beautypg.com

4 preparing to use business continuity manager – HP XP P9500 Storage User Manual

Page 5

background image

Differences in functionality between NORMAL ATTIME and Cnt Ac-J Z ATTIME Suspend
function..........................................................................................................................105

Functions that acquire volume information................................................................................106

Local scan.......................................................................................................................106
Remote scan....................................................................................................................106
NG scan........................................................................................................................108

Volumes used for NG scans..........................................................................................108
Copy types for which a copy group including Non Gen'ed volumes can be defined............109
Operating a copy group including Non Gen'ed volumes*********................................111
Notes on executing an NG scan...................................................................................112

The Logical Path Control function............................................................................................112

Inter-control unit logical paths............................................................................................113
Inter-disk controller logical paths........................................................................................114

Functions that monitor events and errors...................................................................................115

4 Preparing to use Business Continuity Manager...........................................117

Preparation overview............................................................................................................117
Specifying the Business Continuity Manager Log output destination.............................................118
Setting up Storage Systems....................................................................................................118
Settings in the Set Defaults panel............................................................................................119

Specifying the device address domain ID............................................................................119
Setting a prefix for configuration files..................................................................................120

Creating configuration files....................................................................................................120

Overview of configuration files..........................................................................................120
Required settings for configuration files...............................................................................123
Preparing the configuration files on each site.......................................................................123

Acquiring volume information (preparations)............................................................................124

Performing a local scan to acquire volume information..........................................................124
Performing an NG Scan (on a Non-Gen'ed Volume) to acquire device configuration
information.....................................................................................................................124
Performing a remote scan to acquire remote storage system information..................................125

Prerequisite conditions for performing a Remote Scan......................................................125
Specifying a Route List ID.............................................................................................125
Performing a Remote Scan............................................................................................126
Assigning a Dummy Device Number..............................................................................126

Creating a logical path.........................................................................................................126

Establishing a logical path................................................................................................126
Establishing an inter-control unit logical path.......................................................................127
Acquiring path information from a storage system................................................................128

Checking the prerequisite conditions for acquiring a port number......................................128

Establishing a logical path in the reverse direction................................................................129
Deleting a logical path.....................................................................................................129

Defining a journal group with path group IDs...........................................................................129
Setting up the Remote DKC Control Function environment...........................................................130

General procedure for setting up a Remote DKC Control Function environment.........................130
Prerequisite conditions for using the Remote DKC Control Function..........................................130
Configuring routes and command device lines.....................................................................131
Defining the route list........................................................................................................131

Procedure for defining the route list................................................................................131
Images for route list definitions......................................................................................132
Notes on defining the route list......................................................................................134

Registering a command device..........................................................................................135
Deleting command devices................................................................................................136

Deleting command devices registered in a route list.........................................................136
Deleting command devices not registered in a route list....................................................137

Contents

5