Host and target database, Host database, Target database – HP Integrity NonStop H-Series User Manual
Page 22: Nonstop software management security, Host database target database
The archive is located on one or more volumes of the host system. The planner specifies the archive
volumes when configuring NonStop Software Essentials and can add or change volumes using
NonStop Software Essentials.
The software remains in the archive. You can copy software from the archive to update the software
configuration of a system.
Host and Target Database
Each host or target system has one or more SQL databases for storing configuration information.
Each database must be located on a volume that is audited by HP NonStop Transaction
Management Facility (TMF) and has sufficient free space. The volume name, including the dollar
sign, cannot exceed seven characters. To ensure the volume name does not change, do not place
the host or target database on an alternate system disk.
Host Database
The host database must reside on the host system and contains information about requests, software,
snapshots, configurations, and profiles. This information is vital to the operation of NonStop
Software Essentials.
Target Database
Each target database contains information about the files in a logical target, including file names,
attributes, and fingerprints (checksum-type file identifiers).
The target database for the host system is typically kept on the host system in the same volume as
the host database. Target databases should reside on their respective target systems. However,
the target databases also can reside on a different system if it has an Expand connection to that
target system. Moving a target database from one system to another requires running INITENV to
reinitialize the system whose database you are moving. For guidelines on where you should locate
target databases, see
.
Configuring the NonStop Software Management Environment
To plan the organization of systems to be managed by NonStop Software Essentials, see
Planning the NonStop Software Management Environment” (page 41)
. For the procedures for
configuring or reconfiguring the NonStop Software Essentials environment, see
NonStop Software Management Environment”
NonStop Software Management Security
There are three roles for NonStop Software Essentials:
Plans, builds, and applies software configurations. Assumes primary responsibility for the
installation of software using NonStop Software Essentials. The planner must have detailed
Planner
knowledge and understanding of installation procedures and NonStop Software Essentials
operations, as well as software dependencies, softdocs, and the Software Installation and
Upgrade Guide.
Initiates activities on target systems, usually under the direction of the planner. Acts on instructions
from the planner to initiate activities on the target systems. The operator needs only minimal
Operator
understanding and experience with software installation procedures and NonStop software
management operations.
Maintains the NonStop software databases and archive. Maintains security of the NonStop
Software Essentials installation files and files on target systems. Establishes user access permissions
Database
administrator
for target systems. Often installs or updates the configuration of NonStop Software Essentials on
all systems. This person must have an understanding of NonStop software management concepts
and SQL database administration concepts and procedures.
For more information on NonStop software management tasks that each role has permission to
perform and on assigning security settings, see
“Task 3: Planning Users and Security” (page 44)
22
Introduction to the Role of NonStop Software Essentials in NonStop Software Management