beautypg.com

7 data protection operations with raid manager, 8 examples of using raid manager commands – HP XP P9500 Storage User Manual

Page 6

background image

Commands to control Auto LUN.........................................................................................143
Relations between “cc” command issues and status..............................................................146
Restrictions for Auto LUN...................................................................................................147

Continuous Access Journal MxN configuration and control.........................................................147

Overview........................................................................................................................147
Policy ............................................................................................................................148
horcm.conf......................................................................................................................148
Command specifications...................................................................................................149

pairdisplay command..................................................................................................149
pairsplit command......................................................................................................150

Notice on system operation...............................................................................................152
Configuration examples....................................................................................................153

Remote volume discovery.......................................................................................................155

Discovering a remote volume.............................................................................................156

7 Data protection operations with RAID Manager..........................................158

Data protection operations.....................................................................................................158

Data Retention.................................................................................................................158

Restrictions on Data Retention volumes...........................................................................159

Database Validator..........................................................................................................159

Restrictions on Database Validator.................................................................................160

Protection parameters and operations......................................................................................161
Data Protection facility...........................................................................................................161

Data Protection Facility specifications..................................................................................162
Examples for configuration and protected volumes...............................................................162
Target commands for protection.........................................................................................163
permission command.......................................................................................................164
New options for security...................................................................................................164

raidscan –find inst.......................................................................................................164
raidscan –find verify [MU#]..........................................................................................164
raidscan –f[d].............................................................................................................165
pairdisplay –f[d].........................................................................................................165

Permitting protected volumes..............................................................................................165

With a $HORCMPERM file...........................................................................................165
Without a $HORCMPERM file: Commands to run on different operating systems.................166

Environment variables.......................................................................................................167

$HORCMPROMOD....................................................................................................167
$HORCMPERM..........................................................................................................167

Determining the protection mode command device...............................................................167

8 Examples of using RAID Manager commands............................................168

Group version control for mixed storage system configurations....................................................168
LDM volume discovery and flushing for Windows.....................................................................168

Volume discovery function.................................................................................................169
Mountvol attached to Windows systems..............................................................................170
System buffer flushing function...........................................................................................171

Special facilities for Windows systems.....................................................................................173

Signature changing facility for Windows systems.................................................................173
GPT disk for Windows......................................................................................................175
Directory mount facility for Windows systems.......................................................................175

Host group control................................................................................................................177

Specifying a host group....................................................................................................177
Commands and options including a host group...................................................................178

Using RAID Manager SLPR security.........................................................................................178

Specifying the SLPR Protection Facility.................................................................................179
SLPR configuration examples.............................................................................................180

6

Contents

This manual is related to the following products: