HP NonStop RDF J-series RVUs, NonStop RDF H-series RVUs, NonStop RDF Management Manual

HP NonStop RDF System Management Manual for J-series and H-series RVUs (RDF
1.9)
HP Part Number: 529826-006 Published: June 2009 Edition: J06.03 and subsequent J-series RVUs and H06.03 and subsequent H-series RVUs
Legal Notice
Confidential computersoftware. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor’s standard commercial license.
The informationcontained hereinis subject to change without notice. Theonly warranties forHP productsand servicesare set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
shall not be liable for technical or editorial errors or omissions contained herein.
Export of the information contained in this publication might require authorization from the U.S. Department of Commerce.
Microsoft, Windows, and Windows NT are U.S. registered trademarks of Microsoft Corporation.
Intel, Pentium, and Celeron are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries.
Java is a U.S. trademark of Sun Microsystems, Inc.
Motif, OSF/1, UNIX, X/Open, and the "X" device are registered trademarks, and IT DialTone and The Open Group are trademarks of The Open
Group in the U.S. and other countries.
Open Software Foundation, OSF, the OSF logo, OSF/1, OSF/Motif, and Motif are trademarks of the Open Software Foundation, Inc. OSF MAKES
NO WARRANTY OF ANY KIND WITH REGARD TO THE OSF MATERIAL PROVIDED HEREIN, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. OSF shall not be liable for errors contained
herein or for incidental consequential damages in connection with the furnishing, performance, or use of this material.
© 1990, 1991, 1992, 1993 Open Software Foundation, Inc. The OSF documentation and the OSF software to which it relates are derived in part
from materials supplied by the following:© 1987, 1988, 1989 Carnegie-Mellon University. © 1989, 1990, 1991 Digital Equipment Corporation. ©
1985, 1988, 1989, 1990 Encore Computer Corporation. © 1988 Free Software Foundation, Inc. © 1987, 1988, 1989, 1990, 1991 Hewlett-Packard
Company. © 1985, 1987, 1988, 1989, 1990, 1991, 1992 International Business Machines Corporation. © 1988, 1989 Massachusetts Institute of
Technology. © 1988, 1989, 1990 Mentat Inc. © 1988 Microsoft Corporation. © 1987, 1988, 1989, 1990, 1991, 1992 SecureWare, Inc. © 1990, 1991
Siemens NixdorfInformationssysteme AG. © 1986, 1989,1996, 1997Sun Microsystems, Inc. © 1989,1990, 1991Transarc Corporation.OSFsoftware
and documentationare basedin parton the Fourth Berkeley SoftwareDistribution underlicense from The Regents of the Universityof California.
OSF acknowledgesthe followingindividuals and institutions for their role in its development:Kenneth C.R.C. Arnold, Gregory S. Couch, Conrad
C. Huang, Ed James, Symmetric Computer Systems, Robert Elz. © 1980, 1981, 1982, 1983, 1985, 1986, 1987, 1988, 1989 Regents of the University
of California.
Table of Contents
About This Document.......................................................................................................23
Supported Release Version Updates (RVUs)........................................................................................23
Intended Audience................................................................................................................................23
New and Changed Information in This Edition...................................................................................23
New features in the RDF 1.9 manual...............................................................................................23
Updates in the RDF 1.9 manual.......................................................................................................24
Document Organization.......................................................................................................................24
Notation Conventions...........................................................................................................................26
General Syntax Notation.................................................................................................................26
Notation for Messages.....................................................................................................................28
Related Information..............................................................................................................................29
Publishing History................................................................................................................................30
HP Encourages Your Comments..........................................................................................................30
1 Introducing RDF............................................................................................................31
RDF Subsystem Overview....................................................................................................................32
Unplanned Outages With ZLT........................................................................................................34
Unplanned Outages Without ZLT...................................................................................................34
Planned Outages..............................................................................................................................35
Features............................................................................................................................................35
User Interfaces......................................................................................................................................38
RDFCOM for Subsystem Management and Operations.................................................................38
Scanning the EMS Event Log...........................................................................................................38
RDF Tasks..............................................................................................................................................39
RDF Processes.......................................................................................................................................40
Primary System Processes...............................................................................................................41
Backup System Processes................................................................................................................42
RDF Operations....................................................................................................................................42
Monitor Process...............................................................................................................................42
Extractor Process.............................................................................................................................42
Receiver Process..............................................................................................................................44
Sorted Image Trails.....................................................................................................................45
RDF Control Points....................................................................................................................46
RDFNET Process.............................................................................................................................46
Updater Processes............................................................................................................................46
Audited Database Files..............................................................................................................47
REDO Pass..................................................................................................................................48
UNDO Pass.................................................................................................................................48
Restart Information....................................................................................................................48
Partitioned Files, Alternate Key Files, and Indexes...................................................................48
File System Errors Involving Data Files.....................................................................................49
RTD Times..................................................................................................................................49
Purger Process.................................................................................................................................49
Reciprocal and Chain Replication Require Mutually Exclusive Datavols.................................50
Available Types of Replication to Multiple Backup Systems...............................................................52
RDF Control Subvolume.................................................................................................................53
Other RDF Features..............................................................................................................................53
Triple Contingency..........................................................................................................................53
Loopback Configuration (Single System)........................................................................................53
Online Product Initialization...........................................................................................................54
Table of Contents 3
Online Database Synchronization...................................................................................................54
Online Dumps of the Backup Database..........................................................................................54
Subvolume-Level and File-Level Replication..................................................................................54
Shared Access DDL Operations......................................................................................................54
Configurable Software Location......................................................................................................54
EMS Support....................................................................................................................................55
SMF Support....................................................................................................................................55
RTD Warning Thresholds................................................................................................................55
Process-Lockstep Operation............................................................................................................55
Support for Network Transactions..................................................................................................55
RDF and NonStop SQL/MX.............................................................................................................56
Zero Lost Transactions (ZLT)..........................................................................................................56
Monitoring RDF Entities With ASAP..............................................................................................56
2 Preparing the RDF Environment..................................................................................57
Configuring Hardware for RDF Operations.........................................................................................57
Primary System Configuration........................................................................................................57
Backup System Configuration.........................................................................................................57
Disk Volume Limit...........................................................................................................................58
Volume-to-Volume Mapping...........................................................................................................58
Subvolume-to-Subvolume Name Mapping....................................................................................58
Expand (Data Communication) Resources.....................................................................................58
Preparing Software and Database Files for RDF Operations...............................................................59
Configuring TMF for RDF Operations on the Primary System......................................................60
AUDITTRAIL BUFFER..............................................................................................................60
TMF Configuration With Dump Process on the Primary System.............................................61
TMF Configuration Without Dump Process on the Primary System........................................61
Configuring TMF for RDF Operations on the Backup System.......................................................61
Preparing Databases for RDF Protection.........................................................................................62
Audited Files Per Volume on Primary System..........................................................................62
Audited Backup Database Files.................................................................................................62
Reload of Backup Database...................................................................................................62
Disk Process Pins on Database Volumes..............................................................................62
DSM Catalogs and File Code 900...............................................................................................63
Views on the Backup System.....................................................................................................63
Partitioned Tables and Files.......................................................................................................63
Database Block Sizes and Cache on the Backup System............................................................63
Specifying System Generation Parameters for an RDF Environment.............................................63
Designing Transactions for RDF Protection....................................................................................64
Replicating Database Operations...............................................................................................64
NonStop SQL DDL Operations............................................................................................64
Enscribe File-Label Modifications.........................................................................................64
Purge Operations..................................................................................................................64
Partitioned Files....................................................................................................................65
Temporary Disk Files............................................................................................................65
Using SMF With RDF............................................................................................................................65
Configuring an SMF Environment on the Primary System............................................................66
Configuring an SMF Environment on the Backup RDF System.....................................................66
3 Installing and Configuring RDF..................................................................................69
Preparing the Primary System..............................................................................................................69
Stopping the Software.....................................................................................................................69
Preparing the Tables and Files.........................................................................................................69
4 Table of Contents
Separating NonStop SQL Tables................................................................................................70
Compressing Audit Data for Tables and Files...........................................................................70
Preparing the Backup System...............................................................................................................70
Synchronizing the Primary and Backup Databases........................................................................71
Re-Creating an Empty Database With an OBEY Command.....................................................71
Synchronizing Databases With SQLCI Commands...................................................................72
Synchronizing Databases With BACKUP and RESTORE Utilities............................................73
Synchronizing Databases With FUP..........................................................................................74
Synchronizing Partitioned Files.................................................................................................74
Backing Up Application Programs and Files..................................................................................74
Cache for RDF IMAGETRAILS and UPDATER UPDATEVOLUMES............................................74
Installing RDF.......................................................................................................................................75
RDF/IMP (T0346) Product Components..........................................................................................75
RDF/IMPX (T0347) Product Components.......................................................................................75
RDF/ZLT (T0618) Product Components..........................................................................................76
Process-Lockstep Gateway (T1226) Product Components..............................................................76
Component Licensing......................................................................................................................76
Security Guidelines..........................................................................................................................76
Using the OWNER Attribute to Allow Super Group Users to Start, Stop, and Manage RDF........78
Initializing and Configuring TMF........................................................................................................78
TMF Subsystem Not Running Previously.......................................................................................78
TMF Subsystem Running Previously..............................................................................................79
Initializing and Configuring RDF.........................................................................................................79
Initializing RDF...............................................................................................................................79
Initializing RDF To a TMF Shutdown Timestamp.....................................................................80
Initializing RDF Without any Timestamp Option.....................................................................80
Initializing RDF Without Stopping TMF (Using INITTIME Option)..............................................80
Determining a Valid inittime Value.......................................................................................81
Special Considerations...............................................................................................................81
Enscribe Create Records.......................................................................................................81
Stop-RDF-Updater Records..................................................................................................81
TMF Shutdown Records.......................................................................................................82
Online Installation and Initialization Without Stopping RDF........................................................82
Disaster Points............................................................................................................................83
Considerations............................................................................................................................83
