RDF System Management Manual
Table Of Contents
- RDF System Management Manual
- What’s New in This Manual
- About This Manual
- 1 Introducing RDF
- RDF Subsystem Overview
- RDF Processes
- RDF Operations
- Reciprocal and Chain Replication
- Available Types of Replication to Multiple Backup Systems
- Triple Contingency
- Loopback Configuration (Single System)
- Online Product Initialization
- Online Database Synchronization
- Online Dumps
- Subvolume- and File-Level Replication
- Shared Access DDL Operations
- EMS Support
- SMF Support
- RTD Warning Thresholds
- Process-Lockstep Operation
- Support for Network Transactions
- RDF and NonStop SQL/MX
- Zero Lost Transactions (ZLT)
- Monitoring RDF Entities With ASAP
- 2 Preparing the RDF Environment
- 3 Installing and Configuring RDF
- 4 Operating and Monitoring RDF
- 5 Managing RDF
- Recovering From File System Errors
- Handling Disk Space Problems
- Responding to Operational Failures
- Stopping RDF
- Restarting RDF
- Carrying Out a Planned Switchover
- Takeover Operations
- Reading the Backup Database
- Access to Backup Databases in a Consistent State
- RDF and NonStop SQL/MP DDL Operations
- RDF and NonStop SQL/MX Operations
- Backing Up Image Trail Files
- Making Online Dumps With Updaters Running
- Doing FUP RELOAD Operations With Updaters Running
- Exception File Optimization
- Switching Disks on Updater UPDATEVOLUMES
- 6 Maintaining the Databases
- 7 Online Database Synchronization
- 8 Entering RDFCOM Commands
- 9 Entering RDFSCAN Commands
- 10 Triple Contingency
- 11 Subvolume- and File-Level Replication
- 12 Auxiliary Audit Trails
- 13 Network Transactions
- Configuration Changes
- RDF Network Control Files
- Normal RDF Processing Within a Network Environment
- RDF Takeovers Within a Network Environment
- Takeover Phase 1 – Local Undo
- Takeover Phase 2 – File Undo
- Takeover Phase 3 – Network Undo
- Takeover Phase 3 Performance
- Communication Failures During Phase 3 Takeover Processing
- Takeover Delays and Purger Restarts
- Takeover Restartability
- Takeover and File Recovery
- The Effects of Undoing Network Transactions
- Takeover and the RETAINCOUNT Value
- Network Configurations and Shared Access NonStop SQL/MP DDL Operations
- Network Validation and Considerations
- RDF Re-Initialization in a Network Environment
- RDF Networks and ABORT or STOP RDF Operations
- RDF Networks and Stop-Update-to-Time Operations
- Sample Configurations
- RDFCOM STATUS Display
- 14 Process-Lockstep Operation
- Starting a Lockstep Operation
- The DoLockstep Procedure
- The Lockstep Transaction
- RDF Lockstep File
- Multiple Concurrent Lockstep Operations
- The Lockstep Gateway Process
- Disabling Lockstep
- Reenabling Lockstep
- Lockstep Performance Ramifications
- Lockstep and Auxiliary Audit Trails
- Lockstep and Network Transactions
- Lockstep Operation Event Messages
- 15 NonStop SQL/MX and RDF
- Including and Excluding SQL/MX Objects
- Obtaining ANSI Object Names From Updater Event Messages
- Creating NonStop SQL/MX Primary and Backup Databases from Scratch
- Creating a NonStop SQL/MX Backup Database From an Existing Primary Database
- Online Database Synchronization With NonStop SQL/MX Objects
- Offline Synchronization for a Single Partition
- Online Synchronization for a Single Partition
- Correcting Incorrect NonStop SQL/MX Name Mapping
- Consideration for Creating Backup Tables
- Restoring to a Specific Location
- Comparing NonStop SQL/MX Tables
- 16 Zero Lost Transactions (ZLT)
- A RDF Command Summary
- B Additional Reference Information
- C Messages
- D Operational Limits
- E Using ASAP
- Index
Introducing RDF
HP NonStop RDF System Management Manual—524388-003
1-30
Triple Contingency
The following discussion assumes you do not have ZLT functionality. For triple
contingency with ZLT, see Section 10, Triple Contingency.
The triple contingency feature builds upon the ability to replicate to multiple backup
systems. To use this feature, you establish two essentially identical RDF
configurations, as follows:
RDF Configuration #1
\A ---------> \B
RDF Configuration #2
\A ---------> \C
With both RDF configurations in operation, the exact same data is replicated to the two
backup systems (\B and \C). Because the two configurations operate independently of
one another, if the primary system fails, it is unlikely that the databases on the two
backup systems will be logically identical to each other after RDF takeover operations.
The extractor in one RDF configuration may have just read and sent new audit to its
backup system, but the primary system might have failed before the other extractor
could send the same audit to its backup system. To bring the two backup databases
into rapid synchronization, you must perform the following steps:
1. Check the EMS event log on both remote systems after the takeover operations
have finished, and exam each 735 event. This event lists the MAT position of the
last record received by the receiver from its extractor. By comparing this message
in each EMS event log, you can easily identify which backup system received the
most audit.
2. On the backup system that received the least audit, use RDFCOM to execute the
COPYAUDIT command. This command copies all the missing audit from the
system that received the most audit to your present local system—the one that
received the least audit.
3. Still on your same local backup system, use RDFCOM to execute a TAKEOVER
command. When this command completes execution, the databases on both
backup systems will be fully synchronized and logically identical to each other.
Now, you can configure a new RDF environment between the two backup systems, so
that one operates as the primary and the other as the backup system. Then, you can
start your applications on the new primary and have full RDF protection on the backup.
For situations where the backup systems are very far apart when the primary fails, for
example when an Expand line between systems is down for several hours, you must
take steps to ensure that the audit missing from the system with the least audit is still
on disk at the backup system with the most audit. Normally, an RDF purger process
purges image files as soon as it determines that they are no longer needed. For triple
contingency, however, the purger on the system with the most image audit must retain
all files that might be needed for this feature, even if those files are no longer needed in
that purger’s own RDF configuration. To support this need, RDF provides the PURGER
RETAINCOUNT configuration parameter, which lets you specify the number of image
files that should still remain on disk when they are no longer needed. You set
RETAINCOUNT to a value that reflects how far apart you believe your two backup