volume $DB03 on the primary node. | *** Note that the IMAGEVOLUME parameter is omitted; | *** it defaults to $SECIT2 because it was not reset | *** after the previous ADD VOLUME command. | *** SET VOLUME CPUS SET VOLUME PRIORITY...
  • Page 363 commands. The configuration file resides on both the primary and backup node; on both nodes, the configuration file is named: $SYSTEM.control-subvolume.CONFIG • Context file The context file is a key-sequenced file with record length 4062. The context file contains the context information that tells the RDF subsystem where the RDF processes stopped.
  • Page 364: Rdf File Codes

    The ZFILEINC file resides on the backup node and is named $SYSTEM.control-subvolume.ZFILEINC. • RDFTKOVR file This file records whether an RDF Takeover operation has completed successfully. This file is empty under normal circumstances (eof = 0). If, however, you have executed an RDF Takeover operation and it completes successfully, then they key word "DONE"...
  • Page 365: C Messages

    C Messages This appendix describes the messages generated by RDF. The RDF subsystem produces three general types of messages: • “RDF Messages” (page 365), which are reported any time by RDF and directed to the configured EMS event log (collector) •...
  • Page 366 The name of the system on which the particular RDF process is running. The name or process ID of the RDF process that issued this message. The message number. The message text that explains the log entry. If the EMS event log is $0 (the default collector), only items (3), (4), (5) and (6) are logged because of file-length restrictions.
  • Page 367 program is the name of the program file that RDF tried to execute. expected is the expected version number of the program. received is the actual version number of the program, as reflected by the program file. Cause In response to a START RDF command, RDF attempted to execute the designated program file ( program ).
  • Page 368 Effect If this message is issued by an updater process, see Table 5-2 in the RDF manual to determine the appropriate recovery actions. The extractor retries OPEN calls for the audit trail files if the error is 11 (file missing), 12 (file in use), or 59 (file is bad).
  • Page 369 TMP is inaccessible Cause An RDF process has tried to obtain audit trail information from the TMF management process pair (TMP), but the TMP was not accessible. The probable cause is that TMF is not currently running. RDF requires that TMF be up and running on the primary and all backup nodes.
  • Page 370 Recovery See the description of the NEWPROCESS procedure in the Guardian Procedure Errors and Messages Manual to determine the cause of the failure. Once the underlying cause is corrected, the backup process can be created. CHECKPOINT Failure - backup comm error error error is the file-system error number that identifies the specific error.
  • Page 371 Bad parameter in CHECKPOINT - status nnn is the status word returned by CHECKPOINT. Cause A CHECKPOINT call from the primary process of a NonStop process pair to its backup process failed because of a parameter error. This message indicates a programming problem within RDF.
  • Page 372 is the relative byte address where the error occurred in the audit trail file. Cause The extractor encountered an irrecoverable error at the designated relative byte address (rba) in the designated TMF audit trail file. This message indicates an internal RDF or TMF error.
  • Page 373 Recovery This is an internal error. Contact your service provider. Backup Processor Down Cause The CPU of the backup process of a NonStop process pair failed. Effect The primary process continues to run, but not in fault-tolerant mode. Recovery Reload the downed processor. The backup process is re-created when the processor is reloaded.
  • Page 374 Cause The updater has found a Stop-RDF-Updater record in the image trail. This special record is generated in the TMF audit trail on the primary system when an SQL DDL operation WITH SHARED ACCESS involving the specified file has completed. Each updater will stop when it reaches this record in the image trail.
  • Page 375 • To compare MAT positions in preparation for the RDFCOM COPYAUDIT command of the triple contingency protocol • To use for File Recovery to a MAT position on the primary system Recovery This is an informational message; no recovery is required. [ANSI-object-type ANSI-name, Partition partition-id,] [File filename] missing on backup system ANSI-object-type...
  • Page 376 filename is the name of the file that the updater tried to create. Cause An updater was unable to create a file on its UPDATEVOLUME disk. The message includes both the file-system error number and the name of the file the updater attempted to create.
  • Page 377 Cause A fatal error occurred in RDF. Effect RDF stops. Recovery Restart RDF and contact your service provider. FILEINFO obtained on [ANSI-object-type ANSI-name, Partition partition-id,] file filename ANSI-object-type is the ANSI object type (for example, table, index, and so on.). ANSI-name is the ANSI name of the SQL/MX object that encountered the error.
  • Page 378 Internal error - RDF extractor abending Cause The extractor has detected an audit record of an unknown version. Effect The extractor process abends. Recovery This is an internal error. Contact your service provider. Old audit record format encountered Cause The extractor has detected an audit record generated by an unsupported version of TMF.
  • Page 379 The message includes the file name, relative block number, and relative byte address of the audit file in question. Effect This is a catastrophic error; the extractor abends, and RDF stops. Recovery This message indicates an internal RDF or TMF error. You must resynchronize the primary and backup databases.
  • Page 380 Cause The purger has detected that all the updaters have shut down following a successful stop-update-to-time operation. Effect The database is now in a consistent state. Recovery This is an informational message; no recovery is required. Process abending Cause The indicated process is abending. Effect A SAVEABEND file is created, a stack trace is logged, and the process (and its backup process, if any) abends.
  • Page 381 Effect You cannot start the RDF subsystem. Recovery Purge all existing context and configuration files on the primary and backup system. Then initialize the RDF subsystem. Process incompatible with local system Cause The process reporting the error has determined that it has been installed on the wrong operating system.
  • Page 382 Phase one part 3 database synchronization complete Cause The third part of phase one of a database synchronization operation has completed. Effect The extractor continues with phase two. Recovery This is an informational message; no recovery is required. Rolling over to filename filename is the name of the next image file in the sequence.
  • Page 383 Recovery This is an informational message; no recovery is required. Restart position adjusted for database synchronization Cause The extractor has encountered a restart condition during an online database synchronization operation, and its current audit trail restart position sent by the receiver might lead to loss of data.
  • Page 384 Effect If all the records for a transaction are not received on the backup node, the transaction is treated as if it aborted. For every image record that is not applied to the backup database, an exception record is written to the designated exception file. Recovery This is a normal occurrence during TAKEOVER processing.
  • Page 385 timestamp is the timestamp specified previously by an operator in an RDFCOM STOP UPDATE, TIMESTAMP timestamp command. Cause A STOP UPDATE, TIMESTAMP timestamp command has been issued and the updater has completed its redo pass. Effect The updater is ready to commence its undo pass. Recovery This is an informational message;...
  • Page 386 Effect This error is not fatal; processing continues. The backup process is stopped and then re-created later. Recovery See the description of the CHECKALLOCATESEGMENT procedure in the Guardian Procedure Errors and Messages Manual to determine the cause of the failure. Some corrective action might be required for the backup process to be re-created without repeated failures.
  • Page 387 NOTE: Under some circumstances, after the configured backup receiver process re-creates its primary process and switches to that process, it continues to hold an image file open. When the receiver no longer needs this image file and the purger tries to purge it, the purger logs RDF error 797 accompanied by file-system error 12.
  • Page 388 For error 43 (unable to obtain disk space for extent), the receiver retries the write operation. All other errors are fatal; the receiver abends, and RDF stops. Recovery The only recovery from an error 43 condition is to free some disk space. You can do that by purging unused files, by using FUP DEALLOCATE to deallocate unused extents (not for image files), or by using DCOM to move extents so that small free areas are combined into a larger free space.
  • Page 389 WRITEUPDATE error error on file-name error is the file-system error number that identifies the specific error. filename is the name of the file on which the error occurred. Cause The RDFNET process has encountered the specified error on the specified file. Effect The RDFNET process aborts its current transaction, posts a timer, and waits for that timer to expire before attempting a new transaction.
  • Page 390 Cause The operator issued a TAKEOVER command. Effect RDF starts a TAKEOVER operation. Recovery This is an informational message; no recovery is required. Error error communicating with procname error is the file-system error number that identifies the specific error. procname is the name of the process with which the updater cannot communicate.
  • Page 391 error is a file-system error number. filename is the name of the image file associated with the error. Cause The receiver or purger process has encountered an error while attempting to perform a setmode operation on the specified file. Effect The process abends.
  • Page 392 RDF updater stopped unexpectedly, updater updater is the name of the updater process that stopped. Cause An updater has stopped unexpectedly. The message includes the name of the stopped process. Effect This message is issued by the RDF monitor. The monitor sends an abort request to all remaining RDF processes to stop RDF.
  • Page 393 Missing RDF updater CONFIG record Cause The RDF monitor was unable to find an updater configuration record when performing a START RDF command. Effect The START operation fails and RDF shuts down. Recovery Use the SET and ADD commands to create one or more updater configuration records.
  • Page 394 Effect The equivalent of an INSPECT TRACE is written and then the process will abend. Recovery This message gives your service provider information about the state of a process that is terminating abnormally. You might be able to correct the underlying problem and restart RDF. Otherwise it might be necessary to reinitialize RDF.
  • Page 395 command-text is the text of the command that was issued. userid if present, is the Guardian userid (group.user) of the user who issued the command. Cause RDFCOM logs this message whenever you issue any of these commands: ALTER, INITIALIZE RDF, START RDF, START UPDATE, STOP RDF, STOP UPDATE, or TAKEOVER. command-text is the command text.
  • Page 396 Error - Audit-trail file is missing. File filename filename is the name of the audit trail file that could not be found. Cause The extractor was unable to find the designated audit trail file. Usually this occurs because TMF has purged the audit trail file while RDF was stopped. When RDF is running, RDF prevents TMF from purging audit trail files until the extractor has read them, even if the extractor is running far behind TMF (the extractor has a large RTD value) and TMF has performed several rollovers.
  • Page 397 Incorrect version of audit received Cause The receiver has received audit from the extractor that does not match the version of audit that the receiver expects. Effect The receiver abends. Recovery This is an internal error. Contact your service provider. Phase one database synchronization complete Cause The updater that generated this message has completed phase one of the online...
  • Page 398 Cause TMF was stopped during an RDF online database synchronization operation, before the extractor had completed its phase one processing. Effect The extractor abends because the database synchronization operation can no longer succeed. Recovery You must reinitialize the RDF product and restart the online database synchronization operation.
  • Page 399 RDF transaction already aborted Cause The named RDF process has encountered an error condition that requires that its last transaction be aborted, but the transaction has already been aborted. Effect The process restarts and continues processing. Recovery This is an informational message; no recovery is required. Commencing image trail purge pass Cause The purger process is ready to start the task of determining what image files it can...
  • Page 400 Recovery See the description of BEGINTRANSACTION errors in the TMF Application Programmer’s Guide and take appropriate corrective action. Extractor processname RTD (rtd) exceeds RTD warning threshold (threshold#) processname is an extractor process name. is an RTD value. threshold# is an RTDWARNING warning threshold value. Cause The extractor has fallen behind the configured RTDWARNING threshold specified in the RDF configuration.
  • Page 401 Missing purger config record Cause The purger configuration record is not in the RDF configuration file. Effect The reporting process abends and RDF will abort. Recovery Restart RDF. If the problem persists, contact your service provider. RDF purger stopped unexpectedly Cause The purger process has terminated unexpectedly.
  • Page 402 Recovery This is an informational message; no recovery is required. SEGMENT_ALLOCATE_ returned error error, error-detail# error is an error number. error-detail# is the detailed error number. Cause The specified error occurred while attempting to allocate an extended segment. Effect The affected process abends and RDF will abort. Recovery Try to determine why the segment could not be allocated.
  • Page 403 Invalid image filename or filecode [ANSI-object-type ANSI-name, Partition partition-id,] file filename ANSI-object-type is the ANSI object type (for example, table, index, and so on.). ANSI-name is the ANSI name of the SQL/MX object that encountered the error. partition-id is the partition ID of the SQL/MX object that encountered the error. filename is the Guardian filename of the file that encountered the error.
  • Page 404 Recovery This is an informational message. You must examine the event log to determine why the process is restarting and if any recovery action is required. RDF process transaction unilaterally aborted Cause The named RDF process' current transaction has been aborted by TMF and the disk process.
  • Page 405 MAT position for File Recovery: SNO num RBA num Cause A successful takeover has completed. If you need to bring your primary database back into synchronization with your backup database, use TMF File Recovery on your primary system with the specified MAT position. Effect None.
  • Page 406 Stop Update to Time Operation rejected Cause You attempted to issue a new STOP UPDATE, TIMESTAMP command, but the existing ZTXUNDO list from your last stop-update-to-time operation is still needed. Effect The command is aborted. Recovery Wait until all RDF updaters have been started and have caught up, then retry the operation.
  • Page 407 Cause The updater has detected more than the default maximum number of transactions that need to be undone. This exceeds the number of transactions that can currently be loaded into memory. Effect The updater abends, and the takeover operation aborts. Recovery If this happens during a takeover operation, reissue the TAKEOVER command.
  • Page 408 Effect The master receiver waits until all auxiliary receivers have caught up. The auxiliary receiver might continue to report this event as it continues to catch up. Recovery If the master receiver has been waiting for more than 30 seconds, you should check the status of all auxiliary extractors and receivers with the RDFCOM STATUS PROCESS command.