Configuring RDF.............................................................................................................................84
Setting Global Attributes............................................................................................................85
LOGFILE Attribute...............................................................................................................85
UPDATERDELAY Attribute.................................................................................................85
UPDATERTXTIME Attribute................................................................................................86
UPDATERRTDWARNING Attribute...................................................................................86
UPDATEROPEN Attribute...................................................................................................86
SOFTWARELOC Attribute...................................................................................................86
NETWORK Attribute............................................................................................................87
NETWORKMASTER Attribute.............................................................................................87
UPDATEREXCEPTION Attribute........................................................................................87
LOCKSTEPVOL Attribute....................................................................................................87
REPLICATEPURGE Attribute..............................................................................................87
REMOTE MIRROR Attribute................................................................................................87
REMOTE STANDBY Attribute.............................................................................................88
OWNER Attribute.................................................................................................................88
Setting Image Trail Attributes....................................................................................................88
Dedicated Image Trails or Image Trails on UpdateVolumes................................................89
Setting Trigger Attributes...........................................................................................................89
Setting Network Configuration Record Attributes....................................................................90
Table of Contents 5
PRIMARYSYSTEM Attribute................................................................................................90
BACKUPSYSTEM Attribute.................................................................................................91
REMOTECONTROLSUBVOL Attribute..............................................................................91
PNETTXVOLUME Attribute................................................................................................91
Setting Individual Process Attributes........................................................................................91
RDFNET Process...................................................................................................................91
Monitor Process....................................................................................................................91
Extractor Process...................................................................................................................92
Receiver Process....................................................................................................................93
Purger Process.......................................................................................................................94
Updater Processes.................................................................................................................95
Creating a Configuration Command File........................................................................................96
Configuration File Compatibility....................................................................................................96
Enabling RDF Operations.....................................................................................................................97
Starting TMF....................................................................................................................................97
Starting RDF....................................................................................................................................97
Restarting the Applications.............................................................................................................98
4 Operating and Monitoring RDF.................................................................................99
Running RDFCOM...............................................................................................................................99
Command Syntax for Starting an RDFCOM Session......................................................................99
Using RDFCOM Interactively.......................................................................................................100
Starting a Session......................................................................................................................100
Ending a Session.......................................................................................................................101
Interrupting Command Processing..........................................................................................101
Using RDFCOM Noninteractively (without an IN File)...............................................................102
Using RDFCOM From a Command File (IN file)..........................................................................102
Using Scripts for Easy and Fast RDF Initialization and Configuration........................................103
Managing Multiple RDF Environments from One RDFCOM Session.........................................104
Controlling Multiple RDF Environments Running on Different Nodes with a Single Obey
File..................................................................................................................................................104
Using RDFCOM Commands.........................................................................................................105
Configuration Commands........................................................................................................105
Operational Commands...........................................................................................................106
Utility Commands....................................................................................................................106
Entering Commands................................................................................................................107
Requesting Online Help................................................................................................................107
Help for Command Syntax......................................................................................................107
Help for RDF Error Messages..................................................................................................108
Running RDFSCAN............................................................................................................................109
Command Syntax for Starting an RDFSCAN Session...................................................................109
Using RDFSCAN...........................................................................................................................109
Starting a Session......................................................................................................................109
Ending a Session.......................................................................................................................110
Using RDFSCAN Commands........................................................................................................110
Requesting Online Help................................................................................................................111
Help for Command Syntax......................................................................................................111
Introductory Usage Information..............................................................................................112
Performing Routine Operational Tasks...............................................................................................112
Displaying Current Operating Statistics and Configuration Information....................................112
RDF States.................................................................................................................................113
Main STATUS RDF Display......................................................................................................114
Using RDF Status Data to Control TMF Audit Dumping........................................................116
Changing Configuration Attributes..............................................................................................116
6 Table of Contents
Process Priority.........................................................................................................................117
EMS Logs (Collectors)..............................................................................................................117
RETAINCOUNT.......................................................................................................................117
PURGETIME.............................................................................................................................117
UPDATERDELAY.....................................................................................................................117
UPDATEROPEN......................................................................................................................117
Reading Log Messages..................................................................................................................118
Examining RDF Messages........................................................................................................118
ASAP...................................................................................................................................................120
5 Critical Operations, Special Situations, and Error Conditions.............................121
Recovering From File System Errors..................................................................................................121
Handling Disk Space Problems..........................................................................................................124
Exceeding the Maximum Number of Concurrent File Opens............................................................125
Responding to Operational Failures...................................................................................................125
Communication Line Failures.......................................................................................................126
System Failures..............................................................................................................................126
Processor Failures..........................................................................................................................127
Extractor Failure.......................................................................................................................127
Receiver Failure........................................................................................................................127
Updater Failure........................................................................................................................127
Purger Failure...........................................................................................................................128
RDFNET Failure.......................................................................................................................128
RDF State Transition Failure....................................................................................................128
Problems Involving TMF...............................................................................................................128
TMF Audited Volume Failure..................................................................................................128
TMF Subsystem Failure on the Primary System......................................................................128
TMF Subsystem Failure on the Backup System.......................................................................129
Volume Recovery Processing..............................................................................................129
Volume Recovery Failure....................................................................................................129
File Recovery on the Primary System............................................................................................130
File Recovery on the Backup System.............................................................................................130
TMFCOM ABORT TRANSACTION With AVOIDHANGING Option on Primary System........131
Audit Trails Pinned by RDF on the Primary System.....................................................................131
Stopping RDF......................................................................................................................................132
Stopping RDF by Stopping TMF...................................................................................................133
Stopping RDF From the Primary System......................................................................................134
Stopping RDF From the Backup System.......................................................................................134
Stopping RDF Using STOP RDF, DRAIN......................................................................................135
Stopping RDF using STOP RDF, REVERSE Operation.................................................................135
Restarting RDF....................................................................................................................................136
Carrying Out a Planned Switchover...................................................................................................136
Standard Configurations...............................................................................................................136
Using STOP RDF, REVERSE and the REVERSE Trigger...............................................................137
Reciprocal Configurations and Switchover...................................................................................137
Takeover Operations...........................................................................................................................139
The RDF Takeover Operation........................................................................................................139
Phase One Undo Pass...............................................................................................................139
Phase Two Undo Pass...............................................................................................................140
Phase Three Undo Pass............................................................................................................140
Issuing the TAKEOVER Command...............................................................................................140
Issuing the TAKEOVER Command in an Obey File.....................................................................142
Monitoring Takeover Outcome......................................................................................................142
Takeover Failure............................................................................................................................143
Table of Contents 7
Monitor Considerations...........................................................................................................143
Updater Considerations...........................................................................................................143
Takeover and Triple Contingency..................................................................................................143
Checking Exception Files for Uncommitted Transactions............................................................143
How to Plan for the Fastest Movement of Business Operations to Your Backup System After
Takeover.........................................................................................................................................144
Restoring the Primary System.......................................................................................................147
Online Method of Resynchronizing the Primary Database.....................................................148
Offline Method of Resynchronizing the Primary Database.....................................................148
Reading the Backup Database (BROWSE versus STABLE Access)....................................................149
Near Real Time Read Access to Updates on the Primary System......................................................149
Access to Backup Databases with Stable Access................................................................................150
Stopping TMF on the Primary System..........................................................................................150
Using the STOP RDF, DRAIN Command.....................................................................................150
STOP UPDATE to a Timestamp....................................................................................................150
RDF and NonStop SQL DDL Operations...........................................................................................151
Performing Nonshared Access DDL Operations..........................................................................152
Performing Shared Access DDL Operations.................................................................................152
Network Configurations and Shared Access NonStop SQL DDL Operations........................153
RDF and NonStop SQL/MX Operations.............................................................................................153
Backing Up Image Trail Files..............................................................................................................153
TMF and Online Dumps on the Backup System................................................................................154
Doing FUP RELOAD Operations With Updaters Running...............................................................155
Exception File Optimization...............................................................................................................155
Switching Disks on Updater UPDATEVOLUMES.............................................................................155
Online Remirroring of Updater SUBVOLUMES................................................................................156
6 Maintaining the Databases......................................................................................157
Understanding Database States..........................................................................................................157
Making Changes to Database Structures............................................................................................159
NonStop SQL/MP or NonStop SQL/MX Databases......................................................................160
Catalog Changes.......................................................................................................................160
DDL Operations.......................................................................................................................160
With Shared Access.............................................................................................................160
Without Shared Access.......................................................................................................161
Adding a New Column.......................................................................................................161
Guidelines for Create Index and Alter Table Move Operations.........................................162
Example for CREATE INDEX With Shared Access............................................................162
Multiple Indexes on a Single Base Table.............................................................................162
Partition Key Changes..............................................................................................................163
Table Purges.............................................................................................................................163
Enscribe Databases........................................................................................................................164
The STOP TMF Method............................................................................................................164
The STOP RDF DRAIN Method...............................................................................................164
Resynchronizing Databases................................................................................................................164
Resynchronizing Entire Databases Offline....................................................................................165
Resynchronizing Individual Volumes, Tables, and Files Offline..................................................165
Resynchronizing Individual Tables or Files Offline......................................................................166
7 Online Database Synchronization...........................................................................167
Overview.............................................................................................................................................167
Synchronizing Entire Databases Online.............................................................................................168
Considerations When Synchronizing Entire Databases................................................................169
8 Table of Contents
Duration and Preparation Issues..............................................................................................170
SYNCHDBTIME Issues............................................................................................................170
Enscribe Create Records......................................................................................................170
Stop-RDF-Updater Records................................................................................................170
TMF Shutdown Records.....................................................................................................171
CREATE/LOAD Issues (Step 4, Method 1)...............................................................................171
General Considerations for Enscribe Files..........................................................................171
Special Consideration for Enscribe Files.............................................................................172
General Considerations for NonStop SQL Tables...............................................................172
Enscribe Queue File Issues.......................................................................................................172
Different NonStop SQL Product Versions................................................................................173
Moving Duplicated Tables and Files to the Backup System....................................................173
Example of Synchronizing An Entire Database Online................................................................174
Synchronizing Selected Database Portions Online.............................................................................176
Overview........................................................................................................................................176
Example #1 – Staged Synchronization of an Entire Database..................................................176
Example #2 – Synchronization of an Individual Volume.........................................................176
Example #3 – Synchronization of an Individual File or Partition on a Volume.......................176
Partial Database Synchronization Issues.......................................................................................177
Enscribe Files Without Partitions.............................................................................................177
Key-Sequenced and Relative Files......................................................................................177
Entry-Sequenced Files.........................................................................................................177
Enscribe Files With Partitions...................................................................................................177
Key-Sequenced Files with Create/Load (Step 4, Method 1)...............................................177
Key-Sequenced Files with FRNL (Step 4, Method 2)..........................................................178
Relative Files with Create/Load (Step 4, Method 1)...........................................................178
Relative Files with FRNL (Step 4, Method 2)......................................................................178
Entry-Sequenced Files.........................................................................................................178
NonStop SQL/MP and NonStop SQL/MX Tables Without Partitions.....................................178
Tables with SYSKEY or Clustering Keys.............................................................................178
Tables without SYSKEY and Clustering Keys....................................................................178
NonStop SQL/MP and NonStop SQL/MX Tables With Partitions...........................................179
Requirements for Synchronization of Individual Partitions...............................................179
Key-Sequenced Tables.........................................................................................................180
Relative Tables.....................................................................................................................181
NonStop SQL/MP and NonStop SQL/MX Indexes (With or Without Partitions)...................183
Phases of Online Database Synchronization.......................................................................................183
Extractor Phases.............................................................................................................................183
Phase 1, Part 1...........................................................................................................................183
Phase 1, Part 2...........................................................................................................................183
Phase 1, Part 3...........................................................................................................................183
Phase 2......................................................................................................................................184
Updater Phase 2.............................................................................................................................184
Extractor Restart Considerations During Online Database Synchronization....................................184
Determining When Online Database Synchronization Is Complete..................................................184
Extractor Messages........................................................................................................................184
Updater Messages..........................................................................................................................184
8 Entering RDFCOM Commands................................................................................187
Elements of RDFCOM Command Descriptions.................................................................................187
Purpose, Syntax, and Attributes....................................................................................................187
Where Issued.................................................................................................................................187
Security Restrictions......................................................................................................................187
RDF State Requirement.................................................................................................................188
Table of Contents 9
Usage Guidelines...........................................................................................................................188
Output Displayed..........................................................................................................................190
Examples........................................................................................................................................190
RDFCOM-Related Filenames and Process Identifiers........................................................................190
Reserved File Names.....................................................................................................................191
Disk File Names.............................................................................................................................191
Nondisk Device Names.................................................................................................................191
Process File Names........................................................................................................................192
RDFCOM Commands.........................................................................................................................192
ADD...............................................................................................................................................193
Where Issued............................................................................................................................193
Security Restrictions.................................................................................................................193
RDF State Requirement............................................................................................................193
Usage Guidelines......................................................................................................................194
Examples..................................................................................................................................194
ALTER............................................................................................................................................195
Where Issued............................................................................................................................196
Security Restrictions.................................................................................................................196
RDF State Requirement............................................................................................................196
Usage Guidelines......................................................................................................................196
Examples..................................................................................................................................196
COPYAUDIT..................................................................................................................................197
Where Issued............................................................................................................................197
Security Restrictions.................................................................................................................197
RDF State Requirement............................................................................................................197
Usage Guidelines......................................................................................................................197
COPYAUDIT Restartability......................................................................................................198
Example....................................................................................................................................199
DELETE..........................................................................................................................................199
Where Issued............................................................................................................................199
Security Restrictions.................................................................................................................200
RDF State Requirement............................................................................................................200
Usage Guidelines......................................................................................................................200
Examples..................................................................................................................................200
EXIT...............................................................................................................................................201
Where Issued............................................................................................................................201
Security Restrictions.................................................................................................................201
RDF State Requirement............................................................................................................201
Usage Guidelines......................................................................................................................201
Example....................................................................................................................................201
FC...................................................................................................................................................201
Where Issued............................................................................................................................202
Security Restrictions.................................................................................................................202
RDF State Requirement............................................................................................................202
Usage Guidelines......................................................................................................................202
Examples..................................................................................................................................202
HELP..............................................................................................................................................203
Where Issued............................................................................................................................203
Security Restrictions.................................................................................................................203
RDF State Requirement............................................................................................................204
Usage Guidelines......................................................................................................................204
Examples..................................................................................................................................204
HISTORY.......................................................................................................................................205
Where Issued............................................................................................................................205
Security Restrictions.................................................................................................................205
10 Table of Contents
RDF State Requirement............................................................................................................205
Examples..................................................................................................................................205
INFO..............................................................................................................................................206
Where Issued............................................................................................................................207
Security Restrictions.................................................................................................................207
RDF State Requirements...........................................................................................................207
Usage Guidelines......................................................................................................................207
Output Displayed.....................................................................................................................208
Examples..................................................................................................................................208
INFO * Command...............................................................................................................208
INFO EXTRACTOR Command..........................................................................................209
INFO EXTRACTOR Command With OBEYFORM Option...............................................209
INFO MONITOR Command..............................................................................................210
INFO RDF Command.........................................................................................................210
INFO VOLUME Command................................................................................................210
INFO PURGER Command..................................................................................................211
INFO TRIGGER Command................................................................................................211
INFO TRIGGER Command With OBEYFORM Option......................................................212
INFO RDFNET Command..................................................................................................212
INFO NETWORK Command.............................................................................................212
INITIALIZE RDF...........................................................................................................................212
Where Issued............................................................................................................................215
Security Restrictions.................................................................................................................215
RDF State Requirement............................................................................................................215
Usage Guidelines......................................................................................................................215
Examples..................................................................................................................................217
OBEY..............................................................................................................................................217
Where Issued............................................................................................................................217
Security Restrictions.................................................................................................................217
RDF State Requirement............................................................................................................217
Usage Guidelines......................................................................................................................218
Example....................................................................................................................................218
OPEN.............................................................................................................................................218
Where Issued............................................................................................................................218
Security Restrictions.................................................................................................................218
RDF State Requirement............................................................................................................218
Usage Guidelines......................................................................................................................218
Examples..................................................................................................................................219
OUT................................................................................................................................................219
Where Issued............................................................................................................................220
Security Restrictions.................................................................................................................220
RDF State Requirement............................................................................................................220
Usage Guidelines......................................................................................................................220
Examples..................................................................................................................................220
RESET............................................................................................................................................220
Where Issued............................................................................................................................221
Security Restrictions.................................................................................................................221
RDF State Requirement............................................................................................................221
Usage Guidelines......................................................................................................................221
Examples..................................................................................................................................222
SET EXTRACTOR..........................................................................................................................222
Where Issued............................................................................................................................223
Security Restrictions.................................................................................................................223
RDF State Requirements...........................................................................................................223
Usage Guidelines......................................................................................................................223
Table of Contents 11
Examples..................................................................................................................................223
SET IMAGETRAIL.........................................................................................................................224
Usage Guidelines......................................................................................................................224
SET MONITOR..............................................................................................................................224
Where Issued............................................................................................................................225
Security Restrictions.................................................................................................................225
RDF State Requirements...........................................................................................................225
Usage Guidelines......................................................................................................................225
Example....................................................................................................................................225
SET NETWORK.............................................................................................................................225
Where Issued............................................................................................................................226
Security Restrictions.................................................................................................................226
RDF State Requirements...........................................................................................................226
Usage Guidelines......................................................................................................................226
Example....................................................................................................................................226
SET PURGER.................................................................................................................................226
Where Issued............................................................................................................................228
Security Restrictions.................................................................................................................228
RDF State Requirements...........................................................................................................228
Usage Guidelines......................................................................................................................228
Example....................................................................................................................................228
SET RDF.........................................................................................................................................228
Where Issued............................................................................................................................231
Security Restrictions.................................................................................................................231
RDF State Requirements...........................................................................................................231
Usage Guidelines......................................................................................................................231
SET RDFNET.................................................................................................................................231
Where Issued............................................................................................................................232
Security Restrictions.................................................................................................................232
RDF State Requirements...........................................................................................................232
Usage Guidelines......................................................................................................................232
Example....................................................................................................................................232
SET RECEIVER..............................................................................................................................232
Where Issued............................................................................................................................234
Security Restrictions.................................................................................................................234
RDF State Requirements...........................................................................................................234
Usage Guidelines......................................................................................................................234
Examples..................................................................................................................................234
SET TRIGGER................................................................................................................................235
Where Issued............................................................................................................................235
Security Restrictions.................................................................................................................236
RDF State Requirements...........................................................................................................236
Usage Guidelines......................................................................................................................236
Example....................................................................................................................................236
SET VOLUME................................................................................................................................236
Where Issued............................................................................................................................238
Security Restrictions.................................................................................................................238
RDF State Requirements...........................................................................................................238
Usage Guidelines......................................................................................................................238
Examples..................................................................................................................................239
SHOW............................................................................................................................................239
Where Issued............................................................................................................................240
Security Restrictions.................................................................................................................240
RDF State Requirements...........................................................................................................240
Usage Guidelines......................................................................................................................240
12 Table of Contents
Output Displayed.....................................................................................................................240
Examples..................................................................................................................................240
SHOW RDF Command............................................................................................................240
SHOW RECEIVER Command..................................................................................................241
SHOW PURGER Command.....................................................................................................241
SHOW VOLUME Command...................................................................................................241
SHOW RDFNET Command.....................................................................................................242
SHOW NETWORK Command................................................................................................242
SHOW TRIGGER Command...................................................................................................242
START RDF....................................................................................................................................242
Where Issued............................................................................................................................243
Security Restrictions.................................................................................................................243
RDF State Requirement............................................................................................................243
Usage Guidelines......................................................................................................................243
Examples..................................................................................................................................244
START UPDATE............................................................................................................................244
Where Issued............................................................................................................................244
Security Restrictions.................................................................................................................244
RDF State Requirement............................................................................................................244
Usage Guidelines......................................................................................................................244
Example....................................................................................................................................244
STATUS..........................................................................................................................................244
Where Issued............................................................................................................................245
Security Restrictions.................................................................................................................245
RDF State Requirement............................................................................................................245
Usage Guidelines......................................................................................................................245
STATUS RDF Command Output Display................................................................................245
RDF Process..............................................................................................................................247
Name........................................................................................................................................247
RTD Time.................................................................................................................................247
Pri..............................................................................................................................................248
Volume and Seqnce..................................................................................................................248
Cpus..........................................................................................................................................249
Error..........................................................................................................................................249
Special Messages......................................................................................................................249
Examples..................................................................................................................................250
STOP RDF......................................................................................................................................250
Where Issued............................................................................................................................250
Security Restrictions.................................................................................................................251
RDF State Requirement............................................................................................................251
Usage Guidelines......................................................................................................................251
Examples..................................................................................................................................252
STOP SYNCH................................................................................................................................252
Where Issued............................................................................................................................252
Security Restrictions.................................................................................................................252
RDF State Requirement............................................................................................................252
Usage Guidelines......................................................................................................................253
Example....................................................................................................................................253
STOP UPDATE..............................................................................................................................253
Where Issued............................................................................................................................253
Security Restrictions.................................................................................................................253
RDF State Requirement............................................................................................................253
Usage Guidelines......................................................................................................................254
Examples..................................................................................................................................254
TAKEOVER....................................................................................................................................255
Table of Contents 13
Where Issued............................................................................................................................255
Security Restrictions.................................................................................................................255
Usage Guidelines......................................................................................................................255
Limitation.................................................................................................................................257
Example....................................................................................................................................257
UNPINAUDIT...............................................................................................................................257
Where Issued............................................................................................................................257
Security Restrictions.................................................................................................................257
RDF State Requirement............................................................................................................258
Usage Guidelines......................................................................................................................258
Example....................................................................................................................................258
VALIDATE CONFIGURATION....................................................................................................258
Where Issued............................................................................................................................258
Security Restrictions.................................................................................................................258
RDF State Requirement............................................................................................................258
Usage Guidelines......................................................................................................................258
Example....................................................................................................................................259
9 Entering RDFSCAN Commands...............................................................................261
About the EMS Log.............................................................................................................................261
Elements of RDFSCAN Command Descriptions................................................................................261
RDFSCAN Commands.......................................................................................................................262
AT...................................................................................................................................................262
Usage Guidelines......................................................................................................................262
Examples..................................................................................................................................262
DISPLAY........................................................................................................................................262
Usage Guidelines......................................................................................................................263
Examples..................................................................................................................................263
EXIT...............................................................................................................................................263
Usage Guidelines......................................................................................................................263
Examples..................................................................................................................................264
FILE................................................................................................................................................264
Usage Guidelines......................................................................................................................264
Examples..................................................................................................................................264
HELP..............................................................................................................................................265
Usage Guidelines......................................................................................................................265
Examples..................................................................................................................................265
LIST................................................................................................................................................265
Usage Guidelines......................................................................................................................265
Output Displayed.....................................................................................................................266
Examples..................................................................................................................................266
LOG................................................................................................................................................266
Usage Guidelines......................................................................................................................267
Output Displayed.....................................................................................................................267
Examples..................................................................................................................................267
MATCH..........................................................................................................................................267
Usage Guidelines......................................................................................................................267
Examples..................................................................................................................................268
NOLOG..........................................................................................................................................268
Usage Guidelines......................................................................................................................269
Examples..................................................................................................................................269
SCAN.............................................................................................................................................269
Usage Guidelines......................................................................................................................269
Examples..................................................................................................................................269
14 Table of Contents
10 Triple Contingency...................................................................................................271
Overview.............................................................................................................................................271
Requirements......................................................................................................................................271
How Triple Contingency Works.........................................................................................................271
Hardware Requirements.....................................................................................................................272
Software Requirements.......................................................................................................................272
The RETAINCOUNT Configuration Parameter.................................................................................273
The COPYAUDIT Command..............................................................................................................274
COPYAUDIT Restartability................................................................................................................275
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails.............................275
Triple Contingency Without ZLT..................................................................................................275
Using ZLT to Achieve the same Protection...................................................................................276
Summary.............................................................................................................................................277
11 Subvolume-Level and File-Level Replication...........................................................279
INCLUDE Clauses..............................................................................................................................279
EXCLUDE Clauses..............................................................................................................................279
Wildcard Character (*)........................................................................................................................280
Within Subvolume Names.............................................................................................................280
Within Filenames...........................................................................................................................280
INCLUDE/EXCLUDE and RDFCOM In-Memory Table....................................................................280
INCLUDE and EXCLUDE Processing................................................................................................281
INCLUDEPURGE and EXCLUDEPURGE.........................................................................................281
Error Checking....................................................................................................................................282
Performance Ramifications.................................................................................................................282
Summary Examples............................................................................................................................282
12 Subvolume Name Mapping...................................................................................285
Creating a Mapfile to Define the Rules for Subvolume Name Mapping...........................................285
Rules for Creating Mapfile Mapping Strings......................................................................................285
How an Updater Manages Filename Collisions.................................................................................286
Creating a Maplog to Log Subvolume Name Mapping.....................................................................287
Adding a Mapfile and Maplog to an Updater's Configuration Record.............................................288
Managing Subvolume Name Mapping for Partitioned Files.............................................................288
13 Auxiliary Audit Trails...............................................................................................291
Auxiliary Extractor..............................................................................................................................291
Auxiliary Receiver...............................................................................................................................291
Configuring Extractors and Receivers................................................................................................291
Error conditions.............................................................................................................................291
Configuring Image Trails....................................................................................................................292
Configuring Updaters.........................................................................................................................292
Error Conditions............................................................................................................................292
Ramifications for STOP TMF, Stop-Update-to-Time, and SQL Shared Access DDL Ops..................292
Takeover Ramifications.......................................................................................................................293
Usage of Master and Auxiliary Audit Trails.......................................................................................293
Using Expand Multi-CPU Paths.........................................................................................................293
14 Network Transactions..............................................................................................295
Configuration Changes.......................................................................................................................295
NETWORK Attribute.....................................................................................................................295
Table of Contents 15
NETWORKMASTER Attribute.....................................................................................................296
Network Configuration Record.....................................................................................................296
PRIMARYSYSTEM Network Attribute....................................................................................296
BACKUPSYSTEM Network Attribute.....................................................................................296
REMOTECONTROLSUBVOL (RCSV) Network Attribute.....................................................297
PNETTXVOLUME Network Attribute....................................................................................297
Adding the Network Record....................................................................................................297
RDF Network Synchronizer (RDFNET) Process...........................................................................297
RDF Network Control Files................................................................................................................297
Normal RDF Processing Within a Network Environment.................................................................297
RDF Takeovers Within a Network Environment................................................................................298
Takeover Phase 1 – Local Undo.....................................................................................................298
Takeover Phase 2 – File Undo........................................................................................................298
Takeover Phase 3 – Network Undo...............................................................................................298
Takeover Phase 3 Performance......................................................................................................299
Communication Failures During Phase 3 Takeover Processing....................................................299
Takeover Delays and Purger Restarts............................................................................................299
Takeover Restartability..................................................................................................................299
Takeover and File Recovery...........................................................................................................300
The Effects of Undoing Network Transactions..............................................................................300
Takeover and the RETAINCOUNT Value.....................................................................................302
Network Configurations and Shared Access NonStop SQL/MP DDL Operations............................303
Network Validation and Considerations............................................................................................303
RDF Reinitialization in a Network Environment...............................................................................303
Network Master Subsystem Initialization.....................................................................................303
Non-Network Master Subsystem Initialization............................................................................303
RDF Networks and ABORT or STOP RDF Operations......................................................................304
RDF Networks and Stop-Update-to-Time Operations.......................................................................304
Sample Configurations.......................................................................................................................305
Sample Network Master Configuration........................................................................................305
Sample Non-Network Master Configuration................................................................................306
RDFCOM STATUS Display.................................................................................................................307
15 Process-Lockstep Operation....................................................................................309
Starting a Lockstep Operation............................................................................................................309
The DoLockstep Procedure.................................................................................................................310
Including the DoLockstep in COBOL85 Applications..................................................................310
Invoking DoLockStep by Way of TAL...........................................................................................310
DoLockStep Execution...................................................................................................................310
The Lockstep Transaction....................................................................................................................311
RDF Lockstep File...............................................................................................................................311
Multiple Concurrent Lockstep Operations.........................................................................................312
Lockstep and Auxiliary Audit Trails..................................................................................................312
The Lockstep Gateway Process...........................................................................................................312
NAME............................................................................................................................................312
PROGRAM....................................................................................................................................312
STARTUPMSG...............................................................................................................................313
AUTORESTART.............................................................................................................................313
Disabling Lockstep..............................................................................................................................313
Reenabling Lockstep...........................................................................................................................313
Lockstep Performance Ramifications..................................................................................................313
Lockstep and Auxiliary Audit Trails..................................................................................................314
Lockstep and Network Transactions...................................................................................................314
Lockstep Gateway Event Messages....................................................................................................314
16 Table of Contents
16 NonStop SQL/MX and RDF...................................................................................323
Including and Excluding SQL/MX Objects.........................................................................................323
Creating NonStop SQL/MX Primary and Backup Databases.............................................................323
Creating a NonStop SQL/MX Backup Database From an Existing Primary Database......................326
Online Database Synchronization With NonStop SQL/MX Objects..................................................328
Creating the Fuzzy Copy on the Primary System.........................................................................328
Creating the Fuzzy Copy on the Backup System..........................................................................330
Offline Synchronization for a Single Partition....................................................................................330
Directly From the Primary to the Backup......................................................................................330
Indirectly From the Primary to the Backup By Way of a Temporary File.....................................331
Backup Partition Does Not Already Exist.....................................................................................331
Online Synchronization for a Single Partition....................................................................................331
Correcting Incorrect NonStop SQL/MX Name Mapping...................................................................332
Primary and Backup ANSI Catalog Are the Same........................................................................332
Primary and Backup ANSI Schema Names Are Not the Same.....................................................332
Schema Subvolume Names Are Not the Same..............................................................................332
Guardian Filename Is Incorrect for Partition.................................................................................332
Consideration for Creating Backup Tables.........................................................................................333
Restoring to a Specific Location..........................................................................................................333
Example.........................................................................................................................................333
Comparing NonStop SQL/MX Tables.................................................................................................335
17 Zero Lost Transactions (ZLT).....................................................................................337
How It Works......................................................................................................................................337
Using CommitHoldMode...................................................................................................................340
Hardware Setup..................................................................................................................................340
Assigning CPUs on the Standby System............................................................................................340
RDF Configuration Attributes............................................................................................................341
RDF Remote Mirror Configuration...............................................................................................341
RDF Remote Standby Configuration.............................................................................................341
RDF Configuration Record Validation..........................................................................................341
Extractor Audit-Trail Configuration..............................................................................................341
ALTER RDF Remote Mirror Configuration...................................................................................342
ZLT Takeover Operations...................................................................................................................342
Phase 1 (ZLT Processing)...............................................................................................................342
The Audit-Fixup Process..........................................................................................................343
Phase 2 (Takeover Processing).......................................................................................................343
ZLT Events.....................................................................................................................................343
Error Conditions............................................................................................................................343
STATUS RDF..................................................................................................................................343
RDFCOM INFO and SHOW Commands......................................................................................344
Old Audit-Trail Files......................................................................................................................344
Recovering the Primary System After an RDF ZLT Takeover............................................................344
ZLT and RDF Networks......................................................................................................................346
STOP TMF Operations........................................................................................................................346
During Normal Operations...........................................................................................................346
During ZLT Takeover Processing..................................................................................................346
SQL Shared Access DDL Operations..................................................................................................347
A RDF Commands Quick Reference............................................................................349
RDFCOM Run Syntax.........................................................................................................................349
RDFCOM Commands Quick Reference.............................................................................................349
ADD...............................................................................................................................................349
Table of Contents 17
ALTER............................................................................................................................................349
COPYAUDIT..................................................................................................................................350
DELETE..........................................................................................................................................350
EXIT...............................................................................................................................................350
FC...................................................................................................................................................350
HELP..............................................................................................................................................350
HISTORY.......................................................................................................................................350
INFO..............................................................................................................................................351
INITIALIZE RDF...........................................................................................................................351
OBEY..............................................................................................................................................351
OPEN.............................................................................................................................................351
OUT................................................................................................................................................351
RESET............................................................................................................................................352
SET EXTRACTOR..........................................................................................................................352
SET IMAGETRAIL.........................................................................................................................352
SET MONITOR..............................................................................................................................352
SET NETWORK.............................................................................................................................353
SET PURGER.................................................................................................................................353
SET RDF.........................................................................................................................................353
SET RDFNET.................................................................................................................................354
SET RECEIVER..............................................................................................................................354
SET TRIGGER................................................................................................................................354
SET VOLUME................................................................................................................................354
SHOW............................................................................................................................................355
START RDF....................................................................................................................................355
START UPDATE............................................................................................................................355
STATUS..........................................................................................................................................355
STOP RDF......................................................................................................................................356
STOP SYNCH................................................................................................................................356
STOP UPDATE..............................................................................................................................356
TAKEOVER....................................................................................................................................356
UNPINAUDIT...............................................................................................................................356
VALIDATE CONFIGURATION....................................................................................................356
RDFSCAN Commands Quick Reference............................................................................................357
AT...................................................................................................................................................357
DISPLAY........................................................................................................................................357
EXIT...............................................................................................................................................357
FILE................................................................................................................................................357
HELP..............................................................................................................................................357
LIST................................................................................................................................................357
LOG................................................................................................................................................357
MATCH..........................................................................................................................................357
NOLOG..........................................................................................................................................358
SCAN.............................................................................................................................................358
File Names and Process Identifiers.....................................................................................................358
Reserved File Names.....................................................................................................................358
Disk File Names.............................................................................................................................358
Nondisk Device Names.................................................................................................................358
Process File Names........................................................................................................................358
B Additional Reference Information.............................................................................359
Default Configuration Parameters......................................................................................................359
Sample Configuration File..................................................................................................................360
RDFSNOOP Utility.............................................................................................................................362
18 Table of Contents
RDF System Files.................................................................................................................................362
RDF File Codes....................................................................................................................................364
C Messages...................................................................................................................365
About the Message Descriptions........................................................................................................365
RDF Messages.....................................................................................................................................365
RDFCOM Messages............................................................................................................................413
RDFSCAN Messages...........................................................................................................................461
D Operational Limits.....................................................................................................463
E Using ASAP................................................................................................................465
Architectural Overview......................................................................................................................465
Installation...........................................................................................................................................466
Auto Discovery...................................................................................................................................466
Monitoring Specific RDF Environments.............................................................................................466
Adding and Removing RDF Environments.......................................................................................467
Version Compatibility.........................................................................................................................467
RDF Metrics Reported by ASAP.........................................................................................................467
Index...............................................................................................................................469
Table of Contents 19
List of Figures
1-1 Basic RDF Configuration...............................................................................................................33
1-2 RDF Topologies.............................................................................................................................37
1-3 RDF Tasks to Maintain a Copy of a Database...............................................................................40
1-4 RDF Subsystem Processes.............................................................................................................41
1-5 Extractor Process Operation..........................................................................................................43
1-6 Receiver Process Operation...........................................................................................................45
6-1 Synchronized Databases Before Starting RDF............................................................................157
6-2 Synchronized Databases During RDF Operations......................................................................158
6-3 Synchronized Databases, No Outstanding Audit.......................................................................158
6-4 Synchronized Databases After STOP TMF Command...............................................................159
6-5 Unsynchronized Databases.........................................................................................................159
10-1 RDFZLT with Triple Contingency...............................................................................................276
17-1 ZLT Configuration With a Single Standby/Backup System........................................................338
17-2 ZLT Configuration With a Single Standby/Backup System and With the Remote Mirror Located
at an Intermediate Site.................................................................................................................338
17-3 ZLT Configuration With Standby and Backup Systems Located at Separate Sites....................339
E-1 The RDF/ASAP Environment......................................................................................................466
20 List of Figures
List of Tables
1-1 Audit Records at the Time of a Primary System Failure..............................................................34
2-1 RDF Hardware Requirements.......................................................................................................57
2-2 Software Requirements.................................................................................................................60
3-1 RDF Process and Program Security Attributes.............................................................................76
4-1 RDFCOM Configuration Commands..........................................................................................105
4-2 RDFCOM Operational Commands.............................................................................................106
4-3 RDFCOM Utility Commands......................................................................................................107
4-4 RDFSCAN Commands................................................................................................................110
4-5 RDF States....................................................................................................................................113
5-1 Recovery From File Modification Failures (RDF Event 700).......................................................122
5-2 Recovery From File Open Failures (RDF Event 705)...................................................................123
5-3 Recovery From File Creation Failures (RDF Event 739)..............................................................123
8-1 Systems for RDFCOM Commands..............................................................................................188
8-2 Default User Security for RDFCOM Commands........................................................................189
9-1 Pattern Matching Symbols in RDFSCAN....................................................................................268
D-1 Operational Limits for RDF/IMP, IMPX, and ZLT......................................................................463
E-1 RDF Metrics Reported by ASAP.................................................................................................467
21
List of Examples
1-1 Reciprocal Replication...................................................................................................................50
1-2 Chain Replication..........................................................................................................................51
1-3 Invalid Chain Replication..............................................................................................................51
22 List of Examples
About This Document
The Remote Database Facility (RDF) subsystem enables users at a local (primary) system to maintain a current, online copy of their database on one or more remote (backup) systems, protecting stored information from damage that might occur at the primary system. RDF accomplishes this by sending audit trail information, generated at the primary system by the NonStop Transaction Management Facility (TMF) product, over the network to the backup system. At the backup system, RDF software uses the transported information to update the backup database so that it reflects all changes made to the primary database. The backup database is usually current within seconds of the primary. If system capability is lost at the primary system, service can be recovered quickly at the backup system using the live backup database.
This manual describes the RDF subsystem as implemented in version 1, update 9 (RDF 1.9) for RDF IMP, RDF/IMPX and RDF/ZLT on J-series and H-series RVUs.
This manual contains introductory and conceptual information for new users, followed by directions for installing, configuring, and operating RDF and managing the RDF environment. It covers activities at both the primary and backup sites and fully describes all commands available to users. It provides complete reference information for these commands, including their syntax and semantics. Finally, it lists all RDF messages and describes their meaning and any corrective actions that users must take.
Supported Release Version Updates (RVUs)
This manual supports J06.03 and all subsequent J-series RVUs and H06.03 and all subsequent H-series RVUs, until otherwise indicated by its replacement publications.
Intended Audience
This manual contains information for everyone responsible for RDF installation, management, and operations on HP Integrity NonStop™ systems:
System managers
System operators
Database administrators
System analysts
Application designers
Before reading this manual, you should be familiar with Integrity NonStop system architecture. You should also understand the TMF product on which RDF is based. For information about TMF, see the TMF manuals listed in “Related Information”.
Additionally, it is essential to note that throughout this manual the phrases NonStop SQL products and NonStop SQL refer to the NonStop SQL/MP and NonStop SQL/MX product set.
New and Changed Information in This Edition
Besides minor corrections and clarifications throughout the manual, the significant new and changed information contained in this manual are organised in the following manner:
New features in the RDF 1.9 manual.
Added information on the new option of automatic deletion of RDF control files during
initialization in “Initializing RDF” (page 79) and “INITIALIZE RDF” (page 212).
Added new section on“Managing Multiple RDFEnvironments from One RDFCOM Session”
(page 104).
Added information on altering “UPDATEROPEN” (page 117).
Supported Release Version Updates (RVUs) 23
Added information on running a TAKEOVER command using an OBEY file/IN File in
“Issuing the TAKEOVER Command in an Obey File”(page 142) and “TAKEOVER” (page 255).
Added information about FASTUPDATEMODE in “Near Real Time Read Access to Updates
on the Primary System” (page 149) and “SET RECEIVER” (page 232).
Added information on support for long filenames in “Process File Names” (page 358).
Added the figure for Triple contingency under “Using ZLT to Achieve the same Protection”
(page 276).
Added information on Subvolume/File Level REPLICATEPURGE option in
Chapter 11 “Subvolume-Level and File-Level Replication”.
Added the section “INCLUDEPURGE and EXCLUDEPURGE” (page 281).
Added a new EMS event 931 that displays the ANSI name of a SQL/MX object on which a
SHARED ACCESS DDL operation was performed.
Added Fast TAKEOVER Guidelines in “How to Plan for the Fastest Movement of Business
Operations to Your Backup System After Takeover” (page 144).
Updates in the RDF 1.9 manual
Updated description of AUDITTRAILBUFFER attribute in “Configuring TMF for RDF
Operations on the Primary System” (page 60).
Updated information on Online dumps and configuration of UPDATEROPEN mode in
“Configuring TMF for RDF Operations on the Backup System” (page 61).
Updated recommended number of Audited files per volume in “Audited Files Per Volume
on Primary System” (page 62).
Updated details on PROTECTED mode in “UPDATEROPEN Attribute” (page 86).
Added the section “Dedicated Image Trails or Image Trails on UpdateVolumes” (page 89).
Added the section “Using Scripts for Easy and Fast RDF Initialization and Configuration”
(page 103).
Added and updated Table 4-5 “RDF States” in “RDF States” (page 113).
Updated “Main STATUS RDF Display” (page 114).
Updated effects and workaround for “Exceeding the Maximum Number of Concurrent File
Opens” (page 125).
Updated significance of audit pinning operation and precautions in “Audit Trails Pinned
by RDF on the Primary System” (page 131).
Added significance of taking TMF and online dumps on backup system with respect to
business continuity in “TMF and Online Dumps on the Backup System” (page 154).
Added the following sections in DDL Operations:
“With Shared Access” (page 160) “Without Shared Access” (page 161) “Adding a New Column” (page 161)
Updated the STATUS command with description of its elements on (page 244).
Updated the example to reflect new features in “Sample Configuration File” (page 360).
Updated new limits for number of files open per updater in Table D-1 “Operational Limits
for RDF/IMP, IMPX, and ZLT”.
Updated message 733 in Appendix C (page 365).
Added new error messages in “Messages” (page 365).
Document Organization
This manual presents three levels of information: introductory and conceptual information (Chapter 1), task-oriented guidelines (Chapters 2 through 7 and Chapters 10 through 14), and reference information (Chapters8 and 9 and Appendixes A, B,and C). The following table shows
24
where to look for the information you need, based upon the responsibility you have or the kind of tasks you perform at your site:
Chapter/AppendixResponsibility
AllSystem manager
1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, A, C, D, ESystem operator
1, 2, 3, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, A, B, C, D, EDatabase
administrator
1, 2, 3, 10, 11, 12, 13, 14, 15, 16, 17System analyst
1, 2, 10, 11, 12, 14, 15, 17, A, B, C, DApplication designer
The chapters and appendixes contain this information:
Chapter 1 (page 31) introduces RDF and its goals, features, and capabilities; describes the
main RDF processes and their functions; introduces the RDFCOM and RDFSCAN command interfaces used to communicate with the subsystem; and presents an overview of RDF operation.
Chapter 2 (page 57) describes how to configure hardware and prepare software for RDF
installation and operation.
Chapter 3 (page 69) explains how to install and configure RDF, including how to copy
databases and files from the primary system to the backup system before starting RDF.
Chapter 4 (page 99) discusses how to operate RDF, including how to issue RDFCOM and
RDFSCAN commands and how to display RDF configuration parameters and operating statistics, change configuration parameters, and interpret log files.
Chapter 5 (page 121)explains how to manage the RDF environment, including how to recover
from file-system errors, respond to failures, stop and restart the RDF product, direct the backup system to take over application processing when a disaster occurs at the primary system site, and perform other specialized tasks.
Chapter 6 (page 157)details how to back up altered database structures and how to
resynchronize the primary and backup databases.
Chapter 7 (page 167)describes how to synchronize entire databases or selected database
volumes online.
Chapter 8 (page 187) and Chapter 9 (page 261) present the syntax of all RDFCOM and
RDFSCAN commands, respectively, and give examples of these commands.
Chapter 10 (page 271) describes the triple contingency feature.
Chapter 11 (page 279) describes subvolume-level and file-level replication.
Chapter 12 (page 285) describes how to use the mapfile, maplog, and updater configuration
record to support mapping between primary system and backup system subvolumes.
Chapter 13 (page 291) describes support for auxiliary audit trails.
Chapter 14 (page 295) describes support for network transactions.
Chapter 15 (page 309) describes lockstep operation.
Chapter 16 (page 323) describes SQL/MX database setup for RDF.
Chapter 17 (page 337) describes the Zero Lost Transactions (ZLT) functional capability.
Appendix A (page 349) summarizes the syntax of all RDFCOM and RDFSCAN commands.
Appendix B (page 359) provides additional information about RDF, including reserved
words, default values for configuration parameters, and system file descriptions.
Appendix C (page 365) lists all messagesthat can be generated by the lockstep gateway, RDF
processes, RDFCOM, and RDFSCAN, and their probable causes, effects, and recovery actions.
Appendix D (page 463) lists all the operational limits that apply to the RDF/IMP, IMPX, and
ZLT products.
Appendix E (page 465) describes how to monitor RDF entities using ASAP.
Document Organization 25
Notation Conventions
General Syntax Notation
This list summarizes the notation conventions for syntax presentation in this manual.
UPPERCASE LETTERS
Uppercase letters indicate keywords and reserved words. Type these items exactly as shown. Items not enclosed in brackets are required. For example:
MAXATTACH
Italic Letters
Italic letters, regardless of font, indicate variable items that you supply. Items not enclosed in brackets are required. For example:
filename
Computer Type
Computer type letters indicate:
C and Open System Services (OSS) keywords, commands, and reserved words. Type these items exactly as shown. Items not enclosed in brackets are required. For example:
Use the cextdecs.h header file.
Text displayed by the computer. For example:
Last Logon: 14 May 2006, 08:02:23
A listing of computer code. For example
if (listen(sock, 1) < 0) { perror("Listen Error"); exit(-1); }
Bold Text
Bold text in an example indicates user input typed at the terminal. For example:
ENTER RUN CODE
?123 CODE RECEIVED: 123.00
The user must press the Return key after typing the input.
[ ] Brackets
Brackets enclose optional syntax items. For example:
TERM [\system-name.]$terminal-name
INT[ERRUPTS]
A group of items enclosed in brackets is a list from which you can choose one item or none. The items in the list can be arranged either vertically, with aligned brackets on each side of the list, or horizontally, enclosed in a pair of brackets and separated by vertical lines. For example:
FC [ num ] [ -num ] [ text ]
K [ X | D ] address
26
{ } Braces
A group of items enclosed in braces is a list from which you are required to choose one item. The items in the list can be arranged either vertically, with aligned braces on each side of the list, or horizontally, enclosed in a pair of braces and separated by vertical lines. For example:
LISTOPENS PROCESS { $appl-mgr-name } { $process-name }
ALLOWSU { ON | OFF }
| Vertical Line
A vertical line separates alternatives in a horizontal list that is enclosed in brackets or braces. For example:
INSPECT { OFF | ON | SAVEABEND }
… Ellipsis
An ellipsis immediately following a pair of brackets or braces indicates that you can repeat the enclosed sequence of syntax items any number of times. For example:
M address [ , new-value ]
- ] {0|1|2|3|4|5|6|7|8|9}
An ellipsis immediately following a single syntax item indicates that you can repeat that syntax item any number of times. For example:
"s-char"
Punctuation
Parentheses, commas, semicolons, and other symbols not previously described must be typed as shown. For example:
error := NEXTFILENAME ( filename ) ;
LISTOPENS SU $process-name.#su-name
Quotation marks around a symbol such as a bracket or brace indicate the symbol is a required character that you must type as shown. For example:
"[" repetition-constant-list "]"
Item Spacing
Spaces shown between items are required unless one of the items is a punctuation symbol such as a parenthesis or a comma. For example:
CALL STEPMOM ( process-id ) ;
If there is no space between two items, spaces are not permitted. In this example, no spaces are permitted between the period and any other items:
$process-name.#su-name
Line Spacing
If the syntax of a command is too long to fit on a single line, each continuation line is indented three spaces and is separated from the preceding line by a blank line. This spacing distinguishes items in a continuation line from items in a vertical list of selections. For example:
ALTER [ / OUT file-spec / ] LINE
[ , attribute-spec ]
Notation Conventions 27
!i and !o
In procedure calls, the !i notation follows an input parameter (one that passes data to the called procedure); the !o notation follows an output parameter (one that returns data to the calling program). For example:
CALL CHECKRESIZESEGMENT ( segment-id !i , error ) ; !o
!i,o
In procedure calls, the !i,o notation follows an input/output parameter (one that both passes data to the called procedure and returns data to the calling program). For example:
error := COMPRESSEDIT ( filenum ) ; !i,o
!i:i
In procedure calls, the !i:i notation follows an input string parameter that has a corresponding parameter specifying the length of the string in bytes. For example:
error := FILENAME_COMPARE_ ( filename1:length !i:i , filename2:length ) ; !i:i
!o:i
In procedure calls, the !o:i notation follows an output buffer parameter that has a corresponding input parameter specifyingthe maximum length of the output buffer in bytes. For example:
error := FILE_GETINFO_ ( filenum !i , [ filename:maxlen ] ) ; !o:i
Notation for Messages
This list summarizes the notation conventions for the presentation of displayed messages in this manual.
Bold Text
Bold text in an example indicates user input typed at the terminal. For example:
ENTER RUN CODE
?123 CODE RECEIVED: 123.00
The user must press the Return key after typing the input.
Nonitalic Text
Nonitalic letters, numbers, and punctuation indicate text that is displayed or returned exactly as shown. For example:
Backup Up.
Italic Text
Italic text indicates variable items whose values are displayed or returned. For example:
p-register
process-name
[ ] Brackets
Brackets enclose items that are sometimes, but not always, displayed. For example:
Event number = number [ Subject = first-subject-value ]
28
A group of items enclosed in brackets is a list of all possible items that can be displayed, of which one or none might actually be displayed. The items in the list can be arranged either vertically, with aligned brackets on each side of the list, or horizontally, enclosed in a pair of brackets and separated by vertical lines. For example:
proc-name trapped [ in SQL | in SQL file system ]
{ } Braces
A group of items enclosed in braces is a list of all possible items that can be displayed, of which one is actually displayed. The items in the list can be arranged either vertically, with aligned braces on each side of the list, or horizontally, enclosed in a pair of braces and separated by vertical lines. For example:
obj-type obj-name state changed to state, caused by { Object | Operator | Service }
process-name State changed from old-objstate to objstate { Operator Request. } { Unknown. }
| Vertical Line
A vertical line separates alternatives in a horizontal list that is enclosed in brackets or braces. For example:
Transfer status: { OK | Failed }
% Percent Sign
A percent sign precedes a number that is not in decimal notation. The % notation precedes an octal number. The %B notation precedes a binary number. The %H notation precedes a hexadecimal number. For example:
%005400
%B101111
%H2F
P=%p-register E=%e-register
Related Information
This manual belongs to the NonStop data management library of manuals. It is the only manual that fully and directly supports RDF. To use this manual effectively, however, you should be familiar with the information for the TMF product described in the following publications:
TMF Introduction, which provides a general overview of TMF concepts and capabilities for
business professionals, application designers and programmers, and system managers and administrators.
TMF Planning and Configuration Guide, whichprovides information on howto plan, configure,
and manage a TMF system.
TMF Operations and Recovery Guide, which describes how to monitor TMF operations,
reconfigure TMF, perform online and audit dumps, and respond to a variety of exception conditions.
TMF Reference Manual, which covers the syntax, cautionary considerations, and examples
for using the TMFCOM command interface to the TMF product.
Another manual in the Data Management Library, Introduction to Data Management, provides an overview of NonStop data management products, including RDF, and discusses the use of these products in OLTP applications.
Related Information 29
Manuals for other software products that contain information helpful to RDF users include:
SQL/MX Installation and Management Guide and the SQL/MP Installation and Management
Guide, which explain how to install the NonStop SQL/MX and SQL/MP relational database management systems andhow to plan, create, and manage SQL/MX and SQL/MP databases and applications.
SQL/MX Reference Manual and the SQL/MP Reference Manual, which describe the command
and statement syntax and usage considerations for the NonStop SQL/MX and SQL/MP relational database management systems, including interaction with the NonStop SQL product for database protection.
SQL/MP Version Management Guide, which describes version management for different
versions of the NonStop SQL/MP software, catalogs, objects, messages, files, and programs.
TACL Reference Manual, which discusses operations available in the HP Tandem Advanced
Command Language (TACL), the standard command interface to the NonStop operating system. This is the interface through which you run RDFCOM and RDFSCAN and manage files used by them.
File Utility Program (FUP) Reference Manual, which describes the command syntax and error
messages for the File Utility Program (FUP).
Operator Messages Manual, which describes various error codes.
Guardian Procedure Errors and Messages Manual, which provides additional details about
understanding and correcting file system errors.
Publishing History
Publication DateProduct VersionPart Number
July 2005NonStop RDF/IMPX 1.6 (T0346 and T0347)
NonStop RDF/ZLT 1.6 (T0618)
529826-002
November 2005NonStop RDF/IMPX 1.7 (T0346 and T0347)
NonStop RDF/ZLT 1.7 (T0618)
529826-003
August 2007NonStop RDF/IMPX 1.8 (T0346 and T0347) and Lockstep Gateway (T1226) NonStop RDF/ZLT 1.8 (T0618)
529826–004
May 2009NonStop RDF/IMPX 1.9 (T0346 and T0347) and Lockstep Gateway (T1226) NonStop RDF/ZLT 1.9 (T0618)
529826–005
June 2009NonStop RDF/IMPX 1.9 (T0346 and T0347) and Lockstep Gateway (T1226) NonStop RDF/ZLT 1.9 (T0618)
529826–006
HP Encourages Your Comments
HP encourages your comments concerning this document. We are committed to providing documentation that meets your needs. Send any errors found, suggestions for improvement, or compliments to:
pubs.comments@hp.com
Include the document title, part number, and any comment, error found, or suggestion for improvement you have concerning this document.
30
Loading...
+ 448 hidden pages