beautypg.com

Hitachi TAGMASTORE MK-90RD011-25 User Manual

Page 15

background image

Hitachi Command Control Interface (CCI) User and Reference Guide

xv

Figure 4.32

Raidvchkset Command Examples ..................................................... 238

Figure 4.33

Raidvchkdsp Command Examples with -fd and -fe Options....................... 244

Figure 4.34

Raidvchkdsp Command Example with -v cflag Option............................. 245

Figure 4.35

Raidvchkdsp Command Example with -v offset Option............................ 246

Figure 4.36

Raidvchkdsp Command Example with -v errcnt Option ........................... 246

Figure 4.37

Raidvchkdsp Command Example with -v gflag Option............................. 246

Figure 4.38

Raidvchkdsp Command Example with -v pool Option ............................. 247

Figure 4.39

Raidvchkdsp Command Example with -v aou Option .............................. 248

Figure 4.40

Raidvchkscan Command Example with -v cflag Option............................ 251

Figure 4.41

Raidvchkscan Command Example with -v offset Option .......................... 252

Figure 4.42

Raidvchkscan Command Example with -v errcnt Option .......................... 252

Figure 4.43

Raidvchkscan Command Example with -v gflag Option ........................... 253

Figure 4.44

Raidvchkscan Command Example with -v pool Option ............................ 254

Figure 4.45

Raidvchkscan Command Example with -v aou Option ............................. 254

Figure 4.46

Raidvchkscan Command Example with -v jnl 0 Option ............................ 255

Figure 4.47

Example of Q-Marker and Q-CNT ..................................................... 257

Figure 4.48

Raidvchkscan Command Example with -v jnlt Option ............................. 258

Figure 4.49

Raidvchkscan Command Example with -v pid Option.............................. 259

Figure 4.50

Raidvchkscan Command Example with -v pida Option ............................ 260

Figure 4.51

Findcmddev Subcommand Example .................................................. 270

Figure 4.52

Drivescan Subcommand Example ..................................................... 271

Figure 4.53

Portscan Subcommand Example ...................................................... 272

Figure 4.54

Sync Subcommand Example – Pairsplit............................................... 274

Figure 4.55

Sync Subcommand Example – Pairsplit -S............................................ 274

Figure 4.56

Mount Subcommand Example for Windows NT ..................................... 275

Figure 4.57

Mount Subcommand Example for Windows 2003/2000............................ 276

Figure 4.58

Umount Subcommand Example ....................................................... 277

Figure 4.59

Environment Variable Subcommand Examples ..................................... 279

Figure 4.60

Inqraid Command Tool Examples ................................................283-281

Figure 4.61

Inqraid: Example of -find Option (Linux example shown) ........................ 285

Figure 4.62

Inqraid: Example of -find Option (HP-UX example shown) ....................... 285

Figure 4.63

Inqraid: Example of -findc Option (HP-UX example shown) ...................... 285

Figure 4.64

Inqraid: Example of -CLI Option (Linux example shown) ......................... 286

Figure 4.65

Inqraid: Example of -CLIWP and -CLIWN Options (HP-UX example shown) .... 286

Figure 4.66

Inqraid: Example of -sort[CM] Option (HP-UX example shown).................. 287

Figure 4.67

Inqraid: Example of -gvinf Option .................................................... 287

Figure 4.68

Inqraid: Example of -svinf[=PTN] Option ............................................ 287

Figure 4.69

Mkconf Command Tool Example (HP-UX example shown) ........................ 289

Figure 4.70

Synchronization for Hitachi TrueCopy Async/UR ................................... 291

Figure 4.71

Pairsyncwait Command Examples .................................................... 295

Figure 4.72

Definition of the Protection Volume ................................................. 296

Figure 4.73

Example for the Two Host Configuration ............................................ 298

Figure 4.74

Example for the One Host Configuration ............................................ 299

Figure 4.75

Definition of the Group Version....................................................... 306

Figure 4.76

LDM Volume Configuration............................................................. 307

Figure 4.77

LDM Volume Flushing ................................................................... 311

Figure 4.78

Configurations with MSCS and ShadowImage (HOMRCF) .......................... 314

Figure 4.79

Directory Mount Structure ............................................................. 318

Figure 4.80

Protection of the command device that has the SLPR attribute ................ 322

Figure 4.81

SLPR Configuration on a Single Host ................................................. 324