beautypg.com

Hitachi TAGMASTORE MK-90RD011-25 User Manual

Page 9

background image

Hitachi Command Control Interface (CCI) User and Reference Guide

ix

Contents

Chapter 1 Overview of CCI Functionality...............................................................................................1

1.1

Overview of Command Control Interface ..................................................... 1

1.2

Overview of Hitachi Data Replication Functions ............................................ 2

1.2.1

Hitachi TrueCopy ........................................................................ 2

1.2.2

Hitachi ShadowImage ................................................................... 3

1.2.3

Hitachi Universal Replicator ........................................................... 3

1.2.4

Hitachi Copy-on-Write Snapshot ...................................................... 4

1.3

Overview of Hitachi Data Protection Functions ............................................. 5

1.3.1

Hitachi Database Validator ............................................................ 5

1.3.2

Hitachi Data Retention Utility (Open LDEV Guard) ................................ 6

Chapter 2 Overview of CCI Operations ..................................................................................................7

2.1

Overview ........................................................................................... 8

2.2

Features of Paired Volumes..................................................................... 9

2.2.1

ShadowImage Duplicated Mirroring................................................. 10

2.2.2

ShadowImage Cascading Pairs....................................................... 11

2.2.3

Hitachi TrueCopy Takeover Commands ............................................ 14

2.2.4

Hitachi TrueCopy Remote Commands.............................................. 15

2.2.5

Hitachi TrueCopy Local Commands................................................. 16

2.3

Overview of CCI ShadowImage Operations ................................................. 17

2.4

Hitachi TrueCopy/ShadowImage Volumes .................................................. 18

2.4.1

TrueCopy/ShadowImage/Universal Replicator Volume Status ................. 19

2.4.2

TrueCopy Async, TrueCopy Sync CTG, and Universal Replicator Volumes ... 23

2.4.3

TrueCopy Sync/Async and Universal Replicator Fence-Level Settings ........ 28

2.5

Applications of Hitachi TrueCopy/ShadowImage Commands ............................ 31

2.6

Overview of Copy-on-Write Snapshot Operations ......................................... 37

2.6.1

Creating SnapShot..................................................................... 38

2.6.2

SnapShot Volume Specifications .................................................... 38

2.6.3

SnapShot Volume Characteristics ................................................... 38

2.7

Overview of CCI Data Protection Operations............................................... 40

2.7.1

Database Validator .................................................................... 40

2.7.2

Restrictions on Database Validator ................................................. 41

2.7.3

Data Retention Utility/Open LDEV Guard ......................................... 42

2.7.4

Restrictions on Data Retention Utility Volumes .................................. 43

2.7.5

Operations.............................................................................. 44

2.8

CCI Software Structure ........................................................................ 45

2.8.1

HORCM Operational Environment................................................... 45

2.8.2

CCI Instance Configurations.......................................................... 46

2.8.3

Host Machines that Can be Paired .................................................. 48

2.8.4

Configuration Definition File ........................................................ 50

2.8.5

Command Device ...................................................................... 63

2.8.6

Alternate Command Device Function .............................................. 64

2.8.7

Command Interface with Hitachi TrueCopy/ShadowImage..................... 65

2.8.8

Logical DKC per 64K LDEVs........................................................... 68

2.8.9

Command Device Guarding .......................................................... 69

2.8.10

CCI Software Files ..................................................................... 71