Sign In
Upload
Manuals
Brands
Hitachi Manuals
Storage
TAGMASTORE MK-90RD011-25
User Manuals: Hitachi TAGMASTORE MK-90RD011-25 Drive
Manuals and User Guides for Hitachi TAGMASTORE MK-90RD011-25 Drive. We have
1
Hitachi TAGMASTORE MK-90RD011-25 Drive manual available for free PDF download: User Manual
Hitachi TAGMASTORE MK-90RD011-25 User Manual (388 pages)
Hitachi Computer Drive User Manual
Brand:
Hitachi
| Category:
Storage
| Size: 2.19 MB
Table of Contents
Table of Contents
9
Chapter 1 Overview of CCI Functionality
19
Overview of Command Control Interface
19
Overview of Hitachi Data Replication Functions
20
Hitachi Truecopy
20
Hitachi Shadowimage
21
Hitachi Universal Replicator
21
Hitachi Copy-On-Write Snapshot
22
Overview of Hitachi Data Protection Functions
23
Hitachi Database Validator
23
Hitachi Data Retention Utility (Open LDEV Guard)
24
Chapter 2 Overview of CCI Operations
25
Overview
26
Features of Paired Volumes
27
Figure 2.1 Concept of Paired Volumes
27
Figure 2.2 Shadowimage Duplicated Mirrors
28
Shadowimage Duplicated Mirroring
28
Figure 2.3 Shadowimage Cascade Volume Pairs
29
Shadowimage Cascading Pairs
29
Figure 2.4 Server Failover System Configuration
32
Hitachi Truecopy Takeover Commands
32
Figure 2.5 Package Transfer on High Availability (HA) Software
33
Hitachi Truecopy Remote Commands
33
Figure 2.6 Hitachi Truecopy Remote System Configuration
34
Figure 2.7 Hitachi Truecopy Local System Configuration
34
Hitachi Truecopy Local Commands
34
Overview of CCI Shadowimage Operations
35
Figure 2.8 Shadowimage System Configuration
35
Hitachi Truecopy/Shadowimage Volumes
36
Truecopy/Shadowimage/Universal Replicator Volume Status
37
Table 2.1 Hitachi Truecopy and Shadowimage Pair Status
37
Table 2.2 Pair Status Versus Truecopy and Universal Replicator Commands
38
Table 2.3 Pair Status Versus Shadowimage Commands
39
Table 2.4 Pair Status Versus Snapshot Commands
40
Truecopy Async, Truecopy Sync CTG, and Universal Replicator Volumes
41
Table 2.5 Assignment of CT Groups
41
Figure 2.9 Hitachi Truecopy Asynchronous Consistency Groups
42
Figure 2.10 Sidefile Quantity Limit
43
Table 2.6 State Table for Hitachi Truecopy Sync Vs. Truecopy Async
45
Truecopy Sync/Async and Universal Replicator Fence-Level Settings
46
Figure 2.11 Hitachi Truecopy Async Suspension Condition
46
Table 2.7 Relationship between Hitachi Truecopy Pair Status and Fence Level
47
Figure 2.12 Relation between Logs and Data in Paired Status
48
Applications of Hitachi Truecopy/Shadowimage Commands
49
Figure 2.13 Backing up S-VOL in Paired Status Using Hitachi Truecopy
49
Figure 2.14 Backing up S-VOL in Paired Status Using Shadowimage
50
Figure 2.15 Restoring S-VOL to P-VOL in Split Status Using Hitachi Truecopy
51
Figure 2.16 Restoring S-VOL to P-VOL in Split Status Using Shadowimage
52
Figure 2.17 Swapping Paired Volume for Duplex Operation - Hitachi Truecopy Only
53
Figure 2.18 Restoring S-VOL for Duplex Operation (Hitachi Truecopy Only)
54
Overview of Copy-On-Write Snapshot Operations
55
Figure 2.19 Copy-On-Write Snapshot and Volume Mapping
55
Creating Snapshot
56
Snapshot Volume Characteristics
56
Snapshot Volume Specifications
56
Table 2.8 Snapshot Pairing Status
57
Overview of CCI Data Protection Operations
58
Database Validator
58
Restrictions on Database Validator
59
Data Retention Utility/Open LDEV Guard
60
Restrictions on Data Retention Utility Volumes
61
Operations
62
CCI Software Structure
63
HORCM Operational Environment
63
Figure 2.20 HORCM Operational Environment
63
CCI Instance Configurations
64
Figure 2.21 CCI Software Structure
65
Host Machines that Can be Paired
66
Figure 2.22 RAID Manager Communication Among Different Operating Systems
67
Table 2.9 Supported HORCM Communication
67
Configuration Definition File
68
Figure 2.23 Configuration Definition of Paired Volumes
68
Figure 2.24 Configuration File Example - UNIX-Based Servers
69
Figure 2.25 Configuration File Example - Windows Servers
69
Figure 2.26 Configuration and Unit Ids for Multiple Storage Systems
71
Figure 2.27 Configuration for Multiple Networks
76
Figure 2.28 Network Configuration for Ipv6
77
Figure 2.29 Network Configuration for Ipv4 Mapped Ipv6
78
Figure 2.30 Network Configuration for Mixed Ipv4 and Ipv6
79
Command Device
81
Alternate Command Device Function
82
Figure 2.31 Example of Alternate Path for Command Device for Solaris Systems
82
Figure 2.32 Alternate Command Device Function
82
Command Interface with Hitachi Truecopy/Shadowimage
83
Figure 2.33 Relation between Special File and Special LDEV
83
Figure 2.34 HORCM and Command Issue Process
84
Figure 2.35 Flow of Command Issue
84
Figure 2.36 LUSE Device and Command Issue
85
Logical DKC Per 64K Ldevs
86
Figure 2.37 Relation between Ldevs and Command Device on LDKC
86
Command Device Guarding
87
Figure 2.38 Current Assignment Sequence
87
Figure 2.39 Improved Assignment Sequence
88
CCI Software Files
89
Table 2.10 CCI Files for UNIX-Based Systems
89
Table 2.11 CCI Files for Windows-Based Systems
90
Table 2.12 CCI Files for Openvms ® -Based Systems
92
Hitachi Command Control Interface (CCI) User and Reference Guide
93
Log and Trace Files
93
User-Created Files
93
Configuration Definition File
94
Figure 2.40 Hitachi Truecopy Remote Configuration Example
95
Figure 2.41 Hitachi Truecopy Local Configuration Example
97
Figure 2.42 Hitachi Truecopy Configuration Example for Two Instances
100
Figure 2.43 Shadowimage Configuration Example
104
Figure 2.44 Shadowimage Configuration Example with Cascade Pairs
110
Figure 2.45 Hitachi Truecopy/Shadowimage Configuration Example with Cascade Pairs
114
Paircreate -G Oradb1 -Vl
115
Oradb Oradev1(R) (CL1-D , 2, 1) 30053 268..S-VOL PAIR
116
Oradb Oradev2(R) (CL1-D , 2, 2) 30053 269..S-VOL PAIR
116
Oradb1 Oradev11(R) (CL1-D , 2, 1-0)30053 268
116
Oradb1 Oradev12(R) (CL1-D , 2, 2-0)30053 269
116
Oradb2 Oradev21(R) (CL1-D , 2, 1-1)30053 268..SMPL
116
Oradb2 Oradev22(R) (CL1-D , 2, 2-1)30053 269..SMPL
116
Configuration Definition for Cascading Volume Pairs
117
Figure 2.46 Mirror Descriptors and Group Assignment
117
Table 2.13 Mirror Descriptors and Group Assignments
118
Figure 2.47 Shadowimage Cascade Connection and Configuration File
119
Figure 2.48 Pairdisplay on HORCMINST0
120
Figure 2.49 Pairdisplay on HORCMINST1
120
Figure 2.50 Pairdisplay on HORCMINST0
121
Figure 2.51 Truecopy/Shadowimage Cascading Connection and Configuration File
122
Figure 2.52 Pairdisplay for Hitachi Truecopy on HOST1
123
Figure 2.53 Pairdisplay for Hitachi Truecopy on HOST2 (HORCMINST)
123
Figure 2.54 Pairdisplay for Shadowimage on HOST2 (HORCMINST)
124
Figure 2.55 Pairdisplay for Shadowimage on HOST2 (HORCMINST0)
124
Error Monitoring and Configuration Confirmation
125
Error Monitoring for Paired Volumes
125
Error Monitoring for Database Validator
125
Pair Status Display and Configuration Confirmation
126
Figure 2.56 Example of Pair Configuration Confirmation (Pairdisplay)
126
Figure 2.57 Example of Raidscan Command
126
Figure 2.58 System Failover and Recovery
127
Recovery Procedures for HA Configurations
127
Figure 2.59 Degeneracy and Recovery in Case of System Error
128
Chapter 3 Preparing for CCI Operations
129
System Requirements
130
Supported Platforms
132
Table 3.1 Supported Platforms for Truecopy
132
Table 3.2 Supported Platforms for Shadowimage
133
Table 3.3 Supported Platforms for Truecopy Async
134
Table 3.4 Supported Platforms for Universal Replicator
135
Table 3.5 Supported Platforms for Copy-On-Write Snapshot
135
Table 3.6 Supported Guest os for Vmware
136
Table 3.7 Supported Platforms: Ipv6 Vs Ipv6
136
Table 3.8 Supported Platforms: Ipv4 Vs Ipv6
137
Using CCI with Hitachi and Other RAID Storage Systems
138
Table 3.9 Relationship between CCI and RAID Storage System
138
Restrictions on Zlinux
139
Figure 3.1 Relationship between APP, CCI, and Storage System
139
Figure 3.2 Example of a RAID Manager Configuration on Zlinux
139
Restrictions on VM
141
Figure 3.3 RAID Manager Configuration on Guest Os/Vmware
141
Figure 3.4 CCI Configuration on VIO Client
142
About Platforms Supporting Ipv6
144
Figure 3.5 Library and System Call for Ipv6
144
Hardware Installation
146
Software Installation
147
Software Installation for UNIX Systems
147
Software Installation for Windows Systems
149
Software Installation for Openvms ® Systems
149
Changing the CCI User (UNIX Systems)
151
Changing the CCI User (Windows Systems)
152
Uninstallation
154
Creating/Editing the Configuration File
155
Table 3.10 Configuration (HORCM_CONF) Parameters
156
Porting Notice for Openvms
157
Requirements and Restrictions
157
Known Issues
163
Start-Up Procedures Using Detached Process on DCL
164
Command Examples in DCL
167
Start-Up Procedures in Bash
170
CCI Startup
173
Startup for UNIX Systems
173
Startup for Windows Systems
175
Startup for Openvms ® Systems
176
Starting CCI as a Service (Windows Systems)
178
Chapter 4 Performing CCI Operations
181
Environmental Variables
182
Table 4.1 HORCM, Hitachi Truecopy, and Shadowimage Variables
182
HORCMINST and $HORCC_MRCF Supported Options
184
Table 4.2 Relationship between -I[Inst#] Option and $HORCMINST and HORCC_MRCF
185
Verifying $HORCC_MRCF,HORCMINST
185
Creating Pairs (Paircreate)
186
Figure 4.1 Pair Creation
186
Table 4.3 Paircreate Command Parameters
187
Table 4.4 Specific Error Codes for Paircreate
190
Splitting and Deleting Pairs (Pairsplit)
191
Figure 4.2 Pair Splitting
191
Table 4.5 Pairsplit Command Parameters
192
Table 4.6 Specific Error Codes for Pairsplit
195
Timing Pairsplit Operations
196
Deleting Pairs (Pairsplit -S)
197
Figure 4.3 Example of -FHORC Option for Pairsplit
195
Figure 4.4 Example of -FMRCF Option for Pairsplit
195
Resynchronizing Pairs (Pairresync)
198
Figure 4.5 Pair Resynchronization
199
Figure 4.6 Normal Resync and Shadowimage Restore Resync
199
Table 4.7 Pairresync Command Parameters
200
Figure 4.7 Example of -FHORC Option for Pairresync
203
Figure 4.8 Example of -FMRCF Option for Pairresync
203
Table 4.8 Specific Error Codes for Pairresync
203
Figure 4.9 Swap Operation
204
Figure 4.10 Example Swaps Option with -FHORC [MU#]
204
Confirming Pair Operations (Pairevtwait)
205
Figure 4.11 Pair Event Waiting
205
Table 4.9 Pairevtwait Command Parameters
205
Table 4.10 Specific Error Codes for Pairevtwait
207
Figure 4.12 Example of -FHORC Option for Pairevtwait
208
Figure 4.13 Example of -FMRCF Option for Pairevtwait
208
Figure 4.14 Example for Waiting on HOMRCF
208
Figure 4.15 Example for Waiting "SSUS" on 3DC Using TC/UR
209
Monitoring Pair Activity (Pairmon)
210
Figure 4.16 Pairmon Command Example
210
Table 4.11 Pairmon Command Parameters
210
Table 4.12 Results of Pairmon Command Options
211
Checking Attribute and Status (Pairvolchk)
212
Figure 4.17 Pairvolchk Command Examples
212
Table 4.13 Pairvolchk Command Parameters
212
Table 4.14 Specific Error Codes for Pairvolchk
215
Figure 4.18 Example of -FHORC Option for Pairvolchk
216
Figure 4.19 Example of -FMRCF Option for Pairvolchk
216
Table 4.15 Truth Table for Pairvolchk Group Status Display
217
Table 4.16 State Transition Table for HA Control Script
218
Recovery in Case of SVOL-Takeover
220
PVOL-PSUE-Takeover
223
Recovery in Case of PVOL-PSUE-Takeover
224
SVOL-SSUS Takeover in Case of Escon/Fibre/Host Failure
225
Recovery from SVOL-SSUS-Takeover
226
SVOL-Takeover in Case of Host Failure
228
Displaying Pair Status (Pairdisplay)
229
Table 4.17 Pairdisplay Command Parameters
229
Figure 4.20 Hitachi Truecopy Pairdisplay Command Example
232
Figure 4.21 Shadowimage/Snapshot Pairdisplay Command Example
232
Figure 4.22 Pairdisplay -M Example
232
Checking Hitachi Truecopy Pair Currency (Paircurchk)
234
Table 4.18 Data Consistency Displayed by the Paircurchk Command
234
Figure 4.23 Paircurchk Command Example
235
Table 4.19 Paircurchk Command Parameters
235
Table 4.20 Specific Error Code for Paircurchk
236
Performing Hitachi Truecopy Takeover Operations
237
Table 4.21 Horctakeover Command Parameters
237
Table 4.22 Specific Error Codes for Horctakeover
238
Horctakeover Command Functions
241
Table 4.23 Volume Attributes and Takeover Actions
241
Figure 4.24 Display of Inconsistent Volumes for SVOL-Takeover of Group
243
Applications of the Horctakeover Command
245
Figure 4.25 Application/Example of Truecopy Takeover (UNIX-Based System)
245
Figure 4.26 Application/Example of Truecopy Takeover (Windows-Based System)
246
Displaying Configuration Information
247
Raidscan Command
247
Table 4.24 Raidscan Command Parameters
247
Figure 4.27 Raidscan Command Examples for SCSI Ports
249
Figure 4.28 Raidscan Command Examples for Fibre-Channel Ports
249
Figure 4.29 Example of -Find Option for Raidscan
249
Raidar Command
252
Table 4.25 Raidar Command Parameters
252
Figure 4.30 Raidar Command Example
253
Raidqry Command
254
Figure 4.31 Raidqry Command Examples
254
Table 4.26 Raidqry Command Parameters
255
Performing Data Protection Operations
256
Raidvchkset Command
256
Figure 4.32 Raidvchkset Command Examples
256
Table 4.27 Raidvchkset Command Parameters
257
Table 4.28 Specific Error Code for Raidvchkset -Vg Option
258
Table 4.29 Setting H.A.R.D for USP V/VM and Tagmastore USP/NSC
259
Raidvchkdsp Command
260
Table 4.30 Raidvchkdsp Command Parameters
260
Figure 4.33 Raidvchkdsp Command Examples with -Fd and -Fe Options
262
Figure 4.34 Raidvchkdsp Command Example with -V Cflag Option
263
Figure 4.35 Raidvchkdsp Command Example with -V Offset Option
264
Figure 4.36 Raidvchkdsp Command Example with -V Errcnt Option
264
Figure 4.37 Raidvchkdsp Command Example with -V Gflag Option
264
Figure 4.38 Raidvchkdsp Command Example with -V Pool Option
265
Figure 4.39 Raidvchkdsp Command Example with -V Aou Option
266
Raidvchkscan Command
267
Table 4.31 Raidvchkscan Command Parameters
267
Figure 4.40 Raidvchkscan Command Example with -V Cflag Option
269
Figure 4.41 Raidvchkscan Command Example with -V Offset Option
270
Figure 4.42 Raidvchkscan Command Example with -V Errcnt Option
270
Figure 4.43 Raidvchkscan Command Example with -V Gflag Option
271
Figure 4.44 Raidvchkscan Command Example with -V Pool Option
272
Figure 4.45 Raidvchkscan Command Example with -V Aou Option
272
Raidvchkscan Command for Journal (UR)
273
Figure 4.46 Raidvchkscan Command Example with -V Jnl 0 Option
273
Table 4.32 Raidvchkscan Command Parameters (UR)
273
Figure 4.47 Example of Q-Marker and Q-CNT
275
Figure 4.48 Raidvchkscan Command Example with -V Jnlt Option
276
Table 4.33 Detailed Status of the Journal Volume
276
Raidvchkscan Command for Snapshot Pool and Dynamic Provisioning
277
Figure 4.49 Raidvchkscan Command Example with -V Pid Option
277
Table 4.34 Raidvchkscan Command Parameters (Snapshot/Hdp)
277
Figure 4.50 Raidvchkscan Command Example with -V Pida Option
278
Controlling CCI Activity
279
Horcmstart Command
279
Table 4.35 Horcmstart Command Parameters
279
Horcmshutdown Command
280
Table 4.36 Horcmshutdown Command Parameters
280
Horcctl Command
281
Table 4.37 Horcctl Command Parameters
281
3DC Control Command Using HORC/UR NEW
283
Table 4.38 Horctakeoff Command Parameters
283
Windows Subcommands
288
Findcmddev Subcommand
288
Figure 4.51 Findcmddev Subcommand Example
288
Table 4.39 Findcmddev Subcommand Parameters
288
Drivescan Subcommand
289
Figure 4.52 Drivescan Subcommand Example
289
Table 4.40 Drivescan Subcommand Parameters
289
Portscan Subcommand
290
Figure 4.53 Portscan Subcommand Example
290
Table 4.41 Portscan Subcommand Parameters
290
Sync and Syncd Subcommands
291
Table 4.42 Sync and Syncd Subcommand Parameters
291
Figure 4.54 Sync Subcommand Example – Pairsplit
292
Figure 4.55 Sync Subcommand Example – Pairsplit -S
292
Mount Subcommand
293
Figure 4.56 Mount Subcommand Example for Windows NT
293
Table 4.43 Mount Subcommand Parameters
293
Umount and Umountd Subcommands
295
Figure 4.58 Umount Subcommand Example
295
Table 4.44 Umount and Umountd Subcommand Parameters
295
Environment Variable Subcommands
297
Figure 4.59 Environment Variable Subcommand Examples
297
Table 4.45 Environment Variable Subcommand Parameters
297
CCI Command Tools
298
Inqraid Command Tool
298
Table 4.46 Inqraid Command Parameters
298
Figure 4.61 Inqraid: Example of -Find Option (Linux Example Shown)
303
Figure 4.62 Inqraid: Example of -Find Option (HP-UX Example Shown)
303
Figure 4.63 Inqraid: Example of -Findc Option (HP-UX Example Shown)
303
Figure 4.64 Inqraid: Example of -CLI Option (Linux Example Shown)
304
Figure 4.65 Inqraid: Example of -CLIWP and -CLIWN Options (HP-UX Example Shown)
304
Figure 4.66 Inqraid: Example of -Sort[CM] Option (HP-UX Example Shown)
305
Figure 4.67 Inqraid: Example of -Gvinf Option
305
Figure 4.68 Inqraid: Example of -Svinf[=Ptn] Option
305
Mkconf Command Tool
306
Table 4.47 Mkconf Command Parameters
306
Figure 4.69 Mkconf Command Tool Example (HP-UX Example Shown)
307
Synchronous Waiting Command (Pairsyncwait) for Hitachi Truecopy Async/Ur
309
Figure 4.70 Synchronization for Hitachi Truecopy Async/Ur
309
Table 4.48 Pairsyncwait Command Parameters
310
Table 4.49 Specific Error Code for Pairsyncwait
312
Figure 4.71 Pairsyncwait Command Examples
313
Protection Facility
314
Protection Facility Specification
314
Figure 4.72 Definition of the Protection Volume
314
Table 4.50 Registration for the Mirror Descriptor
315
Examples for Configuration and Protected Volumes
316
Figure 4.73 Example for the Two Host Configuration
316
Figure 4.74 Example for the One Host Configuration
317
Target Commands for Protection
318
Permission Command
318
New Options for Security
319
Permitting the Protected Volumes
320
Environmental Variables
322
Table 4.51 Relation between HORCMPROMOD and Command Device
322
Determining the Protection Mode Command Device
323
Group Version Control for Mixed Storage System Configurations
324
Figure 4.75 Definition of the Group Version
324
LDM Volume Discovery and Flushing for Windows
325
Figure 4.76 LDM Volume Configuration
325
Volume Discovery Function
326
Mountvol Attached to Windows 2008/2003/2000 Systems
328
Figure 4.77 LDM Volume Flushing
329
System Buffer Flushing Function
329
Special Facilities for Windows 2008/2003/2000 Systems
332
Signature Changing Facility for Windows 2008/2003/2000 Systems
332
Figure 4.78 Configurations with MSCS and Shadowimage (HOMRCF)
332
GPT Disk for Windows 2003/2008
334
Directory Mount Facility for Windows Systems
336
Figure 4.79 Directory Mount Structure
336
Host Group Control
338
Specifying a Host Group
338
Commands and Options Including a Host Group
339
Using CCI SLPR Security
340
Figure 4.80 Protection of the Command Device that Has the SLPR Attribute
340
Specifying the SLPR Protection Facility
341
Figure 4.81 SLPR Configuration on a Single Host
342
SLPR Configuration Examples
342
Controlling Volume Migration
347
Specifications for Volume Migration
347
Commands to Control the Volume Migration
349
Relations between "CC" Command Issues and Status
353
Table 4.52 Command Issues and Pairing Status Transition
353
Restrictions for Volume Migration
354
Chapter 5 Troubleshooting
355
General Troubleshooting
356
Table 5.1 Operational Notes for CCI Operations
356
About Linux Kernel 2.6.9.XX Supported Ioctl(SG_IO)
359
Changing IO Way of the Command Device for AIX
360
Error Reporting
361
Table 5.2 System Log Messages
361
Table 5.3 Command Error Messages
362
Table 5.4 Generic Error Codes
366
Table 5.5 Generic Error Codes (Raidscan, Raidqry, Raidar, Horcctl)
367
Table 5.6 Specific Error Codes
368
Calling the Hitachi Data Systems Support Center
369
Appendix A Maintenance Logs and Tracing Functions
371
Log Files
371
Trace Files
373
Trace Control Command
373
Logging Commands for Audit
374
Appendix B Updating and Uninstalling CCI
377
Uninstalling UNIX CCI Software
377
Upgrading UNIX CCI Software
377
Uninstalling Windows CCI Software
378
Upgrading Windows CCI Software
378
Appendix C Fibre-To-SCSI Address Conversion
379
Figure C.1 Example Fibre Address Conversion
379
LUN Configurations on the RAID Storage Systems
381
Fibre Address Conversion Tables
382
Acronyms and Abbreviations
385
Hitachi Command Control Interface (CCI) User and Reference Guide
385
Advertisement
Advertisement
Related Products
Hitachi MK-96RD621-08
Hitachi MK-96RD617-08
Hitachi MK-97DF8018-00
Hitachi MK-96RD626-07
Hitachi MSU23
HITACHI MpegCam MP-EG10W
Hitachi M 8SA2
Hitachi ML 36DL
Hitachi MP-1802
Hitachi MP-WU8701B
Hitachi Categories
Projector
Air Conditioner
Drill
Power Tool
TV
More Hitachi Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL