RDF System Management Manual for H-Series RVUs (RDF 1.8)
EXCLUDE Clauses..............................................................................................................................261
Wildcard Character (*)........................................................................................................................261
Within Subvolume Names.............................................................................................................261
Within Filenames...........................................................................................................................262
INCLUDE and EXCLUDE Processing................................................................................................262
Error Checking....................................................................................................................................262
Performance Ramifications.................................................................................................................262
Summary Examples............................................................................................................................262
12 Subvolume Name Mapping...................................................................................265
Creating a Mapfile to Define the Rules for Subvolume Name Mapping...........................................265
Rules for Creating Mapfile Mapping Strings......................................................................................265
How an Updater Manages Filename Collisions.................................................................................267
Creating a Maplog to Log Subvolume Name Mapping.....................................................................267
Adding a Mapfile and Maplog to an Updater's Configuration Record.............................................268
Managing Subvolume Name Mapping for Partitioned Files.............................................................268
13 Auxiliary Audit Trails...............................................................................................271
Auxiliary Extractor..............................................................................................................................271
Auxiliary Receiver...............................................................................................................................271
Configuring Extractors and Receivers................................................................................................271
Error conditions.............................................................................................................................271
Configuring Image Trails....................................................................................................................272
Configuring Updaters.........................................................................................................................272
Error Conditions............................................................................................................................272
STOP TMF Ramifications....................................................................................................................272
Takeover Ramifications.......................................................................................................................273
Usage of Master and Auxiliary Audit Trails.......................................................................................273
Using Expand Multi-CPU Paths.........................................................................................................273
14 Network Transactions..............................................................................................275
Configuration Changes.......................................................................................................................275
Order of Configuration Steps........................................................................................................275
NETWORK Attribute.....................................................................................................................276
NETWORKMASTER Attribute.....................................................................................................276
Network Configuration Record.....................................................................................................276
PRIMARYSYSTEM Network Attribute....................................................................................277
BACKUPSYSTEM Network Attribute.....................................................................................277
REMOTECONTROLSUBVOL (RCSV) Network Attribute.....................................................277
PNETTXVOLUME Network Attribute....................................................................................277
Adding the Network Record....................................................................................................277
RDF Network Synchronizer (RDFNET) Process...........................................................................277
RDF Network Control Files................................................................................................................278
Normal RDF Processing Within a Network Environment.................................................................278
RDF Takeovers Within a Network Environment ...............................................................................278
Takeover Phase 1 – Local Undo.....................................................................................................278
Takeover Phase 2 – File Undo........................................................................................................279
Takeover Phase 3 – Network Undo...............................................................................................279
Takeover Phase 3 Performance......................................................................................................279
Communication Failures During Phase 3 Takeover Processing....................................................280
Takeover Delays and Purger Restarts............................................................................................280
Takeover Restartability..................................................................................................................280
Takeover and File Recovery...........................................................................................................280
Table of Contents 15