  • Page 409 A file is prepared for SQL DDL operation Cause You have completed an SQL DDL operation WITH SHARED ACCESS for a file on your primary system, and all updaters have processed the required audit. It is now safe for you to execute the same DDL operation on the backup database. To obtain the name of the source file involved in the operation on the primary system, look for the last RDF 733 event, which lists the name of the file.
  • Page 410 text is the termination text. Cause The purger has seen that the user specified trigger process has stopped. The message might include completion code and/or termination text information that indicates why the process stopped. If the process abended that will also be indicated. Effect The trigger process is stopped.
  • Page 411 Cause The extractor has encountered a critical audit record that pertains to either a STOP TMF operation or a NonStop SQL/MP or NonStop SQL/MX DDL operation WITH SHARED ACCESS, and the Monitor was unable to communicate information about the operation to another RDF process.
  • Page 412 Cause The updater has detected that the specified mapfile is not found. Effect The updater stops and RDF aborts. Recovery Provide an existing mapfile, and restart RDF. Filenames filename1 and filename2 collide on the same physical filename filename3 on the backup system filename1 is the name of one colliding file on the primary system.
  • Page 413: Rdfcom Messages

    WITH SHARED ACCESS involving the specified table or index has completed. Each updater stops when it reaches this record in the audit trail. Effect All the updaters stop. Recovery When all updaters have stopped, you must perform the same SQL DDL operation on the RDF backup node that was originally done on the primary node.
  • Page 414 Effect The ALTER operation was not completed. Recovery See the Operator Messages Manual for a description of the error code. For additional details about understanding and correcting file-system errors, see the Guardian Procedure Errors and Messages Manual. If possible, correct the error and reenter the command that encountered the error.
  • Page 415 The COPYAUDIT command aborts. Recovery There might be no recovery for this problem. To verify that required audit is missing from your local image trail, contact your local HP analyst. Aux audit support is only available with the RDF/IMPX product Cause You tried to have RDF/IMP protect a data volume associated with an auxiliary audit trail.
  • Page 416 Cause The network master network record does not have the have the specified backup system name for the local RDF subsystem. Effect Validation fails. Recovery You must reconfigure your network master. BACKUPSYSTEM is Not Defined Cause The RDF configuration file is invalid. Effect The RDF configuration record was not added.
  • Page 417 Cause The context file data could not be created or cleared while START RDF processing was being performed after the INITIALIZE RDF command. Effect START RDF processing is aborted. Recovery See the Operator Messages Manual for a description of the error code. For additional details about understanding and correcting file-system errors, see the Guardian Procedure Errors and Messages Manual.
  • Page 418 cpu:cpu are the primary and backup CPUs, respectively. Cause Both the configured primary and backup CPUs were unavailable when a START RDF command was issued. Effect The command fails. Recovery Wait until both CPUs become available, and reenter the START RDF command. If necessary, see your system manager.
  • Page 419 Cause You tried to add an auxiliary extractor or receiver to an RDF environment that had previously been configured for lockstep operations. Effect The ADD EXTRACTOR or ADD RECEIVER command fails. Recovery You cannot have both lockstep operation and protection for data configured to an auxiliary audit trail in the same RDF subsystem.
  • Page 420 and Messages Manual. Take appropriate corrective action, and then reissue the UNPINAUDIT command. Error error# obtaining FILECODE and CRVSN of the MAPFILE filename error# is the file-system error number that identifies the specific error. filename is the name of the updater mapfile specified in the updater configuration. Cause RDFCOM could not obtain the file code and CRVSN of the updater mapfile when an ADD VOLUME, START RDF, START UPDATE, or VALIDATE CONFIGURATION command...
  • Page 421 error# is the file-system error number that identifies the specific error. filename is the name of the image trail file associated with the error. Cause The COPYAUDIT command encountered the specified error while attempting to create the specified image file on the local image trail volume. Effect The COPYAUDIT command aborts.
  • Page 422 Recovery See the Guardian Procedure Errors and Messages Manual for a description of the recovery actions for the file-system error. Correct the error indicated by error#, then reenter the command. Error error# on process info attempt error# is the file-system error number that identifies the specific error. Cause The COPYAUDIT command encountered the specified error while attempting to process information about the current RDFCOM session.
  • Page 423 Cause During execution of a VALIDATE CONFIGURATION command, RDFCOM determined that the updater mapfile is invalid. Effect The command fails. Recovery Correct the mapfile and reenter the command. Expected MAP in the mapping string mapping-string in the MAPFILE filename mapping-string is the erroneous mapping string specified in the mapfile.
  • Page 424 Expecting 'Yes' or 'No' response. Cause You have entered an unexpected response to an RDFCOM prompt that requires only either YES (or Y) or NO (or N) as verification to proceed with your request. Effect The requested operation does not take place. Recovery Reenter your request, this time specifying either YES, Y, NO, or N to the prompt.
  • Page 425 Recovery Set FASTUPDATEMODE ON for the Master Receiver before setting FASTUPDATEMODE ON for any Auxiliary Receiver. FASTUPDATEMODE should be turned OFF for all the Auxilliary Receivers before it is turned OFF for the Master Receiver. Cause You have tried to turn FASTUPDATEMODE OFF for the Master Receiver when FASTUPDATEMODE is ON for one or more Auxilliary Receivers.
  • Page 426 error# is the NEWPROCESS error number that identifies the specific error. Cause A NEWPROCESS error occurred during START RDF or TAKEOVER processing. Effect The START RDF or TAKEOVER operation is aborted. Recovery See the Operator Messages Manual for a description of the error code. For additional details about understanding and correcting process errors, see the Guardian Procedure Errors and Messages Manual.
  • Page 427 Cause You tried to add a secondary image trail on the volume volume-name, but an image trail has already been added for this volume. Effect The command fails. Recovery Select a different volume for the secondary image trail. IMAGETRAIL volume-name is not used by any updater volume-name is the name of the image trail.
  • Page 428 Effect The COPYAUDIT command aborts. Recovery There is no recovery for this problem. Contact your local HP representative. Invalid TMF shutdown timestamp Cause You entered an INITIALIZE RDF timestamp command, but specified the timestamp (or one or more of its components) incorrectly.
  • Page 429 Recovery Examine the specified timestamp. If the format is correct, then the error arises from an incorrect value for the date or time, such as 30 for hour or 32 for day. Correct the specified timestamp and reenter the INITIALIZE RDF command. The correct format for the timestamp is day month year hour:min, where: is a number from 1 to 31.
  • Page 430 Cause RDFCOM expected * in the filename portion of the subvolume indicated by subvolume-name when an ADD VOLUME, ALTER VOLUME, START RDF, START UPDATE, or VALIDATE CONFIGURATION command was being executed. Effect The command fails. Recovery Correct the mapping string, then reenter the command. Mapping string mapping-string is invalid in the MAPFILE filename, error error# mapping-string...
  • Page 431 Cause You have already added an extractor with an ATINDEX value of 0. Effect The ADD EXTRACTOR command fails. Recovery Review and revise your RDF configuration. Master RECEIVER Record already exists Cause You have already added a receiver with an ATINDEX value of 0. Effect The ADD EXTRACTOR command fails.
  • Page 432 Recovery You must add the appropriate NETWORK configuration record. Network synch file ZRDFNETX file must be INCLUDED Cause An INCLUDE pattern has been specified that will cause audit records associated with the NetSynch data file to be filtered out. Effect RDF can not be started.
  • Page 433 Cause The COPYAUDIT command could not find any image files on the remote image trail. This problem indicates that the receiver’s RETAINCOUNT value was probably not set high enough and that, as a result, some image files on the remote system were purged. Effect The COPYAUDIT command aborts.
  • Page 434 Recovery If the network record you have previously added pertains to the RDF network master subsystem, then do not add any further network records. If the network record you have previously added does not pertains to the RDF network master subsystem, then you need to purge your current configuration, reinitialize, and reconfigure.
  • Page 435 Effect The command fails. Recovery Enter another command, or shut down RDF and reenter this command. Operation must be performed on the PRIMARYSYSTEM \primary or BACKUPSYSTEM \backup primary is the name of the primary node that can perform the operation. backup is the name of the backup node that can perform the operation.
  • Page 436 Recovery See the Operator Messages Manual for a description of the error code. For additional details about understanding and correcting file-system errors, see the Guardian Procedure Errors and Messages Manual. If possible, correct the error and reenter the COPYAUDIT command. Otherwise, contact your service provider.
  • Page 437 Cause The RDF configuration file is invalid: both primary and backup node names are identical. Effect The validation fails. Recovery Alter the RDF configuration to reflect different names for these two nodes. Process Name Error: error# error# is the error number that identifies the specific error. Cause A NEWPROCESS error occurred during START RDF or TAKEOVER processing.
  • Page 438 filename is the name of the nonexistent EMS collector (RDF log file). node is the name of the system where the collector name is invalid. Cause The RDF configuration file is invalid: a nonexistent EMS collector was specified. Effect The ADD RDF command fails. Recovery Specify a valid EMS collector name in a SET RDF command, and then reenter the ADD RDF command.
  • Page 439 ctrl-subvol is the name of an RDF subsystem control subvolume. Cause The RDF subsystem that you specified as your network master has not been configured as a network master. Effect Validation fails. Recovery You need to reconfigure your local subsystem and specify the control subvolume of your network master.
  • Page 440 Effect Validation fails. Recovery You must reconfigure your network master and possibly your local configuration. RDFVOLUME is not allowed for an aux receiver. Auxiliary receivers do not have an RDFVOLUME. Cause You tried to add an auxiliary receiver for which you had specified an RDFVOLUME. Effect The ADD command fails.
  • Page 441 As one of its validation checks during START RDF processing, RDFCOM tries to create a temporary image file on the receiver’s RDFVOLUME and then to allocate all 16 extents. This check, if successful, verifies that: • If RDF is starting for the first time, there is enough storage for at least one image file •...
  • Page 442 RECEIVER record exists, use ALTER RECEIVER Cause An ADD RECEIVER command was issued when the configuration file already contained a receiver record. Effect The command fails. Recovery No recovery is required if you want to use the existing receiver process as it is configured.
  • Page 443 mapping-string is the erroneous mapping string specified in the mapfile. filename is the name of the updater mapfile specified in the updater configuration. Cause RDFCOM found a reserved subvolume name in the mapping string specified in the updater mapfile when an ADD VOLUME, ALTER VOLUME, START RDF, START UPDATE, or VALIDATE CONFIGURATION command was being executed.
  • Page 444 SHUTDOWN Failure: error# on VOLUME volume error# is the error number that identifies the specific error. volume is the name of an RDF data volume. Cause RDFCOM could not stop the updater for volume volume because of error. Effect The shutdown is aborted. Recovery See the Operator Messages Manual for a description of the error code.
  • Page 445 to disk. Alternatively, you can use a different TMF shutdown point that is located in a MAT file still on disk, or you can stop TMF and use that resulting shutdown point. START RDF Aborted Cause A START RDF command aborted. Effect The command fails.
  • Page 446 Effect Some updaters might have shut down, but others never received the stop message and are still running. The receiver and monitor cannot now identify these updaters, and you cannot stop them with another STOP UPDATE command or a STOP RDF command. Recovery All remaining updaters must be manually stopped from the TACL interface (for example, with a TACL STOP $UPD1 command).
  • Page 447 Cause A takeover operation is underway. Effect The takeover operation continues. Recovery This is an informational message; no recovery is required. TAKEOVER command is not allowed in an OBEY/IN file without the bang (!) option. Cause TAKEOVER command has been issued through an OBEY/IN file without bang (!) option.
  • Page 448 probably not set high enough and that, as a result, some image files on the remote system were purged. Effect The COPYAUDIT command aborts. Recovery There is no recovery action. The COPYAUDIT command cannot be executed because image files needed for this command were already purged from the remote system. The MAPFILE filename is not found filename is the name of the updater mapfile specified in the updater configuration.
  • Page 449 Cause While searching for a TMF shutdown timestamp to use to initialize RDF, RDFCOM found that the audit trail file with the specified sequence number is not currently available. If you respond to the prompt with YES or Y, RDFCOM directs the TMP to begin restoring this file.
  • Page 450 \bksys is the name of the RDF backup system. subvol is the name of the remote control subvolume. Cause You tried to execute an INITIALIZE RDF command, but the RDF control files (such as CONFIG or CONTEXT) already exist on the remote control subvolume. If these files are on the backup system, then that name is specified.
  • Page 451 Effect The start command fails. Recovery You must reconfigure RDF with a named updater process. The year must be greater than 1996. Cause You specified the year of a timestamp that is earlier than 1997. Effect The command involving the timestamp fails. Recovery Reissue the command, specifying a timestamp year that is 1997 or greater.
  • Page 452 Recovery Check the contents of the RDF configuration file, issue a VALIDATE RDF command to verify the configuration, and reissue your request for the RDFCOM operation you originally wanted to perform. TMF NAT table is full. Cause There is a problem with TMF. Effect The configuration validation fails.
