HP XP P9500, P9000 for Business Continuity Manager Software User's Manual

P9000 for Business Continuity Manager Software User Guide
Abstract
This manual describes how to use the following program products: HP StorageWorks P9000 for Business Continuity Manager Software, HP StorageWorks P9000 for Business Continuity Manager Extended CT Group Software, and HP StorageWorks P9000 for Business Continuity Manager Continuous Access Journal 4x4 Extended CT Software.
HP Part Number: T5253-96059 Published: October 2011 Edition: Eleventh
© Copyright 2007, 2011 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Acknowledgments
Microsoft, Windows, and Windows XP are U.S. registered trademarks of Microsoft Corporation.
Hitachi and Universal Replicator are registered trademarks of Hitachi, Ltd.
ShadowImage and TrueCopy are registered trademarks of Hitachi, Ltd. and Hitachi Data Systems Corporation.
Export Requirements
You may not export or re-export this document or any copy or adaptation in violation of export laws or regulations.
Without limiting the foregoing, this document may not be exported, re-exported, transferred or downloaded to or within (or to a national resident of) countries under U.S. economic embargo, including Cuba, Iran, North Korea, Sudan, and Syria. This list is subject to change.
This document may not be exported, re-exported, transferred, or downloaded to persons or entities listed on the U.S. Department of Commerce Denied Persons List, Entity List of proliferation concern or on any U.S. Treasury Department Designated Nationals exclusion list, or to parties directly or indirectly involved in the development or production of nuclear, chemical, biological weapons, or in missile technology programs as specified in the U.S. Export Administration Regulations (15 CFR 744).
Revision History
DescriptionDateEdition
This document revision applies to Business Continuity Manager version 5.1 and higher.September 2007First
This document revision applies to Business Continuity Manager version 5.5 and higher.January 2008Second
This document revision applies to Business Continuity Manager version 6.00 and higher.June 2008Third
This document revision applies to Business Continuity Manager version 6.10 and higher.December 2008Fourth
This document revision applies to Business Continuity Manager version 6.20 and higher.June 2009Fifth
This document revision applies to Business Continuity Manager version 6.30 and higher.December 2009Sixth
This document revision applies to Business Continuity Manager version 6.40 and higher.June 2010Seventh
This document revision applies to Business Continuity Manager version 6.50 and higher.October 2010Eighth
This document revision applies to Business Continuity Manager version 6.50 and higher.November 2010Ninth
This document revision applies to Business Continuity Manager version 6.60 and higher.May 2011Tenth
This document revision applies to Business Continuity Manager version 6.60 and higher.October 2011Eleventh
Contents
1 Overview of HP P9000 for Business Continuity Manager Software..................16
Why use Business Continuity Manager?....................................................................................16
Communication with HP P9000 Command View Advanced Edition Suite Software..........................17
Products that can be controlled by Business Continuity Manager...................................................18
Business Copy for Mainframe (BC Z)....................................................................................19
Continuous Access Synchronous for Mainframe (Cnt Ac-S Z)....................................................19
Continuous Access Asynchronous for Mainframe (Cnt Ac-A).....................................................20
Continuous Access Journal for Mainframe (Cnt Ac-J Z)............................................................20
Remote volume operations.......................................................................................................21
Grouping to simplify volume operations.....................................................................................22
Copy groups.....................................................................................................................22
Consistency groups............................................................................................................23
Journal groups..............................................................................................................24
Open/MF Consistency Groups.......................................................................................25
Copy group containers.......................................................................................................25
Extended Consistency Groups.........................................................................................26
Terminology by Copy Type..................................................................................................27
Data Center Configurations......................................................................................................27
2DC Configuration.............................................................................................................27
3DC Cascade Configuration...............................................................................................28
3DC Multi-Target Configuration...........................................................................................28
3DC Multi-Target Configuration with the Delta Resync Function.................................................28
2DC Configuration with HyperSwap and Continuous Access Journal........................................29
4x4 Configuration.............................................................................................................29
4x4x4 Cascade Configuration............................................................................................30
4x4x4 Multi-Target Configuration.........................................................................................31
Compatible FlashCopy linkage configuration.........................................................................32
Functions Supporting the Automatic Operation (BCM Monitor)......................................................32
Disaster Recovery Functions.................................................................................................33
Operational testing function................................................................................................33
Functions that Support Copy Group Definitions and Operations...............................................33
Specified Time Suspend functions.........................................................................................34
Functions for Acquiring Volume Information...........................................................................34
Logical Path Control function................................................................................................34
For monitoring events and errors..........................................................................................34
Functionalities Dependent on the Storage System........................................................................35
Storage System Identification ...................................................................................................38
Preparing to set up Business Continuity Manager........................................................................39
2 Business Continuity Manager with replication products..................................41
Storage System Settings and Copy Group Definitions..................................................................41
Replication products and data center configurations....................................................................42
The 2DC configurations......................................................................................................42
The 3DC configurations......................................................................................................43
The 3DC Cascade configuration.....................................................................................44
The 3DC Multi-Target configuration..................................................................................44
Operations during local or remote site storage system maintenance or a failure.....................45
Operations during primary site host maintenance or a host failure.......................................46
The Delta Resync configuration........................................................................................47
2DC Configuration with HyperSwap and Continuous Access Journal........................................48
The 4x4 configuration........................................................................................................50
The 4x4x4 Cascade configuration.......................................................................................51
Contents 3
Operations during a host failure at the primary site...........................................................52
Operations during a storage system failure at the primary site.............................................53
The Compatible FlashCopy linkage configuration...................................................................54
Overview of functions....................................................................................................54
Prerequisites for the Compatible FlashCopy linkage configuration........................................55
Sample replication product combinations...................................................................................57
Understanding Copy Group Operations....................................................................................58
Configuration for Copy Groups Used by Business Continuity Manager......................................59
Configuration Patterns that Allow Pair Creation..................................................................59
Configuration Patterns that Prohibit Pair Creation...............................................................60
Copy Group Operation Commands.....................................................................................62
Using CLI Commands to Obtain Status.................................................................................63
Meaning of copy pair status...........................................................................................63
Using the YKQRYDEV command to obtain the copy pair status of specified volumes...............66
Using the YKQUERY command to obtain the copy pair status for each copy pair...................69
Acquiring Copy Pair information from one site of a Copy Pair.............................................71
Copy Pair Status Transitions.................................................................................................71
Status Monitoring for Copy Groups......................................................................................73
Status Monitoring by Copy Pair.......................................................................................73
Status Monitoring by Volume..........................................................................................74
3 Understanding Business Continuity Manager functions..................................75
Remote DKC Control Function...................................................................................................75
Functions That Support Disaster Recovery...................................................................................77
The Reverse Resync Function................................................................................................77
The Continuous Access Synchronous Consistency Preservation Function.....................................78
The Operational Testing Function..............................................................................................79
Functions That Support Copy Group Definitions and Operations...................................................80
The Copy Group Configuration Check Function......................................................................81
Copy Group Definition File Generation Function Using CSV Files..............................................81
SMS Storage Group Import Function.....................................................................................82
The Specified Time Suspend Function........................................................................................83
NORMAL ATTIME Suspend Function.....................................................................................83
Performing a Backup Using the NORMAL ATTIME Suspend Function (for Cnt Ac-A)................84
Performing a Backup Using the NORMAL ATTIME Suspend Function (for BC Z).....................84
When Suspensions are Executed (NORMAL ATTIME Suspend Function)................................85
NORMAL ATTIME Suspend Function: Recommendations for Backing Up Multiple
Generations.................................................................................................................85
CAJ ATTIME Suspend Function.............................................................................................86
Performing a Backup Using the CAJ ATTIME Suspend Function (for Cnt Ac-J Z)......................86
Relationship Between the ATTIME Suspend Time and Timeout Times.....................................87
When suspensions are executed (CAJ ATTIME Suspend Function)........................................87
CAJ ATTIME Suspend Function: Recommendations for Backing Up Multiple Generations........89
Differences in functionality between NORMAL ATTIME and CAJ ATTIME Suspend function..........89
Functions that Acquire Volume Information.................................................................................90
Local Scan........................................................................................................................90
Remote Scan.....................................................................................................................90
NG Scan..........................................................................................................................91
Volumes Used for NG Scans...........................................................................................92
Copy Types for Which a Copy Group Including Non Gen'ed Volumes Can Be Defined..........92
Operating a Copy Group Including Non Gen'ed Volumes..................................................94
Notes on Executing an NG Scan....................................................................................95
The Logical Path Control Function..............................................................................................95
Inter-Control Unit Logical Paths.............................................................................................96
Inter-Disk Controller Logical Paths.........................................................................................97
4 Contents
Function That Monitors Event and Errors.....................................................................................98
4 Preparing to use Business Continuity Manager.............................................99
Preparation overview..............................................................................................................99
Specifying the Business Continuity Manager Log output destination.............................................100
Setting up Storage Systems....................................................................................................100
Settings in the Set Defaults panel............................................................................................101
Specifying the Device Address Domain ID...........................................................................101
Setting a prefix for configuration files..................................................................................102
Creating configuration files....................................................................................................102
Overview of configuration files..........................................................................................102
Required settings for configuration files...............................................................................105
Preparing the configuration files on each site.......................................................................105
Acquiring volume information (preparations)............................................................................106
Performing a local scan to acquire volume information..........................................................106
Performing an NG Scan (on a Non-Gen'ed Volume) to acquire device configuration
information.....................................................................................................................106
Preparing the hardware (NG Scan)...............................................................................106
Preparing the configuration files (NG Scan)....................................................................107
Performing a remote scan to acquire remote storage system information..................................107
Specifying a Route List ID.............................................................................................109
Performing a Remote Scan............................................................................................110
Assigning a Dummy Device Number..............................................................................110
Creating a logical path.........................................................................................................111
Establishing a logical path................................................................................................112
Establishing an Inter-Control Unit logical path......................................................................113
Acquiring path information from a storage system................................................................113
Checking the Prerequisite Conditions for Acquiring a Port Number....................................114
Establishing a logical path in the reverse direction................................................................115
Deleting a logical path.....................................................................................................115
Setting up the Remote DKC Control Function environment...........................................................115
Configuring routes...........................................................................................................116
Procedures for configuring routes...................................................................................116
Example of configuring routes.......................................................................................117
Defining the route list........................................................................................................118
Route List Settings........................................................................................................119
Registering a command device..........................................................................................119
Registering a command device in the forward direction....................................................119
Command device setup procedure.................................................................................119
Registering a command device in the reverse direction.....................................................120
Command device definition rules...................................................................................120
Deleting command devices................................................................................................120
Deleting Command Devices Registered in a Route List......................................................121
Deleting Command Devices Not Registered in a Route List................................................121
Creating an Inter-Control Unit Logical Path dedicated to the command device..........................122
Supporting a Cnt Ac-S Z or Cnt Ac-A Z copy group configuration......................................122
Supporting a Continuous Access Journal for Mainframe copy group configuration...............123
Preparing to use the Remote DKC Control function................................................................123
Configuration definition for using the Continuous Access Synchronous Consistency Preservation
function...............................................................................................................................123
Defining a copy group.....................................................................................................124
Environment definition for using the Reverse Resync function.......................................................124
When the Reverse Resync function is used from the primary site and one or more other sites......125
When the Reverse Resync function is used only from the primary site.......................................125
Contents 5
5 Configuration Definitions.........................................................................126
Defining a 2DC configuration................................................................................................126
A 2DC configuration example...........................................................................................126
Preparing the hardware (2DC configuration).......................................................................127
Preparing the configuration files (2DC configuration)............................................................128
Preparing the configuration files (2DC configuration)............................................................129
Flow of configuration definitions (2DC configuration)............................................................129
Secondary site with a host............................................................................................129
Secondary site without a host.......................................................................................130
Definition procedure (2DC configuration)............................................................................131
Defining a 3DC Cascade configuration...................................................................................135
A 3DC Cascade configuration example..............................................................................136
Preparing the hardware (3DC Cascade configuration)..........................................................136
Preparing the Configuration Files (3DC Cascade Configuration).............................................137
Preparing the configuration files (3DC Cascade configuration)...............................................138
Definition procedure (3DC Cascade configuration)...............................................................139
Steps on the Primary Host (3DC Cascade Configuration)..................................................140
Steps on the Secondary Host (3DC Cascade Configuration).............................................143
Defining a 3DC Multi-Target configuration...............................................................................148
A 3DC Multi-Target configuration example..........................................................................148
Preparing the hardware (3DC Multi-Target configuration)......................................................149
Preparing the Configuration Files (3DC Multi-Target Configuration).........................................150
Preparing the Configuration Files (3DC Multi-Target Configuration).........................................151
Definition Procedure (3DC Multi-Target Configuration)...........................................................152
Performing a Scan (3DC Multi-Target Configuration)........................................................153
Settings for Operations on the Primary Site (3DC Multi-Target Configuration)......................153
Settings for Operations on the Local Site (3DC Multi-Target Configuration)..........................155
Settings for Operations on the Remote Site (3DC Multi-Target Configuration).......................157
Creating a Copy Group (3DC Multi-Target Configuration)................................................159
Defining a Delta Resync Configuration.....................................................................................160
Configuration Example (Delta Resync configuration)..............................................................160
Preparing the Hardware (Delta Resync Configuration)...........................................................161
Preparing the Configuration Files (Delta Resync Configuration)...............................................162
Preparing the Configuration Files (Delta Resync Configuration)...............................................164
Definition Procedure (Delta Resync Configuration).................................................................166
Creating a Disk Configuration Definition File...................................................................167
Settings on the Primary Site..........................................................................................167
Settings on the Local Site (Delta Resync Configuration).....................................................169
Settings on the Remote Site (Delta Resync Configuration)..................................................171
Creating a Copy Group (Delta Resync Configuration)......................................................173
Copy pair status transitions for Delta Resync pairs................................................................174
Defining a 2DC configuration with HyperSwap and Cnt-Ac J Z ..................................................176
Configuration example (HyperSwap)..................................................................................176
Preparing the hardware (HyperSwap).................................................................................177
Preparing the Configuration Files (HyperSwap)....................................................................178
Preparing the configuration files (HyperSwap)......................................................................179
Definition procedure (HyperSwap)......................................................................................181
Performing a scan.......................................................................................................181
Setting up for performing operations at the primary site...................................................182
Setting up for performing operations at the secondary site................................................185
Making a copy group..................................................................................................186
Defining a 4x4 configuration.................................................................................................187
A 4x4 configuration example............................................................................................187
Preparing the hardware (4x4 configuration)........................................................................190
6 Contents
Preparing the Configuration Files (4x4 Configuration)...........................................................192
Preparing the configuration files (4x4 configuration).............................................................192
Definition procedure (4x4 configuration).............................................................................193
Defining a new 4x4 configuration.................................................................................194
Expanding to a 4x4 configuration by adding storage systems to a 2DC configuration..........195
Changing to a 4x4 Configuration Without Changing the Existing Storage System
Configuration.............................................................................................................196
Adding a new journal group to a 4x4 configuration........................................................197
Adding an Existing Journal Group to a 4x4 Configuration................................................198
Checking the Registration Status of EXCTG (4x4 Configuration)..............................................199
EXCTG Registration when the Copy Operation is Performed in the Forward Direction...........199
EXCTG Registration when the Copy Operation is Performed in the Reverse Direction............200
Deleting a journal group from a copy group container with EXCTG ID specified (4x4
configuration)..................................................................................................................201
Defining a 4x4x4 Cascade Configuration................................................................................201
Configuration example (4x4x4 Cascade)............................................................................202
Preparing Hardware (4x4x4 Cascade)...............................................................................203
Preparing the Configuration Files (4x4x4 Cascade)..............................................................204
Definition procedure (4x4x4 Cascade)...............................................................................206
Defining a new 4x4x4 Cascade configuration................................................................207
Expanding to a 4x4x4 Cascade Configuration by Adding a Continuous Access Journal Z
Copy Group to a Continuous Access Synchronous Z Copy Group......................................216
Expanding to a 4x4x4 Cascade Configuration by Adding a Series of Storage Systems to a
3DC Cascade Configuration........................................................................................225
Checking the registration status of the EXCTG......................................................................230
Defining a configuration so that the CAJ ATTIME Suspend function can be used............................230
Configuration example (CAJ ATTIME suspend).....................................................................230
Preparing the hardware (CAJ ATTIME Suspend)...................................................................231
Preparing the software (CAJ ATTIME Suspend).....................................................................232
Defining a configuration so that the Open/MF Consistency Preservation function can be used........234
Configuration example (Open/MF Consistency)...................................................................234
Preparing the hardware (Open/MF Consistency).................................................................235
Preparing the software (Open/MF Consistency)...................................................................236
Definition procedure (Open/MF Consistency)......................................................................236
Preparing at the Open System Side...............................................................................237
Definition Procedure for Business Continuity Manager......................................................237
When Defining a New Copy Group.........................................................................237
When Assigning an Attribute to a Existing Copy Group...............................................237
When Disabling an Attribute of an Existing Copy Group.............................................237
6 Importing copy groups............................................................................239
Generating a copy group definition file by using CSV files.........................................................239
Generating a copy group definition file (CSV file for copy group definition).............................239
Required files (CSV file for copy group definition)............................................................239
Attributes to be defined in a base copy group definition file..............................................240
CSV Copy Group Rules................................................................................................241
Generation Example (CSV File for Copy Group Definition)................................................243
Example of JCL (for CSV copy group definition)...............................................................244
Generating CSV files for copy group definition....................................................................245
Required files (CSV file for copy group definition)............................................................245
Generation example (CSV file for copy group definition)..................................................245
Example of JCL for CSV file for copy group definition.......................................................246
Updating an existing copy group definition file....................................................................247
Importing definitions for monitoring PPRC copy pairs.................................................................248
Example of a PPRC copy pair configuration.........................................................................248
Contents 7
Preparing the hardware....................................................................................................249
Preparing the software......................................................................................................249
Copy types and generation units for which definitions can be generated.................................249
Supported PPRC commands..............................................................................................249
Generating copy group definition files from the ISPF panel....................................................251
Example of importing PPRC copy pairs...............................................................................252
When monitoring PPRC Cnt Ac-S/Cnt Ac-A copy pairs.....................................................252
When monitoring only PPRC BC Z copy pairs.................................................................252
When monitoring only PPRC Cnt Ac-S Z/BC Z copy pairs.................................................253
Importing SMS storage group definitions.................................................................................254
Preparing to use SMS storage group definitions...................................................................254
Importing storage group information..............................................................................255
Before importing new SMS storage groups................................................................256
Importing new storage group information.......................................................................256
Importing changed storage volume information...............................................................257
About the SMS list output function......................................................................................257
JCL example (SMS storage group definition)...................................................................257
7 Using Business Continuity Manager..........................................................258
Before using copy pairs.........................................................................................................258
Preparing to Use the Remote DKC Control Function...............................................................258
When Executing Copy Group Operation Commands............................................................258
Batch Processing for Multiple Copy Pairs.............................................................................260
Copy Pair Operations Common to All Copy Types................................................................260
Copy Pair Operations for BC Z and Cnt Ac-A......................................................................260
Copy Pair Operations for BC Z..........................................................................................261
Copy Pair Operations for Cnt Ac-S Z..................................................................................261
Copy Pair Operations for Cnt Ac-J Z...................................................................................261
Messages Output from Business Continuity Manager............................................................261
Using configuration files........................................................................................................262
Working with scripts.............................................................................................................262
Expanding to REXX Variables............................................................................................262
Acquiring Copy Pair Status................................................................................................263
Creating and Dissolving Copy Pairs....................................................................................263
Changing the Copy Pair Status..........................................................................................263
Monitoring the Copy Pair Status.........................................................................................263
Checking the copy group configuration...............................................................................263
Sample Script..................................................................................................................263
About Scripts and YKLOAD...............................................................................................264
Operating a copy group.......................................................................................................264
Preparing to Use a Copy Group........................................................................................264
Starting Backup Operations...............................................................................................264
Suspending a Copy Group...............................................................................................264
Resynchronizing a Copy Group.........................................................................................264
Displaying the Status of a Copy Group...............................................................................264
Operating a Copy Group.................................................................................................264
Creating a Copy Group....................................................................................................265
Backing Up a Copy Group...............................................................................................267
Operational Testing..........................................................................................................267
Backup operations using the Cnt Ac-J Z ATTIME Suspend function...............................................268
Status During Normal Operations......................................................................................268
Obtaining Cnt Ac-J Z ATTIME Backups................................................................................269
If an Error Occurs While Copy Pairs Are Suspended.............................................................271
Determining the Volume to Be Used for Restoration...............................................................272
Check whether the Cnt Ac-J Z S-VOL is usable.................................................................272
8 Contents
Check which Business Copy S-VOL generation is usable...................................................272
Setting and Canceling ATTIME Suspension Information.........................................................272
Monitoring status and changing configurations in a 3DC Cascade configuration..........................273
Monitoring the Copy Status...............................................................................................273
When the Cnt Ac-S consistency preservation function is not used.......................................274
When the Cnt Ac-S consistency preservation function is used.............................................275
Changing Configurations of Cnt Ac-S Z and Cnt Ac-J Z Copy Groups.....................................275
Using Compatible FlashCopy linkage configurations.................................................................278
Using the Compatible FlashCopy Linkage Function in a 2DC Configuration.............................278
Compatible FlashCopy Linkage When the Copy Pair Is in the DUPLEX Status.......................279
Compatible FlashCopy linkage using the Preserve Mirror function when the copy pair is in the
DUPLEX status (Continuous Access Synchronous Z)...........................................................280
Compatible FlashCopy Linkage When the Copy Pair Is in the Suspend Status......................282
Using the Compatible FlashCopy Linkage Function in a 3DC Multi-Target Configuration............283
Determining the Compatible FlashCopy Copy Status.............................................................285
How to determine the Compatible FlashCopy copy status.................................................285
Example of a script that determines the Compatible FlashCopy copy status.........................285
Monitoring PPRC copy pairs...................................................................................................286
Using an Open/MF consistency group....................................................................................286
Operating an Open/MF consistency group ........................................................................286
Resynchronizing an Open/MF consistency group.................................................................287
8 Maintenance and Troubleshooting Operations...........................................288
Using a 2DC Configuration...................................................................................................288
Failover Procedure...........................................................................................................288
Failback Procedure..........................................................................................................290
Notes on Failovers and Failbacks in a 2DC Configuration.....................................................291
Notes on operating copy pairs.....................................................................................292
Notes on dissolving copy pairs.....................................................................................292
Using a 3DC Cascade Configuration......................................................................................293
Failover Procedure...........................................................................................................293
Failback Procedure..........................................................................................................294
Using a Delta Resync Configuration........................................................................................297
Performing Primary Site Storage System Maintenance...........................................................300
Failover for Primary Site Storage System Maintenance......................................................300
Failback to the Primary Site..........................................................................................302
Performing Local Site Storage System Maintenance...............................................................305
Preparing...................................................................................................................306
Recovering.................................................................................................................307
Performing Remote Site Storage System Maintenance............................................................307
Preparing...................................................................................................................308
Recovering.................................................................................................................309
Performing Primary Site Host Maintenance..........................................................................309
Failover for Primary Site Host Maintenance.....................................................................309
Failback to the Primary Site..........................................................................................312
Operating Procedure During a Primary Site Storage System Failure (Volatile)...........................314
Failover.....................................................................................................................315
Failback.....................................................................................................................316
Operating Procedure During a Primary Site Storage System Failure (Nonvolatile).....................321
Failover.....................................................................................................................322
Failback.....................................................................................................................322
Operating Procedure During a Local Site Storage System Failure (Volatile)...............................326
Preparing...................................................................................................................327
Recovering.................................................................................................................327
Operating Procedure During a Local Site Storage System Failure (Nonvolatile).........................330
Contents 9
Operating Procedure During a Remote Site Storage System Failure (Volatile)............................330
Preparing...................................................................................................................330
Recovering.................................................................................................................330
Operating Procedure During a Remote Site Storage System Failure (Nonvolatile)......................333
Preparing...................................................................................................................333
Recovering.................................................................................................................333
Primary Site Host Failure...................................................................................................333
Failover.....................................................................................................................333
Failback.....................................................................................................................336
Operating Procedure During a Path Failure Between the Primary Site Storage System and the
Local Site Storage System..................................................................................................338
Preparing...................................................................................................................339
Recovering.................................................................................................................339
Actions to be Taken When the Delta Resync Function Cannot be Set Up or Operated
Successfully.....................................................................................................................340
Managing the HOLDTRNS Status..................................................................................341
When Copy Pairs Do Not Change to HOLD Status..........................................................342
Managing the HOLDER Status......................................................................................343
If the pair status changes to HOLDER before execution of the command YKRESYNC
DELTAJNL..............................................................................................................343
If the pair status changes to HOLDER after execution of the command YKRESYNC
DELTAJNL..............................................................................................................343
If Pair Status Changes to NODELTA...............................................................................345
About Containers with Pairs of Mixed Pair Statuses..........................................................346
Ensuring Successful Completion of Delta Resync in Advance.............................................346
Using a 2DC configuration with HyperSwap and Continuous Access Journal Z.............................348
Operation Startup Procedure.............................................................................................350
Performing Primary Storage System Maintenance.................................................................351
Failover.....................................................................................................................351
Failback.....................................................................................................................353
Performing Primary Host Maintenance................................................................................356
Failover.....................................................................................................................356
Failback.....................................................................................................................358
Performing Local Storage System Maintenance.....................................................................360
Preparing...................................................................................................................360
Recovering.................................................................................................................360
Performing Remote Storage System Maintenance..................................................................361
Preparing...................................................................................................................361
Recovering.................................................................................................................362
Operating Procedure During a Primary Storage System Failure (Volatile).................................362
Failover.....................................................................................................................363
Failback.....................................................................................................................364
Operating Procedure During a Primary Storage System Failure (Nonvolatile)............................368
Failover.....................................................................................................................368
Failback.....................................................................................................................368
Operating Procedure During a Primary Host Failure..............................................................372
Failover.....................................................................................................................372
Failback.....................................................................................................................374
Operating Procedure During a Path Failure Between the Primary Storage System and the Local
Storage System................................................................................................................376
Preparing...................................................................................................................376
Recovering.................................................................................................................377
Operating Procedure During a Local Storage System Failure (Volatile).....................................377
Preparing...................................................................................................................377
Recovering.................................................................................................................377
10 Contents
Operating Procedure During a Local Storage System Failure (Nonvolatile)...............................379
Operating Procedure During Remote Storage System Failure (Volatile).....................................379
Preparing...................................................................................................................379
Recovering.................................................................................................................379
Operating Procedure During a Remote Storage System Failure (Nonvolatile)............................382
Preparing...................................................................................................................382
Recovering.................................................................................................................382
Using a 4x4x4 Cascade Configuration...................................................................................383
Performing Primary Site Storage System Maintenance...........................................................386
Failover.....................................................................................................................386
Failback.....................................................................................................................387
Performing Intermediate Site Storage System Maintenance.....................................................390
Preparing...................................................................................................................391
Recovering.................................................................................................................392
Performing Remote Site Storage System Maintenance............................................................394
Preparing...................................................................................................................395
Recovering.................................................................................................................396
Performing Primary Site Host Maintenance..........................................................................396
Failover.....................................................................................................................397
Failback.....................................................................................................................398
Operating Procedure During a Primary Site Storage System Failure (Volatile)...........................401
Failover.....................................................................................................................401
Failback.....................................................................................................................402
Operating Procedure During a Primary Site Storage System Failure (Nonvolatile).....................406
Failover.....................................................................................................................407
Failback.....................................................................................................................407
Operating Procedure During an Intermediate Site Storage System Failure (Volatile)...................409
Preparing...................................................................................................................410
Recovering.................................................................................................................412
Operating Procedure During an Intermediate Site Storage System Failure (Nonvolatile).............415
Operating Procedure During a Remote Site Storage System Failure (Volatile)............................416
Preparing...................................................................................................................416
Recovering.................................................................................................................416
Operating Procedure During a Remote Site Storage System Failure (Nonvolatile)......................419
Preparing...................................................................................................................419
Recovering.................................................................................................................420
Operating procedure during a primary site host failure.........................................................420
Failover.....................................................................................................................421
Failback.....................................................................................................................422
Operating Procedure During a Path Failure between the Primary Site Storage System and the
Intermediate Site Storage System........................................................................................424
Preparing...................................................................................................................425
Recovering.................................................................................................................427
9 Using the ISPF panels..............................................................................430
Acquiring volume information.................................................................................................430
Local scan procedure.......................................................................................................430
Scanning a device locally on the primary site (local scan).....................................................430
Scanning a device locally on the secondary site (local scan).................................................434
Transferring a disk configuration definition file from the secondary site to the primary site..........434
NG scan procedure.........................................................................................................435
Creating a path set...............................................................................................................439
Defining the inter-DKC logical path set................................................................................439
Adding a logical path to a path set....................................................................................440
Allocating physical paths to logical paths............................................................................443
Contents 11
Defining the inter-CU logical path set..................................................................................447
Adding a logical path to path set..................................................................................447
Allocating physical paths to logical paths.......................................................................452
Establishing a logical path.....................................................................................................456
Defining a route list...............................................................................................................457
Defining a route list ID......................................................................................................458
Defining the first entry of the route......................................................................................459
Adding an entry (extended route definition).........................................................................463
If the storage system on the secondary site has been scanned...........................................464
Remote scanning of the Storage System on the secondary site from the primary site.............466
Defining the second route.................................................................................................468
Images for route list definitions...........................................................................................468
Registering a command device in a Storage System..................................................................470
Remote scan procedure.........................................................................................................472
Specifying a route list ID...................................................................................................472
Performing a remote scan..................................................................................................473
Assigning a dummy device number....................................................................................474
Changing dummy device numbers.....................................................................................477
Defining a copy group..........................................................................................................477
Defining the copy group ID and copy group attributes (Cnt Ac-J Z).........................................478
Adding the copy pair to the copy group (Cnt Ac-J Z)........................................................480
Defining the copy group ID and copy group attributes (BC)...................................................482
Adding the copy pair to the copy group (BC)..................................................................483
Defining the copy group ID and copy group attributes (CA)...................................................483
Adding the copy pair to the copy group (CA).................................................................484
Defining the copy group ID and copy group attributes (Cnt Ac-A)...........................................484
Adding the copy pair to the copy group (Cnt Ac-A).........................................................485
Defining a copy group container............................................................................................485
Defining the copy group ID and copy group attributes..........................................................486
Adding a C/T group........................................................................................................487
Changing a copy group that is not a copy group container to one that is (adding a C/T
group)............................................................................................................................488
Changing a copy group that is a container to one that is not (deleting a C/T group)................489
Defining an EXCTG..........................................................................................................489
Saving settings................................................................................................................492
Defining an Open/MF consistency group................................................................................492
Loading a copy group......................................................................................................493
Suspending a copy group.................................................................................................494
Changing a copy group definition (setting the Open/MF Consistency attribute).......................495
Loading a copy group after changing its definition...............................................................496
Resynchronizing a copy group...........................................................................................497
Operating copy groups.........................................................................................................500
Loading a copy group......................................................................................................501
Making a Cnt-Ac J Z copy pair (SIMPLEX to DUPLEX)............................................................503
Suspending a Cnt-Ac J Z copy pair....................................................................................507
Making a Business Copy for Mainframe copy pair (SIMPLEX to DUPLEX).................................508
Suspending a Business Copy for Mainframe copy pair.........................................................510
Resynchronizing a Cnt-Ac J Zcopy pair...............................................................................511
10 Automatic operation using BCM Monitor.................................................513
Overview of the Business Continuity Manager Monitor functions.................................................513
Business Continuity Manager Monitor operator commands....................................................516
The monitoring status of a copy group................................................................................517
Putting Business Continuity Manager Monitor to sleep...........................................................517
Stop point.......................................................................................................................517
12 Contents
Starting and stopping the Business Continuity Manager Monitor ................................................517
Starting Business Continuity Manager Monitor.....................................................................517
Format.......................................................................................................................517
Operands..................................................................................................................518
Example....................................................................................................................518
Stopping Business Continuity Manager Monitor...................................................................518
Format.......................................................................................................................518
Operands..................................................................................................................518
Example....................................................................................................................519
Remarks.....................................................................................................................519
Forcibly stopping Business Continuity Manager Monitor........................................................519
Format.......................................................................................................................519
Operands..................................................................................................................520
Example....................................................................................................................520
Return codes for Business Continuity Manager Monitor.........................................................520
Operator commands available in BCM Monitor.......................................................................520
DISPLAY command...........................................................................................................521
Format.......................................................................................................................521
Operands..................................................................................................................521
Example....................................................................................................................522
REPORT command...........................................................................................................522
Format.......................................................................................................................522
Operands..................................................................................................................522
Example....................................................................................................................523
SET command.................................................................................................................523
Format.......................................................................................................................524
Operands..................................................................................................................524
Example....................................................................................................................525
SLEEP command..............................................................................................................525
Format.......................................................................................................................525
Operands..................................................................................................................525
Example....................................................................................................................526
WAKEUP command.........................................................................................................526
Format.......................................................................................................................526
Operands..................................................................................................................526
Example....................................................................................................................526
Troubleshooting procedures provided by BCM Monitor..............................................................527
Logs Collected by BCM Monitor........................................................................................527
When a Business Continuity Manager Monitor Instance Cannot Be Started.............................527
When a Business Continuity Manager Monitor Instance Has Started......................................528
Business Continuity Manager Monitor operation examples.........................................................529
Backup operation example................................................................................................529
Example configuration for backup operation...................................................................529
Backup operation flow.................................................................................................530
Example of creating the YKMONOPT file used for a backup operation..............................531
Example of creating the YKMONCG file used for a backup operation...............................531
Example of failure monitoring............................................................................................532
Example configuration of failure monitoring....................................................................532
Failure monitoring flow................................................................................................533
Example of creating a YKMONOPT file used for failure monitoring....................................534
Example of creating a YKMONCG file used for failure monitoring.....................................534
11 Linkage with Replication Manager...........................................................536
What can be achieved when Business Continuity Manager is linked to Replication Manager?........536
Device scan from Replication Manager...............................................................................537
Contents 13
Defining a copy group from Replication Manager................................................................537
Manipulating a copy group from Replication Manager.........................................................538
Monitoring a copy group from Replication Manager............................................................538
Possible configurations......................................................................................................538
Configuring a Business Continuity Manager agent....................................................................539
Selecting a startup mode..................................................................................................539
Selecting Lock Mode...................................................................................................540
Operations after the configuration file is locked...............................................................541
If the Business Continuity Manager agent has already been started...............................541
If the ISPF panel or BCM Monitor has already been started..........................................542
Collecting audit logs........................................................................................................544
Starting and stopping Business Continuity Manager agents........................................................544
Starting a Business Continuity Manager agent.....................................................................545
Format.......................................................................................................................545
Operands..................................................................................................................545
Example....................................................................................................................545
Stopping a Business Continuity Manager agent...................................................................545
Format.......................................................................................................................545
Operands..................................................................................................................546
Example....................................................................................................................546
Return codes...............................................................................................................546
Forcibly stopping a Business Continuity Manager agent........................................................546
Format.......................................................................................................................546
Operands..................................................................................................................547
Example....................................................................................................................547
Displaying or changing the log output level..............................................................................547
Displaying the log output level...........................................................................................547
Format.......................................................................................................................547
Operands..................................................................................................................547
Example....................................................................................................................547
Changing the log output level............................................................................................548
Format.......................................................................................................................548
Operands..................................................................................................................548
Example....................................................................................................................548
Notes on updating configuration files......................................................................................548
Working around site errors and host failures............................................................................549
Error types and error information handling...............................................................................549
When Business Continuity Manager agent cannot be started.................................................551
When information obtained from Business Continuity Manager agent is not updated................553
12 Troubleshooting....................................................................................554
Troubleshooting Failures........................................................................................................554
Error Notification..................................................................................................................554
Performance Monitor.............................................................................................................555
Trace Output Method............................................................................................................556
Collecting Logs.....................................................................................................................556
Log Types........................................................................................................................556
Setting the Business Continuity Manager Log Output Destination............................................557
System Logger Service Setup.............................................................................................557
Defining a Log Stream.................................................................................................558
Which Parameters to Specify for a Log Stream Definition..................................................559
Planning a DASD Log Dataset.......................................................................................561
Deleting a Log Stream.................................................................................................561
Confirming a Log Stream..............................................................................................561
Business Continuity Manager Log Output Method................................................................561
14 Contents
Using System Logger Service........................................................................................561
Not Using System Logger Service..................................................................................562
Business Continuity Manager Log Data Formats..............................................................564
Business Continuity Manager Log Data Output Tool..............................................................564
Specifying Log Data Conditions....................................................................................564
Example JCL...............................................................................................................565
Error Processing..........................................................................................................565
Data Format...............................................................................................................566
ISPF Log Data..................................................................................................................566
CLI Command-Execution Logs............................................................................................566
Using the ISPF Editor...................................................................................................567
Using a Script for Retrieval...........................................................................................568
HyperSwap Completion Detection...........................................................................................568
Recovering from a Failure......................................................................................................569
Recovering a Command Device After an LDEV Blockage.......................................................569
Recovering a Command Device After a Power Outage..........................................................569
Recovering a Log Dataset After Logs are Full........................................................................569
Performing Operations When a Failure Occurs for a Volume in a Copy Group........................570
Recovering from a Cnt Ac-J Z Failure...................................................................................570
Types of Failures.........................................................................................................570
Recovering from Failures during Failovers and PSOFF/Cut Power.......................................571
Recovering from Other Types of Failures.........................................................................573
What To Do When an Error Occurs While Creating a Configuration File................................575
How To Correct an Error that Occurs While Creating or Updating a Configuration File........575
Causes of Errors that Might Occur While Creating or Updating a Configuration File and the
Recommended Actions.................................................................................................577
What To Do When an Error Occurs in the Copy Group Definition File Generation Function Using
CSV Files........................................................................................................................578
13 Support and other resources...................................................................580
Contacting HP......................................................................................................................580
Subscription service..........................................................................................................580
Documentation feedback..................................................................................................580
Related information...............................................................................................................580
HP websites....................................................................................................................582
Conventions for storage capacity values..................................................................................582
Typographic conventions.......................................................................................................582
A Defining Command Devices in Non-basic Configurations............................584
Configurations for Which the Same Command Device Is Shared from Multiple Hosts.....................584
Configurations for Which Command Devices Can and Cannot Be Defined...................................584
Configurations for Which Command Devices Can Be Defined................................................584
Configurations for Which Command Devices Cannot Be Defined...........................................584
When Multiple Command Devices Are Defined for a Single Storage System on the Same Device
Address Domain...................................................................................................................586
B Initializing volumes for command devices for the XP1024/XP128 Disk Array...589
Command device settings......................................................................................................589
Example of a JCL for volume initialization of command devices...................................................590
C Conventions in syntax explanations..........................................................591
Glossary..................................................................................................593
Index.......................................................................................................602
Contents 15
1 Overview of HP P9000 for Business Continuity Manager
Software
This chapter describes the reasons for using Business Continuity Manager, as well as its features. It also explains example system features. It describes Business Continuity Manager system configurations, defines the terms used throughout this manual, and describes how Business Continuity Manager identifies and interacts with storage systems on different storage system models.
“Why use Business Continuity Manager?” (page 16)
“Communication with HP P9000 Command View Advanced Edition Suite Software” (page 17)
“Products that can be controlled by Business Continuity Manager” (page 18)
“Remote volume operations” (page 21)
“Grouping to simplify volume operations” (page 22)
“Data Center Configurations” (page 27)
“Functions Supporting the Automatic Operation (BCM Monitor)” (page 32)
“Functionalities Dependent on the Storage System” (page 35)
“Storage System Identification ” (page 38)
“Preparing to set up Business Continuity Manager” (page 39)
Unless otherwise specified, the term storage system in this guide refers to the following disk arrays:
HP P9500 Disk Array
HP XP24000/XP20000 Disk Arrays
HP XP12000/XP10000 Disk Arrays
HP XP512/XP48 Disk Arrays
HP XP1024/XP128 Disk Arrays
The GUI illustrations in this guide were created using a Windows computer with the Internet Explorer browser. Actual windows may differ depending on the operating system and browser used. GUI contents also vary with licensed program products, storage system models, and firmware versions.
Why use Business Continuity Manager?
The amount of data stored on corporate information systems has increased in tandem with the importance of keeping that data safe. Due to the rising management costs associated with this continually increasing size of storage system, the ability to manage mainframe system storage available with Business Continuity Manager is in strong demand.
Business Continuity Manager offers centralized, enterprise-wide replication and duplication management for mainframe environments, without the help of host processing. By taking advantage of storage system copy functions, Business Continuity Manager makes it possible to perform reliable backup operations in large-scale configurations. This minimizes disaster recovery time and data loss, and reduces the workload on the storage administrator.
Business Continuity Manager provides access to critical system performance metrics and thresholds that enable proactive problem avoidance. With this information, you can achieve optimum system performance and meet or exceed service-level objectives.
The Business Continuity Manager auto-discovery capability eliminates hours of tedious input and costly human errors resulting from configuring and protecting complex, mission critical applications.
16 Overview of HP P9000 for Business Continuity Manager Software
Business Continuity Manager provides centralized management of HP P9000 mainframe replication products, regardless of where they reside on the storage system. This provides many business benefits including:
Improved business resilience and confidence through frequent, non-disruptive disaster recovery.
Robust disaster recovery and planned outage functions, which make for smooth operations
and dramatically reducing recovery times.
Easy to acquire storage system information, making it possible to avoid disaster recovery
failures caused by specifying the wrong duplication target.
Easy development of additional automation with built-in automation and extensibility features,
using the familiar REXX language, to protect more data with less effort.
Accelerated deployment of Continuous Access Journal for Mainframe, Continuous Access
Synchronous for Mainframe, Continuous Access Asynchronous for Mainframe and Business Copy for Mainframe software solutions through a single, consistent user interface based on the familiar TSO/ISPF full-screen panels.
Communication with HP P9000 Command View Advanced Edition Suite Software
P9000 Command View Advanced Edition Suite Software is a series of storage management solutions that can centrally manage ever-larger storage systems to help reduce storage system management workloads, and streamline storage system operations.
However, because P9000 Command View Advanced Edition products were originally designed to manage open-system storage, their full power could not be unleashed in the field of mainframe-system storage management. For this reason, users who owned both open-system and mainframe-system storage had to manage them separately.
In recent years, customers have been demanding programs that can manage both open-system and mainframe-system storage to address the problem that increasing storage sizes tends to increase storage management cost.
Business Continuity Manager can link with P9000 Replication Manager, which is a management server solution from the HP P9000 Command View Advanced Edition product family. If Business Continuity Manager is linked with P9000 Replication Manager, both open-system and mainframe-system storage can be centrally managed from P9000 Replication Manager.
This linkage is achieved via Business Continuity Manager agents that, when configured appropriately, provide an interface between the two solutions by receiving requests from P9000 Replication Manager and passing them on to Business Continuity Manager.
Figure 1 (page 18) is a conceptual illustration of this centralized management of open-system and
mainframe-system storage that can be achieved when Business Continuity Manager (shown as BC Manager) is linked with P9000 Replication Manager (shown as Replication Manager).
Communication with HP P9000 Command View Advanced Edition Suite Software 17
Figure 1 Centralized management of Open-system and Mainframe-system Storage
This centralized management of both open-system and mainframe-system storage can provide a number of advantages, including reduced operation times and quicker responses to failures.
Products that can be controlled by Business Continuity Manager
HP storage systems provide replication products such as Business Copy for Mainframe, Continuous Access Synchronous Mainframe, and Continuous Access Journal for Mainframe. Business Continuity Manager can control these replication products to create highly reliable backup data.
18 Overview of HP P9000 for Business Continuity Manager Software
A volume that contains the original data is called a primary volume (P-VOL). P-VOLs exist in storage systems that are directly connected to a host where Business Continuity Manager is installed. Remote storage systems (or in the case of Business Copy, duplicate volumes) are the copy destinations. A volume that contains duplicate data (a copy of the data on the P-VOL) is called a secondary volume (S-VOL).
A copy pair is a designated relationship between a P-VOL and an S-VOL. P-VOL and S-VOL pairings have an associated copy type that identifies the duplication or replication solution in use. An S-VOL of one pair (using one copy type) can also be the P-VOL for another S-VOL (which uses a different copy type).
Business Continuity Manager can control the following replication products:
BC Z - Business Copy for Mainframe/Hitachi ShadowImage for Mainframe (SI)
Cnt Ac-S Z - Continuous Access Synchronous for Mainframe/Hitachi TrueCopy for Mainframe
(TC)
Cnt Ac-J Z - Continuous Access Journal for Mainframe/Hitachi Universal Replicator for
Mainframe (UR)
Cnt Ac-A - Continuous Access Asynchronous for Mainframe/Hitachi TrueCopy Asynchronous
for Mainframe (TCA)
NOTE: Continuous Access Asynchronous for Mainframe (Cnt Ac-A) is supported on models of
the HP XP Disk Array. Cnt Ac-A is not supported on the HP P9500 Disk Array. Business Continuity Manager can be used with both P9500 and XP disk arrays. The XP disk array copy products can be configured and controlled using the P9000 version of BCM. The HP product names are used in this manual. For compatibility with existing implementations on XP disk arrays, the Hitachi abbreviations shown in parenthesis are accepted by the user interface. The graphics in this manual show the Hitachi abbreviations but your system may show the HP abbreviations.
Throughout this manual, each copy pair type is referred to by its full name as well as its abbreviation, although many of the Business Continuity Manager ISPF panels only use the abbreviation. When a field on a Business Continuity Manager ISPF panel uses an abbreviation for any of these terms, any related text in the manual follows the ISPF terminology and lists the full term in parentheses.
The following subsections explain each copy type in detail.
Business Copy for Mainframe (BC Z)
Duplicates volumes within a storage system.
Continuous Access Synchronous for Mainframe (Cnt Ac-S Z)
Performs and manages remote synchronized volume copy operations between a storage system on the primary site and a storage system on the secondary site, so each S-VOL is always identical to its P-VOL counterpart.
Products that can be controlled by Business Continuity Manager 19
Continuous Access Asynchronous for Mainframe (Cnt Ac-A)
Stores data and control information for each P-VOL in a sidefile, and performs and manages the remote copying of volumes independently (asynchronously) of the host I/O processes.
Continuous Access Journal for Mainframe (Cnt Ac-J Z)
Writes updated data and control information to the master journal on the primary site. When the secondary site makes a read journal request, the updated data and control information are written from the master journal to the restore journal (on the secondary site). This activity is performed asynchronously to host I/O processing.
20 Overview of HP P9000 for Business Continuity Manager Software
Remote volume operations
A command device defined in Business Continuity Manager allows you to remotely create copy pairs, remotely operate volumes, and remotely monitor the status of volumes. This allows you to reduce the operational costs of remote locations.
“Remote Volume Operation” (page 21) explains remote volume operation.
Figure 2 Remote Volume Operation
Remote volume operations 21
Grouping to simplify volume operations
Business Continuity Manager can group together copy pairs to improve the operability of managing replicas of large-scale systems that handle substantial amounts of data. Copy pairs can be grouped together and managed as a single entity. These group types are:
Copy groups (see “Copy groups” (page 22))
Consistency groups (see “Consistency groups” (page 23))
Copy group containers (see “Copy group containers” (page 25))
CAUTION: If a consistency group is added to a copy group container, it can no longer be
operated on as a consistency group. The consistency group can then only be operated on by performing operations on the copy group container.
Working with copy pairs in groups simplifies volume operation and reduces system administration costs.
“Overview of volume operation” (page 22) shows an overview of volume operation.
Figure 3 Overview of volume operation
Copy groups
A copy group is a set of copy pairs that have the same copy type (Business Copy for Mainframe, Continuous Access Synchronous for Mainframe, Continuous Access Asynchronous for Mainframe or Continuous Access Journal for Mainframe), and is designated a copy group id for identification. An operation performed on a copy group is performed on all of the copy pairs within that copy group.
To define a copy group and assign a copy group id, see “Defining a copy group” (page 477).
22 Overview of HP P9000 for Business Continuity Manager Software
Consistency groups
A consistency group is a copy group recognized by a storage system. A consistency group updates the S-VOLs in the same order that data was put onto the P-VOLs. The
data on an S-VOL is guaranteed to be identical to the data on a P-VOL at consistency times. Therefore, data at the secondary site can be used to recover the data at the primary site. This is called preserving consistency. The consistency of updates is assured throughout the entire consistency group. Table 1 (page 23) lists the methods for preserving consistency for each copy type.
Table 1 Methods to preserve consistency for each copy type
Consistency preservation methodConsistency group ID
specification method
Consistency group IDCopy type
The NORMAL ATTIME Suspend function or the CAJ ATTIME
Consistency group IDs are specified in the Copy Group
OptionalBusiness Copy for
Mainframe
Suspend function can be used toAttributes panel in which the preserve the consistency of copy groups.
copy group attributes are defined for the consistency group ID already registered in the storage system by Remote Web Console.
The Cnt-Ac S Z consistency preservation function in Business
When working with Cnt-Ac S Z, you don't need to register
OptionalContinuous
Access
Continuity Manager can be usedthe consistency group ID in theSynchronous for
Mainframe to preserve consistency. Forstorage system. Consistency
details about how to implementgroup IDs are specified in the this, see “The Continuous AccessCopy Group Attributes panel
Synchronous Consistency Preservation Function” (page 78).
in which the copy group attributes are defined for the
When the Open/MF Consistency Preservation Function is used,
consistency group ID for Cnt-Ac S Z.
consistency is only preserved for the Cnt-Ac S Z copy group in the storage system that contains the combined consistency group. For details on the Open/MF Consistency Preservation Function, see “Open/MF
Consistency Groups” (page 25).
Consistency is preserved by using only the Continuous Access
Consistency group IDs are specified in the Copy Group
YesContinuous
Access
Asynchronous for MainframeAttributes panel in which theAsynchronous for
Mainframe functions of the storage system. Ifcopy group attributes are
the ATTIME suspend function isdefined for the consistency used, Continuous Accessgroup ID already registered in Asynchronous for Mainframethe storage system by Remote
Web Console. copy groups that are configured
across multiple storage systems can be suspended at the same time.
Consistency is preserved by using only the Cnt Ac-J Z functions of
The journal group number already registered in the
YesNon-4x4
configurations
Continuous Access Journal for Mainframe the storage system. If the CAJstorage system by the Remote
ATTIME suspend function is usedWeb Console is specified as for BC Z copy groups that linkthe consistency group ID. In with Cnt Ac-J Z copy groups, BCBusiness Continuity Manager, Z copy groups that arethe journal group number for configured across multiplethe primary site is used as the storage systems can be suspended at the same time.
consistency group ID, and the journal group number for the secondary site is used as the sub consistency group ID. The
Grouping to simplify volume operations 23
Table 1 Methods to preserve consistency for each copy type (continued)
Consistency preservation methodConsistency group ID
specification method
Consistency group IDCopy type
consistency group ID and sub consistency group ID are specified in the Copy Group Attributes panel in which the copy group attributes are defined.
For EXCTG, the EXCTG ID (Forward/Reverse) is specified
Yes4x4
configurations
in the Copy Group Detail Definition panel. For details about EXCTG, see “Extended
Consistency Groups” (page 26).
Legend: Yes= Required, Optional= Can be selected.
The Business Continuity Manager ISPF panels use the abbreviation C/T group for consistency group.
For the Business Copy for Mainframe, Continuous Access Asynchronous for Mainframe, or Continuous Access Journal for Mainframe copy type, before a consistency group can be defined, a consistency group ID must be registered with the storage systems. This is described in “Setting
up Storage Systems” (page 100).
You can define a consistency group in Business Continuity Manager by using the registered consistency group ID. The functions of the storage system where the consistency group ID was registered can preserve the consistency of the consistency group. Defining a consistency group is explained in section “Defining the copy group ID and copy group attributes” (page 486).
CAUTION: If you define a consistency group across multiple storage systems and create a copy
group by specifying the consistency group ID, consistency is not preserved, except in the following instances:
For Continuous Access Asynchronous for Mainframe: In a copy group configuration of two
to four primary storage systems and a secondary storage system.
For Continuous Access Journal for Mainframe: In an Extended Consistency Group (see
“Extended Consistency Groups” (page 26)).
This is similar to preserving consistency for a copy group container (see “Copy group containers”
(page 25)).
NOTE: Throughout this manual, the terms consistency group and consistency group ID are used
in full when they appear in the text. When a field on a Business Continuity Manager ISPF panel uses the abbreviation for either of
these terms (C/T group or C/T group ID), any related text duplicates the ISPF terminology and follows it with the full term in parentheses.
Journal groups
Continuous Access Journal writes updates and control information to a master journal on the primary site. Upon a request from the secondary site, the updates are written from the master journal to a restore journal. The master and restore journal pair is called a journal group (JNLG).
A journal volume is a specific type of volume used exclusively to transfer updated data. This group of volumes is not a copy pair P-VOL/S-VOL correlation.
24 Overview of HP P9000 for Business Continuity Manager Software
Open/MF Consistency Groups
When the Open/MF Consistency Preservation Function is used for Continuous Access Synchronous for Mainframe consistency groups, open-system copy groups and mainframe system copy groups within the same consistency group can be suspended at the same time, to preserve consistency between mainframe system copy groups and open-system copy groups within the same consistency group. An Open/MF consistency group is a consistency group that uses the Open/MF Consistency Preservation Function and contains open system and mainframe copy groups.
Figure 4 (page 25) shows the effect of suspending a consistency group that uses the Open/MF
consistency preservation function.
Figure 4 Effect of Suspending an Open/MF Consistency Group
When the YKSUSPND command is issued from Business Continuity Manager for a mainframe system copy group, open-system copy groups and mainframe system copy groups within the same consistency group are suspended at the same time.
For more information about defining the Continuous Access Synchronous Open/MF Consistency Preservation Function, see “Defining a configuration so that the Open/MF Consistency Preservation
function can be used” (page 234).
Copy group containers
A copy group container (CG container) is similar to a copy group, although instead of grouping a set of copy pairs that have the same copy type, it groups a set of copy groups composed of
Grouping to simplify volume operations 25
pairs that have the same copy type. When an operation is performed on a CG group container, it is performed on all of the pairs included in the container.
CAUTION: Because Business Continuity Manager actually sends instructions to the storage system
for each of the C/T groups included in a copy group container, consistency of each included consistency group on the primary site and on the secondary site is preserved. However, consistency between consistency groups in the copy group container is not preserved, except for extended consistency groups. Extended consistency groups are described in section “Extended Consistency
Groups” (page 26).
Defining a copy group container is explained in “Defining a copy group container” (page 485).
“CG Container Overview” (page 26) gives an overview of copy group containers. In “CG Container Overview” (page 26), when an operation is performed on the CG container (Copy group ID:
CG.UR), the operation is performed on the CG container (copy group ID CG.TCA), the operation is performed in batch for the C/T groups with the C/T group IDs 71 and 72.
Figure 5 CG Container Overview
Extended Consistency Groups
In a 4x4 or 4x4x4 configuration, consistency can be preserved among journal groups spread across among multiple storage systems. A copy group container that can preserve consistency between multiple journal groups is called an Extended Consistency Group (EXCTG).
26 Overview of HP P9000 for Business Continuity Manager Software
When an Extended C/T Group ID (EXCTG ID) is specified in the copy group container, the container is registered in the storage system as an EXCTG, and consistency between the journal groups in that CG container is preserved.
Specifying an EXCTG ID in a CG container is explained in “Defining an EXCTG” (page 489).
Terminology by Copy Type
The terminology used to describe similar situations can differ, depending on the type of copy group represented. “Phrase Used to Refer to BC Z and Cnt-Ac S Z Copy Groups” (page 27) through
“Phrase Used to Refer to Cnt Ac-J Z Copy Group” (page 27) provide the terminology used when
working with each of the copy types supported by Business Continuity Manager.
Table 2 Phrase Used to Refer to BC Z and Cnt-Ac S Z Copy Groups
Phrase used to refer to the copy groupType
Copy group with no C/T group ID specifiedSingle groupNo C/T group ID specified
Copy group with C/T group ID specifiedSingle groupC/T group ID specified
CG containerMultiple groups
Table 3 Phrase Used to Refer to Continuous Access Asynchronous for Mainframe Copy Group
Phrase used to refer to the copy groupType
Copy group with C/T group ID specifiedSingle groupC/T group ID specified
CG containerMultiple groups
Table 4 Phrase Used to Refer to Cnt Ac-J Z Copy Group
Phrase used to refer to the copy groupType
Copy group with C/T group ID specified (journal group)
No EXCTG ID specifiedSingle groupC/T group ID (journal group number) specified
CG containerNo EXCTG ID specifiedMultiple groups
CG container with EXCTG ID specifiedEXCTG ID specified
Data Center Configurations
Business Continuity Manager performs replication management for a variety of DC configurations and situations. This section describes the basic configurations.
2DC Configuration
This configuration performs remote copying from the primary site to the secondary site.
Data Center Configurations 27
3DC Cascade Configuration
This configuration performs remote copying from the primary site to a nearby intermediate site and a distant remote site. Continuous Access Synchronous for Mainframe is used from the primary site to the intermediate site, and Continuous Access Journal for Mainframe from the intermediate site to the secondary site.
3DC Multi-Target Configuration
This configuration performs remote copying from the primary site to the local site with Continuous Access Synchronous for Mainframe, and from the primary site to the remote site with Continuous Access Journal for Mainframe.
3DC Multi-Target Configuration with the Delta Resync Function
This configuration allows operation at the local site and remote site under a 2DC configuration to start immediately during a primary site failure or maintenance. In a 3DC Multi-Target configuration, a Continuous Access Journal for Mainframe copy pair (called a delta resync pair) must be created between the Continuous Access Synchronous for Mainframe S-VOL on the local site and the Continuous Access Journal for Mainframe S-VOL on the remote site beforehand, and is put in the delta resync waiting status (meaning that the pair is in the suspend status while the journal for the delta resync pair acquires the differential data between the S-VOLs on the local and remote sites). For details about the Delta Resync Function, see “The Delta Resync configuration” (page 47).
28 Overview of HP P9000 for Business Continuity Manager Software
2DC Configuration with HyperSwap and Continuous Access Journal
This configuration allows operation at the primary site and secondary site under a 2DC configuration to start immediately after a primary storage system failure or maintenance by using HyperSwap. Both the primary storage system and local storage system are placed at the primary site, and a PPRC copy pair for which HyperSwaps are enabled is used. Continuous Access Journal for Mainframe is also used from the primary storage system for the remote storage system at the secondary site. A Continuous Access Journal for Mainframe copy pair in the delta resync waiting status must be created between the PPRC copy pair S-VOL and the Continuous Access Journal for Mainframe S-VOL beforehand.
4x4 Configuration
This configuration performs remote copying from multiple storage systems on the primary site to multiple storage systems on the secondary site with Continuous Access Journal for Mainframe to preserve consistency.
Data Center Configurations 29
4x4x4 Cascade Configuration
This configuration is a combination of a 4x4 configuration and a 3DC Cascade configuration. Between the primary site and the intermediate site, a Continuous Access Synchronous for Mainframe copy group is used. Between the intermediate site and the remote site, the Continuous Access Journal for Mainframe copy group that defined an extended consistency group (EXCTG) is used. This configuration can preserve consistency across multiple storage systems in an EXCTG.
30 Overview of HP P9000 for Business Continuity Manager Software
Loading...
+ 578 hidden pages