RDF System Management Manual for J-series and H-series RVUs (RDF 1.10)
Summary.............................................................................................................................265
11 Subvolume-Level and File-Level Replication................................................266
INCLUDE Clauses.................................................................................................................266
EXCLUDE Clauses.................................................................................................................266
Wildcard Character (*).........................................................................................................267
Within Subvolume Names.................................................................................................267
Within Filenames.............................................................................................................267
INCLUDE/EXCLUDE and RDFCOM In-Memory Table.................................................................267
INCLUDE and EXCLUDE Processing.........................................................................................268
INCLUDEPURGE and EXCLUDEPURGE....................................................................................268
Error Checking.....................................................................................................................269
Performance Ramifications.....................................................................................................269
Replicating purge operations with INCLUDE, EXCLUDE, INCLUDEPURGE, and EXCLUDEPURGE
lists.....................................................................................................................................269
Summary Examples..............................................................................................................270
12 Subvolume Name Mapping...................................................................271
Creating a Mapfile to Define the Rules for Subvolume Name Mapping........................................271
Rules for Creating Mapfile Mapping Strings.............................................................................271
How an Updater Manages Filename Collisions........................................................................273
Creating a Maplog to Log Subvolume Name Mapping..............................................................273
Adding a Mapfile and Maplog to an Updater's Configuration Record.........................................274
Managing Subvolume Name Mapping for Partitioned Files........................................................274
13 Auxiliary Audit Trails.............................................................................276
Auxiliary Extractor................................................................................................................276
Auxiliary Receiver.................................................................................................................276
Configuring Extractors and Receivers.......................................................................................276
Error conditions...............................................................................................................276
Configuring Image Trails........................................................................................................277
Configuring Updaters............................................................................................................277
Error Conditions..............................................................................................................277
Ramifications for STOP TMF, Stop-Update-to-Time, and SQL Shared Access DDL Ops.....................277
Takeover Ramifications..........................................................................................................278
Usage of Master and Auxiliary Audit Trails..............................................................................278
Using Expand Multi-CPU Paths...............................................................................................278
14 Network Transactions............................................................................279
Configuration Changes.........................................................................................................279
NETWORK Attribute........................................................................................................279
NETWORKMASTER Attribute.............................................................................................280
Network Configuration Record...........................................................................................280
PRIMARYSYSTEM Network Attribute...............................................................................280
BACKUPSYSTEM Network Attribute................................................................................280
REMOTECONTROLSUBVOL (RCSV) Network Attribute.....................................................281
PNETTXVOLUME Network Attribute...............................................................................281
Adding the Network Record.........................................................................................281
RDF Network Synchronizer (RDFNET) Process......................................................................281
RDF Network Control Files.....................................................................................................281
Normal RDF Processing Within a Network Environment.............................................................281
RDF Takeovers Within a Network Environment..........................................................................282
Takeover Phase 1 – Local Undo.........................................................................................282
Takeover Phase 2 – File Undo............................................................................................282
Takeover Phase 3 – Network Undo....................................................................................282
Takeover Phase 3 Performance..........................................................................................283
Communication Failures During Phase 3 Takeover Processing................................................283
Contents 15










