ERserver. iseries. Plan a backup and recovery strategy
|
|
|
- Rosalyn Grant
- 10 years ago
- Views:
Transcription
1 ERserer iseries Plan a backup and recoery strategy
2
3 ERserer iseries Plan a backup and recoery strategy
4 Copyright International Business Machines Corporation 1998, All rights resered. US Goernment Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
5 Contents Part 1. Plan a backup and recoery strategy Chapter 1. Backup and recoery timeline Chapter 2. Know what to sae and how often to sae it Chapter 3. Find your sae window Simple sae strategy Medium sae strategy Sae changed objects Journal objects and sae journal receiers Complex sae strategy Chapter 4. Choose aailability options Chapter 5. Test your strategy Chapter 6. Disaster recoery plan template Disaster Recoery Plan Image description Copyright IBM Corp. 1998, 2002 iii
6 i iseries: Plan a backup and recoery strategy
7 Part 1. Plan a backup and recoery strategy Computers in general, and the iseries serer in particular, are ery reliable. You may run your system for months or een years without experiencing any problems that cause you to lose information on your system. Howeer, as the frequency of computer problems has decreased, the potential impact of problems has increased. Businesses are more and more dependent on computers and the information that is stored in them. The information that is in your computer may not be aailable anywhere else. Saing the information on your system is time-consuming and requires discipline. Why should you do it? Why should you spend time planning and ealuating it? Because you may hae a problem. You will need to use your backup copies of information. Eery system needs to restore some or all of its information at some point in time. The Backup and recoery timeline proides a high leel oeriew of the eents that occur during the backup and recoery process. Once you study the backup and recoery timeline, you are ready to start planning your strategy. Follow these steps: 1. Know what to sae and how often to sae it 2. Find your sae window 3. Choose aailability options 4. Test your strategy You may also find the Disaster recoery plan template useful as a planning resource. This topic contains information on how to plan your strategy and make the choices you need to make as you set your system up for backup, recoery, and aailability. For information on how to actually perform the tasks that are related to these topics, see Backup and Recoery and the Back up your serer topic. The Aailability roadmap for your iseries serer topic proides information about the common types of failure that can occur. Copyright IBM Corp. 1998,
8 2 iseries: Plan a backup and recoery strategy
9 Chapter 1. Backup and recoery timeline The timeline for backup and recoery begins when you sae information and ends when your system is fully recoered after a failure. Refer to this timeline as you read this information and make decisions. Your strategies for saing and aailability determine these things: Whether you can successfully complete each step in the chart How long it will take you to complete each step As you read, use the chart to deelop specific examples. What if the known point (1) is Sunday eening and the failure point (2) is Thursday afternoon? How long will it take to get back to the known point? How long will it take you to get to the current point (6)? Is it een possible with the sae strategy you hae planned? Copyright IBM Corp. 1998,
10 4 iseries: Plan a backup and recoery strategy
11 Chapter 2. Know what to sae and how often to sae it You should sae eerything in your system as often as possible. You may not be prepared to recoer from a site loss or certain types of disk failures if you do not regularly sae eerything. If you sae the right parts of your iseries serer, then you can recoer to point 4 (the last sae) shown in backup and recoery timeline. You should sae the parts of your system that change often daily. Eery week, you should sae the parts of your system that do not change often. Parts of your system that change often This table shows the parts of the system that change often, and so should be saed daily: Table 1. What to sae daily: Parts of the system that change often Item Description IBM - Supplied? When Changes Occur Security information (user profiles, priate authorities, authorization lists) Some Regularly as new users and objects are added or authorities are changed 1 Configuration objects in QSYS No Regularly, when deice descriptions are added or changed or when you use the Hardware Serice Manager function to update configuration information 1 IBM-supplied libraries that contain user Yes Regularly data (QGPL, QUSRSYS) User libraries that contain user data and No Regularly programs Folders and documents Some Regularly, if you use these objects Distributions No Regularly, if you use the distribution function User directories No Regularly 1 These objects may also change when you update licensed programs. Parts of your system that do not change often This table shows the parts of the system that do not change often; you can sae these on a weekly basis. Table 2. What to sae weekly: Parts of the system that do not change often Item Description IBM- Supplied? When Changes Occur Licensed Internal Code Yes PTFs or new release of the operating system Operating system objects in QSYS Yes PTFs or new release of the operating system library Operating System/400 optional libraries Yes PTFs or new release of the operating system (QHLPSYS, QUSRTOOL) Licensed program libraries (QRPG, Yes Updates to licensed programs QCBL, Qxxxx) Licensed program folders (Qxxxxxxx) Yes Updates to licensed programs Licensed program directories (/QIBM/ProdData, /QOpenSys/QIBM/ProdData) Yes Updates to licensed programs Copyright IBM Corp. 1998,
12 6 iseries: Plan a backup and recoery strategy
13 Chapter 3. Find your sae window Realistically, when you run sae procedures, how you run sae procedures and what you sae depend on the size of your sae window. Your sae window is the amount of time that your system can be unaailable to users while you perform your sae operations. To simplify your recoery, you need to sae when your system is at a known point and your data is not changing. When you select a sae strategy, you should balance what your users think is an acceptable sae window with the alue of the data you might lose and the amount of time it may take to recoer. If your system is so critical to your business that you do not hae a manageable sae window, you probably cannot afford an unscheduled outage either. You should seriously ealuate all the aailability options of the iseries serer, including clusters. The Aailability roadmap for your iseries serer topic has more information about aailability options. Choose one of the following sae strategies, based on the size of your sae window. Then reealuate your decision based on how your sae strategy positions you for a recoery. Simple sae strategy You hae a long sae window, which means that