HP Storage Mirroring V5 Software User Manual

Page 117

Advertising
background image

9

-

10

3.

Identify the connection ID by locating the number in the left column below the target machine name and initiate the
verification process by using the

verify

command.

Command

VERIFY

Description

Verifies the integrity of the data between the source and target machines.

Syntax

VERIFY <

con_id

> [SYNC [,NEWER][,CHECKSUM] | NOSYNC] [,CHECKSUM]

[STARTTIME=<

mm/dd/yy

> [

hh:mm

]] [EVERY <

number

> <

time_units

>]

[ORPHANS|NOORPHANS]

Options

‹

con_id

—The connection ID which should be moved during failover

‹

SYNC—Synchronizes any data that is different

‹

NEWER—Mirrors only those files that are newer on the source than on the target

‹

CHECKSUM—Mirrors those blocks that are different on the source than on the target based on
checksum comparisons

‹

NOSYNC—Do not synchronize any data that is different

‹

STARTTIME—Starts the verification process at the time specified

‹

mm/dd/yy

—Date in month/day/year format when the verification process will begin

‹

hh:mm

—Time in hour:minute format using the 24 hour clock when the verification process will

begin

‹

EVERY

—Repeat the verification process at the frequency specified

‹

number

—Length of time to repeat the verification process

‹

time_units

—Minutes (

min

), hours (

hr

), or days (

day

)

‹

ORPHANS

—Removes orphan files on the target

‹

NOORPHANS

—Does not remove orphan files on the target

Examples

‹

verify 1

‹

verify 2 sync, newer

‹

verify 2 every 2 hr

Notes

The default verification settings are sync, checksum, and noorphans.

Advertising
This manual is related to the following products: