RDF System Management Manual for J-series and H-series RVUs (RDF 1.10)

Online Dumps of the Backup Database.................................................................................49
Subvolume-Level and File-Level Replication.............................................................................49
Shared Access DDL Operations...........................................................................................49
Configurable Software Location...........................................................................................49
EMS Support.....................................................................................................................50
SMF Support.....................................................................................................................50
RTD Warning Thresholds.....................................................................................................50
Process-Lockstep Operation.................................................................................................50
Support for Network Transactions.........................................................................................50
RDF and NonStop SQL/MX................................................................................................51
Zero Lost Transactions (ZLT)..................................................................................................51
Monitoring RDF Entities With ASAP......................................................................................51
2 Preparing the RDF Environment...................................................................52
Configuring Hardware for RDF Operations.................................................................................52
Primary System Configuration..............................................................................................52
Backup System Configuration...............................................................................................52
Disk Volume Limit...............................................................................................................53
Volume-to-Volume Mapping.................................................................................................53
Subvolume-to-Subvolume Name Mapping.............................................................................53
Expand (Data Communication) Resources.............................................................................53
Preparing Software and Database Files for RDF Operations.........................................................54
Configuring TMF for RDF Operations on the Primary System....................................................55
AUDITTRAIL BUFFER......................................................................................................55
TMF Configuration With Dump Process on the Primary System............................................55
TMF Configuration Without Dump Process on the Primary System........................................56
Configuring TMF for RDF Operations on the Backup System.....................................................56
Preparing Databases for RDF Protection................................................................................56
Audited Files Per Volume on Primary System......................................................................57
Audited Backup Database Files.......................................................................................57
Reload of Backup Database.......................................................................................57
Disk Process Pins on Database Volumes.......................................................................57
DSM Catalogs and File Code 900..................................................................................57
Views on the Backup System...........................................................................................58
Partitioned Tables and Files............................................................................................58
Database Block Sizes and Cache on the Backup System.....................................................58
Specifying System Generation Parameters for an RDF Environment............................................58
Designing Transactions for RDF Protection.............................................................................58
Replicating Database Operations....................................................................................59
NonStop SQL DDL Operations...................................................................................59
Enscribe File-Label Modifications................................................................................59
Purge Operations.....................................................................................................59
Partitioned Files........................................................................................................59
Temporary Disk Files.................................................................................................60
Using SMF With RDF..............................................................................................................60
Configuring an SMF Environment on the Primary System.........................................................60
Configuring an SMF Environment on the Backup RDF System...................................................61
3 Installing and Configuring RDF...................................................................62
Preparing the Primary System...................................................................................................62
Stopping the Software........................................................................................................62
Preparing the Tables and Files.............................................................................................63
Separating NonStop SQL Tables.....................................................................................63
Compressing Audit Data for Tables and Files....................................................................63
Preparing the Backup System....................................................................................................63
Synchronizing the Primary and Backup Databases.................................................................64
4 Contents