you hae an 8- to 12-hour block of time aailable daily with no system actiity (including batch work). Medium sae strategy You hae a medium sae window, which means that you hae a shorter block of time (4 to 6 hours) aailable daily with no system actiity. Complex sae strategy You hae a short sae window, which means that there is little or no time when your system is not being used for interactie or batch work. Simple sae strategy The simplest sae strategy is to sae eerything eery night (or off-shift hours). You can use option 21 (Entire system) from the Sae menu to do this. You can schedule option 21 to run without an operator (unattended) beginning at a certain time. You can also use this method to sae your entire system after you upgrade to a new release or apply program temporary fixes (PTFs). You may find that you do not hae enough time or enough tape unit capability to run option 21 without an operator. You can still employ a simple strategy: Daily Weekly Sae eerything that changes often. Sae the things that do not change often. Option 23 (All user data) on the Sae menu saes the things that change regularly. Option 23 can be scheduled to run unattended. To run unattended, you must hae enough online backup media capacity. If your system has a long period of inactiity on the weekend, your sae strategy might look like this: Friday night Sae menu option 21 Monday night Sae menu option 23 Tuesday night Sae menu option 23 Wednesday night Sae menu option 23 Thursday night Sae menu option 23 Friday night Sae menu option 21 Copyright IBM Corp. 1998,
14 Medium sae strategy You may find that you do not hae a long enough sae window to use a simple sae strategy. Perhaps you run large batch jobs on your system at night. Or, you hae ery large files that take a long time to sae. If this is the case, you may need to deelop a medium sae strategy, which means that the complexity for saing and for recoery is medium. When deeloping a medium sae strategy, apply this principle: the more often it changes, the more often you should sae it. You just need to be more detailed in ealuating how often things change than when you use a simple strategy. Seeral techniques are aailable to use in a medium sae strategy. You may use one of them or a combination. Sae changed objects Journal objects and sae the journal receiers Sae changed objects You can use seeral commands to sae only information that has changed since the last sae operation or since a particular date and time. You can use the Sae Changed Objects (SAVCHGOBJ) command to sae only those objects that hae changed since a library or group of libraries was last saed. This can be particularly useful in a situation where programs and data files are in the same library. Typically, data files change frequently and programs change infrequently. You can use the SAVCHGOBJ command to sae only the files that change. You can use the Sae Document Library Object (SAVDLO) command to sae only documents and folders that hae changed. Likewise, you can use the Sae (SAV) command to sae objects in directories that hae changed since a particular point. You might also choose to sae changed objects if your batch work load is heaier some nights. For example: Day Batch Workload Sae Operation Friday night Light Sae menu option 21 Monday night Heay Sae changes only 1 Tuesday night Light Sae menu option 23 Wednesday night Heay Sae changes only 1 Thursday night Heay Sae changes only 1 Friday night Light Sae menu option 21 1 Use a combination of the SAVCHGOBJ, SAVDLO, and SAV commands. Journal objects and sae journal receiers If your sae operations for database files take too long because your files are large, saing changed objects may not help you. If you hae a file member with records and 1 record changes, the SAVCHGOBJ command saes the entire file member. In this situation, journaling your database files and saing journal receiers regularly may be a better solution, een though recoery is more complex. A similar principle applies to integrated file system objects and data areas. If your sae operations for integrated file system objects and data areas are taking too long, you may choose to journal the objects to make your sae operations more efficient. Saing journal receiers may be a better option. 8 iseries: Plan a backup and recoery strategy
15 When you journal objects, the system writes a copy of eery change in the object to a journal receier. When you sae a journal receier, you are saing only the changed portions of the object, not the entire object. If you journal your objects and hae a batch work load that aries, your sae strategy might look like this: Day Batch Workload Sae Operation Friday night Light Sae menu option 21 Monday night Heay Sae journal receiers Tuesday night Light Sae menu option 23 Wednesday night Heay Sae journal receiers Thursday night Heay Sae journal receiers Friday night Light Sae menu option 21 Notes: 1. To take adantage of the protection that journaling proides, you should detach and sae journal receiers regularly. How often you sae them depends on the number of journaled changes that occur. Saing journal receiers seeral times during the day may be appropriate for you. How you sae journal receiers depends on whether they are in a separate library. You might use the Sae Library (SAVLIB) command or the Sae Object (SAVOBJ) command. 2. You must sae new objects before you can apply journal entries to the object. If your applications regularly add new objects, you should consider using the SAVCHGOBJ strategy either by itself or in combination with journaling. The Journal management topic has more information about journaling. Complex sae strategy A ery short sae window requires a complex strategy for saing and for recoery. You use the same tools and techniques that are described for a medium sae strategy, but at a greater leel of detail. For example, you may need to sae specific critical files at specific times of the day or week. You may also want to consider using a tool such as Backup Recoery and Media Serices for iseries (BRMS). Saing your system while it is actie is often necessary in a complex sae strategy. The sae actie (SAVACT) parameter is supported on these commands: Sae Library (SAVLIB) Sae Object (SAVOBJ) Sae Changed Objects (SAVCHGOBJ) Sae Document Library Object (SAVDLO) Sae (SAV) If you use sae-while-actie support, you can significantly reduce the amount of time that files are made unaailable. When the system has established a checkpoint for all objects being saed, the objects can be made aailable for use. Sae-while-actie support can be used in combination with journaling and commitment control to simplify the recoery procedure. If you use the *LIB or *SYNCLIB alues with the SAVACT parameter, you should use journaling to simplify recoery. If you use the *SYSDFN alue with the SAVACT parameter, you must use commitment control if the library you are saing has related database objects. If you choose to use sae-while-actie support, make sure that you understand the process and monitor how well checkpoints are being established on your system. You can also reduce the amount of time that files are unaailable by performing sae operations on more than one deice at a time, or performing concurrent sae operations. For example, you can sae libraries to one deice, folders to another deice, and directories to third deice. Or, you can sae different sets of libraries or objects to different deices. Chapter 3. Find your sae window 9
16 If you are using V4R4 or a later release, you can also use multiple deices simultaneously by performing a parallel sae operation. To perform a parallel sae operation, you need Backup Recoery and Media Serices or an application that allows you to create media definition objects. For more information on sae-while-actie support, concurrent sae operations, and parallel sae operations, see the Back up your serer information. The Commitment control topic has more detailed information about commitment control. The Journal management topic has more detailed information about journaling. 10 iseries: Plan a backup and recoery strategy
17 Chapter 4. Choose aailability options Aailability options are a complement to a good sae strategy, not a replacement. Aailability options can significantly reduce the time it takes you to recoer after a failure. In some cases, aailability options can preent you from haing to perform a recoery. To justify the cost of using aailability options, you need to understand the following: The alue your system proides. The cost of a scheduled or unscheduled outage. What your aailability requirements are. The following are the aailability options that you can use to complement your sae strategy: Journal management lets you recoer the changes to objects that hae occurred since your last complete sae. Access path protection lets you re-create the order in which records in a database file are processed. Disk pools limit the amount of data you hae to recoer to the data in the disk pool with the failed unit. Deice parity protection enables you to reconstruct data that is lost; the system can continue to run while the data is being reconstructed. Mirrored protection helps you keep your data aailable because you hae two copies of the data on two separate disk units. Clustering lets you maintain some or all data on two systems; the secondary system can take oer critical application programs if the primary system fails. The Aailability roadmap for your iseries serer topic contains information that you can use to implement an aailability solution on your iseries serer. Copyright IBM Corp. 1998,
18 12 iseries: Plan a backup and recoery strategy
19 Chapter 5. Test your strategy If your situation requires a medium sae strategy or a complex sae strategy, it also requires regular reiew, as follows: Are you saing eerything occasionally? What do you need to do to recoer to the known point (4) on the backup and recoery timeline? Are you using options like journaling or saing changed objects to help you recoer to the failure point (5)? Do you know how to recoer using those options? Hae you added new applications? Are the new libraries, folders, and directories being saed? Are you saing the IBM-supplied libraries that contain user data (for example QGPL and QUSRSYS)? Note: The Special alues for the SAVLIB command topic lists all of the IBM-supplied libraries that contain user data. Hae you tested your recoery? The best way to test your strategy for saing is to test a recoery. Although you can test a recoery on your own system, doing so can be risky. If you hae not saed eerything successfully, you may lose information when you attempt to restore. A number of organizations offer recoery testing as a serice. IBM Continuity and Recoery Serices is one organization that can assist you with recoery testing. Copyright IBM Corp. 1998,
20 14 iseries: Plan a backup and recoery strategy
21 Chapter 6. Disaster recoery plan template The objectie of a disaster recoery plan is to ensure that you can respond to a disaster or other emergency that affects information systems and minimize the effect on the operation of the business. This topic proides you with guidelines for the kind of information and procedures that you need to recoer from a disaster. When you hae prepared the information described in this topic, store your document in a safe, accessible location off site. Here is a template to use as you create your disaster recoery plan. You can browse this template here; to print it, download and print the PDF file for this topic. Disaster Recoery Plan Section 1. Major goals of this plan The major goals of this plan are the following: To minimize interruptions to the normal operations. To limit the extent of disruption and damage. To minimize the economic impact of the interruption. To establish alternatie means of operation in adance. To train personnel with emergency procedures. To proide for smooth and rapid restoration of serice. Section 2. Personnel Data processing personnel Name Position Address Telephone Note: Attach a copy of your organization chart to this section of the plan. Section 3. Application profile Copyright IBM Corp. 1998,
22 Use the Display Software Resources (DSPSFWRSC) command to complete this table. Application profile Application Name Critical? Yes/No Fixed Asset? Yes/No Manufacturer Comments Comment legend: 1. Runs daily. 2. Runs weekly on. 3. Runs monthly on. Section 4. Inentory profile Use the Work with Hardware Products (WRKHDWPRD) command to complete this table. This list should include the following: Processing units Disk units Models Workstation controllers Personal computers Spare workstations Telephones Air conditioner or heater System printer Tape and diskette units Controllers I/O processors General data communication Spare displays Racks Humidifier or dehumidifier Inentory profile Manufacturer Description Model Serial Number Own or Leased Cost 16 iseries: Plan a backup and recoery strategy
23 Inentory profile Manufacturer Description Model Serial Number Note: This list should be audited eery months. Own or Leased Cost Miscellaneous inentory Description Quantity Comments Note: This list should include the following: Tapes PC software (such as DOS) File cabinet contents or documentation Tape ault contents Diskettes Emulation packages Language software (such as COBOL and RPG) Printer supplies (such as paper and forms) Section 5. Information serices backup procedures iseries Serer Daily, journal receiers are changed at and at. Daily, a sae of changed objects in the following libraries and directories is done at : This procedure also saes the journals and journal receiers. On (day) at (time) a complete sae of the system is done. All sae media is stored off-site in a ault at (location). Personal Computer It is recommended that all personal computers be backed up. Copies of the personal computer files should be uploaded to the serer on (date) at (time), just before a complete sae of the system is done. It is then saed with the normal system sae procedure. This proides for a more secure backup of personal computer-related systems where a local area disaster could wipe out important personal computer systems. Section 6. Disaster recoery procedures For any disaster recoery plan, the following three elements should be addressed. Chapter 6. Disaster recoery plan template 17
24 Emergency Response Procedures To document the appropriate emergency response to a fire, natural disaster, or any other actiity in order to protect lies and limit damage. Backup Operations Procedures To ensure that essential data processing operational tasks can be conducted after the disruption. Recoery Actions Procedures To facilitate the rapid restoration of a data processing system following a disaster. Disaster action checklist 1. Plan Initiation a. Notify senior management b. Contact and set up disaster recoery team c. Determine degree of disaster d. Implement proper application recoery plan dependent on extent of disaster (see Section 7. Recoery plan mobile site) e. Monitor progress f. Contact backup site and establish schedules g. Contact all other necessary personnel both user and data processing h. Contact endors both hardware and software i. Notify users of the disruption of serice 2. Follow-Up Checklist a. List teams and tasks of each b. Obtain emergency cash and set up transportation to and from backup site, if necessary c. Set up liing quarters, if necessary d. Set up eating establishments, as required e. List all personnel and their telephone numbers f. Establish user participation plan g. Set up the deliery and the receipt of mail h. Establish emergency office supplies i. Rent or purchase equipment, as needed j. Determine applications to be run and in what sequence k. Identify number of workstations needed l. Check out any off-line equipment needs for each application m. Check on forms needed for each application n. Check all data being taken to backup site before leaing and leae inentory profile at home location o. Set up primary endors for assistance with problems incurred during emergency p. Plan for transportation of any additional items needed at backup site q. Take directions (map) to backup site r. Check for additional magnetic tapes, if required s. Take copies of system and operational documentation and procedural manuals. t. Ensure that all personnel inoled know their tasks u. Notify insurance companies Recoery start-up procedures for use after a disaster 1. Notify Disaster Recoery Serices of the need to utilize serice and of recoery plan selection. 18 iseries: Plan a backup and recoery strategy
25 Note: Guaranteed deliery time countdown begins at the time is notified of recoery plan selection. a. Disaster notification numbers or These telephone numbers are in serice from am until pm Monday through Friday. 2. Disaster notification number: This telephone number is in serice for disaster notification after business hours, on weekends, and during holidays. Please use this number only for the notification of the actual disaster. 3. Proide with an equipment deliery site address (when applicable), a contact, and an alternate contact for coordinating serice and telephone numbers at which contacts can be reached 24 hours a day. 4. Contact power and telephone serice suppliers and schedule any necessary serice connections. 5. Notify immediately if any related plans should change. Section 7. Recoery plan mobile site 1. Notify of the nature of the disaster and the need to select the mobile site plan. 2. Confirm in writing the substance of the telephone notification to within 48 hours of the telephone notification. 3. Confirm all needed backup media are aailable to load the backup machine. 4. Prepare a purchase order to coer the use of backup equipment. 5. Notify of plans for a trailer and its placement (on side of ). (See the Mobile site setup plan in this section.) 6. Depending on communication needs, notify telephone company ( ) of possible emergency line changes. 7. Begin setting up power and communications at. a. Power and communications are prearranged to hook into when trailer arries. b. At the point where telephone lines come into the building ( ), break the current linkage to the administration controllers ( ). These lines are rerouted to lines going to the mobile site. They are linked to modems at the mobile site. The lines currently going from to would then be linked to the mobile unit ia modems. c. This could conceiably require to redirect lines at complex to a more secure area in case of disaster. 8. When the trailer arries, plug into power and do necessary checks. 9. Plug into the communications lines and do necessary checks. 10. Begin loading system from backups (see Section 9. Restoring the Entire System). 11. Begin normal operations as soon as possible: a. Daily jobs b. Daily saes c. Weekly saes 12. Plan a schedule to back up the system in order to restore on a home-base computer when a site is aailable. (Use regular system backup procedures). 13. Secure mobile site and distribute keys as required. 14. Keep a maintenance log on mobile equipment. Mobile site setup plan Chapter 6. Disaster recoery plan template 19
26 Attach the mobile site setup plan here. Communication disaster plan Attach the communication disaster plan, including the wiring diagrams. Electrical serice Attach the electrical serice diagram here. Section 8. Recoery plan hot site The disaster recoery serice proides an alternate hot site. The site has a backup system for temporary use while the home site is being reestablished. 1. Notify of the nature of the disaster and of its desire for a hot site. 2. Request air shipment of modems to for communications. (See for communications for the hot site.) 3. Confirm in writing the telephone notification to within 48 hours of the telephone notification. 4. Begin making necessary trael arrangements to the site for the operations team. 5. Confirm that all needed tapes are aailable and packed for shipment to restore on the backup system. 6. Prepare a purchase order to coer the use of the backup system. 7. Reiew the checklist for all necessary materials before departing to the hot site. 8. Make sure that the disaster recoery team at the disaster site has the necessary information to begin restoring the site. (See Section 12. Disaster site rebuilding). 9. Proide for trael expenses (cash adance). 10. After arriing at the hot site, contact home base to establish communications procedures. 11. Reiew materials brought to the hot site for completeness. 12. Begin loading the system from the sae tapes. 13. Begin normal operations as soon as possible: a. Daily jobs b. Daily saes c. Weekly saes 14. Plan the schedule to back up the hot-site system in order to restore on the home-base computer. Hot-site system configuration Attach the hot-site system configuration here. Section 9. Restoring the entire system To get your system back to the way it was before the disaster, use the procedures on recoering after a complete system loss in the Backup and Recoery, SC iseries: Plan a backup and recoery strategy
27 Before You Begin: Find the following tapes, equipment, and information from the on-site tape ault or the off-site storage location: If you install from the alternate installation deice, you need both your tape media and the CD-ROM media containing the Licensed Internal Code. All tapes from the most recent complete sae operation The most recent tapes from saing security data (SAVSECDTA or SAVSYS) The most recent tapes from saing your configuration, if necessary All tapes containing journals and journal receiers saed since the most recent daily sae operation All tapes from the most recent daily sae operation PTF list (stored with the most recent complete sae tapes, weekly sae tapes, or both) Tape list from most recent complete sae operation Tape list from most recent weekly sae operation Tape list from daily saes History log from the most recent complete sae operation History log from the most recent weekly sae operation History log from the daily sae operations The Software Installation book The Backup and Recoery book Telephone directory Modem manual Tool kit Section 10. Rebuilding process The management team must assess the damage and begin the reconstruction of a new data center. If the original site must be restored or replaced, the following are some of the factors to consider: What is the projected aailability of all needed computer equipment? Will it be more effectie and efficient to upgrade the computer systems with newer equipment? What is the estimated time needed for repairs or construction of the data site? Is there an alternatie site that more readily could be upgraded for computer purposes? Once the decision to rebuild the data center has been made, go to Section 12. Disaster site rebuilding. Section 11. Testing the disaster recoery plan In successful contingency planning, it is important to test and ealuate the plan regularly. Data processing operations are olatile in nature, resulting in frequent changes to equipment, programs, and documentation. These actions make it critical to consider the plan as a changing document. Use thes checklists as your conduct your test and decide what areas should be tested. Table 3. Conducting a recoery test Item Yes No Applicable Select the purpose of the test. What aspects of the plan are being ealuated? Describe the objecties of the test. How will you measure successful achieement of the objecties? Not Applicable Comments Chapter 6. Disaster recoery plan template 21
28 Table 3. Conducting a recoery test (continued) Item Yes No Applicable Meet with management and explain the test and objecties. Gain their agreement and support. Hae management announce the test and the expected completion time. Collect test results at the end of the test period. Ealuate results. Was recoery successful? Why or why not? Determine the implications of the test results. Does successful recoery in a simple case imply successful recoery for all critical jobs in the tolerable outage period? Make recommendations for changes. Call for responses by a gien date. Notify other areas of results. Include users and auditors. Change the disaster recoery plan manual as necessary. Not Applicable Comments Table 4. Areas to be tested Item Yes No Applicable Recoery of indiidual application systems by using files and documentation stored off-site. Reloading of system tapes and performing an IPL by using files and documentation stored off-site. Ability to process on a different computer. Ability of management to determine priority of systems with limited processing. Ability to recoer and process successfully without key people. Ability of the plan to clarify areas of responsibility and the chain of command. Effectieness of security measures and security bypass procedures during the recoery period. Ability to accomplish emergency eacuation and basic first-aid responses. Ability of users of real-time systems to cope with a temporary loss of on-line information. Ability of users to continue day-to-day operations without applications or jobs that are considered noncritical. Ability to contact the key people or their designated alternates quickly. Ability of data entry personnel to proide the input to critical systems by using alternate sites and different input media. Not Applicable Comments 22 iseries: Plan a backup and recoery strategy
29 Table 4. Areas to be tested (continued) Item Yes No Applicable Aailability of peripheral equipment and processing, such as printers and scanners. Aailability of support equipment, such as air conditioners and dehumidifiers. Aailability of support: supplies, transportation, communication. Distribution of output produced at the recoery site. Aailability of important forms and paper stock. Ability to adapt plan to lesser disasters. Not Applicable Comments Section 12. Disaster site rebuilding Floor plan of data center. Determine current hardware needs and possible alternaties. (See Section 4. Inentory profile.) Data center square footage, power requirements and security requirements. Square footage Power requirements Security requirements: locked area, preferably with combination lock on one door. Floor-to-ceiling studding Detectors for high temperature, water, smoke, fire and motion Raised floor Vendors Floor plan Include a copy of the proposed floor plan here. Section 13. Record of plan changes Keep your plan current. Keep records of changes to your configuration, your applications, and your backup schedules and procedures. For example, you can get print a list of your current local hardware, by typing: DSPLCLHDW OUTPUT(*PRINT) Chapter 6. Disaster recoery plan template 23
30 Image description The description for the timeline image is as follows: 1. Point 1: Known point (last sae). Actiity occurs on system. 2. Point 2: Failure occurs. Hardware repair or IPL occurs. 3. Point 3: Hardware is aailable. Information is restored from backup. 4. Point 4: System is recoered to known point 1. Transactions from point 1 to point 2 are recoered. 5. Point 5: System is recoered to failure point 2. Business actiity from failure point 2 to recoery point 5 is recoered. 6. Point 6: System is current. 24 iseries: Plan a backup and recoery strategy
31
32 Printed in U.S.A.
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
Systems management Planning a backup and recovery strategy
System i Systems management Planning a backup and recovery strategy Version 5 Release 4 System i Systems management Planning a backup and recovery strategy Version 5 Release 4 Note Before using this information
ERserver. iseries. Backup, Recovery and Media Services (BRMS)
ERserer iseries Backup, Recoery and Media Serices (BRMS) ERserer iseries Backup, Recoery and Media Serices (BRMS) Copyright International Business Machines Corporation 1998, 2002. All rights resered.
Software Installation
iseries Software Installation Version 5 SC41-5120-05 iseries Software Installation Version 5 SC41-5120-05 Note Before using this information and the product it supports, be sure to read the information
ERserver. iseries. Journal management
ERserer iseries Journal management ERserer iseries Journal management Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment Users Restricted Rights Use, duplication
ERserver. iseries. Service tools
ERserer iseries Serice tools ERserer iseries Serice tools Copyright International Business Machines Corporation 2002. All rights resered. US Goernment Users Restricted Rights Use, duplication or disclosure
ERserver. Backup, Recovery, and Media Services for iseries. iseries. Version 5 SC41-5345-03
ERserer iseries Backup, Recoery, and Media Serices for iseries Version 5 SC41-5345-03 ERserer iseries Backup, Recoery, and Media Serices for iseries Version 5 SC41-5345-03 Note Before using this information
Software Installation
AS/400e Software Installation Version 4 SC41-5120-04 AS/400e Software Installation Version 4 SC41-5120-04 Note Before using this information and the product it supports, be sure to read the information
Backup, Recovery, and Media Services for iseries
iseries Backup, Recoery, and Media Serices for iseries Version 5 SC41-5345-02 iseries Backup, Recoery, and Media Serices for iseries Version 5 SC41-5345-02 Note Before using this information and the product
ERserver. Single signon. iseries. Version 5 Release 3
ERserer iseries Single signon Version 5 Release 3 ERserer iseries Single signon Version 5 Release 3 Note Before using this information and the product it supports, be sure to read the information in Notices,
IBM Maximo for Aviation MRO Version 7 Release 6. Guide
IBM Maximo for Aiation MRO Version 7 Release 6 Guide Note Before using this information and the product it supports, read the information in Notices on page 185. This edition applies to ersion 7, release
IBM Rapid Restore Ultra Version 4.0. User s Guide
IBM Rapid Restore Ultra Version 4.0 User s Guide IBM Rapid Restore Ultra Version 4.0 User s Guide Notice: Before using this information and the product it supports, be sure to read Notices and Trademarks,
IBM Marketing Operations OnDemand November 17, 2014. Project Manager's Guide
IBM Marketing Operations OnDemand Noember 17, 2014 Project Manager's Guide Note Before using this information and the product it supports, read the information in Notices on page 63. IBM Marketing Operations
How To Set Up An Ops Console On A Pc Or Mac Or Macbook
ERserer iseries iseries Access for Windows Operations Console ERserer iseries iseries Access for Windows Operations Console Copyright International Business Machines Corporation 2002, 2003. All rights
IBM DB2 9.7 for Linux, UNIX, and Windows
IBM DB2 9.7 for Linux, UNIX, and Windows Version 9 Release 7 Data Recoery and High Aailability Guide and Reference Updated September, 2010 SC27-2441-02 IBM DB2 9.7 for Linux, UNIX, and Windows Version
iseries Getting started with iseries
iseries Getting started with iseries iseries Getting started with iseries Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment Users Restricted Rights Use,
IBM Sterling Gentran Server for Windows. Quick Start Guide. Version 5.3.1
IBM Sterling Gentran Serer for Windows Quick Start Guide Version 5.3.1 IBM Sterling Gentran Serer for Windows Quick Start Guide Version 5.3.1 This edition applies to the 5.3.1 ersion of IBM Sterling Gentran:Serer
IBM i Version 7.2. Systems management Backing up your system
IBM i Version 7.2 Systems management Backing up your system IBM i Version 7.2 Systems management Backing up your system Note Before using this information and the product it supports, read the information
IBM Marketing Operations Version 9 Release 1 October 25, 2013. User's Guide
IBM Marketing Operations Version 9 Release 1 October 25, 2013 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 207. This edition applies
ERserver. iseries. Digital certificate management
ERserer iseries Digital certificate management ERserer iseries Digital certificate management ii iseries: Digital certificate management Contents Part 1. Digital certificate management.....................
iseries Virtual private networking
iseries Virtual priate networking iseries Virtual priate networking Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment Users Restricted Rights Use, duplication
Tivoli Storage Manager for Windows
Tioli Storage Manager for Windows Version 6.1 Installation Guide GC23-9785-01 Tioli Storage Manager for Windows Version 6.1 Installation Guide GC23-9785-01 Note Before using this information and the product
IBM License Metric Tool Version 9.0 (includes version 9.0.1, 9.0.1.1 and 9.0.1.2 ) Managing the Software Inventory Guide
IBM License Metric Tool Version 9.0 (includes ersion 9.0.1, 9.0.1.1 and 9.0.1.2 ) Managing the Software Inentory Guide IBM License Metric Tool Version 9.0 (includes ersion 9.0.1, 9.0.1.1 and 9.0.1.2 )
Operations Console Setup
iseries Operations Console Setup SC41-5508-02 iseries Operations Console Setup SC41-5508-02 Note Before using this information and the product it supports, be sure to read the information in Safety and
Remote Supervisor Adapter II. Installation Instructions for Linux Users
Remote Superisor Adapter II Installation Instructions for Linux Users Remote Superisor Adapter II Installation Instructions for Linux Users Third Edition (October 2003) Copyright International Business
IBM Unica Marketing Operations and Campaign Version 8 Release 6 May 25, 2012. Integration Guide
IBM Unica Marketing Operations and Campaign Version 8 Release 6 May 25, 2012 Integration Guide Note Before using this information and the product it supports, read the information in Notices on page 51.
Dock Scheduling Guide
Kewill Transport Dock Scheduling Guide DocumentationDate:8December2014 Documentation Date: 8 December 2014 This edition applies to ersion 6.9.6 of Kewill Transport (formerly the Sterling Transportation
IBM Tealeaf CX Version 9 Release 0.2 June 18, 2015. Tealeaf Databases Guide
IBM Tealeaf CX Version 9 Release 0.2 June 18, 2015 Tealeaf Databases Guide Note Before using this information and the product it supports, read the information in Notices on page 111. This edition applies
IBM Campaign Version 9 Release 1.1 February 18, 2015. User's Guide
IBM Campaign Version 9 Release 1.1 February 18, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 245. This edition applies to ersion
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference
IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference Note Before using this information and the product it supports,
ERserver. iseries. Windows server on iseries
ERserer iseries Windows serer on iseries ERserer iseries Windows serer on iseries Copyright International Business Machines Corporation 1998, 2002. All rights resered. US Goernment Users Restricted Rights
DISASTER STRIKES. Are you ready?
DISASTER STRIKES Are you ready? 1 Your Goal Complete OS/400 restoration Complete application restoration Bring back the most current information Protect your job 2 Your AS/400 just lost all of its data!
IBM SmartCloud Monitoring - Application Insight. User Interface Help SC27-5618-01
IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 ii IBM SmartCloud Monitoring - Application
Data Protection for Microsoft Exchange Server Installation and User's Guide
IBM Tioli Storage Manager for Mail Version 6.4 Data Protection for Microsoft Exchange Serer Installation and User's Guide GC27-4009-01 IBM Tioli Storage Manager for Mail Version 6.4 Data Protection for
AS/400e. Networking PPP connections
AS/400e Networking PPP connections AS/400e Networking PPP connections Copyright International Business Machines Corporation 1998, 2000. All rights resered. US Goernment Users Restricted Rights Use, duplication
IBM Tivoli Storage Manager for Linux. Quick Start. Version 5 Release 1 GC23-4692-00
IBM Tioli Storage Manager for Linux Quick Start Version 5 Release 1 GC23-4692-00 IBM Tioli Storage Manager for Linux Quick Start Version 5 Release 1 GC23-4692-00 Note! Before using this information and
AS/400e. Digital Certificate Management
AS/400e Digital Certificate Management AS/400e Digital Certificate Management ii AS/400e: Digital Certificate Management Contents Part 1. Digital Certificate Management............ 1 Chapter 1. Print
BEST/1 Capacity Planning Tool
iseries BEST/1 Capacity Planning Tool Version 5 SC41-5341-01 iseries BEST/1 Capacity Planning Tool Version 5 SC41-5341-01 Note Before using this information and the product it supports, be sure to read
ERserver. iseries. Networking Security IP filtering and network address translation (NAT)
ERserer iseries Networking Security IP filtering and network address translation (NAT) ERserer iseries Networking Security IP filtering and network address translation (NAT) Copyright International Business
iseries Troubleshooting clusters
iseries Troubleshooting clusters iseries Troubleshooting clusters Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment Users Restricted Rights Use, duplication
i5/os and related software Distributing software
System i and System p i5/os and related software Distributing software Version 6 Release 1 System i and System p i5/os and related software Distributing software Version 6 Release 1 Note Before using
AS/400 Logical Partitions Hardware Planning Guide
AS/400 Logical Partitions Hardware Planning Guide AS/400 Logical Partitions Hardware Planning Guide Copyright International Business Machines Corporation 1998, 1999. All rights reserved. US Government
Lotus. Notes Version 8.5.2. Lotus Notes Traveler
Lotus Notes Version 8.5.2 Lotus Notes Traeler Lotus Notes Version 8.5.2 Lotus Notes Traeler Note Before using this information and the product it supports, read the information in the Notices section.
IBM InfoSphere Master Data Management Standard and Advanced Editions Version 11 Release 3. Installation Guide GI13-2658-01
IBM InfoSphere Master Data Management Standard and Adanced Editions Version 11 Release 3 Installation Guide GI13-2658-01 IBM InfoSphere Master Data Management Standard and Adanced Editions Version 11
Rocket Servergraph Professional Proactive Data Protection Management
Rocket Serergraph Professional Proactie Data Protection Management Identifying issues in real time for rapid isolation and resolution Creating efficiencies that free up costly resources Ensure You re Always
DSK MANAGER. For IBM iseries and AS/400. Version 5.01. Last Updated September 2002. Kisco Information Systems 7 Church Street Saranac Lake, NY 12983
DSK MANAGER For IBM iseries and AS/400 Version 5.01 Last Updated September 2002 Kisco Information Systems 7 Church Street Saranac Lake, NY 12983 Phone: (518) 897-5002 FAX: (518) 897-5003 E-mail: [email protected]
Table of contents Introduction. 11-About it. 12-Prerequisites. 13-Installation
by Giovanni B. Perotti (Italy) 1. 2. 3. 4. 5. Table of contents Introduction 11. About it 12. Prerequisites 13. Installation Set up 21. Defining an image catalog 22. Defining a virtual tape drive 23. Loading
ERserver. Tips and Tools for Securing Your iseries. iseries. Version 5 SC41-5300-06
ERserer iseries Tips and Tools for Securing Your iseries Version 5 SC41-5300-06 ERserer iseries Tips and Tools for Securing Your iseries Version 5 SC41-5300-06 Note Before using this information and the
Data Protection for SAP Installation and User's Guide for Oracle
IBM Tioli Storage Manager for Enterprise Resource Planning Version 6.3 Data Protection for SAP Installation and User's Guide for Oracle SC33-6340-12 IBM Tioli Storage Manager for Enterprise Resource Planning
IBM Tivoli Storage Manager for Databases Version 7.1. Data Protection for Microsoft SQL Server Installation and User's Guide
IBM Tioli Storage Manager for Databases Version 7.1 Data Protection for Microsoft SQL Serer Installation and User's Guide IBM Tioli Storage Manager for Databases Version 7.1 Data Protection for Microsoft
Tivoli Security Compliance Manager
Tioli Security Compliance Manager Version 5.1 Tioli Risk Manager Adapter Guide Tioli Security Compliance Manager Version 5.1 Tioli Risk Manager Adapter Guide Note Before using this information and the
Robot SAVE 12 User Guide
Robot SAVE 12 User Guide - 1 - Copyright Information Copyright HelpSystems, LLC. All rights reserved. Robot is a division of HelpSystems. www.helpsystems.com U.S.: +1 952-933-0609 Outside the U.S.: +44
Communications Management
AS/400e Communications Management Version 4 SC41-5406-02 AS/400e Communications Management Version 4 SC41-5406-02 Note Before using this information and the product it supports, be sure to read the information
Systems Management Advanced job scheduler
System i Systems Management Advanced job scheduler Version 5 Release 4 System i Systems Management Advanced job scheduler Version 5 Release 4 Note Before using this information and the product it supports,
Developer's Guide: Extending Tivoli Workload Automation
IBM Tioli Workload Automation Deeloper's Guide: Extending Tioli Workload Automation Version 9 Release 2 SC14-7623-03 IBM Tioli Workload Automation Deeloper's Guide: Extending Tioli Workload Automation
IBM Unica Campaign Version 8 Release 6 May 25, 2012. Data Migration Guide
IBM Unica Campaign Version 8 Release 6 May 25, 2012 Data Migration Guide Note Before using this information and the product it supports, read the information in Notices on page 49. This edition applies
IBM Universal Behavior Exchange Toolkit Release 16.1.2 April 8, 2016. User's Guide IBM
IBM Uniersal Behaior Exchange Toolkit Release 16.1.2 April 8, 2016 User's Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 39. This document
Rational Build Forge. AutoExpurge System. Version7.1.2andlater
Rational Build Forge AutoExpurge System Version7.1.2andlater Note Before using this information and the product it supports, read the information in Notices, on page 11. This edition applies to ersion
IBM Client Security Solutions. Client Security Software Version 5.3 Installation Guide
IBM Client Security Solutions Client Security Software Version 5.3 Installation Guide IBM Client Security Solutions Client Security Software Version 5.3 Installation Guide First Edition (May 2004) Before
Data Protection for Microsoft SQL Server Installation and User s Guide
IBM Tioli Storage Manager for Databases Data Protection for Microsoft SQL Serer Installation and User s Guide Version 5 Release 2 SC32-9059-01 IBM Tioli Storage Manager for Databases Data Protection for
Sterling Store Inventory Management. Concepts Guide. Release 9.2
Sterling Store Inentory Management Concepts Guide Release 9.2 Sterling Store Inentory Management Concepts Guide Release 9.2 Note Before using this information and the product it supports, read the information
IBM Maximo Asset Management Version 7 Release 5. Workflow Implementation Guide
IBM Maximo Asset Management Version 7 Release 5 Workflow Implementation Guide Note Before using this information and the product it supports, read the information in Notices on page 47. This edition applies
Version 9 Release 1.2 September 23, 2015. IBM Campaign Installation Guide IBM
Version 9 Release 1.2 September 23, 2015 IBM Campaign Installation Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 115. This edition applies
ERserver. iseries. Remote Access Services: PPP connections
ERserer iseries Remote Access Serices: PPP connections ERserer iseries Remote Access Serices: PPP connections Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment
Total Recovery and Control for the AS/400
Total Recovery and Control for the AS/400 Version 3.3 User and Administration Guide We pride ourselves in producing good stuff. If you have any questions, problems, or suggestions regarding this product,
Frequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent
Frequently sked uestions (Fs) United Computer Group, Inc. VULT400 System i (S/400) gent Revised September 2013 VULT400 System i (S/400) gent F What are the key benefits of VULT400 ISeries gent when compared
Planning an Installation
IBM Tioli Composite Application Manager for Application Diagnostics Version 7.1.0.2 Planning an Installation GC27-2827-00 IBM Tioli Composite Application Manager for Application Diagnostics Version 7.1.0.2
Lightweight Directory Access Protocol. BladeCenter Management Module and IBM Remote Supervisor Adapters
Lightweight Directory Access Protocol User s Guide for IBM ERserer BladeCenter Management Module and IBM Remote Superisor Adapters Lightweight Directory Access Protocol User s Guide for IBM ERserer BladeCenter
IBM. Performance Management. Sterling B2B Integrator. Version 5.2
Sterling B2B Integrator IBM Performance Management Version 5.2 Sterling B2B Integrator IBM Performance Management Version 5.2 Note Before using this information and the product it supports, read the information
Citrix XenApp-7.5 Administration Training
1 http://trainings24x7.com copyright 2013-2014 All rights resered. Citrix XenApp-7.5 Administration Training Course Content Course Duration : 40 Hours (5 Weekends) Class Duration : 4 Hours http://trainings24x7.com
Configuring the Tivoli Enterprise Monitoring Server on z/os
IBM Tioli Management Serices on z/os Version 6.2.3 Fix Pack 1 Configuring the Tioli Enterprise Monitoring Serer on z/os SC27-2313-03 IBM Tioli Management Serices on z/os Version 6.2.3 Fix Pack 1 Configuring
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
IBM EMM Reports Version 9 Release 1.1 November 26, 2014. Installation and Configuration Guide
IBM EMM Reports Version 9 Release 1.1 Noember 26, 2014 Installation and Configuration Guide Note Before using this information and the product it supports, read the information in Notices on page 161.
IBM Informix Backup and Restore Guide
Informix Product Family Informix Version 11.50 IBM Informix Backup and Restore Guide SC27-3608-02 Informix Product Family Informix Version 11.50 IBM Informix Backup and Restore Guide SC27-3608-02 Note
Password Synchronization for Active Directory Plug-in Installation and Configuration Guide
Tioli Identity Manager Version 5.1 Password Synchronization for Actie Directory Plug-in Installation and Configuration Guide SC23-9622-00 Tioli Identity Manager Version 5.1 Password Synchronization for
Product Overview Guide
IBM Security Identity Manager Version 6.0 Product Oeriew Guide GC14-7692-01 IBM Security Identity Manager Version 6.0 Product Oeriew Guide GC14-7692-01 Note Before using this information and the product
March 15, 2016. IBM Digital Analytics Explore User's Guide IBM
March 15, 2016 IBM Digital Analytics Explore User's Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 109. IBM Digital Marketing and Analytics
IBM InfoSphere MDM Web Reports User's Guide
IBM InfoSphere Master Data Management IBM InfoSphere MDM Web Reports User's Guide Version 11 Release 3 GI13-2652-01 IBM InfoSphere Master Data Management IBM InfoSphere MDM Web Reports User's Guide Version
Installation and User s Guide
IBM Tioli Storage Manager for System Backup and Recoery Installation and User s Guide Version 5.6 GC32-9076-02 IBM Tioli Storage Manager for System Backup and Recoery Installation and User s Guide Version
IBM Unica Marketing Platform Version 8 Release 5 June 1, 2012. Administrator's Guide
IBM Unica Marketing Platform Version 8 Release 5 June 1, 2012 Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 449. This edition
Load Balancer Administration Guide
Load Balancer Administration Guide ii Load Balancer Administration Guide Contents Chapter 3. Product oeriew...... 9 What is new in this release......... 10 Components of Load Balancer that are aailable
ERserver. iseries. Work management
ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication
Tiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups
General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These
IBM DB2 for Linux, UNIX, and Windows. Best Practices Physical Database Design for Online Transaction Processing (OLTP) environments
IBM DB2 for Linux, UNIX, and Windows Best Practices Physical Database Design for Online Transaction Processing (OLTP) enironments Authors The Physical Database Design for Online Transaction Processing
IT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
Reverse Proxy Scenarios for Single Sign-On
Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4 Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4 Note Before using this information and the product
IBM Endpoint Manager for Software Use Analysis Version 9. Scalability Guide. Version 3
IBM Endpoint Manager for Software Use Analysis Version 9 Scalability Guide Version 3 IBM Endpoint Manager for Software Use Analysis Version 9 Scalability Guide Version 3 Scalability Guide This edition
