beautypg.com

Creating an independent snapshot of the target, Creating an independent snapshot, Creating an independent – HP Integrity NonStop H-Series User Manual

Page 157

background image

1.

At the ZPHITI main menu, enter 5 (Perform database verify) in the Selection number field, and
press F1. DSM/SCM displays the Verify Database - Submit Request screen.

2.

From the Verify Database - Submit Request screen, press F1 to submit the request. DSM/SCM
displays the Processing Verification screen, which shows status information about the progress
of the request:

The screen is updated with current status information every 15 seconds.

While waiting for the request to finish, to view current request-related EMS messages,
press F4.

You cannot submit any other DSM/SCM requests while a Verify Database request is
running.

When the Verify Database request finishes successfully, DSM/SCM displays an informational
message.

NOTE:

If $DATA00 is a scratch volume, Verify Database stops in restartable mode giving

an EMS message that no scratch volumes are configured on the target system.

Define at least one scratch volume using the Target Maintenance and restart the Verify Database
activity.

After successful completion of Verify Database, update the volume usage information using
the ZPHIHMI also.

If $DATA00 is an archive volume, after successful completion of Verify Database, update the
volume usage information using the ZPHITMI and ZPHIHMI.

For more information, see

“Updating the Volume Usage” (page 151)

.

Creating an Independent Snapshot of the Target System

A snapshot of a target system provides current target database information to transfer to the host
system and receive into the host database. With current information about the target contents,
DSM/SCM can keep the host and target databases synchronized, which is crucial to effective
system configuration management. You should create a snapshot after most DSM/SCM tasks on
a target. A snapshot includes:

The physical target name

The SYSnn and configuration name of each logical target on the target system

The TSV locations associated with each logical target

File attributes, including fingerprints of each managed file on the target system

Activity records from the target system

The target’s EMS messages

Target system profile information

Disk and tape device locations on the target system

Name and timestamp of when the snapshot was generated

Managing NonStop Software Management Databases

157

This manual is related to the following products: