Creating an independent snapshot of the, Target system, Rget. see – HP Integrity NonStop H-Series User Manual

Page 312: Creating an independent, Snapshot of the target system, Creating an, Independent snapshot of the target system

Advertising
background image

Managing DSM/SCM

DSM/SCM User’s Guide — 529846-014

17 - 19

Creating an Independent Snapshot of the Target

System

When the Verify Database request finishes successfully, DSM/SCM displays an
informational message.

Creating an Independent Snapshot of the Target System

A snapshot of a target system provides current target database information to transfer
to the host system and receive into the host database. With current information about
the target contents, DSM/SCM can keep the host and target databases synchronized,
which is crucial to effective system configuration management. You should create a
snapshot after most DSM/SCM tasks on a target. A snapshot includes:

The physical target name

The SYSnn and configuration name of each logical target on the target system

The TSV locations associated with each logical target

File attributes, including fingerprints of each managed file on the target system

Activity records from the target system

The target’s EMS messages

Target system profile information

Disk and tape device locations on the target system

Name and timestamp of when the snapshot was generated

If you submit a Build/Apply request, a snapshot is automatically created, transferred to
the host system, and received into the host database. The planner might request an
independent snapshot for one of these reasons:

Software on the target system has changed outside of a Build/Apply.

The host snapshot is lost or corrupted.

Note. If $DATA00 is a scratch volume, Verify Database stops in restartable mode giving
an EMS message that no scratch volumes are configured on the target system.

Define at least one scratch volume using the Target Maintenance and restart the Verify
Database activity.

After successful completion of Verify Database, update the volume usage information
using the ZPHIHMI also.

If $DATA00 is an archive volume, after successful completion of Verify Database, update
the volume usage information using the ZPHITMI and ZPHIHMI.

For more information, see

Updating the Volume Usage

on page 17-11.

Note. When it receives a snapshot from a target system, DSM/SCM creates a configuration
report that lists each logical target, its products, and SPRs applied to the products on the
target. DSM/SCM then notifies the OSM application, which in turn creates a Software
Configuration Incident report and delivers it to the GCSC.

Advertising
This manual is related to the following products: