Sign In
Upload
Manuals
Brands
HP Manuals
Software
NonStop RDF
User Manuals: HP NonStop RDF Data Replication Software
Manuals and User Guides for HP NonStop RDF Data Replication Software. We have
1
HP NonStop RDF Data Replication Software manual available for free PDF download: Management Manual
Hp NonStop RDF Management Manual (478 pages)
for J-series and H-series RVUs
Brand:
Hp
| Category:
Software
| Size: 4.04 MB
Table of Contents
Table of Contents
3
About this Document
23
Supported Release Version Updates (Rvus)
23
Intended Audience
23
New and Changed Information in this Edition
23
New Features in the RDF 1.9 Manual
23
Updates in the RDF 1.9 Manual
24
Document Organization
24
RDF States
24
RDFSCAN Commands
25
Notation Conventions
26
General Syntax Notation
26
Notation for Messages
28
Related Information
29
Publishing History
30
HP Encourages Your Comments
30
1 Introducing RDF
31
RDF Subsystem Overview
32
Basic RDF Configuration
33
Unplanned Outages with ZLT
34
Unplanned Outages Without ZLT
34
Audit Records at the Time of a Primary System Failure
34
Planned Outages
35
Features
35
RDF Topologies
37
User Interfaces
38
RDFCOM for Subsystem Management and Operations
38
Scanning the EMS Event Log
38
RDF Tasks
39
RDF Processes
40
RDF Tasks to Maintain a Copy of a Database
40
Primary System Processes
41
RDF Subsystem Processes
41
Backup System Processes
42
RDF Operations
42
Extractor Process
42
Monitor Process
42
Extractor Process Operation
43
Receiver Process
44
Sorted Image Trails
45
Receiver Process Operation
45
RDF Control Points
46
RDFNET Process
46
Updater Processes
46
Audited Database Files
47
Partitioned Files, Alternate Key Files, and Indexes
48
REDO Pass
48
Restart Information
48
UNDO Pass
48
File System Errors Involving Data Files
49
Purger Process
49
RTD Times
49
Reciprocal and Chain Replication Require Mutually Exclusive Datavols
50
Chain Replication
51
Invalid Chain Replication
51
Available Types of Replication to Multiple Backup Systems
52
RDF Control Subvolume
53
Other RDF Features
53
Loopback Configuration (Single System)
53
Triple Contingency
53
Configurable Software Location
54
Online Database Synchronization
54
Online Dumps of the Backup Database
54
Online Product Initialization
54
Shared Access DDL Operations
54
Subvolume-Level and File-Level Replication
54
EMS Support
55
Process-Lockstep Operation
55
RTD Warning Thresholds
55
SMF Support
55
Support for Network Transactions
55
Monitoring RDF Entities with ASAP
56
RDF and Nonstop SQL/MX
56
Zero Lost Transactions (ZLT)
56
2 Preparing the RDF Environment
57
Configuring Hardware for RDF Operations
57
Primary System Configuration
57
Backup System Configuration
57
RDF Hardware Requirements
57
Disk Volume Limit
58
Volume-To-Volume Mapping
58
Subvolume-To-Subvolume Name Mapping
58
Expand (Data Communication) Resources
58
Preparing Software and Database Files for RDF Operations
59
Audittrail Buffer
60
Configuring TMF for RDF Operations on the Primary System
60
Software Requirements
60
TMF Configuration with Dump Process on the Primary System
61
TMF Configuration Without Dump Process on the Primary System
61
Configuring TMF for RDF Operations on the Backup System
61
Preparing Databases for RDF Protection
62
Audited Backup Database Files
62
Audited Files Per Volume on Primary System
62
Disk Process Pins on Database Volumes
62
Reload of Backup Database
62
Database Block Sizes and Cache on the Backup System
63
DSM Catalogs and File Code 900
63
Partitioned Tables and Files
63
Specifying System Generation Parameters for an RDF Environment
63
Views on the Backup System
63
Designing Transactions for RDF Protection
64
Enscribe File-Label Modifications
64
Nonstop SQL DDL Operations
64
Purge Operations
64
Replicating Database Operations
64
Partitioned Files
65
Temporary Disk Files
65
Using SMF with RDF
65
Configuring an SMF Environment on the Backup RDF System
66
Configuring an SMF Environment on the Primary System
66
3 Installing and Configuring RDF
69
Preparing the Primary System
69
Stopping the Software
69
Preparing the Tables and Files
69
Compressing Audit Data for Tables and Files
70
Separating Nonstop SQL Tables
70
Preparing the Backup System
70
Synchronizing the Primary and Backup Databases
71
Re-Creating an Empty Database with an OBEY Command
71
Synchronizing Databases with SQLCI Commands
72
Synchronizing Databases with BACKUP and RESTORE Utilities
73
Synchronizing Databases with FUP
74
Synchronizing Partitioned Files
74
Backing up Application Programs and Files
74
Cache for RDF IMAGETRAILS and UPDATER UPDATEVOLUMES
74
Installing RDF
75
RDF/IMP (T0346) Product Components
75
RDF/IMPX (T0347) Product Components
75
RDF/ZLT (T0618) Product Components
76
Process-Lockstep Gateway (T1226) Product Components
76
Component Licensing
76
Security Guidelines
76
RDF Process and Program Security Attributes
76
Using the OWNER Attribute to Allow Super Group Users to Start, Stop, and Manage RDF
78
Initializing and Configuring TMF
78
TMF Subsystem Not Running Previously
78
TMF Subsystem Running Previously
79
Initializing and Configuring RDF
79
Initializing RDF
79
Initializing RDF to a TMF Shutdown Timestamp
80
Initializing RDF Without any Timestamp Option
80
Initializing RDF Without Stopping TMF (Using INITTIME Option)
80
Determining a Valid Inittime Value
81
Enscribe Create Records
81
Special Considerations
81
Stop-RDF-Updater Records
81
Online Installation and Initialization Without Stopping RDF
82
TMF Shutdown Records
82
Considerations
83
Disaster Points
83
Configuring RDF
84
LOGFILE Attribute
85
Setting Global Attributes
85
UPDATERDELAY Attribute
85
SOFTWARELOC Attribute
86
UPDATEROPEN Attribute
86
UPDATERRTDWARNING Attribute
86
UPDATERTXTIME Attribute
86
LOCKSTEPVOL Attribute
87
NETWORK Attribute
87
NETWORKMASTER Attribute
87
REMOTE MIRROR Attribute
87
REPLICATEPURGE Attribute
87
UPDATEREXCEPTION Attribute
87
OWNER Attribute
88
REMOTE STANDBY Attribute
88
Setting Image Trail Attributes
88
Dedicated Image Trails or Image Trails on Updatevolumes
89
Setting Trigger Attributes
89
PRIMARYSYSTEM Attribute
90
Setting Network Configuration Record Attributes
90
BACKUPSYSTEM Attribute
91
Monitor Process
91
PNETTXVOLUME Attribute
91
RDFNET Process
91
REMOTECONTROLSUBVOL Attribute
91
Setting Individual Process Attributes
91
Extractor Process
92
Receiver Process
93
Purger Process
94
Updater Processes
95
Configuration File Compatibility
96
Creating a Configuration Command File
96
Enabling RDF Operations
97
Starting RDF
97
Starting TMF
97
Restarting the Applications
98
4 Operating and Monitoring RDF
99
Running RDFCOM
99
Command Syntax for Starting an RDFCOM Session
99
Using RDFCOM Interactively
100
Starting a Session
100
Ending a Session
101
Interrupting Command Processing
101
Using RDFCOM Noninteractively (Without an in File)
102
Using RDFCOM from a Command File (in File)
102
Using Scripts for Easy and Fast RDF Initialization and Configuration
103
Managing Multiple RDF Environments from One RDFCOM Session
104
Controlling Multiple RDF Environments Running on Different Nodes with a Single Obey File
104
Using RDFCOM Commands
105
Configuration Commands
105
RDFCOM Configuration Commands
105
Operational Commands
106
Utility Commands
106
RDFCOM Operational Commands
106
RDFCOM Utility Commands
106
Entering Commands
107
Requesting Online Help
107
Help for Command Syntax
107
Help for RDF Error Messages
108
Running RDFSCAN
109
Command Syntax for Starting an RDFSCAN Session
109
Starting a Session
109
Using RDFSCAN
109
Ending a Session
110
Using RDFSCAN Commands
110
Help for Command Syntax
111
Requesting Online Help
111
Introductory Usage Information
112
Performing Routine Operational Tasks
112
Displaying Current Operating Statistics and Configuration Information
112
RDF States
113
Main STATUS RDF Display
114
Changing Configuration Attributes
116
Using RDF Status Data to Control TMF Audit Dumping
116
EMS Logs (Collectors)
117
Process Priority
117
Purgetime
117
Retaincount
117
Updaterdelay
117
Updateropen
117
Examining RDF Messages
118
Reading Log Messages
118
Asap
120
5 Critical Operations, Special Situations, and Error Conditions
121
Recovering from File System Errors
121
Recovery from File Modification Failures (RDF Event 700)
122
Recovery from File Open Failures (RDF Event 705)
123
Recovery from File Creation Failures (RDF Event 739)
123
Handling Disk Space Problems
124
Exceeding the Maximum Number of Concurrent File Opens
125
Responding to Operational Failures
125
Communication Line Failures
126
System Failures
126
Extractor Failure
127
Processor Failures
127
Receiver Failure
127
Updater Failure
127
Problems Involving TMF
128
Purger Failure
128
RDF State Transition Failure
128
RDFNET Failure
128
TMF Audited Volume Failure
128
TMF Subsystem Failure on the Primary System
128
TMF Subsystem Failure on the Backup System
129
Volume Recovery Failure
129
Volume Recovery Processing
129
File Recovery on the Backup System
130
File Recovery on the Primary System
130
Audit Trails Pinned by RDF on the Primary System
131
TMFCOM ABORT TRANSACTION with AVOIDHANGING Option on Primary System
131
Stopping RDF
132
Stopping RDF by Stopping TMF
133
Stopping RDF from the Backup System
134
Stopping RDF from the Primary System
134
Stopping RDF Using STOP RDF, DRAIN
135
Stopping RDF Using STOP RDF, REVERSE Operation
135
Restarting RDF
136
Carrying out a Planned Switchover
136
Standard Configurations
136
Reciprocal Configurations and Switchover
137
Using STOP RDF, REVERSE and the REVERSE Trigger
137
Takeover Operations
139
Phase One Undo Pass
139
The RDF Takeover Operation
139
Issuing the TAKEOVER Command
140
Phase Three Undo Pass
140
Phase Two Undo Pass
140
Issuing the TAKEOVER Command in an Obey File
142
Monitoring Takeover Outcome
142
Checking Exception Files for Uncommitted Transactions
143
Monitor Considerations
143
Takeover and Triple Contingency
143
Takeover Failure
143
Updater Considerations
143
How to Plan for the Fastest Movement of Business Operations to Your Backup System after Takeover
144
Restoring the Primary System
147
Offline Method of Resynchronizing the Primary Database
148
Online Method of Resynchronizing the Primary Database
148
Reading the Backup Database (BROWSE Versus STABLE Access)
149
Near Real Time Read Access to Updates on the Primary System
149
Access to Backup Databases with Stable Access
150
STOP UPDATE to a Timestamp
150
Stopping TMF on the Primary System
150
Using the STOP RDF, DRAIN Command
150
RDF and Nonstop SQL DDL Operations
151
Performing Nonshared Access DDL Operations
152
Performing Shared Access DDL Operations
152
Network Configurations and Shared Access Nonstop SQL DDL Operations
153
RDF and Nonstop SQL/MX Operations
153
Backing up Image Trail Files
153
TMF and Online Dumps on the Backup System
154
Doing FUP RELOAD Operations with Updaters Running
155
Exception File Optimization
155
Switching Disks on Updater UPDATEVOLUMES
155
Online Remirroring of Updater SUBVOLUMES
156
6 Maintaining the Databases
157
Understanding Database States
157
Synchronized Databases before Starting RDF
157
Synchronized Databases During RDF Operations
158
Synchronized Databases, no Outstanding Audit
158
Making Changes to Database Structures
159
Synchronized Databases after STOP TMF Command
159
Unsynchronized Databases
159
Nonstop SQL/MP or Nonstop SQL/MX Databases
160
Catalog Changes
160
DDL Operations
160
With Shared Access
160
Adding a New Column
161
Without Shared Access
161
Example for CREATE INDEX with Shared Access
162
Guidelines for Create Index and Alter Table Move Operations
162
Multiple Indexes on a Single Base Table
162
Partition Key Changes
163
Table Purges
163
Enscribe Databases
164
The STOP RDF DRAIN Method
164
The STOP TMF Method
164
Resynchronizing Databases
164
Resynchronizing Entire Databases Offline
165
Resynchronizing Individual Volumes, Tables, and Files Offline
165
Resynchronizing Individual Tables or Files Offline
166
7 Online Database Synchronization
167
Overview
167
Synchronizing Entire Databases Online
168
Considerations When Synchronizing Entire Databases
169
Duration and Preparation Issues
170
Enscribe Create Records
170
Stop-RDF-Updater Records
170
SYNCHDBTIME Issues
170
CREATE/LOAD Issues (Step 4, Method 1)
171
General Considerations for Enscribe Files
171
TMF Shutdown Records
171
Enscribe Queue File Issues
172
General Considerations for Nonstop SQL Tables
172
Special Consideration for Enscribe Files
172
Different Nonstop SQL Product Versions
173
Moving Duplicated Tables and Files to the Backup System
173
Example of Synchronizing an Entire Database Online
174
Synchronizing Selected Database Portions Online
176
Overview
176
Example #1 - Staged Synchronization of an Entire Database
176
Example #2 - Synchronization of an Individual Volume
176
Example #3 - Synchronization of an Individual File or Partition on a Volume
176
Partial Database Synchronization Issues
177
Enscribe Files with Partitions
177
Enscribe Files Without Partitions
177
Entry-Sequenced Files
177
Key-Sequenced and Relative Files
177
Key-Sequenced Files with Create/Load (Step 4, Method 1)
177
Entry-Sequenced Files
178
Key-Sequenced Files with FRNL (Step 4, Method 2)
178
Nonstop SQL/MP and Nonstop SQL/MX Tables Without Partitions
178
Relative Files with Create/Load (Step 4, Method 1)
178
Relative Files with FRNL (Step 4, Method 2)
178
Tables with SYSKEY or Clustering Keys
178
Tables Without SYSKEY and Clustering Keys
178
Nonstop SQL/MP and Nonstop SQL/MX Tables with Partitions
179
Requirements for Synchronization of Individual Partitions
179
Key-Sequenced Tables
180
Relative Tables
181
Nonstop SQL/MP and Nonstop SQL/MX Indexes (with or Without Partitions)
183
Phases of Online Database Synchronization
183
Extractor Phases
183
Phase 1, Part 1
183
Phase 1, Part 2
183
Phase 1, Part 3
183
Phase 2
184
Updater Phase 2
184
Extractor Restart Considerations During Online Database Synchronization
184
Determining When Online Database Synchronization Is Complete
184
Extractor Messages
184
Updater Messages
184
8 Entering RDFCOM Commands
187
Elements of RDFCOM Command Descriptions
187
Purpose, Syntax, and Attributes
187
Where Issued
187
Security Restrictions
187
RDF State Requirement
188
Usage Guidelines
188
Systems for RDFCOM Commands
188
Default User Security for RDFCOM Commands
189
Output Displayed
190
Examples
190
RDFCOM-Related Filenames and Process Identifiers
190
Reserved File Names
191
Disk File Names
191
Nondisk Device Names
191
Process File Names
192
RDFCOM Commands
192
Add
193
RDF State Requirement
193
Security Restrictions
193
Where Issued
193
Examples
194
Usage Guidelines
194
Alter
195
Examples
196
RDF State Requirement
196
Security Restrictions
196
Usage Guidelines
196
Where Issued
196
Copyaudit
197
RDF State Requirement
197
Security Restrictions
197
Usage Guidelines
197
Where Issued
197
COPYAUDIT Restartability
198
Example
199
Delete
199
Where Issued
199
Examples
200
RDF State Requirement
200
Security Restrictions
200
Usage Guidelines
200
Exit
201
Example
201
RDF State Requirement
201
Security Restrictions
201
Usage Guidelines
201
Where Issued
201
Examples
202
RDF State Requirement
202
Security Restrictions
202
Usage Guidelines
202
Where Issued
202
Help
203
Security Restrictions
203
Where Issued
203
Examples
204
RDF State Requirement
204
Usage Guidelines
204
History
205
Examples
205
RDF State Requirement
205
Security Restrictions
205
Where Issued
205
Info
206
RDF State Requirements
207
Security Restrictions
207
Usage Guidelines
207
Where Issued
207
Examples
208
INFO * Command
208
Output Displayed
208
INFO EXTRACTOR Command
209
INFO EXTRACTOR Command with OBEYFORM Option
209
INFO MONITOR Command
210
INFO RDF Command
210
INFO VOLUME Command
210
INFO PURGER Command
211
INFO TRIGGER Command
211
INFO NETWORK Command
212
INFO RDFNET Command
212
INFO TRIGGER Command with OBEYFORM Option
212
Initialize Rdf
212
RDF State Requirement
215
Security Restrictions
215
Usage Guidelines
215
Where Issued
215
Examples
217
Obey
217
RDF State Requirement
217
Security Restrictions
217
Where Issued
217
Example
218
Open
218
RDF State Requirement
218
Security Restrictions
218
Usage Guidelines
218
Where Issued
218
Examples
219
Out
219
Examples
220
RDF State Requirement
220
Reset
220
Security Restrictions
220
Usage Guidelines
220
Where Issued
220
RDF State Requirement
221
Security Restrictions
221
Usage Guidelines
221
Where Issued
221
Examples
222
Set Extractor
222
RDF State Requirements
223
Security Restrictions
223
Usage Guidelines
223
Where Issued
223
Examples
223
Set Imagetrail
224
Usage Guidelines
224
Set Monitor
224
Where Issued
225
Security Restrictions
225
RDF State Requirements
225
Usage Guidelines
225
Example
225
Set Network
225
Where Issued
226
Security Restrictions
226
RDF State Requirements
226
Usage Guidelines
226
Example
226
Set Purger
226
Where Issued
228
Security Restrictions
228
RDF State Requirements
228
Usage Guidelines
228
Example
228
Set Rdf
228
Where Issued
231
Security Restrictions
231
RDF State Requirements
231
Usage Guidelines
231
Set Rdfnet
231
Where Issued
232
Security Restrictions
232
RDF State Requirements
232
Usage Guidelines
232
Example
232
Set Receiver
232
Where Issued
234
Security Restrictions
234
RDF State Requirements
234
Usage Guidelines
234
Examples
234
Set Trigger
235
Where Issued
235
Security Restrictions
236
RDF State Requirements
236
Usage Guidelines
236
Example
236
Set Volume
236
Where Issued
238
Security Restrictions
238
RDF State Requirements
238
Usage Guidelines
238
Examples
239
Show
239
Where Issued
240
Security Restrictions
240
RDF State Requirements
240
Usage Guidelines
240
Examples
240
Output Displayed
240
SHOW RDF Command
240
SHOW PURGER Command
241
SHOW RECEIVER Command
241
SHOW VOLUME Command
241
SHOW NETWORK Command
242
SHOW RDFNET Command
242
SHOW TRIGGER Command
242
Start Rdf
242
RDF State Requirement
243
Security Restrictions
243
Usage Guidelines
243
Where Issued
243
Example
244
Examples
244
RDF State Requirement
244
Security Restrictions
244
Start Update
244
Status
244
Usage Guidelines
244
Where Issued
244
RDF State Requirement
245
Security Restrictions
245
STATUS RDF Command Output Display
245
Usage Guidelines
245
Where Issued
245
Name
247
RDF Process
247
RTD Time
247
Pri
248
Volume and Seqnce
248
Cpus
249
Error
249
Special Messages
249
Examples
250
Stop Rdf
250
Where Issued
250
RDF State Requirement
251
Security Restrictions
251
Usage Guidelines
251
Examples
252
RDF State Requirement
252
Security Restrictions
252
Stop Synch
252
Where Issued
252
Example
253
RDF State Requirement
253
Security Restrictions
253
Stop Update
253
Usage Guidelines
253
Where Issued
253
Examples
254
Usage Guidelines
254
Security Restrictions
255
Takeover
255
Usage Guidelines
255
Where Issued
255
Example
257
Limitation
257
Security Restrictions
257
Unpinaudit
257
Where Issued
257
Example
258
RDF State Requirement
258
Security Restrictions
258
Usage Guidelines
258
Validate Configuration
258
Where Issued
258
Example
259
9 Entering RDFSCAN Commands
261
About the EMS Log
261
Elements of RDFSCAN Command Descriptions
261
RDFSCAN Commands
262
Usage Guidelines
262
Examples
262
Display
262
Examples
263
Usage Guidelines
263
Exit
263
Examples
264
File
264
Usage Guidelines
264
Help
265
Examples
265
Usage Guidelines
265
List
265
Examples
266
Output Displayed
266
Log
266
Examples
267
Output Displayed
267
Usage Guidelines
267
Match
267
Examples
268
Nolog
268
Pattern Matching Symbols in RDFSCAN
268
Usage Guidelines
269
Examples
269
Scan
269
10 Triple Contingency
271
Overview
271
Requirements
271
How Triple Contingency Works
271
Hardware Requirements
272
Software Requirements
272
The RETAINCOUNT Configuration Parameter
273
The COPYAUDIT Command
274
COPYAUDIT Restartability
275
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails
275
Triple Contingency Without ZLT
275
Using ZLT to Achieve the same Protection
276
RDFZLT with Triple Contingency
276
Summary
277
1 Subvolume-Level and File-Level Replication
279
INCLUDE Clauses
279
EXCLUDE Clauses
279
Wildcard Character (*)
280
Within Subvolume Names
280
Within Filenames
280
INCLUDE/EXCLUDE and RDFCOM In-Memory Table
280
INCLUDE and EXCLUDE Processing
281
INCLUDEPURGE and EXCLUDEPURGE
281
Error Checking
282
Performance Ramifications
282
Summary Examples
282
12 Subvolume Name Mapping
285
Creating a Mapfile to Define the Rules for Subvolume Name Mapping
285
Rules for Creating Mapfile Mapping Strings
285
How an Updater Manages Filename Collisions
286
Creating a Maplog to Log Subvolume Name Mapping
287
Adding a Mapfile and Maplog to an Updater's Configuration Record
288
Managing Subvolume Name Mapping for Partitioned Files
288
13 Auxiliary Audit Trails
291
Auxiliary Extractor
291
Auxiliary Receiver
291
Configuring Extractors and Receivers
291
Error Conditions
291
Configuring Image Trails
292
Configuring Updaters
292
Error Conditions
292
Ramifications for STOP TMF, Stop-Update-To-Time, and SQL Shared Access DDL Ops
292
Takeover Ramifications
293
Usage of Master and Auxiliary Audit Trails
293
Using Expand Multi-CPU Paths
293
14 Network Transactions
295
Configuration Changes
295
NETWORK Attribute
295
NETWORKMASTER Attribute
296
Network Configuration Record
296
BACKUPSYSTEM Network Attribute
296
PRIMARYSYSTEM Network Attribute
296
Adding the Network Record
297
PNETTXVOLUME Network Attribute
297
REMOTECONTROLSUBVOL (RCSV) Network Attribute
297
RDF Network Synchronizer (RDFNET) Process
297
RDF Network Control Files
297
Normal RDF Processing Within a Network Environment
297
RDF Takeovers Within a Network Environment
298
Takeover Phase 1 - Local Undo
298
Takeover Phase 2 - File Undo
298
Takeover Phase 3 - Network Undo
298
Takeover Phase 3 Performance
299
Communication Failures During Phase 3 Takeover Processing
299
Takeover Delays and Purger Restarts
299
Takeover Restartability
299
Takeover and File Recovery
300
The Effects of Undoing Network Transactions
300
Takeover and the RETAINCOUNT Value
302
Network Configurations and Shared Access Nonstop SQL/MP DDL Operations
303
Network Validation and Considerations
303
RDF Reinitialization in a Network Environment
303
Network Master Subsystem Initialization
303
Non-Network Master Subsystem Initialization
303
RDF Networks and ABORT or STOP RDF Operations
304
RDF Networks and Stop-Update-To-Time Operations
304
Sample Configurations
305
Sample Network Master Configuration
305
Sample Non-Network Master Configuration
306
RDFCOM STATUS Display
307
15 Process-Lockstep Operation
309
Starting a Lockstep Operation
309
The Dolockstep Procedure
310
Including the Dolockstep in COBOL85 Applications
310
Invoking Dolockstep by Way of tal
310
Dolockstep Execution
310
The Lockstep Transaction
311
RDF Lockstep File
311
Multiple Concurrent Lockstep Operations
312
Lockstep and Auxiliary Audit Trails
312
The Lockstep Gateway Process
312
Name
312
Program
312
Startupmsg
313
Autorestart
313
Disabling Lockstep
313
Reenabling Lockstep
313
Lockstep Performance Ramifications
313
Lockstep and Auxiliary Audit Trails
314
Lockstep and Network Transactions
314
Lockstep Gateway Event Messages
314
16 Nonstop SQL/MX and RDF
323
Including and Excluding SQL/MX Objects
323
Creating Nonstop SQL/MX Primary and Backup Databases
323
Creating a Nonstop SQL/MX Backup Database from an Existing Primary Database
326
Online Database Synchronization with Nonstop SQL/MX Objects
328
Creating the Fuzzy Copy on the Primary System
328
Creating the Fuzzy Copy on the Backup System
330
Offline Synchronization for a Single Partition
330
Directly from the Primary to the Backup
330
Indirectly from the Primary to the Backup by Way of a Temporary File
331
Backup Partition Does Not Already Exist
331
Online Synchronization for a Single Partition
331
Correcting Incorrect Nonstop SQL/MX Name Mapping
332
Primary and Backup ANSI Catalog Are the same
332
Primary and Backup ANSI Schema Names Are Not the same
332
Schema Subvolume Names Are Not the same
332
Guardian Filename Is Incorrect for Partition
332
Consideration for Creating Backup Tables
333
Restoring to a Specific Location
333
Example
333
Comparing Nonstop SQL/MX Tables
335
17 Zero Lost Transactions (ZLT)
337
How It Works
337
ZLT Configuration with a Single Standby/Backup System
338
ZLT Configuration with a Single Standby/Backup System and with the Remote Mirror Located at an Intermediate Site
338
ZLT Configuration with Standby and Backup Systems Located at Separate Sites
339
Using Commitholdmode
340
Hardware Setup
340
Assigning Cpus on the Standby System
340
RDF Configuration Attributes
341
Extractor Audit-Trail Configuration
341
RDF Configuration Record Validation
341
RDF Remote Mirror Configuration
341
RDF Remote Standby Configuration
341
ALTER RDF Remote Mirror Configuration
342
ZLT Takeover Operations
342
Phase 1 (ZLT Processing)
342
Error Conditions
343
Phase 2 (Takeover Processing)
343
Status Rdf
343
The Audit-Fixup Process
343
ZLT Events
343
Old Audit-Trail Files
344
RDFCOM INFO and SHOW Commands
344
Recovering the Primary System after an RDF ZLT Takeover
344
ZLT and RDF Networks
346
STOP TMF Operations
346
During Normal Operations
346
During ZLT Takeover Processing
346
SQL Shared Access DDL Operations
347
A RDF Commands Quick Reference
349
RDFCOM Run Syntax
349
RDFCOM Commands Quick Reference
349
Add
349
Alter
349
Copyaudit
350
Delete
350
Exit
350
Help
350
History
350
Info
351
Initialize Rdf
351
Obey
351
Open
351
Out
351
Reset
352
Set Extractor
352
Set Imagetrail
352
Set Monitor
352
Set Network
353
Set Purger
353
Set Rdf
353
Set Rdfnet
354
Set Receiver
354
Set Trigger
354
Set Volume
354
Show
355
Start Rdf
355
Start Update
355
Status
355
Stop Rdf
356
Stop Synch
356
Stop Update
356
Takeover
356
Unpinaudit
356
Validate Configuration
356
RDFSCAN Commands Quick Reference
357
Display
357
Exit
357
File
357
Help
357
List
357
Log
357
Match
357
Nolog
358
Scan
358
File Names and Process Identifiers
358
Reserved File Names
358
Disk File Names
358
Nondisk Device Names
358
Process File Names
358
B Additional Reference Information
359
Default Configuration Parameters
359
Sample Configuration File
360
RDFSNOOP Utility
362
RDF System Files
362
RDF File Codes
364
C Messages
365
About the Message Descriptions
365
RDF Messages
365
RDFCOM Messages
413
RDFSCAN Messages
461
D Operational Limits
463
Operational Limits for RDF/IMP, IMPX, and ZLT
463
E Using ASAP
465
Architectural Overview
465
Installation
466
Auto Discovery
466
Monitoring Specific RDF Environments
466
The RDF/ASAP Environment
466
Adding and Removing RDF Environments
467
Version Compatibility
467
RDF Metrics Reported by ASAP
467
Index
469
Advertisement
Advertisement
Related Products
HP HP NonStop Data Transformation Engine FTP Adapter
Hp NonStop RDF H-series RVUs
Hp NonStop RDF J-series RVUs
Hp NonStop SQL/MP
Hp NonStop SQL/MX
Hp NonStop SSL
Hp NonStop Pathway/iTS
Hp NonStop TMF
HP NonStop Transformation Engine
HP NonStop SQL/MX 3.0
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL