7 data protection operations with raid manager, 8 examples of using raid manager commands, 9 troubleshooting – HP XP7 Storage User Manual

Page 7

Advertising
background image

Overview........................................................................................................................175
Policy ............................................................................................................................176
horcm.conf......................................................................................................................176
Command specifications...................................................................................................177

pairdisplay command..................................................................................................177
pairsplit command......................................................................................................178

Notice on system operation...............................................................................................180
Configuration examples....................................................................................................181

Remote volume discovery.......................................................................................................183

Discovering a remote volume.............................................................................................184

7 Data protection operations with RAID Manager..........................................186

Data protection operations.....................................................................................................186

Data Retention ................................................................................................................186

Restrictions on Data Retention volumes...........................................................................187

Database Validator..........................................................................................................187

Restrictions on Database Validator.................................................................................188

Protection parameters and operations......................................................................................188
Data Protection facility...........................................................................................................189

Data Protection Facility specifications..................................................................................190
Examples for configuration and protected volumes...............................................................191
The operation authority with CMD security enabled..............................................................192
Target commands for protection.........................................................................................192
Permission command........................................................................................................192
New options for security...................................................................................................193

raidscan -find inst........................................................................................................193
raidscan -find verify [MU#]...........................................................................................193
raidscan -f[d]..............................................................................................................193
pairdisplay -f[d]..........................................................................................................193

Permitting protected volumes..............................................................................................194

With a $HORCMPERM file...........................................................................................194
Without a $HORCMPERM file: Commands to run on different operating systems.................195

Environment variables.......................................................................................................195

$HORCMPROMOD....................................................................................................195
$HORCMPERM..........................................................................................................196

Determining the protection mode command device...............................................................196

8 Examples of using RAID Manager commands ...........................................197

Group version control for mixed storage system configurations....................................................197
LDM volume discovery and flushing for Windows.....................................................................197

Volume discovery function.................................................................................................198
Mountvol attached to Windows 2000/2003/2008/2012 systems........................................199
System buffer flushing function...........................................................................................200

Special facilities for Windows systems.....................................................................................202

Signature changing facility for Windows systems.................................................................202
GPT disk for Windows......................................................................................................205
Directory mount facility for Windows systems.......................................................................206

Host group control................................................................................................................207

Specifying a host group....................................................................................................207
Commands and options including a host group...................................................................208

Using RAID Manager SLPR security.........................................................................................209

Specifying the SLPR Protection Facility.................................................................................209
SLPR configuration examples.............................................................................................210

9 Troubleshooting......................................................................................214

General troubleshooting........................................................................................................214

Contents

7

Advertising
This manual is related to the following products: