Hitachi TAGMASTORE MK-90RD011-25 User Manual
Page 9

Hitachi Command Control Interface (CCI) User and Reference Guide
ix
Contents
Chapter 1 Overview of CCI Functionality...............................................................................................1
1.1
Overview of Command Control Interface ..................................................... 1
1.2
Overview of Hitachi Data Replication Functions ............................................ 2
1.2.1
Hitachi TrueCopy ........................................................................ 2
1.2.2
Hitachi ShadowImage ................................................................... 3
1.2.3
Hitachi Universal Replicator ........................................................... 3
1.2.4
Hitachi Copy-on-Write Snapshot ...................................................... 4
1.3
Overview of Hitachi Data Protection Functions ............................................. 5
1.3.1
Hitachi Database Validator ............................................................ 5
1.3.2
Hitachi Data Retention Utility (Open LDEV Guard) ................................ 6
Chapter 2 Overview of CCI Operations ..................................................................................................7
2.1
Overview ........................................................................................... 8
2.2
Features of Paired Volumes..................................................................... 9
2.2.1
ShadowImage Duplicated Mirroring................................................. 10
2.2.2
ShadowImage Cascading Pairs....................................................... 11
2.2.3
Hitachi TrueCopy Takeover Commands ............................................ 14
2.2.4
Hitachi TrueCopy Remote Commands.............................................. 15
2.2.5
Hitachi TrueCopy Local Commands................................................. 16
2.3
Overview of CCI ShadowImage Operations ................................................. 17
2.4
Hitachi TrueCopy/ShadowImage Volumes .................................................. 18
2.4.1
TrueCopy/ShadowImage/Universal Replicator Volume Status ................. 19
2.4.2
TrueCopy Async, TrueCopy Sync CTG, and Universal Replicator Volumes ... 23
2.4.3
TrueCopy Sync/Async and Universal Replicator Fence-Level Settings ........ 28
2.5
Applications of Hitachi TrueCopy/ShadowImage Commands ............................ 31
2.6
Overview of Copy-on-Write Snapshot Operations ......................................... 37
2.6.1
Creating SnapShot..................................................................... 38
2.6.2
SnapShot Volume Specifications .................................................... 38
2.6.3
SnapShot Volume Characteristics ................................................... 38
2.7
Overview of CCI Data Protection Operations............................................... 40
2.7.1
Database Validator .................................................................... 40
2.7.2
Restrictions on Database Validator ................................................. 41
2.7.3
Data Retention Utility/Open LDEV Guard ......................................... 42
2.7.4
Restrictions on Data Retention Utility Volumes .................................. 43
2.7.5
Operations.............................................................................. 44
2.8
CCI Software Structure ........................................................................ 45
2.8.1
HORCM Operational Environment................................................... 45
2.8.2
CCI Instance Configurations.......................................................... 46
2.8.3
Host Machines that Can be Paired .................................................. 48
2.8.4
Configuration Definition File ........................................................ 50
2.8.5
Command Device ...................................................................... 63
2.8.6
Alternate Command Device Function .............................................. 64
2.8.7
Command Interface with Hitachi TrueCopy/ShadowImage..................... 65
2.8.8
Logical DKC per 64K LDEVs........................................................... 68
2.8.9
Command Device Guarding .......................................................... 69
2.8.10
CCI Software Files ..................................................................... 71