RDF System Management Manual
Table Of Contents
- RDF System Management Manual
- What’s New in This Manual
- About This Manual
- 1 Introducing RDF
- RDF Subsystem Overview
- RDF Processes
- RDF Operations
- Reciprocal and Chain Replication
- Available Types of Replication to Multiple Backup Systems
- Triple Contingency
- Loopback Configuration (Single System)
- Online Product Initialization
- Online Database Synchronization
- Online Dumps
- Subvolume- and File-Level Replication
- Shared Access DDL Operations
- EMS Support
- SMF Support
- RTD Warning Thresholds
- Process-Lockstep Operation
- Support for Network Transactions
- RDF and NonStop SQL/MX
- Zero Lost Transactions (ZLT)
- Monitoring RDF Entities With ASAP
- 2 Preparing the RDF Environment
- 3 Installing and Configuring RDF
- 4 Operating and Monitoring RDF
- 5 Managing RDF
- Recovering From File System Errors
- Handling Disk Space Problems
- Responding to Operational Failures
- Stopping RDF
- Restarting RDF
- Carrying Out a Planned Switchover
- Takeover Operations
- Reading the Backup Database
- Access to Backup Databases in a Consistent State
- RDF and NonStop SQL/MP DDL Operations
- RDF and NonStop SQL/MX Operations
- Backing Up Image Trail Files
- Making Online Dumps With Updaters Running
- Doing FUP RELOAD Operations With Updaters Running
- Exception File Optimization
- Switching Disks on Updater UPDATEVOLUMES
- 6 Maintaining the Databases
- 7 Online Database Synchronization
- 8 Entering RDFCOM Commands
- 9 Entering RDFSCAN Commands
- 10 Triple Contingency
- 11 Subvolume- and File-Level Replication
- 12 Auxiliary Audit Trails
- 13 Network Transactions
- Configuration Changes
- RDF Network Control Files
- Normal RDF Processing Within a Network Environment
- RDF Takeovers Within a Network Environment
- Takeover Phase 1 – Local Undo
- Takeover Phase 2 – File Undo
- Takeover Phase 3 – Network Undo
- Takeover Phase 3 Performance
- Communication Failures During Phase 3 Takeover Processing
- Takeover Delays and Purger Restarts
- Takeover Restartability
- Takeover and File Recovery
- The Effects of Undoing Network Transactions
- Takeover and the RETAINCOUNT Value
- Network Configurations and Shared Access NonStop SQL/MP DDL Operations
- Network Validation and Considerations
- RDF Re-Initialization in a Network Environment
- RDF Networks and ABORT or STOP RDF Operations
- RDF Networks and Stop-Update-to-Time Operations
- Sample Configurations
- RDFCOM STATUS Display
- 14 Process-Lockstep Operation
- Starting a Lockstep Operation
- The DoLockstep Procedure
- The Lockstep Transaction
- RDF Lockstep File
- Multiple Concurrent Lockstep Operations
- The Lockstep Gateway Process
- Disabling Lockstep
- Reenabling Lockstep
- Lockstep Performance Ramifications
- Lockstep and Auxiliary Audit Trails
- Lockstep and Network Transactions
- Lockstep Operation Event Messages
- 15 NonStop SQL/MX and RDF
- Including and Excluding SQL/MX Objects
- Obtaining ANSI Object Names From Updater Event Messages
- Creating NonStop SQL/MX Primary and Backup Databases from Scratch
- Creating a NonStop SQL/MX Backup Database From an Existing Primary Database
- Online Database Synchronization With NonStop SQL/MX Objects
- Offline Synchronization for a Single Partition
- Online Synchronization for a Single Partition
- Correcting Incorrect NonStop SQL/MX Name Mapping
- Consideration for Creating Backup Tables
- Restoring to a Specific Location
- Comparing NonStop SQL/MX Tables
- 16 Zero Lost Transactions (ZLT)
- A RDF Command Summary
- B Additional Reference Information
- C Messages
- D Operational Limits
- E Using ASAP
- Index
Index
HP NonStop RDF System Management Manual—524388-003
Index-10
R
STATUS RDF 4-19, 8-93, A-13
STOP RDF 8-100, A-14
STOP SYNCH 8-104, A-14
STOP UPDATE 8-105, A-14
TAKEOVER 8-108, A-14
UNPINAUDIT A-15
VALIDATE
CONFIGURATION 8-113, A-15
description 4-1
keywords 4-7
online help 4-12
prompt (]) 4-1
running 4-1
security requirements 3-12
using from a command file 4-6
using interactively 4-3
using noninteractively 4-5
RDFCOM command syntax 4-4
RDFEXTO
extractor object file 3-9
security requirements 3-12
RDFINST installation macro 3-9
RDFLOCK file description B-9
RDFLOG 4-14, A-16
RDFMONO
monitor object file 3-9
security requirements 3-13
RDFNETO
security requirements 3-13
RDFRCVO
licensed program 3-11
receiver object file 3-9
security requirements 3-13
RDFSCAN
commands 4-16
AT 9-3, A-16
DISPLAY 9-4, A-16
EXIT 9-6, A-16
FILE 9-7, A-16
HELP 9-9, A-17
LIST 9-10, A-17
LOG 9-12, A-17
MATCH 9-14, A-17
NOLOG 9-12, 9-16, A-17
SCAN 9-17, A-17
description 9-1
description of use 1-11, 4-25
ending a session 4-15
help text file 3-9
messages C-143
object code file 3-9
online help 4-17
running 4-14
security requirements 3-13
starting a session 4-15
wildcard characters in match
patterns 9-14
RDFSCAN command A-16
RDFSCANH help text file 3-9
RDFSNOOP B-7
licensed program 3-11
object code file 3-9
security requirements 3-13
RDFUPDO
licensed program 3-11
security requirements 3-13
updater object file 3-9
RDFVOLUME parameter
receiver process 3-32, 3-33
verification of image file volume 8-113
RDF/IMP product components 3-9
RDF/IMPX product components 3-10
RDF/ZLT product components 3-10
RDIMAGE
security requirements 3-13
Receiver process 1-19
auxiliary 12-1
configuration 3-32, 3-33, 8-64, 8-74,
A-11
disk space allocation 5-6