RDF System Management Manual
Table Of Contents
- RDF System Management Manual
- What’s New in This Manual
- About This Manual
- 1 Introducing RDF- RDF Subsystem Overview
- RDF Processes
- RDF Operations
- Reciprocal and Chain Replication
- Available Types of Replication to Multiple Backup Systems
- Triple Contingency
- Loopback Configuration (Single System)
- Online Product Initialization
- Online Database Synchronization
- Online Dumps
- Subvolume- and File-Level Replication
- Shared Access DDL Operations
- EMS Support
- SMF Support
- RTD Warning Thresholds
- Process-Lockstep Operation
- Support for Network Transactions
- RDF and NonStop SQL/MX
- Zero Lost Transactions (ZLT)
- Monitoring RDF Entities With ASAP
 
- 2 Preparing the RDF Environment
- 3 Installing and Configuring RDF
- 4 Operating and Monitoring RDF
- 5 Managing RDF- Recovering From File System Errors
- Handling Disk Space Problems
- Responding to Operational Failures
- Stopping RDF
- Restarting RDF
- Carrying Out a Planned Switchover
- Takeover Operations
- Reading the Backup Database
- Access to Backup Databases in a Consistent State
- RDF and NonStop SQL/MP DDL Operations
- RDF and NonStop SQL/MX Operations
- Backing Up Image Trail Files
- Making Online Dumps With Updaters Running
- Doing FUP RELOAD Operations With Updaters Running
- Exception File Optimization
- Switching Disks on Updater UPDATEVOLUMES
 
- 6 Maintaining the Databases
- 7 Online Database Synchronization
- 8 Entering RDFCOM Commands
- 9 Entering RDFSCAN Commands
- 10 Triple Contingency
- 11 Subvolume- and File-Level Replication
- 12 Auxiliary Audit Trails
- 13 Network Transactions- Configuration Changes
- RDF Network Control Files
- Normal RDF Processing Within a Network Environment
- RDF Takeovers Within a Network Environment- Takeover Phase 1 – Local Undo
- Takeover Phase 2 – File Undo
- Takeover Phase 3 – Network Undo
- Takeover Phase 3 Performance
- Communication Failures During Phase 3 Takeover Processing
- Takeover Delays and Purger Restarts
- Takeover Restartability
- Takeover and File Recovery
- The Effects of Undoing Network Transactions
- Takeover and the RETAINCOUNT Value
 
- Network Configurations and Shared Access NonStop SQL/MP DDL Operations
- Network Validation and Considerations
- RDF Re-Initialization in a Network Environment
- RDF Networks and ABORT or STOP RDF Operations
- RDF Networks and Stop-Update-to-Time Operations
- Sample Configurations
- RDFCOM STATUS Display
 
- 14 Process-Lockstep Operation- Starting a Lockstep Operation
- The DoLockstep Procedure
- The Lockstep Transaction
- RDF Lockstep File
- Multiple Concurrent Lockstep Operations
- The Lockstep Gateway Process
- Disabling Lockstep
- Reenabling Lockstep
- Lockstep Performance Ramifications
- Lockstep and Auxiliary Audit Trails
- Lockstep and Network Transactions
- Lockstep Operation Event Messages
 
- 15 NonStop SQL/MX and RDF- Including and Excluding SQL/MX Objects
- Obtaining ANSI Object Names From Updater Event Messages
- Creating NonStop SQL/MX Primary and Backup Databases from Scratch
- Creating a NonStop SQL/MX Backup Database From an Existing Primary Database
- Online Database Synchronization With NonStop SQL/MX Objects
- Offline Synchronization for a Single Partition
- Online Synchronization for a Single Partition
- Correcting Incorrect NonStop SQL/MX Name Mapping
- Consideration for Creating Backup Tables
- Restoring to a Specific Location
- Comparing NonStop SQL/MX Tables
 
- 16 Zero Lost Transactions (ZLT)
- A RDF Command Summary
- B Additional Reference Information
- C Messages
- D Operational Limits
- E Using ASAP
- Index
Installing and Configuring RDF
HP NonStop RDF System Management Manual—524388-003
3-3
Preparing the Backup System
To set the AUDITCOMPRESS attribute for an Enscribe file, use the File Utility Program 
(FUP) to enter an ALTER command:
FUP ALTER filename, AUDITCOMPRESS
Preparing the Backup System
Before starting RDF, you need to copy every database, program, and file that the 
primary system applications use to the backup system so that the backup system can 
take over in the event of a primary system failure. In the backup copies, you need to 
change any occurrences of the primary system name to the backup system name. 
RDF replicates the database; you should use the HP NonStop Autosync product to 
replicate everything else that is not audited, such as important application files, objects, 
and scripts.
If the names of any volumes or devices the applications might use on the backup 
system are different from the names on the primary system, you must also change any 
references to these volumes or devices.
It is strongly recommended that the backup system have one volume for every volume 
protected by RDF on the primary system and that each backup volume have the same 
name as the corresponding primary volume. If the backup volume names are not 
identical to the primary volume names, then you need to update every backup 
partitioned file and every backup file that has alternate keys so that each points to the 
right volume name. Also, if you replicate two or more volumes on the primary system 
to a single volume on the backup system, the updaters might fall behind under very 
high throughput due to the double workload.
RDF requires that TMF be started on the backup system, the database on the backup 
system resides on configured data volumes, the data volumes be physically up, and 
the files and tables be audited. BEGINTRANS should be enabled. SMF disks should 
be audited. If replicating NonStop SQL/MP Format 2 audit data, be sure the backup 
system supports it.
For NonStop SQL/MP or NonStop SQL/MX databases, you must create catalogs on 
the backup system and you need copies of the following objects on the backup system:
•
Catalogs in which base tables protected by RDF and objects dependent on those 
base tables are registered, preferably with the same names as the primary system 
catalogs
•
All base tables that reside on primary system volumes protected by RDF
•
All views and indexes dependent on base tables protected by RDF
•
All program files for applications that use any base tables protected by RDF if you 
want the applications to run at the backup site after an RDF takeover operation










