RDF System Management Manual for J-series and H-series RVUs (RDF Update 13)

How Triple Contingency Works..............................................................................................264
Hardware Requirements........................................................................................................265
Software Requirements..........................................................................................................265
The RETAINCOUNT Configuration Parameter...........................................................................266
The COPYAUDIT Command...................................................................................................267
COPYAUDIT Restartability......................................................................................................268
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails.................................268
Triple Contingency Without ZLT..........................................................................................268
Using ZLT to Achieve the same Protection............................................................................268
Summary.............................................................................................................................269
11 Subvolume-Level and File-Level Replication................................................271
INCLUDE Clauses.................................................................................................................271
EXCLUDE Clauses.................................................................................................................271
Wildcard Character (*).........................................................................................................272
Within Subvolume Names.................................................................................................272
Within Filenames.............................................................................................................272
INCLUDE/EXCLUDE and RDFCOM In-Memory Table.................................................................272
INCLUDE and EXCLUDE Processing.........................................................................................273
INCLUDEPURGE and EXCLUDEPURGE....................................................................................274
Error Checking.....................................................................................................................274
Performance Ramifications.....................................................................................................274
Replicating purge operations with INCLUDE, EXCLUDE, INCLUDEPURGE, and EXCLUDEPURGE
lists.....................................................................................................................................275
Summary Examples..............................................................................................................275
12 Subvolume Name Mapping...................................................................277
Creating a Mapfile to Define the Rules for Subvolume Name Mapping........................................277
Rules for Creating Mapfile Mapping Strings.............................................................................277
How an Updater Manages Filename Collisions........................................................................279
Creating a Maplog to Log Subvolume Name Mapping..............................................................279
Adding a Mapfile and Maplog to an Updater's Configuration Record.........................................280
Managing Subvolume Name Mapping for Partitioned Files........................................................280
13 Auxiliary Audit Trails.............................................................................282
Auxiliary Extractor................................................................................................................282
Auxiliary Receiver.................................................................................................................282
Configuring Extractors and Receivers.......................................................................................282
Error conditions...............................................................................................................282
Configuring Image Trails........................................................................................................283
Configuring Updaters............................................................................................................283
Error Conditions..............................................................................................................283
Ramifications for STOP TMF, Stop-Update-to-Time, and SQL Shared Access DDL Ops.....................283
Takeover Ramifications..........................................................................................................284
Usage of Master and Auxiliary Audit Trails..............................................................................284
Using Expand Multi-CPU Paths...............................................................................................284
14 Network Transactions............................................................................286
Configuration Changes.........................................................................................................286
NETWORK Attribute........................................................................................................286
NETWORKMASTER Attribute.............................................................................................287
Network Configuration Record...........................................................................................287
RDF Network Synchronizer (RDFNET) Process......................................................................288
RDF Network Control Files.....................................................................................................288
Normal RDF Processing Within a Network Environment.............................................................288
RDF Takeovers Within a Network Environment..........................................................................289
Takeover Phase 1 Local Undo.........................................................................................289
8 Contents