RDF System Management Manual for H-Series RVUs (RDF 1.8)
Shared Access DDL Operations......................................................................................................60
Fast Takeover...................................................................................................................................60
Configurable Software Location......................................................................................................61
EMS Support....................................................................................................................................61
SMF Support....................................................................................................................................61
RTD Warning Thresholds................................................................................................................61
Process-Lockstep Operation............................................................................................................61
Support for Network Transactions..................................................................................................61
RDF and NonStop SQL/MX.............................................................................................................62
Zero Lost Transactions (ZLT)..........................................................................................................62
Monitoring RDF Entities With ASAP..............................................................................................62
2 Preparing the RDF Environment..................................................................................63
Configuring Hardware for RDF Operations.........................................................................................63
Primary System Configuration........................................................................................................63
Backup System Configuration.........................................................................................................63
Disk Volume Limit...........................................................................................................................64
Volume-to-Volume Mapping...........................................................................................................64
Subvolume-to-Subvolume Name Mapping....................................................................................64
Data Communication (Expand) Resources.....................................................................................64
Preparing Software and Database Files for RDF Operations...............................................................65
Mixed-Product Installation..............................................................................................................66
Configuring TMF for RDF Operations............................................................................................66
TMF Configuration With Dump Process...................................................................................67
TMF Configuration Without Dump Process..............................................................................67
Preparing Databases for RDF Protection.........................................................................................67
Audited Backup Database Files.................................................................................................67
Taking Online Dumps of Backup Database..........................................................................68
Reload of Backup Database...................................................................................................68
DSM Catalogs and File Code 900...............................................................................................68
Views on the Backup System.....................................................................................................68
Partitioned Tables and Files.......................................................................................................68
Specifying System Generation Parameters for an RDF Environment.............................................69
Designing Transactions for RDF Protection....................................................................................69
Replicating Database Operations...............................................................................................69
NonStop SQL/MP and NonStop SQL/MX DDL Operations................................................69
Enscribe File-Label Modifications.........................................................................................69
Purge Operations..................................................................................................................70
Partitioned Files....................................................................................................................70
Temporary Disk Files............................................................................................................70
Using SMF With RDF............................................................................................................................70
Configuring an SMF Environment on the Primary System............................................................71
Configuring an SMF Environment on the Backup RDF System.....................................................71
3 Installing and Configuring RDF..................................................................................73
Preparing the Primary System..............................................................................................................73
Stopping the Software.....................................................................................................................73
Preparing the Tables and Files.........................................................................................................73
Separating NonStop SQL/MP or NonStop SQL/MX Tables.......................................................74
Compressing Audit Data for Tables and Files ..........................................................................74
Preparing the Backup System...............................................................................................................74
Synchronizing the Primary and Backup Databases........................................................................75
Re-Creating an Empty Database With an OBEY Command.....................................................75
4 Table of Contents