  • Page 453 Cause The COPYAUDIT command has aborted because of a problem reported in the previous RDFCOM message. Effect The COPYAUDIT command aborts. Recovery Correct the problem reported in the previous error message and reissue the COPYAUDIT command. Unable to allocate Map Cause A NEWPROCESS error occurred during START RDF or TAKEOVER processing.
  • Page 454 error# is the file-system error number that identifies the specific error. Cause A DELETE IMAGETRAIL command tried to delete an image trail, but RDFCOM could not purge all image files in the trail because of the error denoted by file-system file-error.
  • Page 455 Effect RDF will not start. Recovery Change the RDF configuration to reflect a valid disk volume. VOLUME device UPDATEVOLUME is NOT a disk volume device is the non-disk device assigned for the UPDATEVOLUME. Cause The RDF configuration file is invalid. Effect RDF will not start.
  • Page 456 Recovery Delete the updater, and then delete the image trail. VOLUME vol-name does not match imagetrail ATINDEX atindex Cause You added an updater with the specified ATINDEX, but the IMAGEVOLUME configured for the updater does not have that value. Effect The validation fails.
  • Page 457 procname is the RDF process without a backup CPU, which is one of: EXTRACTOR, MONITOR, RECEIVER, or $volume UPDATER. Cause RDF is started without a backup process for the process identified in this message. Effect RDF is started. Recovery Stop RDF, reconfigure it to include a backup CPU for the RDF process, and start the subsystem once again.
  • Page 458 another three minutes from the specified timestamp to ensure that the starting position in the audit trail is a safe one. Recovery This is an informational message; no recovery is required. *** WARNING *** REPLICATEPURGE is not turned ON. Cause REPLICATEPURGE is turned OFF but INCLUDEPURGE or EXCLUDEPURGE lists have been added for a volume.
  • Page 459 Recovery Respond “yes” or “no” to the prompt. You are attempting a TAKEOVER operation immediately after the receiver has crashed. Please contact your HP analyst before proceeding with the TAKEOVER operation. Cause RDFCOM has detected that the receiver stopped prematurely the last time it was running.
  • Page 460 You cannot add more than 48 network records Cause The current limit for the number of RDF subsystems in your RDF network is 48 and you have attempted to add 49. Effect The configuration command fails. Recovery Do not add any more network records. You cannot alter MAPFILE on the backup system if the primary system is available Cause...
  • Page 461: Rdfscan Messages

    RDFSCAN Messages The following RDFSCAN messages (listed alphabetically by text) can appear on your terminal screen during an RDFSCAN session. Beyond eof! Cause The AT position specified is beyond the end-of-file mark in the current log file. Effect The AT command fails. Recovery Reenter the AT command, this time with a record-number parameter that indicates a position before the end-of-file mark.
  • Page 462 Filename is the invalid filename. Cause The specified file is not a valid file recognized by the operating system. Effect The command fails. Recovery Check the filename for correct spelling and compliance with syntax rules. HELP for command not found command is the RDFSCAN command for which online help was requested.
  • Page 463: D Operational Limits

    D Operational Limits Table D-1 Operational Limits for RDF/IMP, IMPX, and ZLT Limit Description Maximum Value Number of volumes being protected Number of volumes in an SMF pool on backup system Number of auxiliary image trails Number of files per updater 3000 Number of RDF configurations with the same primary system Number of systems that can contribute audit to a primary system...
  • Page 465: E Using Asap

    E Using ASAP ASAP (Availability Statistics and Performance) allows many subsystem entities to be monitored across a network of NonStop servers. The status and statistics for the entities are collected on a single system, and are then monitored either through the ASAP command interface or through the ASAP graphical user interface (GUI) PC client.
  • Page 466: Installation

    Figure E-1 The RDF/ASAP Environment Installation The RDF SGP is packaged with the RDF/IMP and IMPX products and, by default, is installed on $SYSTEM.RDF. You might, however, place this object file wherever you want. If you install the SGP object file somewhere other than $SYSTEM.RDF, you must ensure that the ASAP configuration points to the correct location (by way of the SET RDF command within the ASAP command interface).
  • Page 467: Adding And Removing Rdf Environments

    MONITOR RDF DOME->TANDA This command uses DOME as the CSV. To use a control subvolume with a suffix, say E, one should use the command: MONITOR RDF DOMEE->TANDA where, DOMEE is the control subvolume and TANDA is the RDF Backup System without '\'. Adding and Removing RDF Environments The RDF SGP performs the auto detection and processing of the RDF environments added through the MONITOR command when the process starts.
  • Page 468 Table E-1 RDF Metrics Reported by ASAP (continued) Information Monitor Extractor Receiver Imagetrail Purger RDFNET Updater Passed to ASAP — — — Auxiliary Audit Index File — — — Sequence Number Relative — — — — — Byte Address RTD Time —...
  • Page 469: Index

    Index views, 63 Symbols volume names, 58 * wildcard character, 268 BACKUPSWAP parameter, 228 900, File code, 63 BACKUPSYSTEM network attribute, 296 ? wildcard character, 268 BACKUPSYSTEM parameter, 212 ] prompt, 99 Bracket prompt (]), 99 Abbreviations, 203, 350 Catalog changes ADD command, 193, 349 NonStop SQL/MP, 160 ADD EXTRACTOR command, 88, 92...
  • Page 470 VALIDATE CONFIGURATION, 258, 356 Databases RDFSCAN backing up altered structures, 159 AT, 262, 357 Enscribe file-label modifications, 164 DISPLAY, 262 NonStop SQL/MP EXIT, 263, 357 backing up altered structures, 160 FILE, 264, 357 catalog changes, 160 HELP, 265, 357 DDL operations, 160 LIST, 265, 357 partition key changes, 163 LOG, 266, 357...
  • Page 471 Error messages, file system, 366 exception, examining, 362 Error recovery label modifications, 64 create operation, 123 log, 38, 261 modify operation, 122 OBEY command, 103, 360 open operation, 122 partitioned, 63 RDF error 700, modify operation, 122 placement of partitions, 65 RDF error 705, open operation, 122 RDF requirements, 59 RDF error 739, create operation, 123...
  • Page 472 TMF, 78 configuration, 224, 225, 231, 235, 352 INITTIME parameter, 81, 213 object code file, 75 Installing the RDF subsystem, 75 parameters, 91, 360 adding to configuration file, 193, 349 altering, 196 Keywords, 103 displaying configuration values, 206, 351 displaying option values, 239, 355 INFO MONITOR example, 210 Label modifications, file, 64 resetting option values, 220, 352...
  • Page 473 backup system, 71, 74 preparing for RDF installation, 69 synchronizing databases with, 71 processes, 41 OBEYFORM option, 206 RDF requirements, 57 of INFO command, 96 Primary system failure, stopping the backup system OBEYVOL command, 218 before restarting the primary system, 132 ODBC catalog changes, 160 PRIMARYSWAP parameter, 228 Offline synchronization for a single partition, 330...
  • Page 474 log device for messages, 365 RDF/ZLT product components, 76 log file, 38, 261 RDFCHEK log file example, 365 file comparison utility, 75 managing, 99 licensed program, 76 messages, 365, 366 RDFCOM messages, scanning, 39, 118 command summary, 103 network transactions, 295 command syntax, 99, 101 NonStop process pairs, 41 commands...
  • Page 475 RDFNETO, security requirements, 77 Recompiling programs, 74 RDFRCVO Reload of backup database, 62 licensed program, 76 REMOTECONTROLSUBVOL network attribute, 297 receiver object file, 75 REMOTECONTROLSUBVOL parameter, 197 security requirements, 77 REMOTESYS parameter, 197 RDFSCAN Replicating database operations, 64 description, 261 Replication description of use, 39, 118 file-level, 279...
  • Page 476 SQL/MX offline synchronization for a single partition, placement of partitions, 65 preparing for RDF protection, 70 SQL/MX tables purges, 163 comparing, 335 TACL macros restoring, 333 backup system, 71 START RDF command, 97, 242, 355 RDFINST for RDF installation, 75 START TMF command, TMFCOM, 97 TAKEOVER command, 255, 356 START TRANSACTION command, TMFCOM, 74, 78...
  • Page 477 SET VOLUME example, 239 setting option values, 236 SHOW VOLUME example, 241 partitioned files, auditing, 48 RDF errors, 121 restart point, 48 restart points, error recovery, 121 Updater, failure, 127 UPDATERDELAY parameter, 228 UPDATEVOLUME parameter, 236 User interfaces, RDF subsystem, 38 VALIDATE CONFIGURATION command, 258, 356 Views, NonStop SQL/MP, 63, 70 Volume...

This manual is also suitable for:

Nonstop rdf h-series rvusNonstop rdf

Table of Contents