Permitting operations on protected volumes, Permitting operations on protected volumes 87 – HP XP Continuous Access Software User Manual
Page 86
86
HP StorageWorks Disk Array XP RAID Manager: User’s Guide
• raidscan –find inst
RM recognizes permitted volumes as a result of executing raidscan
–find inst
(the Permission command). This command issues a SCSI
inquiry to the specified device file to get the array Ser# and volume
LDEV# from the XP array. Then, it cross checks volumes in the
horcm.conf
file against host viewable volumes and stores the result
within the RM instance.
The following example shows the relationship between device files
and the horcm.conf file upon manual execution of the Permission
command in an HP-UX environment. Operations to all volumes
displayed by ioscan will be allowed.
Example
(HP-UX)
# ioscan -fun | grep rdsk | raidscan -find inst
DEVICE_FILE Group PairVol PORT TARG LUN M SERIAL LDEV
/dev/rdsk/c0t3d0 oradb oradev1 CL1-D 3 0 - 35013 17
/dev/rdsk/c0t3d0 oradb oradev1 CL1-D 3 0 0 35013 17
Permitting operations on protected volumes
Protection Mode requires a recognition step to check the host accessibility
of volumes against the horcm.conf file at RM startup, using a command
device with protection ON. This registration process (
c
or
d
) is executed
automatically by /etc/horcmgr at RM startup.
c
The following is executed to register permitted volumes in a file
($HORCMPERM). If the $HORCMPERM file already exists, then it will
use the existing file without doing a new ioscan (
d
).
If you want to permit even fewer volumes, edit the device file list in the
$HORCMPERM file. If you try to add device files that ioscan does not see
(due to nonexistence or a LUN security product), an error will be returned
at access time. This file is simply the text output (device files only) of a
prior ioscan with the non XP device files removed.