RDF System Management Manual

Table Of Contents
Introducing RDF
HP NonStop RDF System Management Manual524388-003
1-24
Updater Processes
NonStop SQL/MP and NonStop SQL/MX indexes are updated independently as a
consequence of the individual audit records generated on the primary system by TMF
software.
File System Errors Involving Data Files
File system errors can occur when:
A file is created.
A file is opened.
A modify operation is performed on the file. Modify operations are those that the
updater might perform on an open file, such as updating the file (logical
REDO/UNDO) or altering the owner or security after the replication of a file
creation.
Errors encountered are reported in the EMS event log.
If an updater process encounters a file system error, it responds in either of the
following ways (depending upon the type of error that occurred):
Restarts and retries the operation again by reprocessing all database updates
since the last restart point. If the updater takes this course of action, it continues to
do so until the underlying problem goes away. This would be the action, for
example, if an updater process cannot create a data file on a backup volume
because that volume is protected by the Safeguard security management
subsystem; in this case, the updater logs error message 739, with an error 48, and
restarts.
Skips the operation. This would be the action, for example, in response to an
error 10 (“record already exists”).
Reading Image Data
Write operations to the various sorted image trails occur asynchronously to one
another. To ensure correct operation, the updaters cannot read to the end-of-file.
Instead, they can only read as far as the receiver allows (determined by receiver “save”
points in the image trail). Thus, on a finely tuned RDF backup node, the RDF time
delay (RTD) for an updater can typically lag from 1 to 15 seconds behind TMF
processing. This 15-second delay does not mean that 15 seconds are needed for the
updater to catch up, however; that operation typically requires less than a second.
Note. You must be sure that volumes on the primary system containing alternate key files and
indexes are protected by RDF. It is not sufficient to protect just the associated data file or table
(particularly in the case of alternate keys). Likewise, if primary partitions reside on volumes
protected by RDF, you must ensure that the secondary partitions are also configured for
protection.