Creating an independent snapshot of the, Target system, Rget. see – HP Integrity NonStop H-Series User Manual
Page 312: Creating an independent, Snapshot of the target system, Creating an, Independent snapshot of the target system
Managing DSM/SCM
DSM/SCM User’s Guide — 529846-014
17 - 19
Creating an Independent Snapshot of the Target
System
When the Verify Database request finishes successfully, DSM/SCM displays an
informational message.
Creating an Independent Snapshot of the Target System
A snapshot of a target system provides current target database information to transfer
to the host system and receive into the host database. With current information about
the target contents, DSM/SCM can keep the host and target databases synchronized,
which is crucial to effective system configuration management. You should create a
snapshot after most DSM/SCM tasks on a target. A snapshot includes:
The physical target name
The SYSnn and configuration name of each logical target on the target system
The TSV locations associated with each logical target
File attributes, including fingerprints of each managed file on the target system
Activity records from the target system
The target’s EMS messages
Target system profile information
Disk and tape device locations on the target system
Name and timestamp of when the snapshot was generated
If you submit a Build/Apply request, a snapshot is automatically created, transferred to
the host system, and received into the host database. The planner might request an
independent snapshot for one of these reasons:
Software on the target system has changed outside of a Build/Apply.
The host snapshot is lost or corrupted.
Note. If $DATA00 is a scratch volume, Verify Database stops in restartable mode giving
an EMS message that no scratch volumes are configured on the target system.
Define at least one scratch volume using the Target Maintenance and restart the Verify
Database activity.
After successful completion of Verify Database, update the volume usage information
using the ZPHIHMI also.
If $DATA00 is an archive volume, after successful completion of Verify Database, update
the volume usage information using the ZPHITMI and ZPHIHMI.
For more information, see
Note. When it receives a snapshot from a target system, DSM/SCM creates a configuration
report that lists each logical target, its products, and SPRs applied to the products on the
target. DSM/SCM then notifies the OSM application, which in turn creates a Software
Configuration Incident report and delivers it to the GCSC.