RDF System Management Manual
Table Of Contents
- RDF System Management Manual
- What’s New in This Manual
- About This Manual
- 1 Introducing RDF
- RDF Subsystem Overview
- RDF Processes
- RDF Operations
- Reciprocal and Chain Replication
- Available Types of Replication to Multiple Backup Systems
- Triple Contingency
- Loopback Configuration (Single System)
- Online Product Initialization
- Online Database Synchronization
- Online Dumps
- Subvolume- and File-Level Replication
- Shared Access DDL Operations
- EMS Support
- SMF Support
- RTD Warning Thresholds
- Process-Lockstep Operation
- Support for Network Transactions
- RDF and NonStop SQL/MX
- Zero Lost Transactions (ZLT)
- Monitoring RDF Entities With ASAP
- 2 Preparing the RDF Environment
- 3 Installing and Configuring RDF
- 4 Operating and Monitoring RDF
- 5 Managing RDF
- Recovering From File System Errors
- Handling Disk Space Problems
- Responding to Operational Failures
- Stopping RDF
- Restarting RDF
- Carrying Out a Planned Switchover
- Takeover Operations
- Reading the Backup Database
- Access to Backup Databases in a Consistent State
- RDF and NonStop SQL/MP DDL Operations
- RDF and NonStop SQL/MX Operations
- Backing Up Image Trail Files
- Making Online Dumps With Updaters Running
- Doing FUP RELOAD Operations With Updaters Running
- Exception File Optimization
- Switching Disks on Updater UPDATEVOLUMES
- 6 Maintaining the Databases
- 7 Online Database Synchronization
- 8 Entering RDFCOM Commands
- 9 Entering RDFSCAN Commands
- 10 Triple Contingency
- 11 Subvolume- and File-Level Replication
- 12 Auxiliary Audit Trails
- 13 Network Transactions
- Configuration Changes
- RDF Network Control Files
- Normal RDF Processing Within a Network Environment
- RDF Takeovers Within a Network Environment
- Takeover Phase 1 – Local Undo
- Takeover Phase 2 – File Undo
- Takeover Phase 3 – Network Undo
- Takeover Phase 3 Performance
- Communication Failures During Phase 3 Takeover Processing
- Takeover Delays and Purger Restarts
- Takeover Restartability
- Takeover and File Recovery
- The Effects of Undoing Network Transactions
- Takeover and the RETAINCOUNT Value
- Network Configurations and Shared Access NonStop SQL/MP DDL Operations
- Network Validation and Considerations
- RDF Re-Initialization in a Network Environment
- RDF Networks and ABORT or STOP RDF Operations
- RDF Networks and Stop-Update-to-Time Operations
- Sample Configurations
- RDFCOM STATUS Display
- 14 Process-Lockstep Operation
- Starting a Lockstep Operation
- The DoLockstep Procedure
- The Lockstep Transaction
- RDF Lockstep File
- Multiple Concurrent Lockstep Operations
- The Lockstep Gateway Process
- Disabling Lockstep
- Reenabling Lockstep
- Lockstep Performance Ramifications
- Lockstep and Auxiliary Audit Trails
- Lockstep and Network Transactions
- Lockstep Operation Event Messages
- 15 NonStop SQL/MX and RDF
- Including and Excluding SQL/MX Objects
- Obtaining ANSI Object Names From Updater Event Messages
- Creating NonStop SQL/MX Primary and Backup Databases from Scratch
- Creating a NonStop SQL/MX Backup Database From an Existing Primary Database
- Online Database Synchronization With NonStop SQL/MX Objects
- Offline Synchronization for a Single Partition
- Online Synchronization for a Single Partition
- Correcting Incorrect NonStop SQL/MX Name Mapping
- Consideration for Creating Backup Tables
- Restoring to a Specific Location
- Comparing NonStop SQL/MX Tables
- 16 Zero Lost Transactions (ZLT)
- A RDF Command Summary
- B Additional Reference Information
- C Messages
- D Operational Limits
- E Using ASAP
- Index
Network Transactions
HP NonStop RDF System Management Manual—524388-003
13-9
The Effects of Undoing Network Transactions
If an RDF event 888 is reported, then the specified File Recovery position is based on
both phase 1 and phase 3 processing. Each system logs its own File Recovery
position. While that position may differ from one backup system to the next, the logged
position for any single system is correct. If you supply the returned File Recovery
position to the TMF file recovery process on the primary system, the process recovers
the files on the primary database up to that point. If you use File Recovery to a MAT
position on all primary systems in the RDF network, in each case using the returned
File Recovery positions, then your primary distributed database will be consistent
across the RDF network.
You would use the File Recovery position with File Recovery in situations such as the
following. Assume you have had an outage of your primary system, you have
executed the RDF takeover operation on your backup system, and you have resumed
business transactions on your backup system. Assume further that the former primary
system has been repaired, it is back online, and you want to switch your business
transactions from the active backup database back to the former primary database.
To do so, you merely execute a planned RDF switchover from the backup to the newly
restored primary.
The problem with doing a planned switchover from backup to primary after an RDF
takeover operation is that some transactions might have committed on the primary
system immediately prior to the unplanned outage, and the outage brought down the
extractor before it could send that data to the backup system. In such a case, when
you bring the primary system back up the two databases are no longer synchronized
because the primary database contains committed transactions that are not in the
backup database. Such transactions cannot be recovered.
In the past you would have had to synchronize your entire primary and backup
databases. That could be a lengthy task. Now you can simply use TMF file recovery
to a MAT position. If you execute this operation on your primary system using the MAT
position specified in the RDF event 888 message (see the description of message 888
in Appendix C), it brings the primary database into the exact same state that the
backup database was in upon completion of the RDF takeover. Thus, after file
recovery has completed, you can execute a normal planned switchover from backup to
primary.
The Effects of Undoing Network Transactions
Except with RDF/ZLT, phase 3 undo processing within an RDF network environment
usually results in other transactions being undone on every system in the network
because the RDF product is designed to make the safest, and most conservative,
assumptions regarding all possible interrelationships between transactions. This is
best illustrated by example.
Consider an RDF network consisting of two RDF subsystem configurations (primary
system \A protected by backup system \X, and primary system \B protected by backup
Note. Due to the order transactions that commit on individual systems, file recovery might not
always be possible. If an 888 message is generated, however, it can be trusted.