beautypg.com

7 data protection operations with raid manager – HP XP RAID Manager Software User Manual

Page 6

background image

Continuous Access Asynchronous, Continuous Access Synchronous, and Continuous Access Journal
volumes..........................................................................................................................138

Sidefile cache for Continuous Access Asynchronous.........................................................140
Continuous Access Asynchronous transition states and sidefile control................................141
Continuous Access Asynchronous/Continuous Access Journal error state.............................142

Continuous Access Synchronous/Continuous Access Asynchronous and Continuous Access Journal
fence level settings...........................................................................................................143

Setting the fence level..................................................................................................144

Snapshot operations.............................................................................................................144

Snapshot volumes............................................................................................................145
Creating a Fast Snap or Snapshot pair...............................................................................145
Snapshot pair status.........................................................................................................146
Pair status relationship to Snapshot commands.....................................................................146

Controlling Auto LUN............................................................................................................147

Specifications for Auto LUN...............................................................................................147
Commands to control Auto LUN.........................................................................................149
Relations between “cc” command issues and status..............................................................151
Restrictions for Auto LUN...................................................................................................153

Continuous Access Journal MxN configuration and control.........................................................153

Overview........................................................................................................................153
Policy ............................................................................................................................154
horcm.conf......................................................................................................................154
Command specifications...................................................................................................155

pairdisplay command..................................................................................................155
pairsplit command......................................................................................................156

Notice on system operation...............................................................................................158
Configuration examples....................................................................................................159

Remote volume discovery.......................................................................................................161

Discovering a remote volume.............................................................................................162

7 Data protection operations with RAID Manager..........................................164

Data protection operations.....................................................................................................164

Data Retention.................................................................................................................164

Restrictions on Data Retention volumes...........................................................................165

Database Validator..........................................................................................................165

Restrictions on Database Validator.................................................................................166

Protection parameters and operations......................................................................................167
Data Protection facility...........................................................................................................167

Data Protection Facility specifications..................................................................................168
Examples for configuration and protected volumes...............................................................168
Target commands for protection.........................................................................................169
permission command.......................................................................................................170
New options for security...................................................................................................170

raidscan –find inst.......................................................................................................170
raidscan –find verify [MU#]..........................................................................................170
raidscan –f[d].............................................................................................................171
pairdisplay –f[d].........................................................................................................171

Permitting protected volumes..............................................................................................171

With a $HORCMPERM file...........................................................................................171
Without a $HORCMPERM file: Commands to run on different operating systems.................172

Environment variables.......................................................................................................173

$HORCMPROMOD....................................................................................................173
$HORCMPERM..........................................................................................................173

Determining the protection mode command device...............................................................173

6

Contents

This manual is related to the following products: